<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Big Data Archives - ICT News</title>
	<atom:link href="https://www.ict-news.org/tag/big-data/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ict-news.org</link>
	<description>Information &#38; Communication technology world news</description>
	<lastBuildDate>Sat, 11 Mar 2017 14:08:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.9.3</generator>

<image>
	<url>https://www.ict-news.org/wp-content/uploads/2018/03/ICT-icon-3.png</url>
	<title>Big Data Archives - ICT News</title>
	<link>https://www.ict-news.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>HPE refocuses tech services group on cloud, big data</title>
		<link>https://www.ict-news.org/hpe-refocuses-tech-services-group-cloud-big-data/</link>
					<comments>https://www.ict-news.org/hpe-refocuses-tech-services-group-cloud-big-data/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Fri, 03 Mar 2017 10:55:46 +0000</pubDate>
				<category><![CDATA[HP]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Digital Transformation]]></category>
		<category><![CDATA[IT Outsourcing]]></category>
		<guid isPermaLink="false">https://newsroom.ict-hardware.com/?p=7514</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://www.ict-news.org/hpe-refocuses-tech-services-group-cloud-big-data/">HPE refocuses tech services group on cloud, big data</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="container-wrap  main-color "  style="padding-top:40px;padding-bottom:40px" ><div class="section-container container"><div class="vc_row vc_row-fluid row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner "><div class="wpb_wrapper">
	<div class="kleo_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<section class="deck viewability">
<h2>The new Pointnext group will help customers adopt emerging technologies</h2>
</section>
<p>Hewlett Packard Enterprise has revamped its technology services unit to focus on helping customers adopt emerging technologies, including cloud computing, the internet of things, and big data.</p>
<p>HPE&#8217;s new Pointnext technology services division, <a href="http://www.marketwired.com/press-release/hewlett-packard-enterprise-redefines-technology-services-organization-pointnext-nyse-hpe-2199987.htm">announced Thursday</a>, is designed to help businesses speed up their adoption of several technologies, also including hybrid IT services and analytics, the company said. HPE announced the rebranded services unit with <a href="https://www.hpe.com/us/en/services.html">an &#8220;unboxing&#8221; video</a>.</p>
<div class="unruly_in_article_placement">
<div class="unruly_ia_furniture">The revamped technology services unit is designed to meet customer needs as digital transformation is &#8220;driving an incredible pace of change&#8221; in the IT industry, Antonio Neri, executive vice president and general manager of the HPE Enterprise Group, said in a press release.</div>
</div>
<p>HPE Pointnext combines HPE&#8217;s consulting and <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">support</span></span> organizations in one group under general manager Ana Pinczuk, former chief product officer at Veritas. HPE <a href="https://www.hpe.com/us/en/newsroom/news-archive/featured-article/2017/02/Ana-Pinczuk-Joins-HPE-to-Lead-Technology-Services.html">announced her hiring</a> last month.</p>
<aside class="nativo-promo smartphone"></aside>
<p>Pointnext will use HPE&#8217;s 25,000 <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">technology</span></span> services specialists in 80 countries to help business with digital transformations, the company said.</p>
<p>Crawford Del Prete, an enterprise computing analyst at IDC, called the announcement a relaunch and rebranding of HPE&#8217;s tech services group.</p>
<p dir="auto">The announcement comes after HPE&#8217;s <a href="http://www.csc.com/investor_relations/press_releases/137152-csc_announces_merger_with_enterprise_services_segment_of_hewlett_packard_enterprise_to_create_global_it_services_leader">announcement of a merger</a> of its separate enterprise services unit with CSC, he noted.</p>
<p>Technology services have been &#8220;a bright spot in HPE&#8217;s portfolio, and with the spin-merge of professional services to CSC, will be the focus of HPE&#8217;s services in the future,&#8221; he said via email.</p>
<p>&nbsp;</p>
<p>By <span class="fn"><a href="http://www.computerworld.com/author/Grant-Gross/" rel="author">Grant Gross</a>, source by <a href="http://www.computerworld.com">ComputerWorld</a></span></p>
<p>Visit <a href="http://www.computerworld.com">ICT Hardware</a> website to get more info about <a href="http://www.computerworld.com">HP Products</a></p>
<div class="ad viewability"></div>

		</div> 
	</div> </div></div></div></div></div></section><!-- end section -->
