Cloud Computing is an inflection point, and is the technology that enable Big Data and predictive analytics. In combination with Big Data, Social Media and Mobile Computing, it constitutes how mainstream business use Cloud
Claudia Imhoff of the Boulder BI Brain Trust gives the lowdown on integrating real-time data to leverage modern BI practices for your business in this Information Builders Innovation Session presentation.
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
Presented on PHPID Online Learning 35.
Komunitas PHP Indonesia
Title: Enabling Data Governance - The Journey through Data Trust, Ethics, and Quality
Eryk B. Pratama
Global IT & Cybersecurity Advisor
Dama Ireland slides - Data Trust event 9th June 2016Ken O'Connor
Do we need a Data Trust / Data Quality Mark?
Presentation by Data Management Specialist, Ken O'Connor:
Our food packaging provides facts about the food we buy. It's required by law. These facts enable us to make informed decisions about the food we consume. What about when we seek to make informed decisions in our business processes? What do we know about the data we're consuming? How can we trust that the data we depend on is fit for the purpose for which we need it? In this presentation, you will learn:
Your rights and responsibilities as a data consumer and provider;
The questions you should ask about the data you consume;
The facts you should provide about the data you provide;
The need for a "Data Q-Mark" or a "Data Trust-Level" ;
The presentation was followed by a panel discussion with Ronan Brennan, the CTO of Silverfinch (a MoneyMate company). In October 2015, Silverfinch announced it was handing €2.5 trillion of look-through assets for asset manager clients worldwide. Ronan shared the SilverFinch success story with the attendees, which is built on solid data management practices.
Claudia Imhoff of the Boulder BI Brain Trust gives the lowdown on integrating real-time data to leverage modern BI practices for your business in this Information Builders Innovation Session presentation.
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
Presented on PHPID Online Learning 35.
Komunitas PHP Indonesia
Title: Enabling Data Governance - The Journey through Data Trust, Ethics, and Quality
Eryk B. Pratama
Global IT & Cybersecurity Advisor
Dama Ireland slides - Data Trust event 9th June 2016Ken O'Connor
Do we need a Data Trust / Data Quality Mark?
Presentation by Data Management Specialist, Ken O'Connor:
Our food packaging provides facts about the food we buy. It's required by law. These facts enable us to make informed decisions about the food we consume. What about when we seek to make informed decisions in our business processes? What do we know about the data we're consuming? How can we trust that the data we depend on is fit for the purpose for which we need it? In this presentation, you will learn:
Your rights and responsibilities as a data consumer and provider;
The questions you should ask about the data you consume;
The facts you should provide about the data you provide;
The need for a "Data Q-Mark" or a "Data Trust-Level" ;
The presentation was followed by a panel discussion with Ronan Brennan, the CTO of Silverfinch (a MoneyMate company). In October 2015, Silverfinch announced it was handing €2.5 trillion of look-through assets for asset manager clients worldwide. Ronan shared the SilverFinch success story with the attendees, which is built on solid data management practices.
How to Integrate Data and Protect PrivacyDATAVERSITY
Integrating data from different sources can result in privacy violations. For example, if a government agency combines data about a person's income, education, health and employment data then there is the potential for this data to be misused. However, government agencies often need to integrate data from multiple sources to understand if changes to policy result in improved outcomes.
The Australian Federal Government has introduced an Integration Authority certification to ensure its agencies have controls in place to combine data from different sources in a way that protects privacy. This webinar describes a method for integrating data and protecting privacy.
Introduction to Modern Data Virtualization 2021 (APAC)Denodo
Watch full webinar here: https://bit.ly/2XXyc3R
“Through 2022, 60% of all organisations will implement data virtualization as one key delivery style in their data integration architecture," according to Gartner. What is data virtualization and why is its adoption growing so quickly? Modern data virtualization accelerates that time to insights and data services without copying or moving data.
Watch on-demand this webinar to learn:
- Why organizations across the world are adopting data virtualization
- What is modern data virtualization
- How data virtualization works and how it compares to alternative approaches to data integration and management
- How modern data virtualization can significantly increase agility while reducing costs
Battle the Dark Side of Data GovernanceDATAVERSITY
On May 25th, 2018, Star Wars fans will enjoy a new movie while organizations world-wide must protect their EU customers’ data or risk the high penalties of non-compliance. Regulations such as SOX, HIPAA, and GDPR bring about specific requirements, rules, and guidelines for data governance that need to be understood and implemented to avoid serious fines. Tackling these will take a team effort - you can’t do this solo. IDERA’s Ron Huizenga will discuss how you can channel the Force for your data architecture with a high-level overview of the impact of industry and government regulations as well as address steps you can take within your data architecture to conquer the regulatory storm-troopers.
