Blockchain, which is akin to a distributed and decentralized accounts ledger, can record and verify high volumes of digital transactions, irrespective of location. So, blockchain has the capacity to contribute to many industry sectors, besides finance. As a secure technology platform, blockchain’s main benefits are accuracy, protection against fraud, and easy sharing of information. The […]
Fundamentals of Data Stewardship: Frameworks and Responsibilities
If organizations must have Data Stewardship, but struggle with deploying valuable Data Stewardship programs, how can companies mitigate the challenges and get better results faster? The Art of War, by the Chinese military general Sun Tzu, provides insight. He advised, “strategy without tactics is the slowest route to victory. Tactics without strategy is the noise […]
Artificial Neural Networks: An Overview
Neural networks and deep learning currently provide some of the most reliable image recognition, speech recognition, and natural language processing solutions available. However, it wasn’t always that way. One of the earliest and simplest teaching philosophies for artificial intelligence was marginally successful. It suggested that loading the maximum amount of information into a powerful computer […]
Challenges for Data Governance and Data Quality in a Machine Learning Ecosystem
The high availability of data, enhanced computing power and advanced Data Science technologies together make a lethal combination for data-driven outcomes. With the open data economy just around the corner, well-tuned Data Governance capabilities will be the goal of most businesses. Current Data Management practices are focused on risk free data sharing and regulatory compliance. […]
Data Governance and Streaming Analytics
Data volumes are continuing to grow and the use of streaming analytics therefore is becoming even more widespread, so many companies are beginning to realize that existing Data Governance practices must also evolve to remain relevant. “More is being asked of an organization’s governance platform than ever before,” says industry insider Robert Chernesky, about the […]
Data Strategy vs. Data Architecture
“Data Leadership is about understanding the organization’s relationship with data and seeking ways to help the organization meet its goals using whatever tools are available,” said Anthony Algmin, of Algmin Data Leadership in a DATAVERSITY® interview. Within that overall Data Leadership Framework, sit Data Strategy and Data Architecture as individual disciplines. Data Strategy Companies often […]
Case Study: Department of the Interior Lays Out Steps for Metadata Implementation
After the U.S. Office of Management and Governance issued the Open Data Policy, federal agencies set to the task of developing Enterprise Data Inventories to support a mandate of government transparency. The Department of the Interior (DOI) took this opportunity to create and implement a Metadata Management framework using an enterprise approach, properly documenting data […]
Data Architecture with Data Governance: A Proactive Approach
“Data Architecture is the physical implementation of the Business Strategy,” said Nigel Turner, Principal Consultant in E.M.E.A. at Global Data Strategy, speaking at the DATAVERSITY® Enterprise Data Governance Online Conference. “It’s a key part of the whole continuum that you need to build within an organization to manage data effectively,” and Data Governance forms an […]
Data Management and the Internet of Things
Billions of things with sensors surround people and their lives. These Internet of Things (IoT) interact with people, homes, factories, workplaces, cities, farms, and vehicles. Gartner predicts that by 2021, IoT technology will be in 95 percent of electronics for new product designs, from wearables to medical devices and beyond. IoT promises useful information, allowing […]
A Brief History of Data Security
Data security describes the protection of digital data from a cyberattack or a data breach. A data breach is the unauthorized opening of data, typically to read or copy the information. Stolen data may contain confidential information, such as customer data, credit card numbers, or trade secrets. A cyberattack is much more aggressive. It is […]