Why BI ?
Performance management
Identify trends
Cash flow trend
Fine-tune operations
Sales pipeline analysis
Future projections
business Forecasting
Decision Making Tools
Convert data into information
How to Think ?
What happened?
What is happening?
Why did it happen?
What will happen?
What do I want to happen?
Much of the software world has moved to microservices and a Service-Oriented Architecture (SOA) when designing large-scale systems. An alternate, less-known philosophy of building large systems is called Data-Oriented Architecture (DOA), which trades off the scale and maintainability challenges of SOA with a rigorous focus on schema representation in a monolithic data access layer. For microservices-based systems where scale across verticals is a challenge, DOA might be an appropriate alternative.
Speaker: Eyas Sharaiha - Senior Software Engineer at Google
Capturing Business Requirements For Scorecards, Dashboards And ReportsJulian Rains
This paper helps Management Information and Business Intelligence related projects build a solid foundation for their reporting business requirements gathering. It defines the scope of the information needed to design and build dashboards, scorecards and other types of report.
Why BI ?
Performance management
Identify trends
Cash flow trend
Fine-tune operations
Sales pipeline analysis
Future projections
business Forecasting
Decision Making Tools
Convert data into information
How to Think ?
What happened?
What is happening?
Why did it happen?
What will happen?
What do I want to happen?
Much of the software world has moved to microservices and a Service-Oriented Architecture (SOA) when designing large-scale systems. An alternate, less-known philosophy of building large systems is called Data-Oriented Architecture (DOA), which trades off the scale and maintainability challenges of SOA with a rigorous focus on schema representation in a monolithic data access layer. For microservices-based systems where scale across verticals is a challenge, DOA might be an appropriate alternative.
Speaker: Eyas Sharaiha - Senior Software Engineer at Google
Capturing Business Requirements For Scorecards, Dashboards And ReportsJulian Rains
This paper helps Management Information and Business Intelligence related projects build a solid foundation for their reporting business requirements gathering. It defines the scope of the information needed to design and build dashboards, scorecards and other types of report.
07. Analytics & Reporting Requirements TemplateAlan D. Duncan
This document template defines an outline structure for the clear and unambiguous definition of analytics & reporting outputs (including standard reports, ad hoc queries, Business Intelligence, analytical models etc).
07. Analytics & Reporting Requirements TemplateAlan D. Duncan
This document template defines an outline structure for the clear and unambiguous definition of analytics & reporting outputs (including standard reports, ad hoc queries, Business Intelligence, analytical models etc).
Unlocking Success in the 3 Stages of Master Data ManagementPerficient, Inc.
Master data management (MDM) comprises the processes, governance, policies, standards and tools that define and manage critical data. MDM is used to conduct strategic initiatives such as customer 360, product excellence and operational efficiency.
The quality of enterprise Information depends on the master data, so getting it right should be a high priority. This webinar will highlight key factors needed for success in each of the three stages of the MDM journey:
Planning
Implementation
Steady state
We review each stage in detail and provide insight into planning and collaborative activities. In this slideshare you will learn:
Best practices, tips and techniques for a successful MDM program
Top considerations for business case building, architecture and going live
How to support the overall program after launching your MDM program
Sub-optimal Order Management negatively impacts customer experienceGenpact Ltd
Improving customer experience, creating perfect order, maintaining costs and compliance are the key challenges in order management that call for standardized automation.
Presentation of use cases of Master Data Management for product Data. It presents the five facets of MDM for product Data (MDM for Material, MDM for Lean Managed Services, MDM for Regulated Products, Product Information Management, MDM for “Anything”) and how Talend platform for MDM can adress them
resentation of use cases of Master Data Management for Customer Data. It presents the business drivers and how Talend platform for MDM can adress them.
Gartner: Seven Building Blocks of Master Data ManagementGartner
Gartner will further examine key trends shaping the future MDM market during the Gartner MDM Summit 2011, 2-3 February in London. More information at www.europe.gartner.com/mdm.