<p>The post <a rel="nofollow" href="https://www.ict-news.org/hpe-refocuses-tech-services-group-cloud-big-data/">HPE refocuses tech services group on cloud, big data</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/hpe-refocuses-tech-services-group-cloud-big-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco amps-up Tetration platform with better security, reduced footprint, AWS cloud option</title>
		<link>https://www.ict-news.org/cisco-amps-tetration-platform-better-security-reduced-footprint-aws-cloud-option/</link>
					<comments>https://www.ict-news.org/cisco-amps-tetration-platform-better-security-reduced-footprint-aws-cloud-option/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Thu, 09 Feb 2017 09:02:27 +0000</pubDate>
				<category><![CDATA[analytics]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Cisco Subnet]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Data Center]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://newsroom.ict-hardware.com/?p=7469</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://www.ict-news.org/cisco-amps-tetration-platform-better-security-reduced-footprint-aws-cloud-option/">Cisco amps-up Tetration platform with better security, reduced footprint, AWS cloud option</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="container-wrap  main-color "  style="padding-top:40px;padding-bottom:40px" ><div class="section-container container"><div class="vc_row vc_row-fluid row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner "><div class="wpb_wrapper">
	<div class="kleo_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<section class="deck viewability">
<h2>Cisco Tetration helps users move toward Zero Trust data center</h2>
</section>
<div class="ad viewability">
<p>Cisco has rolled out a second release of its Tetration Analytics package with features such as a smaller footprint and a cloud <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">service</span></span> that will go a long way toward making the system alluring to more data center customers.</p>
<p>Announced in June of last year, Cisco’s Tetration Analytics is a turnkey analytics package that gathers <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">information</span></span> from hardware and software sensors and analyzes the information using big data and machine learning.</p>
<p>Tetration software sensors support Linux and Windows server hosts, while hardware sensors are embedded in Cisco network switch ASICS: Nexus 9200, Nexus 9300-EX and Nexus 9500-EX, to collect flow data at line rate from all the ports. Per Cisco once in place, the Tetration platform learns its enterprise environment and any policies IT has in place. From there it can learn which applications are dependent on each other throughout their data center and into the cloud. It can monitor server behavior patterns and group servers more efficiently.</p>
<aside class="nativo-promo smartphone"></aside>
<p>For policy setting, customers can validate new policies by running them through Tetration first to see what their impact would be on the enterprise. <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">Users</span></span> can also use this information for regulatory compliance applications.</p>
<p>In the first release of the platform it was largely looking and listening to customer <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">networks</span></span> and applications and now with release 2 it can act on what it has found – automatically enforcing policies, securing the enterprise and continuing to help customers get a better handle on their data centers, said Cisco senior director, product management Yogesh Kaushik.</p>
<p>Security was always a key part of Tetration and the second release builds more options onto the system. Kaushik said customers are moving toward a “zero trust” policy which locks down all access to applications – but with highly distributed applications, like cloud apps, that have many components and are multitiered it can be complex to implement, Kaushik stated.</p>
<aside class="nativo-promo tablet desktop"></aside>
<p>Cisco says Tetration Analytics policy recommendation and enforcement engine can now take micro-segmentation &#8212; a security technique enabling workload separation &#8212; a leap further by delivering application segmentation, which drives policies across the application layer, regardless of where the application resides: virtualized, bare metal, physical servers, or in the cloud. Policies can be pushed to any vendor&#8217;s firewall, and can be orchestrated at the network layer as well, Cisco said.</p>
<figure class="large">
<div class="embed-wrapper"></div>
</figure>
<p>Cisco says Tetration can capture a million events per second and make decisions behavior analysis of billions of flows, processes, and workload characteristics allowing for realtime policy enforcement. The idea is that as <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">customers</span></span> move towards a more devops environment where apps are rapidly brought online and off, Tetration can implement security policies quickly.</p>
