Educause 2011 Data Administration Constituent Group October 19th, 2011

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

What is HathiTrust and How Can it Make a Difference? Sourcing and Scaling brought to the collective collection.
Digital Preservation A Matter of Trust. Context * As of March 5, 2011.
Doug Couto Information Systems and Technology Committee (ABJ50) Washington, DC January 25, 2011.
Travelers CyberRisk for Insurance Companies
Privacy: Facebook, Twitter
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Today’s Speakers  Diane Dagefoerde, CIO, Arts and Sciences, The Ohio State University  Butch Juelg, Associate Vice Chancellor, Technology Services,
Build the Binary Group in the Cloud Brand Niemann Senior Enterprise Architect Binary Group August 5, Updated August 8,
Educause 2009 Data Administration Constituent Group November 5th, /5/20091Educause DASIG Constituent Group.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
Agenda The Colligo Vision Unified Solutions for & Records Management Colligo Manager Colligo Contributor Pro Colligo Briefcase Colligo Administrator.
Enterprise Risk Management EXECUTIVE POLICY GROUP Enterprise Risk Managementwww.utdallas.edu Enterprise Risk Management Campus Safety.
Technology Trends Impacting Community Colleges Technology trends impacting community colleges and SJECCD over the next five years, Ben Seaberry.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Your Professional Network Powered by NCURA By: Stephanie Moore NCURA Community Curator.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
SEC835 Database and Web application security Information Security Architecture.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Handling Sensitive Data: Security, Privacy, and Other Considerations Rodney Petersen Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Managing with Technology: What’s Ahead on the Road to High-Performance Government.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Chapter 1 Course Orientation. Outline Definition of data source management Definition of data source management Importance data source management to organization.
Microsoft Confidential - Internal Only Cloud Services for Collaboration – the road to Wave 15.
DEVELOPING A RISK ANALYSIS. What is a risk analysis? A Risk analysis is concerned with identifying the risks that an organisation is exposed to, identifying.
Dell Connected Security Solutions Simplify & unify.
Becky Briggs, BSMP, CMQ/OE, CBIP Director/Data Steward ARC May 10, 2011 Data Governance How to Keep Your DG Program Viable for the Long Haul.
Utilizing Social Media A Corporate Human Resource Point of View Gerasimos Papandrikopoulos afceayouth.com, Administrator 4 th Student Conference May 30,
American Society of Engineers of Indian Origin 30 th National Convention Sasi K. Pillay Chief Information Officer University of Wisconsin System September.
HathiTrust’s Past, Present and Future. Short- and Long-term Functional Objectives Short-term Page turner mechanism (and Mobile!) Branding (overall initiative;
ADMINISTRATION & MANAGEMENT TOOLS BY: DURGESH PATEL & KHUSHBOO KADBER
IT Internal Audit “Hot Topics” April 2011 Agenda Survey Overview Survey Results IT Internal Audit Hot Topics Overview – Social Media and Social Networking.
INTELLIGENCE. INNOVATION. INTEGRITY Long Term Data Storage Database Archiving Functions.
Graph Data Analytics Arka Mukherjee, Ph.D. Global IDs Resolving Complexity at an Enterprise Scale.
Management of IT Auditing John Schultz. Define IT – What areas should be considered for inclusion in an IT audit plan? Evaluate IT-related Risk – Doing.
1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
TOP TEN IT ISSUES OF Help Us Improve and Grow Thank you for participating in today’s session. We’re very interested in your feedback. Please take.
Protecting your Managed Services Practice: Are you at Risk?
Financial Sector Interdependencies/Dependencies From a Regional Financial Institution Perspective May 2, /1/20161.
Integration choices 3 Connect your Existing apps to the cloud Build out your business without building new datacenters Run existing integrations in.
D E P A R T M E N T O F COMPUTER SCIENCE AND SYSTEMS ANALYSIS SCHOOL OF ENGINEERING & APPLIED SCIENCE O X F O R D O H I O MIAMI UNIVERSITY Business Intelligence.
CIW CURRICULUM.  Definition: the management and processing of information using computers and computer networks.  Most businesses have an IT department.
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
© David L. Wells Integrating Analytics into Business Intelligence Dave Wells
Health Management Information Systems Health Information Systems Overview Lecture b This material Comp6_Unit2b was developed by Duke University, funded.
Sierra Pacific Community College District 7300 College Avenue Sacramento, CA
Draft - Enterprise Risk Management Risk Universe
Cloud Adoption Framework
SQL Server 2016 features by edition
Slide Template for Module 4 Data Storage, Backup, and Security
A Shift in the Data Security Paradigm
Higher Education’s 2016 Top 10 IT Issues: Divest, Reinvest,
Microsoft Power BI with Azure Services
Educause DASIG Constituent Group
ICT Security Expert, DC Cloud Practice Leader HUAWEI
Selecting a Business Continuity Planning Tool
Makes Navigating Plants Safer, More Efficient
What is business intelligence?
CYB 110 Education for Service-- tutorialrank.com
All PARTNERS ACCESS NETWORK
Threat Landscape for Data Security
Cloud OS App Launch Services MINI-Case Study
Social Networks.
Clouds & Containers: Case Studies for Big Data
In BI, One Size Does Not Fit All
Forward thinking companies see the value in convergence and collaboration on an all-IP network
Harness the competitive advantages of Power BI and obtain business-critical insights with Adastra’s enterprise analytics platform using Microsoft Azure.
The Database Environment
Presentation transcript:

