Open Framework, Information Management Strategy & Collaborative Governance | Data & Social Methodology - MIKE2.0 Methodology
Members
Collapse Expand Close

To join, please contact us.

Improve MIKE 2.0
Collapse Expand Close
Need somewhere to start? How about the most wanted pages; or the pages we know need more work; or even the stub that somebody else has started, but hasn't been able to finish. Or create a ticket for any issues you have found.
by: RickDelgado
12  Dec  2014

How Much Longer Until Flash Storage is the Only Storage?

In terms of trends, few are as clear and popular as flash storage. While other technology trends might be more visible among the general public (think the explosion of mobile devices), the rise of flash storage among enterprises of all sizes has the potential to make just as big of an impact in the world, even if it happens beneath the surface. There’s little question that the trend is growing and looks to continue over the next few years, but the real question revolves around flash storage and the other mainstream storage option: hard disk drives (HDD). While HDD remains more widely used, flash storage is quickly gaining ground. The question then becomes, how long do we have to wait before flash storage not only overtakes hard drives but becomes the only game in town? A careful analysis reveals some intriguing answers and possibilities for the future, but one that emphasizes a number of obstacles that still need to be overcome.

First, it’s important to look at why flash storage has become so popular in the first place. One of the main selling points of flash storage or solid-state drives (SSD) is its speed. Compared to hard drives, flash storage has much faster processing power. This is achieved by storing data on rewritable memory cells, which doesn’t require moving parts like hard disk drives and their rotating disks (this also means flash storage is more durable). Increased speed and better performance means apps and programs can launch more quickly. The capabilities of flash storage have become sorely needed in the business world since companies are now dealing with large amounts of information in the form of big data. To properly process and analyze big data, more businesses are turning to flash, which has sped up its adoption.

While it’s clear that flash array storage features a number of advantages in comparison to HDD, these advantages don’t automatically mean it is destined to be the sole storage option in the future. For such a reality to come about, solutions to a number of flash storage problems need to be found. The biggest concern and largest drawback to flash storage is the price tag. Hard drives have been around a long time, which is part of the reason the cost to manufacture them is so low. Flash storage is a more recent technology, and the price to use it can be a major barrier limiting the number of companies that would otherwise gladly adopt it. A cheap hard drive can be purchased for around $0.03 per GB. Flash storage is much more expensive at roughly $0.80 per GB. While that not seem like much, keep in mind that’s about 27 times more expensive. For businesses being run on a tight budget, hard drives seem to be the more practical solution.

Beyond the price, flash storage may also suffer from performance problems down the line. While it’s true that flash storage is faster than HDD, it also has a more limited lifespan. Flash cells can only be rewritten so many times, so the more times a business uses it, the more performance will suffer. New technology has the potential to increase that lifespan, but it’s still a concern that enterprises will have to deal with in some fashion. Another problem is that many applications and systems that have been in use for years were designed with hard drives in mind. Apps and operating systems are starting to be created with SSD as the primary storage option, but more changes to existing programs need to happen before flash storage becomes the dominant storage solution.

So getting back to the original question, when will flash storage be the new king of storage options? Or is such a future even likely? Experts differ on what will happen within the next few years. Some believe that it will be a full decade before flash storage is more widely used than hard drives. Others have said that looking at hard drives and flash storage as competitors is the wrong perspective to have. They say the future lies with not one or the other but rather both used in tandem through hybrid systems. The idea would be to use flash storage for active data that is used frequently, while hard drives would be used for bulk storage and archive purposes. There are also experts who say discussion over which storage option will win out is pointless because within the next decade, better storage technologies like memristors, phase-change memory, and even atomic memory will become more mainstream. However the topic is approached, current advantages featured in flash storage make it an easy choice for enterprises with the resources to use it. For now, the trend of more flash looks like it will continue its impressive growth.

Category: Web Content Management
No Comments »

by: Gil Allouche
10  Dec  2014

Pros and cons of Cloud providers and Hadoop solutions

Selecting a big data solution can be tricky at times with the different options available for enterprises. Deciding between a cloud big data analytics provider and an on-premise Hadoop solution comes down to recognizing the pros and cons of both options and how they will affect the bottom line.