This material was presented at Orang Siber Indonesia regular webinar.
Content:
> Understanding privacy management
> Global privacy news
> Understanding privacy regulations and frameworks
> Data Privacy Program Management practices
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...DATAVERSITY
“Data privacy,” “data security,” “data protection” –
whatever we call the way we control our data, it isn’t working. Data is as
vulnerable as ever. And this is true for both consumers hoping to keep their
data safe, and for enterprises seeking to govern their corporate and customer
data.
We’re at a crossroads: Governing data and putting data to
use are two dueling objectives, and businesses are stuck in the middle.
Can this problem be solved? In a word: yes.
The answer is through what we call automated Data Governance, which introduces speed, agility, and precision into the process of applying rules on data. Join Immuta for a webinar as we explore these Data Governance challenges and discuss how you can proactively address them with automated Data Governance.
What Is My Enterprise Data Maturity 2021DATAVERSITY
Maturity frameworks have varying levels of Data Management maturity. Each level corresponds to not only increased data maturity but also increased organizational maturity and bottom-line ROI. There are recommended targets to achieve an effective information management program. The speaker’s maturity framework sequences the information management activities for your consideration. It is based on real client roadmaps. This webinar promises to offer a wealth of ideas for key quick wins to benefit the organization’s information management program.
Attendees can self-assess their current information management capabilities as we go through Data Strategy, organization, architecture, and technology, yielding an overall view of the current level of information management maturity.
This webinar provides a foundation for enhancing current data and analytic capabilities and updating the strategy and plans for the achievement of improved information management maturity, aligned with major initiatives.
A Key to Real-time Insights in a Post-COVID World (ASEAN)Denodo
Watch full webinar here: https://bit.ly/2EpHGyd
Presented at Data Champions, Online Asia 2020
Businesses and individuals around the world are experiencing the impact of a global pandemic. With many workers and potential shoppers still sequestered, COVID-19 is proving to have a momentous impact on the global economy. Regardless of the current situation and post-pandemic era, real-time data becomes even more critical to healthcare practitioners, business owners, government officials, and the public at large where holistic and timely information are important to make quick decisions. It enables doctors to make quick decisions about where to focus the care, business owners to alter production schedules to meet the demand, government agencies to contain the epidemic, and the public to be informed about prevention.
In this on-demand session, you will learn about the capabilities of data virtualization as a modern data integration technique and how can organisations:
- Rapidly unify information from disparate data sources to make accurate decisions and analyse data in real-time
- Build a single engine for security that provides audit and control by geographies
- Accelerate delivery of insights from your advanced analytics project
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
To do effective data governance, analysts should preview the amount of data their organization is collecting and consider if it is all necessary information to run the business or just “nice to have” data. Today companies are collecting a variety of Personally identifiable information (PII), combining it with location information, and using it to both personalize their own services and to sell to advertisers for behavioral marketing. Data brokers are tracking cell phone applications and insurance companies are installing devices to monitor driving habits. At the same time, however, hackers are embedding malicious software in company computers, opening a virtual door for criminals to rifle through an organization’s valuable personal and financial information.
This presentation explores:
•What company data should be tagged as “sensitive” data?
•Who within the company has access to personal data?
•Is the company breaking any privacy laws by storing PII data?
•Is the data secure from both internal and external hackers?
•What happens if there is an external data breech?
Advanced Analytics and Machine Learning with Data VirtualizationDenodo
Watch full webinar here: https://bit.ly/3aXysas
Advanced data science techniques, like machine learning, have proven to be extremely useful to derive valuable insights from your data. Data Science platforms have become more approachable and user friendly. With all the advancements in the technology space, the Data Scientist is still spending most of the time massaging and manipulating the data into a usable data asset. How can we empower the data scientist? How can we make data more accessible, and foster a data sharing culture?
Join us, and we will show you how Data Virtualization can do just that, with an agile and AI/ML laced data management platform. It can empower your organization, foster a data sharing culture, and simplify the life of the data scientist.
Watch this webinar to learn:
- How data virtualization simplifies the life of the data scientist, by overcoming data access and manipulation hurdles.
- How integrated Denodo Data Science notebook provides for a unified environment
- How Denodo uses AI/ML internally to drive the value of the data and expose insights
- How customers have used Data Virtualization in their Data Science initiatives.
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
Is your current state really threat ready?
Amit Walia, Senior Vice President, General Manager of Data Integration and Security at Informatica, shares how to protect data from the inside and the outside from the 2015 Informatica Government Summit.