Educause 2011 Data Administration Constituent Group October 19th, 2011 Educause DASIG Constituent Group

Educause DASIG Constituent Group Data Governance The discipline embodies a convergence of data quality, data management, business process management, and risk management surrounding the handling of data in an organization. Through data governance, organizations are looking to exercise positive control over the processes and methods used by their data stewards to handle data. Wikipedia Educause DASIG Constituent Group

Educause DASIG Constituent Group Data Governance Support Processes Education/Documentation Educause DASIG Constituent Group

Educause DASIG Constituent Group Who has Data Governance Under Control ? Educause DASIG Constituent Group

Educause DASIG Constituent Group DG in Relation to … The “Cloud” Social Media Mobile Technology Analytics Educause DASIG Constituent Group

DG from the Perspective of … Legal Regulatory Institutional Educause DASIG Constituent Group

Educause DASIG Constituent Group The “Cloud” Protection/Confidentiality Bankruptcy Disclosure Intrusions Foreign Governments Professional Hackers/Crime Groups Social Hacking Educause DASIG Constituent Group

Educause DASIG Constituent Group The “Cloud” Integration With existing in house data Between Cloud providers Educause DASIG Constituent Group

Educause DASIG Constituent Group The “Cloud” Backup/Recovery Data loss Audit requirements Change control Disaster recovery Educause DASIG Constituent Group

Educause DASIG Constituent Group The “Cloud” Archival Legal Institutional Research Educause DASIG Constituent Group

Educause DASIG Constituent Group Social Media Blogs Tweets Facebook Other Educause DASIG Constituent Group

Educause DASIG Constituent Group Social Media Unstructured data/Text analytics Confidentiality IP Educause DASIG Constituent Group

Educause DASIG Constituent Group Social Media Volume Organization Provisioning Educause DASIG Constituent Group

Educause DASIG Constituent Group Social Media Archival Metadata Searching Educause DASIG Constituent Group

Educause DASIG Constituent Group Mobile Technology Mobile apps Mobile devices replace field notebooks Security Educause DASIG Constituent Group

Educause DASIG Constituent Group Analytics Consolidation Definition Warehousing Metadata Provisioning BI Tools Educause DASIG Constituent Group

Educause DASIG Constituent Group Mike Fary Enterprise Data Architect University of Chicago mfary@uchicago.edu Educause DASIG Constituent Group