Pros of On-premise Hadoop Solutions

As with any on-premise solution, on-premise Hadoop allows businesses to have complete control over their Hadoop cluster and perhaps more importantly their data. While the cloud is getting more accessible to industries facing heavy security and compliance regulations, some companies may prefer to keep everything in-house. On-premise Hadoop also avoids the complexity or potential log-in of vendor SLA agreements.

Cons of On-premise Hadoop solutions

Investing in Hadoop hardware can prove to be expensive depending on how it’s being used. Despite using low-cost commodity servers, extending to thousands of nodes can result in significant costs requiring attention to problems typically uncommon but become increase in frequency with a large number of servers.

Hadoop is also complex to maintain and manage. Companies will have to dedicate certain employees to deploying clusters every time a query is made. Once a cluster’s capacity is reached, it will also eat up resources adding additional nodes to th ecluster.

Pros of Cloud providers

One of the pros of using a cloud provider versus an on-premise Hadoop solution is the scalable nature of a cloud provider. Cloud platforms allow for total scalability allowing companies to access unlimited storage on demand. Enterprises can easily upscale or downscale depending on the IT requirements allowing business growth to be supported without expensive changes to your existing IT systems.

Another pro of using a cloud provider versus an on-premise Hadoop solution is the flexibility of solutions available both in and out of the workplace. Employees can more easily access files using devices like smartphones and laptops. Organizations can simultaneously share documents and other files over the cloud while supporting both internal and external collaboration.

Cons of Cloud Providers

Due to the massive growth of cloud computing, organizations are starting to rely on managed data centers run by cloud experts trained in maintaining and scaling shared, private and hybrid Clouds. Companies who do not have their own data scientists will have to make changes to their current cloud computing structure to meet their evolving data needs.

A risk organizations make with cloud providers is relying on the provider’s level of security and responsiveness to technical issues. Though rare, the cloud provider may have downtime that impacts a businesses’ ability to run queries or meet the customer’s demand for queries.

The path businesses take will depend on individual needs and circumstances as there are pros and cons to each type of solution. As big data moves mainstream, you will want to consider how you will take advantage of this resource.

 

Category: Business Intelligence
No Comments »

by: RickDelgado
06  Dec  2014

Keep Your Holidays Merry and Bright: Don’t Delay in Improving Holiday Security

With the holidays upon us, most businesses are dealing with what is usually their busiest time of the year. It’s a period of excitement and increased sales, but it’s also a time of worry and concern. In the wake of the recent data breaches at large retailers like Target and Home Depot, many businesses are approaching the holidays with a more cautious attitude, particularly toward security. Hackers have the potential to steal data and cause millions of dollars in damages, essentially crippling any business no matter their size. What’s even more alarming is that many companies haven’t responded effectively to the threat of security breaches. A recent study has shown that up to 58 percent of retailers are actually less secure compared to a year ago. While some may have added new network security features, cyber attackers have had added time to get inside a business system and take advantage of any weaknesses they have found. The lesson is that organizations need to work on their security for the holidays, and they need to do so immediately. Any delay could be costly.

 

When it comes to improving business security, one of the first steps is to identify where a company may be vulnerable. This can be accomplished primarily through vulnerability scans. These scans are basically an automated test that businesses can run to find weaknesses within their networks and systems. Any vulnerabilities may eventually be used by hackers to infiltrate the network and steal valuable and sensitive information. This is a particular concern during the holidays since the number of credit card purchases increases dramatically. With the weaknesses properly identified, companies will know where to focus their attention.

 

Finding vulnerabilities as soon as possible is especially important because current hacking techniques are different than those used years ago. While some hackers may still employ traditional hit-and-run tactics, many others have the long game in mind. Companies that experience attacks during the holidays may actually be suffering from an infiltration that occurred as long as six months ago. Surprisingly, recent research has also shown that attacks during the holiday shopping season don’t actually increase in number, but that doesn’t mean hackers aren’t busy. Many may infiltrate a network during that time but not launch an attack until many months have passed. The main point is that finding vulnerabilities quickly is the first step businesses need to take, and fixing those problems needs to follow immediately.