<p>&#8220;As organizations undergo digital transformation and embrace the DevOps model, they&#8217;re investing in new technologies with infrastructure that&#8217;s becoming more dynamic and distributed, and as a result <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">security</span></span> must become more dynamic as well,&#8221; <a href="http://www.networkworld.com/article/3164247/security/cisco-unveils-tetration-20-focuses-on-application-security.html" target="_blank">said Zeus Kerravala, principal analyst at</a> ZK Research and Network World blogger, said in a statement. &#8220;Although 80% of security spending is focused on the perimeter, only 20% of the breaches occur there. With Tetration&#8217;s security policy enforcement, organizations could probably pay for the platform by heading off a single breach.&#8221;</p>
<p>In addition to the software <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">improvements</span></span>, Cisco added a smaller footprint version and a cloud option.</p>
<p>The small-scale Cisco Tetration-M is aimed at deployments supporting up to 1,000 workloads. The Tetration-M package includes eight 1RU servers (Six UCS C-220 servers and two Nexus 9300 servers) compared to the larger version which requires 39 1RU servers.</p>
<p>Jim Duffy, a senior analyst with the 451 Research group, noted that Cisco said last summer at Cisco Live they they&#8217;d be scaling Tetration down, even to the chip level. “So smaller footprints and more digestible packaging and pricing makes much sense.”</p>
<p>For the cloud, Cisco has also announced an appliance with Tetration software deployed in the public cloud on Amazon Web Services (AWS). Tetration Cloud also supports up to 1,000 workloads. Tetration can monitor workloads in private as well as public clouds, Cisco stated.</p>
<p>Cisco also bolstered the number of <a title="Cisco" href="http://blogs.cisco.com/datacenter/robust-ecosystem-for-tetration-analytics" target="_blank">third-party vendors</a> that can now utilize Tetration to build its data into their systems – AlgoSec, Citrix, F5, Infoblox, ServiceNow Tufin and the Dell Converged Infrastructure Group (previously known as VCE).</p>
<p>The Tetration upgrade comes on the heels of Cisco’s purchase of AppDynamics and its application performance monitoring technology which could end up being a component for feeding Tetration all manner of application performance information, experts said.</p>
<p>“The information collected from AppDynamics is an ideal fit in Tetration,” said Dennis Drogseth vice president, Enterprise Management Associates.</p>
<p>During a press event for the AppDynamics buy, Cisco’s Senior Vice President and General Manager Rowan Trollope said of a possible AppDynamics integration with Tetration: “We have been looking at our analytics strategy more broadly in the past year and a big part of the value that we bring especially with the Tetration product, is the ability to deeply instrument and report on the <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">infrastructure</span></span> – what’s happening from UCS all the way to the network and getting that broad view from the security perspective. But taking all of that data and making sense of it …being able to connect the dots on all these parts of the enterprise hasn’t really been possible&#8230;you could see us making moves that we would tie these things together.&#8221;</p>
<p>By <span class="fn"><a href="http://www.networkworld.com/author/Michael-Cooney/" rel="author">Michael Cooney</a>, source by <a href="http://www.networkworld.com">NetworkWorld</a></span></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> website to get more info about <a href="https://www.ict-hardware.com/">Cisco Products</a></p>
</div>

		</div> 
	</div> </div></div></div></div></div></section><!-- end section -->
<p>The post <a rel="nofollow" href="https://www.ict-news.org/cisco-amps-tetration-platform-better-security-reduced-footprint-aws-cloud-option/">Cisco amps-up Tetration platform with better security, reduced footprint, AWS cloud option</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/cisco-amps-tetration-platform-better-security-reduced-footprint-aws-cloud-option/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>HPE acquires security startup Niara to boost its ClearPass portfolio</title>
		<link>https://www.ict-news.org/hpe-acquires-security-startup-niara-boost-clearpass-portfolio/</link>
					<comments>https://www.ict-news.org/hpe-acquires-security-startup-niara-boost-clearpass-portfolio/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Wed, 08 Feb 2017 09:38:46 +0000</pubDate>
				<category><![CDATA[analytics]]></category>