Gartner: Master Data Management FunctionalityGartner
Gartner will further examine key trends shaping the future MDM market during the Gartner MDM Summit 2011, 2-3 February in London. More information at www.europe.gartner.com/mdm
It is real Art and Talent to make an effective Standard Operating procedure and understanding of the difference between guideline and SOP.
SOP should tell itself
Agile Mumbai 2022
Real-Time Insights and AI for better Products, Customer experience and Resilient Platform
Balvinder Kaur
Principal Consultant, Thoughtworks
Sushant Joshi
Product Manager, Thoughtworks
GDPR Noncompliance: Avoid the Risk with Data VirtualizationDenodo
You can watch the full webinar on-demand here: https://goo.gl/2f2RYF
In its recent report “Predictions 2018: A year of reckoning”, Forrester predicts that 80% of firms affected by GDPR will not comply with the regulation by May 2018. Of those noncompliant firms, 50% will intentionally not comply.
Compliance doesn’t have to be this difficult! What if you have an opportunity to facilitate GDPR compliance with a mature technology and significant cost reduction? Data virtualization is a mature, cost-effective technology that enables privacy by design to facilitate GDPR compliance.
Attend this session to learn:
• How data virtualization provides a GDPR compliance foundation with data catalog, auditing, and data security.
• How you can enable single enterprise-wide data access layer with guardrails.
• Why data virtualization is a must-have capability for compliance use cases.
• How Denodo’s customers have facilitated compliance.
KASHTECH AND DENODO: ROI and Economic Value of Data VirtualizationDenodo
Watch full webinar here: https://bit.ly/3sumuL5
Join KashTech and Denodo to discover how Data Virtualization can help accelerate your time-to-value from data while reducing the costs at the same time.
Gartner has predicted that organizations using Data Virtualization will spend 40% less on data integration than those using traditional technologies. Denodo customers have experienced time-to-deliver improvements of up to 90% within their data provisioning processes and cost savings of 50% or more. As Rod Tidwell (Cuba Gooding Jr.) said in the movie 'Jerry Maguire', "Show me the money!"
Register to attend and learn how Data Virtualization can:
- Accelerate the delivery of data to users
- Drive digital transformation initiatives
- Reduce project costs and timelines
- Quickly deliver value to your organization
Real time insights for better products, customer experience and resilient pla...Balvinder Hira
Businesses are building digital platforms with modern architecture principles like domain driven design, microservice based, and event-driven. These platforms are getting ever so modular, flexible and complex.
While they are built with architecture principles like - loose coupling, individually scaling, plug-and-play components; regulations and security considerations on data - complexity leads to many unknown and grey areas in the entire architecture. Details on how the different components of this complex architecture interact with each other are lost. Generating insights becomes multi-teams, multi-staged activity and hence multi-days activity.
Multiple users and stakeholders of the platform want different and timely insights to take both corrective and preventive actions.Business teams want to know how business is doing in every corner of the country near real time at a zipcode granularity. Tech teams want to correlate flow changes with system health including that of downstream stability as it happens.Knowing these details also helps in providing the feedback to the platform itself, to make it more efficient and also to the underlying business process.
In this talk we intend to share how we made all the business and technical insights of a complicated platform available in realtime with limited incremental effort and constant validation of the ideas and slices with business teams. Since the client was a Banking client, we will also touch base handling of financial data in a secure way and still enabling insights for a large group of stakeholders.
We kept the self-service aspect at the center of our solution - to accommodate increasing components in the source platform, evolving requirements, even to support new platforms altogether. Configurability and Scalability were key here, it was important that all the data that was collected from the source platform was discoverable and presentable. This also led to evolving the solution in lines of domain data products, where the data is generated and consumed by those who understand it the best.
How to Place Data at the Center of Digital Transformation in BFSIDenodo
Watch full webinar here: https://bit.ly/3j7E9Jo
Consumers are increasingly using digital banking tools and insurance models, and these numbers will only continue to grow. Financial and insurance organizations have to adapt to the new and always changing situation while complying with new regulations, such as IFRS17, and embracing ESG criteria.