 

Companies also need to be on guard for other cyber attacks targeting their business. One of the most common during the holidays is spear phishing. Spear phishing isn’t necessarily targeted toward a company’s network but rather at the employees. The idea is to deceive people into believing an email or similar message is real and have them click on a link. That link usually leads to downloading malware or some other type of virus. During the holidays, spear phishing usually comes in the form of fake charity emails, false shipping confirmations, or a fraudulent bank notification. Since users are making more unusual purchases during this time of year, they are more susceptible to believing this type of scam. While it may seem like this is more of a problem for individuals than for an organization, employees are using personal mobile devices at work much more often through BYOD policies, and those devices often connect to the company’s network. If those devices have been infected with malware, the business could be in trouble.

 

Combating this type of cyber attack requires companies to inform and train their employees. Workers need to know about the security threats that are out there. That means spotting the warning signs and knowing how to respond to them. This is especially important during the holidays since many workers are only seasonal and may not receive adequate training. Even if the job is temporary, employees still need to be kept up to date about the risks and how to prevent them. Taking this proactive step immediately can help businesses avoid security breaches during the holidays and into the future.

 

The last thing any business wants is to deal with a security breach during the holidays. Though the threats may feel overwhelming, it’s never too late to start improving security, finding vulnerabilities, and educating employees about the dangers they may face. Fighting the threats is an ongoing battle that should receive extra attention at any time of year, not just the holiday shopping season. With better security, businesses can feel more confident about protecting customer information and preparing for another busy year ahead.

 

Category: Business Intelligence
No Comments »

by: Bsomich
06  Dec  2014

MIKE2.0 Community Update

 
 logo.jpg

Did You Know? 

MIKE’s Integrated Content Repository brings together the open assets from the MIKE2.0 Methodology, shared assets available on the internet and internally held assets. The Integrated Content Repository is a virtual hub of assets that can be used by an Information Management community, some of which are publicly available and some of which are held internally.

Any organisation can follow the same approach and integrate their internally held assets to the open standard provided by MIKE2.0 in order to:

  • Build community
  • Create a common standard for Information Development
  • Share leading intellectual property
  • Promote a comprehensive and compelling set of offerings
  • Collaborate with the business units to integrate messaging and coordinate sales activities
  • Reduce costs through reuse and improve quality through known assets

The Integrated Content Repository is a true Enterprise 2.0 solution: it makes use of the collaborative, user-driven content built using Web 2.0 techniques and technologies on the MIKE2.0 site and incorporates it internally into the enterprise. The approach followed to build this repository is referred to as a mashup.

Feel free to try it out when you have a moment- we’re always open to new content ideas.

Sincerely,

MIKE2.0 Community  

Contribute to MIKE:

Start a new article, help witharticles under construction or look for other ways to contribute.

Update your personal profile to advertise yourself to the community and interact with other members.

Useful Links:
Home Page
Login
Content Model
FAQs
MIKE2.0 Governance

Join Us on
42.gif

Follow Us on
43 copy.jpg

Join Us on
 images.jpg

 

Did You Know?
All content on MIKE2.0 and any contributions you make are published under the Creative Commons license. This allows you free re-use of our content as long as you add a brief reference back to us.

 

This Week’s Blogs for Thought:

Could Data Governance Actually Endanger Data?

One of my favorite books is SuperFreakonomics by economist Steven Levitt and journalist Stephen Dubner, in which, as with their first book and podcast, they challenge conventional thinking on a variety of topics, often revealing counterintuitive insights about how the world works. One of the many examples from the book is their analysis of the Endangered Species Act (ESA) passed by the United States in 1973 with the intention to protect critically imperiled species from extinction.

Read more.