How to Integrate Data and Protect PrivacyDATAVERSITY
Integrating data from different sources can result in privacy violations. For example, if a government agency combines data about a person's income, education, health and employment data then there is the potential for this data to be misused. However, government agencies often need to integrate data from multiple sources to understand if changes to policy result in improved outcomes.
The Australian Federal Government has introduced an Integration Authority certification to ensure its agencies have controls in place to combine data from different sources in a way that protects privacy. This webinar describes a method for integrating data and protecting privacy.
Introduction to Modern Data Virtualization 2021 (APAC)Denodo
Watch full webinar here: https://bit.ly/2XXyc3R
“Through 2022, 60% of all organisations will implement data virtualization as one key delivery style in their data integration architecture," according to Gartner. What is data virtualization and why is its adoption growing so quickly? Modern data virtualization accelerates that time to insights and data services without copying or moving data.
Watch on-demand this webinar to learn:
- Why organizations across the world are adopting data virtualization
- What is modern data virtualization
- How data virtualization works and how it compares to alternative approaches to data integration and management
- How modern data virtualization can significantly increase agility while reducing costs
Battle the Dark Side of Data GovernanceDATAVERSITY
On May 25th, 2018, Star Wars fans will enjoy a new movie while organizations world-wide must protect their EU customers’ data or risk the high penalties of non-compliance. Regulations such as SOX, HIPAA, and GDPR bring about specific requirements, rules, and guidelines for data governance that need to be understood and implemented to avoid serious fines. Tackling these will take a team effort - you can’t do this solo. IDERA’s Ron Huizenga will discuss how you can channel the Force for your data architecture with a high-level overview of the impact of industry and government regulations as well as address steps you can take within your data architecture to conquer the regulatory storm-troopers.
This material was presented at Orang Siber Indonesia regular webinar.
Content:
> Understanding privacy management
> Global privacy news
> Understanding privacy regulations and frameworks
> Data Privacy Program Management practices
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...DATAVERSITY
“Data privacy,” “data security,” “data protection” –
whatever we call the way we control our data, it isn’t working. Data is as
vulnerable as ever. And this is true for both consumers hoping to keep their
data safe, and for enterprises seeking to govern their corporate and customer
data.
We’re at a crossroads: Governing data and putting data to
use are two dueling objectives, and businesses are stuck in the middle.
Can this problem be solved? In a word: yes.
The answer is through what we call automated Data Governance, which introduces speed, agility, and precision into the process of applying rules on data. Join Immuta for a webinar as we explore these Data Governance challenges and discuss how you can proactively address them with automated Data Governance.
What Is My Enterprise Data Maturity 2021DATAVERSITY
Maturity frameworks have varying levels of Data Management maturity. Each level corresponds to not only increased data maturity but also increased organizational maturity and bottom-line ROI. There are recommended targets to achieve an effective information management program. The speaker’s maturity framework sequences the information management activities for your consideration. It is based on real client roadmaps. This webinar promises to offer a wealth of ideas for key quick wins to benefit the organization’s information management program.
Attendees can self-assess their current information management capabilities as we go through Data Strategy, organization, architecture, and technology, yielding an overall view of the current level of information management maturity.
This webinar provides a foundation for enhancing current data and analytic capabilities and updating the strategy and plans for the achievement of improved information management maturity, aligned with major initiatives.
A Key to Real-time Insights in a Post-COVID World (ASEAN)Denodo
Watch full webinar here: https://bit.ly/2EpHGyd
Presented at Data Champions, Online Asia 2020
Businesses and individuals around the world are experiencing the impact of a global pandemic. With many workers and potential shoppers still sequestered, COVID-19 is proving to have a momentous impact on the global economy. Regardless of the current situation and post-pandemic era, real-time data becomes even more critical to healthcare practitioners, business owners, government officials, and the public at large where holistic and timely information are important to make quick decisions. It enables doctors to make quick decisions about where to focus the care, business owners to alter production schedules to meet the demand, government agencies to contain the epidemic, and the public to be informed about prevention.
In this on-demand session, you will learn about the capabilities of data virtualization as a modern data integration technique and how can organisations:
- Rapidly unify information from disparate data sources to make accurate decisions and analyse data in real-time
- Build a single engine for security that provides audit and control by geographies
- Accelerate delivery of insights from your advanced analytics project
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
To do effective data governance, analysts should preview the amount of data their organization is collecting and consider if it is all necessary information to run the business or just “nice to have” data. Today companies are collecting a variety of Personally identifiable information (PII), combining it with location information, and using it to both personalize their own services and to sell to advertisers for behavioral marketing. Data brokers are tracking cell phone applications and insurance companies are installing devices to monitor driving habits. At the same time, however, hackers are embedding malicious software in company computers, opening a virtual door for criminals to rifle through an organization’s valuable personal and financial information.