At the heart of any digital transformation is data. Therefore, it is not a stretch to say that data management and analytics strategies differentiate many of the leaders from the laggards in the banking, financial services and insurance (BFSI) industry. BFSI organizations still relying on slow, traditional systems and data management processes will find themselves falling behind their competition. In addition, as many adopt cloud strategies, these traditional approaches fill the cloud modernization process with downtime and end user frustration. In fact, according to a McKinsey article, cloud combined with distributed data infrastructure will define how consumers and providers adopt digital insurance models for the next decade.
Hear how the BFSI industry is leveraging data virtualization to deploy data fabric or data mesh architectures for enterprise-wide digital transformation.
Join this webinar to learn:
- The latest trends in BFSI for 2023 and how data and analytics is reshaping the industry
- How a logical data architecture can help you capitalize on your data
- How Denodo customers digitally transformed themselves using the Denodo Platform
Apache Hadoop Summit 2016: The Future of Apache Hadoop an Enterprise Architec...PwC
Hadoop Summit is an industry-leading Hadoop community event for business leaders and technology experts (such as architects, data scientists and Hadoop developers) to learn about the technologies and business drivers transforming data. PwC is helping organizations unlock their data possibilities to make data-driven decisions.
Empowering your Enterprise with a Self-Service Data Marketplace (EMEA)Denodo
Watch full webinar here: https://bit.ly/3aWI8lt
Self-service is a major goal of modern data strategists. A successfully implemented self-service initiative means that business users have access to holistic and consistent views of data regardless of its location, source or type. As data unification and data collaboration become key critical success factors for organisations, data catalogs play a key role as the perfect companion for a virtual layer to fully empower those self-service initiatives and build a self-service data marketplace requiring minimal IT intervention.
Denodo’s Data Catalog is a key piece in Denodo’s portfolio to bridge the gap between the technical data infrastructure and business users. It provides documentation, search, governance and collaboration capabilities, and data exploration wizards. It provides business users with the tool to generate their own insights with proper security, governance, and guardrails.
In this session we will cover:
- The role of a virtual semantic layer in self-service initiatives
- Key ingredients of a successful self-service data marketplace
- Self-service (consumption) vs. inventory catalogs
- Best practices and advanced tips for successful deployment
- A Demonstration: Product Demo
- Examples of customers using Denodo’s Data Catalog to enable self-service initiatives
Denodo DataFest 2017: The Need for Speed and Agility in BusinessDenodo
Watch the live presentation here: https://goo.gl/c3sbGY
Speed is everything. Businesses that move fast leave their competition in the dust. But one needs high performance architecture to enable it.
Watch this Denodo DataFest 2017 session to discover:
• How businesses can move faster than their competitors with the right architecture.
• The critical technology component that enables speed and agility.
• How to build a data services layer to protect the data sources from corruption.
Similar to Bhawani prasad mdm-cdh-methodology (20)
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
2. 2
Mastering Customer Data
1. Customer Data Hub (CDH) architectural overview
2. Different data hub approaches
• Registry Technique
• Co-existence Technique
• Transactional Technique
3. CDH Build Methodology (within a Development Life
Cycle)
4. CDH Deliverables along the way
5. Customer Data Hybrid data model
6. Enterprise customer example
3. 3
Business Processes & Systems
Master Data Account/Contacts/Partner and then Product/Pricing, Workforce, others)
(Identity Management
Data Delivery Platform (Real-time ODS , Aggregation Layer, Analytics, Predictive Modleling)
Business Services/Web Services – SOA
Call Center
eStore
Orders
Credit Card Processing
Mktg Apps
Customer Segmentation
& List Generation
Marketing Campaigns
Marketing Performance
Cleansing/De-duping
Lead Routing
Predictive Modeling
Forecasting
Whitespace
Campaign Planning
Customer Profiling
CRM/PRM
Opportunity/Lead Mgmt
Direct Sales
Channel Sales
- Partner Center
- Deal Reg Mgmt
Quote Generation Order Mgmt
Credit Mgmt Product/Pricing
Invoicing/Billing Credit Card Proc
Account Mgmt Auto Fulfillment
Financial Mgmt Human Resources
Contract/Agreement Management
ERP
Sub Center
Sub Customers
Service Requests
Agreements, Contracts
Electronic Fulfillment,
Activation/Registration
Sterling
EDI
ERP Assets Mgmt, Entitlements, Procurement
Incentive Programs
AOE
Single OE
Partner Center (service)
Service/Contracts
Renewal Opty
(int/channel)
Marketing Sales Service SalesFulfillment
Market
Contacts /
Responses
Leads
Opportunities /
Deals
Quotes
Orders
Fulfillment
Registration
/ Activation
Service /
Support
Renewals
6. 6
Analytics
Views
Customer Data Hub’s by Segment
360 °
Customer
Transaction
Views
Historical
Analytics
Real Time
Analytics
Customer
Service
Customer
ID Mgmt
Customer
Loyalty
Etc.