Trading Your Way to IT Simplicity

Stop reading now if your organisation is easier to navigate today than it was 3, 5 or 10 years ago.  The reality that most of us face is that the general ledger that might have cost $100,000 to implement twenty or so years ago will now cost $1 million or even $10 million.  Just as importantly, it is getting harder to implement new products, services or systems. The cause of this unsustainable business malaise is the complexity of the technology we have chosen to implement.

Read more.
Improving Network Security for Small Businesses 

You’ve likely read all about them–the massive security breaches and cyber attacks hitting major corporations like Home Depot, Target, and even the New York Times. These damaging attacks have cost these companies millions of dollars in damages, and they’re just a portion of all the security risk stories out there. As a small business owner, you may be tempted to think your company doesn’t have to worry as much about cyber attackers inflicting damage on your operations. After all, compared to a big business, your company has relatively few resources and doesn’t leave nearly as big of a footprint on the market. That belief, however, could leave you and your business vulnerable.

Read more.

 

Category: Information Development
No Comments »

by: Ocdqblog
30  Nov  2014

Could data governance actually endanger data?

One of my favorite books is SuperFreakonomics by economist Steven Levitt and journalist Stephen Dubner, in which, as with their first book and podcast, they challenge conventional thinking on a variety of topics, often revealing counterintuitive insights about how the world works.

One of the many examples from the book is their analysis of the Endangered Species Act (ESA) passed by the United States in 1973 with the intention to protect critically imperiled species from extinction.

Levitt and Dubner argued the ESA could, in fact, be endangering more species than it protects. After a species is designated as endangered, the next step is to designate the geographic areas considered critical habitats for that species. After an initial set of boundaries is made, public hearings are held, allowing time for developers, environmentalists, and others to have their say. The process to finalize the critical habitats can take months or even years. This lag time creates a strong incentive for landowners within the initial geographic boundaries to act before their property is declared a critical habitat or out of concern that it could attract endangered species. Trees are cut down to make their land less hospitable or development projects are fast-tracked before ESA regulation would prevent them. This often has the unintended consequence of hastening the destruction of more critical habitats and expediting the extinction of more endangered species.

This made me wonder whether data governance could be endangering more data than it protects.

After a newly launched data governance program designates the data that must be governed, the next step is to define the policies and procedures that will have to be implemented. A series of meetings are held, allowing time for stakeholders across the organization to have their say. The process to finalize the policies and procedures can take weeks or even months. This lag time provides an opportunity for developing ways to work around data governance processes once they are in place, or ways to simply not report issues. Either way this can create the facade that data is governed when, in fact, it remains endangered.

Just as it’s easy to make the argument that endangered species should be saved, it’s easy to make the argument that data should be governed. Success is a more difficult argument. While the ESA has listed over 2,000 endangered species, only 28 have been delisted due to recovery. That’s a success rate of only one percent. While the success rate of data governance is hopefully higher, as Loraine Lawson recently blogged, a lot of people don’t know if their data governance program is on the right track or not. And that fact in itself might be endangering data more than not governing data at all.

 

Category: Information Governance
No Comments »

by: Robert.hillard
22  Nov  2014

Trading your way to IT simplicity

Stop reading now if your organisation is easier to navigate today than it was 3, 5 or 10 years ago.  The reality that most of us face is that the general ledger that might have cost $100,000 to implement twenty or so years ago will now cost $1 million or even $10 million.  Just as importantly, it is getting harder to implement new products, services or systems.

The cause of this unsustainable business malaise is the complexity of the technology we have chosen to implement.

For the general ledger it is the myriad of interfaces. For financial services products it is the number of systems that need to keep a record of every aspect of business activity.  For telecommunications it is the bringing together the OSS and BSS layers of the enterprise.  Every function and industry has its own good reasons for the added complexity.

However good the reasons, the result is that it is generally easier to innovate in a small nimble enterprise, even a start-up, than in the big corporates that are the powerhouse of our economies.

While so much of the technology platform creates efficiencies, often enormous and essential to the productivity of the enterprise, it generally doesn’t support or even permit rapid change.  It is really hard to design the capacity to change into the systems that support the organisation.  The more complex an environment becomes the harder it is to implement change.

