January 19, 2014

The models of data stewardship: how to run a data governance program
In this video interview from the fall 2009 TDWI World Conference, Dyche, partner and co-founder of Baseline Consulting, and Nevala, a senior consultant at Baseline, give tips on how to manage data governance programs and detail what they've defined as the five models of data stewardship. In addition, they discuss the benefits that BI teams can get from data governance programs, the need to measure the success of governance initiatives and the importance of giving data stewards the authority and accountability that's required to succeed in that role.


The 5 Keys to Effective Vulnerability Assessment
The bad news here is that too many organizations are not taking care of the basics that they need to in order to secure their systems. The good news: there are many straightforward steps these organizations can take to dramatically improve the security of their systems. One of these steps is having an effective vulnerability risk management program. In fact, a vulnerability assessment to scan for and remedy security flaws and weak configurations within your infrastructure is one of the most effective things you can do to increase the security of your enterprise.


A Simple Model for Information Governance, Part 1 of 3
While both AIIM and ARMA cover the information portion of the topic well, they seem to struggle with bridging the discussion into “Governance.” Others, in the Governance, Risk Management and Compliance arena, make clear the linkage between “Governance” and risk management and compliance, but generally with little reference to “Information.” See OCEG’s “GRC Capability Model ‘Red Book’ 2.0.” (The current version, 2.1, doesn’t address this as well).


SQL Server Change Tracking: A Near Bullet-Proof ETL Solution (Part 1)
This multi-part series will concentrate primarily on the Extract portion of the data extraction, transformation, and loading (ETL) process using SQL Server Change Tracking (CT). The second part will concentrate more on design architecture with CT, and the last part also touch on the Translate and Load portions as well as a near-real world example using the AdventureWorks2012 database. This segment will introduce the concept of CT as well as provide a substantive demo (i.e., something better than a hello world example) of CT’s functionality.


Australian IT project failures spark new ICT governance standard
"The standard was prepared due to continuing failures of major IT projects to deliver expected value. The aim was to bring home the need for action from boards and senior business executives who are responsible for the overall governance of the organisation," said Standards Australia chief executive, Dr Bronwyn Evans. "If organisations want to obtain maximum value from their investment, governance of IT projects should not be left to the IT department alone."


Cloud computing faces a clear and present danger
The “war on terror” is a political reality for both Australia and the US, and business leaders clearly need to more broadly consider the risks involved in working with cloud service providers. Cloud services and offshoring style outsourcing arrangements can be a contractual minefield. They are made more complex when the provider is a multinational that operates infrastructure located in multiple legal jurisdictions. Contractual and legal complexities can clearly be simplified when services and infrastructure are located entirely in Australia, and provided by an Australian company.


Assessing Vulnerability, Strategy, and Cost
The pervasive use of virtualization, the consumerization of IT, and the adoption of Cloud solutions to support IT service delivery are drivers of "new infrastructure" innovation that require public sector technology managers to better identify and mitigate associated security risks. By leveraging a holistic approach to vulnerability, strategy and cost, IT managers can formulate sound plans and operative decisions relative to security and its management. This session will explore these considerations for new infrastructure, workforce mobility, and end-point application security.


Creating a SQL Server DBA's Library
DBAs - like any other information worker - creates, collects, shares and interacts with all different types of information to help him/her do their job. Some of these pieces of information may be needed repeatedly, some of the knowledge gathered over time may be better saved in a secure location. Some of the applications used should perhaps be available for everyone else in the team. This is the concept of a "DBA Library": it's not the library in traditional terms where you have books and journals stacked on your desk; rather it's a centralized and integrated repository of knowledge, information and applications for the DBA.


Obama unveils NSA reforms: 'Keep calm and carry on spying'
A senior White House official speaking to sister-site CBS News' Mark Knoller said the President wants to dance the delicate line between preserving the NSA's surveillance capabilities while addressing "privacy and civil liberties concerns." But Obama remained on the defensive, reiterating previous claims that the NSA was "not abusing authorities in order to listen to your private phone calls, or read your emails." Obama's comments will likely not appease everyone, considering the conflicting desires of the technology and telecoms industry, intelligence agencies, foreign diplomats and privacy advocates.


Minding the API Hierarchy of Needs with RAML and APIkit
The trend for the approach used in designing and building public APIs is towards a RESTful approach, and away from the SOAP web services approach, as shown by the following graph drawn from the directory of APIs within ProgrammableWeb.com. This trend also extends to the internal and partner APIs within the enterprise. ... Enter the RESTful API Modeling Language (RAML). As described on RAML.org, RAML “is a simple and succinct way of describing practically-RESTful APIs. It encourages reuse, enables discovery and pattern-sharing.”



Quote for the day:

"Do something. If it doesn't work, do something else. No idea is too crazy" -- Jim Hightower

No comments:

Post a Comment