Sunday, June 30, 2019

Business needs to see infosec pros as trusted advisers

 
ISSUE DATE: 30 June 2019
TOP STORIES

Business needs to see infosec pros as trusted advisers
A better working relationship between the two sides of the business will bridge the misconception that IT risk is separate from business risk, writes RV Raghu.
READ MORE →

ADVERTISEMENT
IN DEPTH

AI storage: Machine learning, deep learning and storage needs
Artificial intelligence workloads impact storage, with NVMe flash needed for GPU processing – and there are other choices right through the AI data lifecycle.
READ MORE →

Lloyds Bank uses community effort to push out DevOps
The developers and IT operations teams were once separate. Now they are one. The challenge is getting this to scale across the business
READ MORE →

Microsoft’s road to multicloud support
From Microsoft’s perspective, multicloud is more about portability than resiliency.
READ MORE →

Managed SD-WAN is a developing part of WAN transformation
Despite SD-WAN’s benefits for WAN transformation, enterprises can’t avoid the shortcomings. Find out how many organisations address those challenges with managed SD-WAN.
READ MORE →

Cross Network Updates is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US,
Click to: Unsubscribe

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com

© 2019 TechTarget, Inc. all rights reserved.  Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List

Friday, June 28, 2019

Word of the Day: data quality

Word of the Day WhatIs.com
Daily updates on the latest technology terms | June 28, 2019
data quality

Data quality is a perception or an assessment of data's fitness to serve its purpose in a given context. The quality of data is determined by factors such as accuracy, completeness, reliability, relevance and how up to date it is. As data has become more intricately linked with the operations of organizations, the emphasis on data quality has gained greater attention.

An oft-cited estimate originating from IBM suggests the yearly cost of data quality issues in the U.S. during 2016 alone was about $3.1 trillion. Lack of trust by business managers in data quality is commonly cited among chief impediments to decision-making.

The problem of poor data quality was particularly common in the early days of corporate computing, when most data was entered manually. Even as more automation took hold, data quality issues rose in prominence. For a number of years, the image of deficient data quality was represented in stories of meetings at which department heads sorted through differing spreadsheet numbers that ostensibly described the same activity.

Determining data quality

Aspects, or dimensions, important to data quality include accuracy, conformity and consistency. As a first step toward improving data quality, organizations typically perform data asset inventories in which the relative value, uniqueness and validity of data can undergo baseline studies. Established baseline ratings for known good data sets are then used for comparison against data in the organization going forward.

Methodologies for such data quality projects include the Data Quality Assessment Framework (DQAF), which was created by the International Monetary Fund (IMF) to provide a common method for assessing data quality. The DQAF provides guidelines for measuring data dimensions that include timeliness, in which actual times of data delivery are compared to anticipated data delivery schedules.

Managing data quality

 

Software tools specialized for data quality management match records, delete duplicates, establish remediation policies and identify personally identifiable data. Management consoles for data quality support creation of rules for data handling to maintain data integrity, discovering data relationships and automated data transforms that may be part of quality control efforts.

Collaborative views and workflow enablement tools have become more common, giving data stewards, who are charged with maintaining data quality, views into corporate data repositories. These tools and related processes are often closely linked with master data management (MDM) systems that have become part of many data governance efforts.

Data quality management tools include IBM InfoSphere Information Server for Data Quality, Informatica Data Quality, Oracle Enterprise Data Quality, Pitney Bowes Spectrum Technology Platform, SAP Data Quality Management and SAS DataFlux.

Quote of the Day

 
"Reasonable data quality management tools do not only support the operational aspects of data stewardship, but they can also increase awareness of the value of high-quality information and motivate good data quality practices across the organization." - David Loshin

Learning Center

 

Explore data integration products for your organization
Data integration products help companies collect, manage and analyze the constant steam of data and translate it into meaningful information. This product roundup provides detailed insights to help you establish your data integration tool needs and sort through the buying process.

AIOps early adopters tackle data quality issues
AIOps has moved beyond futurists' imaginations and vendors' marketing hype to real-world production at enterprises that struggle with burgeoning IT resources. But it's far from a panacea.

A comparison of open source, real-time data streaming platforms
Real-time data streaming platforms, like Spark Streaming, Kafka Streams, Flink, Storm, Samza and Flume, have plenty in common. But what differentiates them? Here, industry analysts and IT professionals compared the many vendors on the market.

11 features to look for in data quality management tools
As the need for quality data has increased, so have the capabilities of data quality management tools. Expert David Loshin offers a comprehensive list of features that can enable efficient data quality management.

Why data quality tools matter in today's organizations
Data quality tools can help an organization save time and money and provide better customer service. So why aren't more organizations using the technology?

Quiz Yourself

 
Data management is a broad area of study that ___________ many more specialized fields.
a. comprises
b. is comprised of

Answer

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

Visit the Word of the Day Archives and catch up on what you've missed!

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.