Enterprise architecture

Most organisations recognise the impact of complexity and try to reduce it by implementing an enterprise architecture in one form or another.  Supporting the architecture is a set of principles which, if implemented in full, will support consistency and dramatically reduce the cost of change.  Despite the best will in the world, few businesses or governments succeed in realising their lofty architectural principles.

The reason is that, while architecture is seen as the solution, it is too hard to implement.  Most IT organisations run their business through a book of projects.  Each project signs-up to an architecture but quickly implements compromises as challenges arise.

It’s no wonder that architects are perhaps the most frustrated of IT professionals.  At the start of each project they get wide commitment to the principles they espouse.  As deadlines loom, and the scope evolves, project teams make compromises.  While each compromise may appear justified they have the cumulative effect of making the organisation more rather than less complex.

Complexity has a cost.  If this cost is full appreciated, the smart organisation can see the value in investing in simplification.

Measuring simplicity

While architects have a clear vision of what “simple” looks like, they often have a hard time putting a measure against it.  It is this lack of a measure that makes the economics of technology complexity hard to manage.

Increasingly though, technologists are realising that it is in the fragmentation of data across the enterprise that real complexity lies.  Even when there are many interacting components, if there is a simple relationship between core information concepts then the architecture is generally simple to manage.

Simplicity can be achieved through decommissioning (see Value of decommissioning legacy systems) or by reducing the duplication of data.  This can be measured using the Small Worlds measure as described in MIKE2.0 or chapter 5 of my book Information-Driven Business.  The idea is further extended as “Hillard’s Graph Complexity” in Michael Blaha’s book, UML Database Modelling Workbook.

In summary, the measure looks at how many steps are required to bring together key concepts such as customer, product and staff.  The more fragmented information is, the more difficult any business change or product implementation becomes.

Consider the general ledger discussed earlier.  In its first implementation in the twentieth century, each key concept associated with the chart of accounts would have been managed in a master list whereas by the time we implement the same functionality today there would be literally hundreds if not thousands of points where various parts of the chart of accounts are required to index interfaces to subsidiary systems across the enterprise.

Trading simplicity

One approach to realising these benefits is to have dedicated simplification projects.  Unfortunately these are the first projects that get cut if short-term savings are needed.

Alternatively, imagine if every project that adds complexity (a little like adding pollution) needed to offset that complexity with equal and opposite “simplicity credits”.  Having quantified complexity, architects are well placed to define whether each new project simplifies the enterprise or adds complexity.

Some projects simply have no choice but to add complexity.  For example, a new marketing campaign system might have to add customer attributes.  However, if they increase the complexity they should buy simplicity “offsets” a little like carbon credits.

The implementation of a new general ledger might provide a great opportunity to reduce complexity by bringing various interfaces together or it could add to it by increasing the sophistication of the chart of the accounts.

In some cases, a project may start off simplifying the enterprise by using enterprise workflow or leveraging a third-party cloud solution, however in the heat of implementation be forced to make compromises that make it a net complexity “polluter”.

The CIO has a role to act as the steward of the enterprise and measure this complexity.  Project managers should not be allowed to forget their responsibility to leave the organisation cleaner and leaner at the conclusion of their project.  They should include the cost of this in their project budget and purchase offsetting credits from others if they cannot deliver within the original scope due complicating factors.

Those that are most impacted by complexity can pick their priority areas for funding.  Early wins will likely reduce support costs and errors in customer service.  Far from languishing in the backblocks of the portfolio, project managers will be queueing-up to rid the organisation of many of these long-term annoyances to get the cheapest simplicity credits that they can find!