This presentation explores:
•What company data should be tagged as “sensitive” data?
•Who within the company has access to personal data?
•Is the company breaking any privacy laws by storing PII data?
•Is the data secure from both internal and external hackers?
•What happens if there is an external data breech?
Advanced Analytics and Machine Learning with Data VirtualizationDenodo
Watch full webinar here: https://bit.ly/3aXysas
Advanced data science techniques, like machine learning, have proven to be extremely useful to derive valuable insights from your data. Data Science platforms have become more approachable and user friendly. With all the advancements in the technology space, the Data Scientist is still spending most of the time massaging and manipulating the data into a usable data asset. How can we empower the data scientist? How can we make data more accessible, and foster a data sharing culture?
Join us, and we will show you how Data Virtualization can do just that, with an agile and AI/ML laced data management platform. It can empower your organization, foster a data sharing culture, and simplify the life of the data scientist.
Watch this webinar to learn:
- How data virtualization simplifies the life of the data scientist, by overcoming data access and manipulation hurdles.
- How integrated Denodo Data Science notebook provides for a unified environment
- How Denodo uses AI/ML internally to drive the value of the data and expose insights
- How customers have used Data Virtualization in their Data Science initiatives.
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
Is your current state really threat ready?
Amit Walia, Senior Vice President, General Manager of Data Integration and Security at Informatica, shares how to protect data from the inside and the outside from the 2015 Informatica Government Summit.
Computer science is faced with many challenges as the digital universe expands. From mobile and cloud computing to data security, addressing these issues can require large, structural changes, but an examination of these problems can lead to organizational solutions and improvements in the world.
This talk given at the Hadoop Summit in San Jose on June 28, 2016, analyzes a few major trends in Big Data analytics.
These are a few takeaways from this talk:
- Adopt Apache Beam for easier development and portability between Big Data Execution Engines.
- Adopt stream analytics for faster time to insight, competitive advantages and operational efficiency.
- Accelerate your Big Data applications with In-Memory open source tools.
- Adopt Rapid Application Development of Big Data applications: APIs, Notebooks, GUIs, Microservices…
- Have Machine Learning part of your strategy or passively watch your industry completely transformed!
- How to advance your strategy for hybrid integration between cloud and on-premise deployments?
This presentation contains information regarding gifted students and tips for teachers with respect to providing gifted students appropriate educational opportunities.
Bollywood & Startups: Emotion, Drama, Tragedy and more. This is made just for fun. Keep focus on your startup, keep building your product. And have lots of fun while you do that.
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...MicheleNati
Presentation showing Digital Catapult interest and fit in Industrie 4.0 movement. Digital Technologies for Manufacturing Innovation: Embracing Industry 4.0 - Nottingham, November 30th
Digital Technologies for Manufacturing Innovation: Industry 4.0Digital Catapult
Michele Nati, Lead Technologist in Personal Data and Trust at the Digital Catapult, delivered this presentation about how they are working to improve digital technologies and boost manufacturing innovation.
Chief Data Officer Agenda Webinar: How CDOs Should Work with LawyersDATAVERSITY
Legal risks, rights and obligations are among the most important emerging issues in enterprise data management today, and yet are not well understood, especially considering most CDOs come to the role with a business or IT background, rather than legal training. Bill Tanenbaum is one of the leading technology and intellectual property attorneys in the country, and is joining us on this edition of the CDO Agenda to provide a legal perspective on the issues that organizations should be dealing with today, from the standpoint of data management policy. Among the topics he will address are:
Security and Data Breaches
Data Vulnerability in Contracts
The CDO’s Role in ITS Contracts
Privacy is Contextual
Data Ownership vs License rights
Data as Intellectual Property
Data Sharing
Is Data an Asset?
How Long Should you Keep Data?
It is a fascinating, explosive time for enterprise analytics.
It is from the position of analytics leadership that the enterprise mission will be executed and company leadership will emerge. The data professional is absolutely sitting on the performance of the company in this information economy and has an obligation to demonstrate the possibilities and originate the architecture, data, and projects that will deliver analytics. After all, no matter what business you’re in, you’re in the business of analytics.
The coming years will be full of big changes in enterprise analytics and data architecture. William will kick off the fifth year of the Advanced Analytics series with a discussion of the trends winning organizations should build into their plans, expectations, vision, and awareness now.
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...Jeff Kelly
Privacera’s Vice President of Product Management Srikanth Venkat and Nauman Fakhar, Director, ISV Solutions at Databricks, survey the current and future data privacy landscape, what it means for enterprises like yours, and what you can do to ensure compliance. The webinar includes an in-depth CCPA compliance demonstration on Azure Databricks with Privacera, based on Apache Ranger.