Consumer
Enterprise
Partner/Channel
“Other”
Sales
Entity
7. 7
Workflow
WS EAI ETL/EII
Analytics
Views
Integration services
ODS
360 °
Customer
Transaction
Views
Historical
Analytics
Real Time
Analytics
Customer
Service
Customer
ID Mgmt
Customer
Loyalty
Etc.
DW
. . . .
ERP
D&B M&A
Registry
TechniqueLocal ID1
Local ID2
Party ID local ID1 local ID2
10000 34598 98743
34598
98743
10000
•Authoring at Spokes
•Cross Reference Only (attributes not mastered in hub)
•Provides links to sources (that may not share the same data model)
•Non-invasive (easier to implement, but less attribute consistency)
Global ID = 28110
DM
8. 8
Workflow
WS EAI ETL/EII
Analytics
Views
Integration services
360 °
Customer
Transaction
Views
Historical
Analytics
Real Time
Analytics
Customer
Service
Customer
ID Mgmt
Customer
Loyalty
Etc.
. . . .
D&B M&A
Co-Existence
Technique
Party ID Party Name Party Addr local ID local ID2 DUNS#
10000 ABC Ltd 390 Baker Rd 34598 98743 65412
• Authoring at Spokes AND at Hub possible (not subscription)
• Cross References and Golden Record stored at hub
• Maps attributes to common data model
• Extended Attributes
• High Attribute consistency
34577 IBM Inc 983 NY Ave 56789 54321 78902
Global ID = 28110
ERP
Party ID
Local ID1
Local ID2
98743 ABC Ltd 390 Baker Rd
10000 ABC Co 390 Baker Rd
34598 ABC Ltd 390 Baker Rd
10000
ODS
DW
DM
9. 9
Analytics
Views
360 °
Customer
Transaction
Views
Historical
Analytics
Real Time
Analytics
Customer
Service
Customer
ID Mgmt
Customer
Loyalty
Etc.
Transactional
Technique
• Authoring at Spokes AND at Hub possible (consumes changes from hub)
• Cross References and Golden Record stored at hub
• Maps attributes to common data model
• Extended Attributes
• High Attribute consistency, High cross systems consistency
Workflow
WS EAI ETL/EII
Integration services
D&B M&A
Party ID Party Name Party Addr local ID local ID2 DUNS#
10000 ABC Ltd 390 Baker Rd 34598 98743 65412
Global ID = 28110
ERP
Party ID
Local ID1
Local ID2
98743 ABC Ltd 390 Baker Rd
10000 ABC Co 390 Baker Rd
34598 ABC Ltd 390 Baker Rd
10000
ODS
DW
DM
34577 IBM Inc 983 NY Ave 56789 54321 78902
10. 10
CDH Build Methodology
2
3
4
5
6
1
1
1
1 1
1
1 Data Analysis/Data Assessment (spokes)
2 Data Analysis/Master Data Model (hub)
3
Identify/Define
participation model
4
Overall/Broader
architecture participation
5
Define Governance,
Stewardship, business org
Define Business
logic/workflow
6
7 Build/Deploy
Hub
Spoke
Integration
Broader
Architecture
7
3rd party
service
11. 11
CDH Build Methodology
Data Analysis/Data Assessment ** SPOKES **
1
1
1
1 1
1
Hub
Spoke
Integration
Broader
Architecture
Data Analysis/Data Assessment
- Def’s, Models, Attributes
- Use cases/Data accesses
- Volatility/Frequency/Velocity
- Data Quality assessment
- Dependencies
Upstream/Downstream
- Rules being applied
- Standards being applied
- Logic being applied
- What we have and
what we need
1
3rd party
service
12. 12
CDH Build Methodology
Data Analysis/Master Data Model ** HUB **
2
Hub
Spoke
Integration
Broader
Architecture
Data Analysis/Master Data Model
- Def’s, Models
- Identify Core Attributes and
Relationships (scope)
- Use cases/Data accesses
> starting with CRUD
- Understand the data
Volatility, Frequency, Velocity
- Identify cross Reference &