Category: Enterprise2.0, Information Governance, Information Strategy
No Comments »

by: RickDelgado
20  Nov  2014

Improving Network Security for Small Businesses

You’ve likely read all about them–the massive security breaches and cyber attacks hitting major corporations like Home Depot, Target, and even the New York Times. These damaging attacks have cost these companies millions of dollars in damages, and they’re just a portion of all the security risk stories out there. As a small business owner, you may be tempted to think your company doesn’t have to worry as much about cyber attackers inflicting damage on your operations. After all, compared to a big business, your company has relatively few resources and doesn’t leave nearly as big of a footprint on the market. That belief, however, could leave you and your business vulnerable. A study from the National Cyber Security Alliance shows that one out of every five businesses becomes a victim of cyber attacks every year, with an even larger portion targeted by hackers. Small businesses need to work to improve their network security, because it’s not a question of if a cyber attack happens but when.

Of course, many small business owners are aware of the security risks and would like nothing more than to invest in the features that would help them repel hackers. The problem is many of these features require money, time, and other resources, and since many small businesses can only barely make ends meet, security issues tend to fall by the wayside. Luckily, there are still several methods you can employ that will increase your network security and keep your small business safe at no extra cost. One of the first and foremost measures that will provide added protection for your network is having stronger passwords for all your accounts as well as your employees’ accounts. A strong password is long–usually around eight characters or more. The password should contain capital letters, numbers, and symbols, and should not have simple words or phrases, no matter how memorable they might be to you. In addition to stronger passwords, small business leaders should also keep tight control over who has administrative access, which can be made easier through existing tools already found on many desktops and laptops (the Local Group Policy Editor for Windows 8 is a good example of this).

Much of a small businesses network security will depend on the workers. While employees may do great work, they also represent a weakness in a security system. Employees can be susceptible to spearfishing attacks and social engineering, which may introduce malware into the network and infect other systems. The best way to combat this is to educate your employees. Teach them the common methods hackers use to gain access to a network and demonstrate the methods they can practice to prevent these attacks from happening. Small business owners should also make sure every employee’s mobile device is secure, since mobile technology is an increasingly popular target for cyber attacks.

All small business owners should also identify the points in their network that are the most vulnerable. While this can be done with purchased software, it’s well known that wireless routers are a favorite entry point for persistent hackers. In fact, recent research shows that around 80% of the 25 best-selling wireless routers for small and home offices on Amazon had notable security vulnerabilities. Hackers can easily exploit wireless routers, often to damaging effect. There are a number of ways you can make your wireless router more secure for your small business. First, you should never use the default IP ranges that come with the router since attackers can easily predict certain addresses and use them. Second, make sure you turn on your router’s encryption while turning off WPS. And third, as mentioned earlier, make sure your router’s password is particularly strong. Change it from the default password you’re given and turn it into one that’s near impossible to crack.

As always, there are security products out there available for purchase, each with varying degrees of features, quality, and price. While the options are plentiful, you should always take into consideration a number of different factors. You need to ensure you have the staff that is trained to fully utilize the software. You also should make sure the program can be configured quickly and easily to suit your needs. Also, try to get software that will have new capabilities added to it as your small business grows over the years. With these considerations in mind, you’ll be sure to pick a security product that’s right for your business.

Attacks happen, and unfortunately there’s no way to prevent them 100% of the time. The best you can do to protect your small business network is to have the security features that will give you a fighting chance. With improved network security, you’ll be able to grow your business with confidence and a safe outlook for the future.

 

Category: Business Intelligence
No Comments »

by: Bsomich
15  Nov  2014

MIKE2.0 Community Update

Missed what’s been happening in the MIKE2.0 community? Check out our bi-weekly update:

 
 logo.jpg

Business Drivers for Better Metadata Management

There are a number Business Drivers for Better Metadata Management that have caused metadata management to grow in importance over the past few years at most major organisations. These organisations are focused on more than just a data dictionary across their information – they are building comprehensive solutions for managing business and technical metadata.

Our wiki article on the subject explores many factors contributing to the growth of metadata and guidance to better manage it:  

Feel free to check it out when you have a moment.

Sincerely,MIKE2.0 Community

Contribute to MIKE:

Start a new article, help witharticles under construction or look for other ways to contribute.

Update your personal profile to advertise yourself to the community and interact with other members.