Privacera Databricks CCPA Webinar Feb 2020Privacera
Privacera’s Vice President of Product Management Srikanth Venkat and Nauman Fakhar, Director, ISV Solutions at Databricks, survey the current and future data privacy landscape, what it means for enterprises like yours, and what you can do to ensure compliance. The webinar includes an in-depth CCPA compliance demonstration on Azure Databricks with Privacera, based on Apache Ranger.
Learn more at www.privacera.com
Achieving Digital Transformation in RegulatoryCary Smithson
Significant change is underway in Regulatory Affairs as life science companies re-evaluate their global operating capabilities in light of today's data-driven standards and newly available technologies. Mounting pressure to operate more efficiently worldwide is driving companies to optimize and harmonize processes, improve data usage and management, and adopt shared global systems. In this presentation, Cary Smithson will discuss potential ways to leverage the latest technologies to address today's business challenges in Regulatory and provide a practical approach for driving transformation and enabling greater efficiency.
ADV Slides: Data Curation for Artificial Intelligence StrategiesDATAVERSITY
This webinar will focus on the promise AI holds for organizations in every industry and every size, and how to overcome some of the challenge today of how to prepare for AI in the organization and how to plan AI applications.
The foundation for AI is data. You must have enough data to analyze and build models. Your data determines the depth of AI you can achieve — for example, statistical modeling, machine learning, or deep learning — and its accuracy. The increased availability of data is the single biggest contributor to the uptake in AI where it is thriving. Indeed, data’s highest use in the organization soon will be training algorithms. AI is providing a powerful foundation for impending competitive advantage and business disruption.
New Analytic Uses of Master Data Management in the EnterpriseDATAVERSITY
Companies all over the world are going through digital transformation now, which in many cases is all about maturing the data environment and the use of data. Master data is key to this effort. All transformative projects require master data and usually many subject areas.
What could you accomplish if cultivating master data didn’t have to be part of every project and could be accessed as a service?
We’ll look at creative enterprise use cases of Master Data Management in the enterprise. We’ll see what some MDM vendors are doing with AI and how the future of MDM will be shaped by looking at some specific MDM actions influenced by AI.
Microservices And Fast Data: Industry And Architecture Trends [with 451 Resea...Lightbend
Streaming data systems, so called “Fast Data”, promise accelerated access to information, leading to new innovations and competitive advantages. But they aren’t just “faster” versions of Big Data systems. They force architecture changes to meet new demands for reliability and dynamic scalability, more like microservices. At the same time, they open up opportunities for new products and services.
Join Dean Wampler with Lightbend and Matt Aslett with 451 Research as they:
* Discuss the business justification for transitioning from batch-oriented big data to stream-oriented fast data.
* Explain the changes that streaming architectures require to meet their higher demands for reliability, resiliency, dynamic scalability, etc.
* Discuss how some of these requirements can be met by leveraging what organizations already know about microservice architectures.
Intelligent Maintenance: Mapping the #IIoT ProcessDan Yarmoluk
A presentation about Industrial IoT, the value chain and real-world use cases; how to create value with IoT at your organization with an emphasis on predictive maintenance (bearing fault detection).
A Successful Data Strategy for Insurers in Volatile Times (EMEA)Denodo
Watch full webinar here: https://bit.ly/34gVVzH
To capitalize on all their data, insurers need a flexible and easily adaptable data integration technology that allows them to keep up with the ever-changing and growing data environment.
Data virtualization is that modern data integration technology. It can support insurers not only on their journey to digitization, but also on their future infrastructure changes and innovations, adding agility, flexibility and efficiency to data architectures.
Join this webinar to:
- Find out why data virtualization should be a part of your enterprise data strategy
- See how this technology can help you capitalize on your data
- Hear how many of your peers are already leveraging the Denodo Platform for Data Virtualization and the benefits they’re observing
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Denodo
Watch full webinar here: https://bit.ly/3lSwLyU
En la era de la explosión de la información repartida en distintas fuentes, el gobierno de datos es un componente clave para garantizar la disponibilidad, usabilidad, integridad y seguridad de la información. Asimismo, el conjunto de procesos, roles y políticas que define permite que las organizaciones alcancen sus objetivos asegurando el uso eficiente de sus datos.
La virtualización de datos forma parte de las herramientas estratégica para implementar y optimizar el gobierno de datos. Esta tecnología permite a las empresas crear una visión 360º de sus datos y establecer controles de seguridad y políticas de acceso sobre toda la infraestructura, independientemente del formato o de su ubicación. De ese modo, reúne múltiples fuentes de datos, las hace accesibles desde una sola capa y proporciona capacidades de trazabilidad para supervisar los cambios en los datos.