How Netflix uses GraphQL to deliver its programming

Application Development Digest
A roundup of application development content from TechTarget's network | June 28th, 2019
TechTarget
FEATURED STORY
SmartBear acquires Cucumber, bolsters its BDD toolset

By Darryl K. Taft, News Writer

Already the owner of HipTest, SmartBear continues to expand via acquisitions with a purchase of Cucumber and its BDD product, Jam, in a move that reflects the company's stance on open source.
(SearchSoftwareQuality.com)

Advertisement
NEWS
 
Netflix content engineers pick GraphQL over REST, Falcor
Netflix's content engineering team builds the tools used to create the platform's shows. Here's how they built a new data integration system, and what they used to do so.
(SearchMicroservices.com)
 
Best of VMworld 2019 U.S. Awards: Rules & criteria

Read the rules, criteria and categories for the Best of VMworld 2019 U.S. Awards and learn about the requirements for each nomination.

(SearchServerVirtualization.com)

 
Brace for wave of M&A in microservices security
Microservices and DevOps made IT security a shared responsibility among enterprise stakeholders, and experts expect this shift to prompt mass consolidation among vendors.
(SearchITOperations.com)
 
Best of VMworld 2019 U.S. Awards: Nomination form
Submit your nominations for the top end-user, cloud and virtualization computing products for the Best of VMworld 2019 U.S. Awards.
(SearchServerVirtualization.com)
EXPERT ADVICE
 
How GitHub and Bitbucket augment key Git features

Git is, of course, many developers' go-to version control systems. Here's what Git can do, and how GitHub and Bitbucket bolster its capabilities.

(SearchSoftwareQuality.com)

 
Ways to pick the right application wireframing tool
App-dev teams rely on wireframes, and the relevant tools, to give stakeholders and investors a sense of an app's functions and UX.
(SearchMicroservices.com)
 
Test your Java code with these 5 static code analysis tools

Static code analysis tools are an effective means to mitigate preventable software bugs. These tools can test code from many angles.

(TheServerSide.com)

 
How distributed Agile teams overcome geographic boundaries

Shrewd planning, well-run meetings and coordination are hallmarks of Agile teams that find success being geographically distributed.

(SearchSoftwareQuality.com)

 
4 great Java-based CMS options

There is a wide variety of open source Java CMS tools. Explore these four platforms to see if they would be a match for your enterprise.

(TheServerSide.com)

 
Take this Web Components 101 crash course

Learn what Web Components are, and how you can best use them. For one, you can create UIs. Most design tools even support their direct use.

(SearchSoftwareQuality.com)

 
Use event processing to achieve microservices state management
Events can provide state information for microservices that need them with the right model. Here's how to build such applications.
(SearchMicroservices.com)
 
Before you use Jenkins X perform a Kubernetes security hardening

Developers, before you use Jenkins X to automate Kubernetes and manage containers, know what security vulnerabilities to look for.

(TheServerSide.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Application Development Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Application Development Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.
TechTarget

One month left to save $400 on your Activate pass.

Activate Registration Invite
Activate 2019 - Washington D.C. - September 9-12
New sessions added! Reserve your space by July 26 to save $400.

Learn how the world's most sophisticated organizations give employees hyper-personalized information and insights in real-time, making them more effective and engaged, while improving business results.

Activate, the Search and AI Conference, brings together technology and business leaders to learn about how AI-powered is delivering practical, measurable ROI in the enterprise.

Attend sessions from ExxonMobil, LexisNexis, Salesforce, Uber, Verizon Wireless, and more. View the Activate agenda and reserve your space by July 26 to save $400.



View the Activate 2018 Video Recap

Will Keynote - Activate 2018 Recap.png

This email was sent by Lucidworks | 235 Montgomery Street Suite 500 | San Francisco, CA 94104. If you're not interested in receiving these types of communication, click here to unsubscribe and we'll remove you from our mailing list. We value your privacy

Automation is the key to DevOps and cloud success

TechTarget
Business Technology Research     June 28, 2019
TechTarget
IN THIS ISSUE
Automation is the key to DevOps and cloud success
SPONSORED BY: BMC
The combination of DevOps and cloud change a lot about how and where work gets done, but not necessarily how quickly. Access this E-Book to learn how to efficiently automate cloud workloads and DevOps throughout your entire development process.
3 phishing FAQs answered
SPONSORED BY: SkOUT
Download the following paper to learn how to protect yourself and your organization from phishing attacks, with 3 pertinent phishing FAQs answered.
This newsletter is published by TechTarget, Inc.
275 Grove Street, Newton, Massachusetts, 02466 US

Click to: Unsubscribe

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List below, as described in our Privacy Policy. For additional assistance, please contact: webmaster@techtarget.com

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

Network Pulse | Edition 2 | Week of June 24th

 
 
Network Pulse
CiscoLive 2019
 
Will streaming news be the real winner of the 2020 Democratic debates?

As the debates ramp up, more Americans will stream their coverage rather than catch it on traditional TV. What does that mean for enterprise networks?

Read More
 
 
AppNeta 2019 State of Enterprise IT report
 
Shining a light on Shadow IT

According to Gartner, 20 to 50 percent of enterprise app spending takes place "in the shadows." How can enterprise IT regain control?

 
Read More
 
 
Google remote work survey
 
After long crawl, cloud adoption accelerates in financial sector

The emergence of trustworthy Regtech and Fintech are pushing banks closer to cloud migration for core-business functions.

 
Read More
 
 
                                                           

This email was sent to dasmith1973.blog@blogger.com. If you no longer wish to receive these emails you may unsubscribe at any time.