Useful Links:
Home Page
Login
Content Model
FAQs
MIKE2.0 Governance

Join Us on
42.gif

Follow Us on
43 copy.jpg

Join Us on
images.jpg

Did You Know?
All content on MIKE2.0 and any contributions you make are published under the Creative Commons license. This allows you free re-use of our content as long as you add a brief reference back to us.

 

This Week’s Blogs for Thought:

Is BYON a Bigger Threat than BYOD?

No doubt you’ve heard of bring your own device (BYOD) already. It’s been nearly impossible to avoid the hype surrounding BYOD and all the benefits supporters say it offers. While companies may be focused on BYOD, another trend has slowly but steadily been catching on. It’s called bring your own network (BYON), and while it might sound similar to BYOD, it’s actually creating even more headaches for IT departments. While BYOD is something businesses can adopt and regulate, BYON mostly operates in the shadows. Bring your own network essentially means employees are using their own mobile devices’ 3 and 4G capabilities to create or access wireless hotspots. This is often done when workers determine that the current business network does not meet the demands of their jobs. As you can imagine this trend is causing more than its fair share of problems, particularly when it comes to security.

Read more.

What are your Big Data Application options? 

Hadoop is an excellent tools for collecting and sorting massive volumes of data, but businesses must also use analytics and visualization tools on top of Hadoop in order to reap the full benefits from big data. Here’s a quick list of apps to successfully manage and leverage the massive amounts of information generated as organizations grow.Read more.

Open Data opens eyes to Data Quality and Governance

Calls for increased transparency and accountability lead government agencies around the world to make more information available to the public as open data. As more people accessed this information, it quickly became apparent that data quality and data governance issues complicate putting open data to use.
“It’s an open secret,” Joel Gurin wrote, “that a lot of government data is incomplete, inaccurate, or almost unusable. Some agencies, for instance, have pervasive problems in the geographic data they collect: if you try to map the factories the EPA regulates, you’ll see several pop up in China, the Pacific Ocean, or the middle of Boston Harbor.”Read more.

  Forward this message to a friend

 

Category: Information Development
No Comments »

by: Ocdqblog
12  Nov  2014

Open Data opens eyes to Data Quality and Data Governance

Calls for increased transparency and accountability lead government agencies around the world to make more information available to the public as open data. As more people accessed this information, it quickly became apparent that data quality and data governance issues complicate putting open data to use.

“It’s an open secret,” Joel Gurin wrote, “that a lot of government data is incomplete, inaccurate, or almost unusable. Some agencies, for instance, have pervasive problems in the geographic data they collect: if you try to map the factories the EPA regulates, you’ll see several pop up in China, the Pacific Ocean, or the middle of Boston Harbor.”

A common reason for such data quality issues in the United States government’s data is what David Weinberger wrote about Data.gov. “The keepers of the site did not commit themselves to carefully checking all the data before it went live. Nor did they require agencies to come up with well-formulated standards for expressing that data. Instead, it was all just shoveled into the site. Had the site keepers insisted on curating the data, deleting that which was unreliable or judged to be of little value, Data.gov would have become one of those projects that each administration kicks further down the road and never gets done.”

Of course, the United States is not alone in either making government data open (about 60 countries have joined the Open Government Partnership) or having it reveal data quality issues. Victoria Lemieux recently blogged about data issues hindering the United Kingdom government’s Open Data program in her post Why we’re failing to get the most out of open data.

One of the data governances issues Lemieux highlighted was data provenance. “Knowing where data originates and by what means it has been disclosed,” Lemieux explained, “is key to being able to trust data. If end users do not trust data, they are unlikely to believe they can rely upon the information for accountability purposes.” Lemieux explained that determining data provenance can be difficult since “it entails a good deal of effort undertaking such activities as enriching data with metadata, such as the date of creation, the creator of the data, who has had access to the data over time. Full comprehension of data relies on the ability to trace its origins. Without knowledge of data provenance, it can be difficult to interpret the meaning of terms, acronyms, and measures that data creators may have taken for granted, but are much more difficult to decipher over time.”