Le invitamos a participar en este webinar para aprender:
- Cómo acelerar la integración de datos provenientes de fuentes de datos fragmentados en los sistemas internos y externos y obtener una vista integral de la información.
- Cómo activar en toda la empresa una sola capa de acceso a los datos con medidas de protección.
- Cómo la virtualización de datos proporciona los pilares para cumplir con las normativas actuales de protección de datos mediante auditoría, catálogo y seguridad de datos.
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)Denodo
Watch full webinar here: https://bit.ly/3rpr4La
Data is an insurer’s most valuable asset. Capitalizing on all of that stored and incoming data to draw valuable insights for business decisions is what ultimately makes a competitive difference.
But, insurers face challenges when it comes to modernizing and digitizing their data architectures. Most organizations rely on traditional systems and data integration processes that are time consuming and slow. In addition, as many adopt cloud strategies, these traditional approaches fill the cloud modernization process with downtime and end user frustration.
This is why insurers need a flexible and easily adaptable data integration technology that allows them to keep up with the ever-changing and growing data environment.
Data virtualization is that modern data integration technology. It can support insurers not only on their journey to digitization, but also on their future infrastructure changes and innovations, adding agility, flexibility and efficiency to data architectures. Data virtualization can help insurance companies create 360° views of deals and claims processes as well as gather quick social media or sensor data for on-the-go risk profiling.
Join this on-demand webinar to:
- Find out why data virtualization should be a part of your enterprise data strategy
- See how this technology can help you capitalize on your data
- Hear how many of your peers are already leveraging the Denodo Platform for Data Virtualization and the benefits they’re observing
¿En qué se parece el Gobierno del Dato a un parque de atracciones?Denodo
Watch full webinar here: https://bit.ly/3Ab9gYq
Imagina llegar a un parque de atracciones con tu familia y comenzar tu día sin el típico plano que te permitirá planificarte para saber qué espectáculos ver, a qué atracciones ir, donde pueden o no pueden montar los niños… Posiblemente, no podrás sacar el máximo partido a tu día y te habrás perdido muchas cosas. Hay personas que les gusta ir a la aventura e ir descubriendo poco a poco, pero cuando hablamos de negocios, ir a la aventura puede ser fatídico...
En la era de la explosión de la información repartida en distintas fuentes, el gobierno de datos es clave para garantizar la disponibilidad, usabilidad, integridad y seguridad de esa información. Asimismo, el conjunto de procesos, roles y políticas que define permite que las organizaciones alcancen sus objetivos asegurando el uso eficiente de sus datos.
La virtualización de datos, herramienta estratégica para implementar y optimizar el gobierno del dato, permite a las empresas crear una visión 360º de sus datos y establecer controles de seguridad y políticas de acceso sobre toda la infraestructura, independientemente del formato o de su ubicación. De ese modo, reúne múltiples fuentes de datos, las hace accesibles desde una sola capa y proporciona capacidades de trazabilidad para supervisar los cambios en los datos.
En este webinar aprenderás a:
- Acelerar la integración de datos provenientes de fuentes de datos fragmentados en los sistemas internos y externos y obtener una vista integral de la información.
- Activar en toda la empresa una sola capa de acceso a los datos con medidas de protección.
- Cómo la virtualización de datos proporciona los pilares para cumplir con las normativas actuales de protección de datos mediante auditoría, catálogo y seguridad de datos.
Date Use Rules in Different Business Scenarios:It's All Contextual William Tanenbaum
All privacy is contextual. Like that, the legal rules for collecting, aggregating, sharing and protecting data, including through IP, are specific to the context. One size does not fit all.
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
Arent Fox LLP. Rules for data collection, aggregation, sharing, use and protection all depend on the business and legal context. One size does not fit all.
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
Arent Fox LLP. Collecting, sharing, aggregating and using data in different business models and scenarios are subject to different rules and depend on the specific context
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...William Tanenbaum
Conventional deal structures do not always work when big companies engage small cloud and social media companies as part of marketing and digital business. To go live you need to go smart. Legal documents need to enable, not delay. Due diligence is important: Are you picking a winner or a loser? Would you invest in this company? Is security backed in or will you be subject to a privacy breach and a reputational hit? Are the investors in it for the long haul or are they taking a flier?