Registry needs
- Identify Extended Attributes
- Start identifying the rules
that we need applied
- Start identifying the
standards that we need
applied
- Start identifying the logic
that we need applied
2
3rd party
service
13. 13
CDH Build Methodology
Define Business Logic/Workflow ** HUB **
3
Hub
Spoke
Integration
Broader
Architecture
Define Business Logic/Workflows
- Identify and map out the
hub based business logic
needed
- Validate that all Use cases
and Data accesses are
addressed
- Factor in Volatility,
Frequency, Velocity
- Clearly identify all major
Workflows (automated or
one’s with human interface)
- Dependencies identified
- Identify rules logic to be
applied at the hub (cleansing
rules, so on)
- Identify standards to be
applied at the hub
3
** This may include calls to third party services (matching, cleansing, validation, so on)
3rd party
service
14. 14
CDH Build Methodology
Define Participation Model ** HUB/SPOKE **
4
Hub
Spoke
Integration
Broader
Architecture
Define Hub/Spoke Participation Model
- Identify and define how each
spoke interacts with the hub
AND with each other
(termed participation model)
- Cleary identify and define
each inbound and outbound
behavior in terms of publish,
subscribe
(provider/consumer)
- Remember, we are defining
a microcosm of organisms
that must now live together
(not a silo)
4
3rd party
service
15. 15
CDH Build Methodology
Overall/Broader Architecture Participation
5
Hub
Spoke
Integration
Broader
Architecture
Define overall/broader architecture participation
- Clearly identify how the
MDM customer data is to be
utilized in the broader
company architecture
- Examples are with ODS,
Sales, Marketing, Finance,
EDW, WS’s, SOA, so on.
- This new microcosm must
now fit into the broader
universe of your other
systems
5
3rd party
service
Other
Platforms
and Systems
16. 16
CDH Build Methodology
Define Governance, Stewardship, Business Org.
6
Hub
Spoke
Integration
Broader
Architecture
Define Governance, Stewardship, and Business Organization
- Clearly identify how the
MDM of Customer data is
managed from the business
side (process, workflow,
ownership, coordination,
and with a liaison into IT –
the custodians)
- Create a stewardship model
and organization. This may
include a steering
committee that acts as a
policy maker and
compliance
arm of this key data
category
6
3rd party
service
Other
Platforms
and Systems
17. 17
CDH Build Methodology
*** Deliverables and Artifacts ***
Metadata/Model
Hub
Spoke
Integration
Broader
Architecture
3rd party
service
Other
Platforms
and Systems
Business Logic
Participation Model
Broader Architecture
- Core attributes to be managed
- Party-based mappings (hub/spoke)
- Cross Reference Identities/Registry
- Ownership model
- Data Models (hub/spokes)
- life cycle (archive, purge, availability)
- Workflow
- Merge, match, Dedupe logic
- standardization, cleansing
- Data sync needs
- Mappings/context
- Transformations needed
- Logical/physical merge approach
- Frequency/Velocity requirements
- Inbound/Outbound definitions
- Contributing Attributes from each spoke to the hub
- overall publishing/subscribing needs (frequency/volatility)
- Other system interfaces
(Upstream/downstream)
- General exposure methods (WS,
API, Services)