I think the bad press about open data is a good thing because open data is opening eyes to two basic facts about all data. One, whenever data is made available for review, you will discover data quality issues. Two, whenever data quality issues are discovered, you will need data governance to resolve them. Therefore, the reason we’re failing to get the most out of open data is the same reason we fail to get the most out of any data.

 

Category: Data Quality, Information Governance
No Comments »

by: RickDelgado
11  Nov  2014

Is BYON a Bigger Threat Than BYOD?

No doubt you’ve heard of bring your own device (BYOD) already. It’s been nearly impossible to avoid the hype surrounding BYOD and all the benefits supporters say it offers. While companies may be focused on BYOD, another trend has slowly but steadily been catching on. It’s called bring your own network (BYON), and while it might sound similar to BYOD, it’s actually creating even more headaches for IT departments. While BYOD is something businesses can adopt and regulate, BYON mostly operates in the shadows. Bring your own network essentially means employees are using their own mobile devices’ 3 and 4G capabilities to create or access wireless hotspots. This is often done when workers determine that the current business network does not meet the demands of their jobs. As you can imagine this trend is causing more than its fair share of problems, particularly when it comes to security.

One of the main points of contention with BYON is how it allows employees to completely avoid the corporate network. Perhaps they do it because they think the company’s network is too slow for what they need. Or maybe they use a different network to gain access to sites that have been blocked. It’s easy to see that avoiding network filters and security measures can lead to significant problems for businesses. Security measures, such as firewalls and antivirus protection, are put in place to protect the network and the devices that have been granted access to it. Employees that use their devices to avoid the corporate network may also represent a weak point that hackers can attack and exploit, gaining access to data and business systems should the workers ever connect to the regular network at any point.

When a business enacts a BYOD policy, it allows them to carefully monitor and create controls for all devices being used for work. However, by using BYON, many employees choose to go behind the IT department’s back, using devices that haven’t been outfitted with the sometimes necessary controls that can improve BYOD security. Without these controls, IT workers will have no way to monitor each employee’s device, nor can they install the protective measures that can serve as a deterrent to more security threats. This is especially important because when employees use their mobile devices for work purposes, they also pose the risk of accidentally accessing unauthorized content or downloading malicious apps and malware. Without security controls, IT has no way to detect malware and no way to wipe a device that gets lost or stolen. Perhaps some employees see this as a benefit, but the fact remains that a device without controls is a bigger risks than one without.

BYON also increases the risks of data leakage. With insecure access points in play, hackers will likely have an easier time infiltrating a mobile device and perusing its contents. If an employee uses the device for work, it may contain company data and other sensitive information that can be used by a hacker to spread further damage. IT departments are normally able to monitor data within the company, but when it comes to devices connected to other networks, IT has no way to ensure data security. Devices that utilize BYON are essentially outside the IT department’s jurisdiction, and that can lead to numerous problems usually not foreseen by the employee.

These security challenges that stem from bring your own network are certainly troubling, but there are solutions that companies can put in place. Many businesses may choose to fully and unequivocally embrace BYOD by establishing clear and precise guidelines over what is permitted while also communicating these policies to employees. Many workers use BYON not knowing it is against company policy, so clear communication can help avoid these problems. Companies should also run business risk assessments to more accurately identify where the weak points are in their network and what data might be in danger of leaking or getting stolen. An outright ban on Wi-Fi hot spots may also be necessary, but that’s for the most extreme cases.

Bring your own network is usually a response to restrictive network policies. Employees want to use their own devices at peak performance outside network restrictions, but the consequences of doing this usually lead to more security problems. Activities outside the network can actually create bigger security threats than what companies see with BYOD, so it’s important for businesses to address BYON problems before they become damaging. An early response can help a company direct its focus to other important matters while keeping networks and systems safe.

 

Category: Business Intelligence
No Comments »

Calendar
Collapse Expand Close
TODAY: Sun, March 29, 2015
March2015
SMTWTFS
1234567
891011121314
15161718192021
22232425262728
2930311234
Recent Comments
Collapse Expand Close