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Social Business =Cloud + Big Data + Social Media + Mobile Computing
1. Social Business = Cloud + Big Data
+ Social Media + Mobile Computing
William A. Tanenbaum
Chair, Technology, Intellectual Property & Outsourcing Group
Chair, GreenTech and Sustainability Group
Kaye Scholer LLP
New York and Palo Alto Offices
60758855.pptx
2. Overview
• Cloud + Big Data + Social Media + Mobile Computing = Social
Business
• “Cloud of Clouds”
• New outsourcing
• Sustainability in mainstream companies and in supply chains
will be IT-enabled and make use of Cloud
• Cloud vs. IT Outsourcing
• Security as a service
• BYOD to work (“bring your own device”)
60758855.pptx 2
3. “Old” Business Data Aggregation
• Credit Reports
• Background Checks
• Financial industry reporting of trading activity
60758855.pptx 3
4. New Data Aggregation
• What is new?
• Big Data – the three “V’s”
– Volume
– Velocity
– Variety
• Computer “horse power” to handle volume
• Unstructured as well as structured data
• Social Media as Supply Chain
– Measuring intensity
• User-provided information
60758855.pptx 4
5. Hypothetical to Illustrate Key Issues
• Property management outsourcing hypothetical
• Underlying city map
• Building locations overlay
• Building interior/mechanicals overlay
• Maintenance records
• Mobile-to-Cloud
• Cloud to legacy records and vice versa
• Tenant PII
– Leave vs. service agreement
– Consent
60758855.pptx 5
6. Key Issues – Continued
• Building sensors (and sensors to the Cloud)
– Wired vs. IP addresses
• Track employee location
• Real-time truck re-routing
• Monitor employee efficiency
• Determine parts inventory levels
• Supply chain coordination for just-in-time repairs
60758855.pptx 6
7. Key Issues – Continued
• Customer wants historical data to evaluate maintenance and
provider performance (and number of skilled employees)
• Customer wants predictive analytics
• Customer wants real time dashboards
• Big Data needs data displays (need not be static)
• Provider wants data for fine-tuning SLA’s and pricing for future
projects and employee training
• Predictive analytics tools/algorithms
• Different levels of data roll-ups
60758855.pptx 7
8. Key Issues – Continued
• Multiple outsource providers and subcontractors and IT
infrastructure providers
• Sustainability
– Make buildings and units more energy and water-efficient
– Electric vehicles
– Trucks as “Rolling Storage Units” (“RSU’s”)
– Power co-generation; solar/wind
• Portfolio of providers
• Cross-licenses
• Summary: need to know your data ecosystem
60758855.pptx 8
9. Sources of Data
• Customer records
• Customer websites
• Business partners
• Third parties
• Internet tracking companies
• Social Media
• Company submissions to portals maintained supply chain
customer or jointly in an industry
– ROHS as illustrative
• Metadata
• Clouds used by employees on “BYOD”
60758855.pptx 9
10. Owners vs. Licensing vs. Right of Access
• Cannot license data you do not own or in which you do not
have sufficient license rights
60758855.pptx 10
11. Customer Records
• Customer records and company’s own websites
– Terms of Use and Consent
– Click-through agreements
– Challenges to enforceability
60758855.pptx 11
12. Obtaining – and Proving – Consent
• Contracts of adhesion vs. expectations privacy and use
• Enforceability vs. number of screens
• How record and prove consent?
– Electronic signatures?
– E-Sign
60758855.pptx 12
13. Business Partners and Third Party Data
Providers
• Anonymity
– Is it anonymous if all companies use the same encryption hash?
• Potentially an issue with health data in new health care electronic
record ecosystems
60758855.pptx 13
14. Internet Tracking Companies
• Web bugs are not the current controversy
• Health care as illustrative of sensitive issues
• FDA and FTC
• Representations, Warranties and Continuing Covenants
• Indemnities; termination remedies
• Consequential damages vs. specified direct damages
60758855.pptx 14
16. New Role for HR Outsourcing
• Problem:
– Potential HR legal liability from considering information reported on
Facebook and other social networks
• Emerging Business Solution:
– New role for Outsourcing
– Outsource providers conduct social media background checks
– Insulate HR departments
60758855.pptx 16
17. Potential Outsourcing Issues
• Outsource providers retained to perform data analytics
• Results in datasets from multiple customers which can be
combined to yield valuable data asset
• Outsourcing providers directly monetize or license data to
third parties
• How can outsource customer protect against data collected
for it and data analytics on such data being used by
competitors?
60758855.pptx 17
18. Customer’s Potential Solutions
• Assert ownership over data
• Assert exclusive rights over analytic tools
• Use contact to limit combination of datasets with those of
other customers, public data, or other sources of data (or
other sources)
60758855.pptx 18
19. Outsourcing
• Portfolio model of outsource providers
• Need to structure to ensure data sharing
• Licensing rights back to each provider
60758855.pptx 19
20. Revisiting Common NDA Provisions
• Fact Pattern: common exclusion of protection for public
domain material
• Business Problem: information technically in the public
domain needs to be maintained as private asset or protected
because of regulatory obligations
– EU PII; U.S. GLB, Health, FTC
– Non-regulatory data constitutes business intelligence
• Solution: modify public domain
60758855.pptx 20
21. Competitive Intelligence
• Business Problem: Competitive information can be
inadvertently disclosed through identification in RFP’s of
subcontractors and analytics tools
• Solutions:
– Reduce scope of identification
– Early stage use of confidentiality agreements
60758855.pptx 21
22. Cross-License Data Agreements
• License terms for data
• Cannot license what do not own or have license rights to
• Scope of use limitations
• Negative covenants
60758855.pptx 22
23. Defensive Use of Trade Secret Protection
• Wal-Mart and Sustainability Consortium
• Reporting requirements/requests
• Can adverse information be “shielded” by trade secret?
• SEC and financial statement reporting obligations
• Is this public data?
60758855.pptx 23
24. Licensing and Outsourcing Terms
• Outsourcing: Draft RFP’s to contract schedules to review by
subject matter experts
– Regulatory compliance
• For IP ownership and documentation, complete pre-agreed
upon assignment in recordable form, even if not recorded, and
record with PTO or Copyright Office when advisable
• Audit rights
• Specific data deliverables
• Data Managers
• Timely notice of data claims
60758855.pptx 24
25. Questions and Answers
William A. Tanenbaum
Chair, Technology, Intellectual Property & Outsourcing Group
Chair, GreenTech and Sustainability Group
Kaye Scholer LLP, New York and Palo Alto
wtanenbaum@kayescholer.com
212-836-7661
60758855.pptx 25
26. William A. Tanenbaum
wtanenbaum@kayescholer.com
William A. Tanenbaum is the international chair of Kaye Scholer’s Technology,
Intellectual Property & Outsourcing Group and its GreenTech and Sustainability
Group and works in the firm’s New York and Palo Alto offices. Chambers found
that he “built one of New York City’s most outstanding transactional IT practices,”
that he is a “well-respected attorney, with a well-informed approach [who] provides
litigation, transaction work and strategic counseling on a range of technology
issues,” that he is “efficient, solution-driven and makes excellent judgment calls,”
and that he is an “internationally recognized intellectual property, technology and
outsourcing lawyer”. He is recognized as a “Leading Individual” and was awarded
“Recommended” ratings in both “Technology and IT Outsourcing” and “Business
Process Outsourcing,” and named as a “Notable Practitioner” at the national level
in Outsourcing. He was voted one of the world’s top 250 IP strategists (IAM client
survey) and he was selected as one of the country’s top 25 pre-eminent IT
practitioners in the Best of the Best USA. He regularly advises clients on strategic
intellectual property concerns, privacy, data security, data transfer, information life
cycle management and competitive intelligence matters, in both transactional and
litigation contexts.
60758855.pptx 26
27. William A. Tanenbaum (cont’d)
Mr. Tanenbaum is the founder and co-chair of PLI’s annual Outsourcing
Conference, the founder and chair of its Green Technology conference, and a
regular lecturer at industry outsourcing conferences. He chairs Kaye Scholer’s
GreenTech breakfast seminar series and presents webcasts on IT, IP and
GreenTech topics. He has contributed to Bloomberg’s Energy Sustainability Law
Report. He is a past President of the International Technology Law Association
(formerly the Computer Law Association) and is listed in Who’s Who in America,
the International Who’s Who of Business Lawyers, the Guide to the World’s
Leading Litigation Experts and the Guide to the World’s Leading Patent Law
Experts. He is the privacy and data protection columnist for the New York Law
Journal, co-author of a book on privacy law and has been quoted in The Economist
magazine as an expert on IP law. His articles have been used at Harvard and
other law schools. He graduated from Brown University (degree with highest
honors and Phi Beta Kappa) and Cornell Law School.
60758855.pptx 27
Social MediaSocial network privacy rulesFacebook controversies as an illustrativeGoogle book project Issues with treating as a copyright litigation settlement Blogging as advertising and “sponsored” content
Social network privacy rulesFacebook controversies as an illustrativeGoogle book project Issues with treating as a copyright litigation settlement Blogging as advertising and “sponsored” content
Cooperative Business Ventures Terms of use and obtaining consent Practical enforceability issues Contracts of adhesion What are current reasonable expectations? European vs. US PII (and Canada too) What data can be combined Licensing as a vehicle Combining representations and warranties with continuing covenants Indemnification for proper collection and consent