		<category><![CDATA[HP]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://newsroom.ict-hardware.com/?p=7462</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://www.ict-news.org/hpe-acquires-security-startup-niara-boost-clearpass-portfolio/">HPE acquires security startup Niara to boost its ClearPass portfolio</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="container-wrap  main-color "  style="padding-top:40px;padding-bottom:40px" ><div class="section-container container"><div class="vc_row vc_row-fluid row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner "><div class="wpb_wrapper">
	<div class="kleo_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<section class="deck viewability">
<h2>Niara’s software helps enterprises detect and protect from threats that have penetrated perimeter defenses</h2>
</section>
<div class="ad viewability">
<p>Hewlett Packard Enterprise has acquired Niara, a <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">startup</span></span> that uses machine learning and big data analytics on enterprise packet streams and log streams to detect and protect customers from advanced cyberattacks that have penetrated perimeter defenses.</p>
<p>The financial terms of the deal were not disclosed.</p>
<p>Operating in the User and Entity Behavior Analytics (UEBA) market, Niara’s technology starts by automatically establishing baseline characteristics for all users and devices across the enterprise and then <a href="https://www.hpe.com/us/en/newsroom/news-archive/featured-article/2017/02/HPE-Acquires-Niara-to-Deliver-Behavioral-Analytics-for-Enhancing-Protection-on-the-Intelligent-Edge.html">looking for anomalous, inconsistent activities</a> that may indicate a security threat, Keerti Melkote, senior vice president and general manager of HPE Aruba and cofounder of Aruba Networks, wrote in a blog post on Wednesday.</p>
<aside id="fsb-917" class="fakesidebar fakesidebar-auto">[ <a href="http://www.cio.com/article/3152659/free-security-tools-to-support-cyber-security-efforts.html#tk.ciofsb">Free security tools to support cybersecurity efforts</a> ]</aside>
<p>The time taken to investigate individual security incidents has been reduced from up to 25 hours using manual processes to less than a minute by using machine learning, Melkote added.</p>
<aside class="nativo-promo smartphone"></aside>
<p>Hewlett Packard <a href="https://www.sec.gov/Archives/edgar/data/1173752/000119312515192854/d928044d8k.htm">acquired wireless networking company Aruba Networks</a> in May 2015, ahead of its corporate split into HPE, an enterprise-focused business and HP, a business focused on PCs and printers.</p>
<p>The strategy now is to integrate Niara’s behavioral analytics technology with Aruba’s <a href="http://www.arubanetworks.com/assets/ds/DS_ClearPass_PolicyManager.pdf">ClearPass Policy Manager</a>, a role and device-based network access control platform, so as to to offer customers advanced threat detection and prevention for network security in wired and wireless environments, and internet of things (IoT) devices, Melkote wrote.</p>
<p>For Niara’s CEO Sriram Ramachandran and Vice President for Engineering Prasad Palkar and several other engineers it is a homecoming. They are part of the team that developed the core technologies in the ArubaOS operating system.</p>
<p>Niara technology addresses the need to monitor a device after it is on the internal network, following authentication by a network access control platform like ClearPass. Niara claims that it detects compromised users, systems or devices by aggregating and putting into context even subtle changes in typical IT access and usage.</p>
<aside class="nativo-promo tablet desktop"></aside>
<p>Most networks today allow the traffic to flow freely between source and destination once devices are on the network, with internal controls, such as Access Control Lists, used to protect some types of traffic, while others flow freely, Melkote wrote.</p>
<p>“More importantly, none of this traffic is analyzed to detect advanced attacks that have penetrated perimeter security systems and actively seek out weaknesses to exploit on the interior network,” she added.</p>
<p>By <span class="fn"><a href="http://www.cio.com/author/John-Ribeiro/" rel="author">John Ribeiro</a>, source by <a href="http://www.cio.com">CIO</a></span></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> website to check <a href="https://www.ict-hardware.com/">HP Products</a>. We are one of <a href="https://www.ict-hardware.com/">HP Partners</a>.</p>
</div>

		</div> 
	</div> </div></div></div></div></div></section><!-- end section -->
<p>The post <a rel="nofollow" href="https://www.ict-news.org/hpe-acquires-security-startup-niara-boost-clearpass-portfolio/">HPE acquires security startup Niara to boost its ClearPass portfolio</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/hpe-acquires-security-startup-niara-boost-clearpass-portfolio/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to build a sustainable, value-focused data culture</title>
		<link>https://www.ict-news.org/build-sustainable-value-focused-data-culture/</link>
					<comments>https://www.ict-news.org/build-sustainable-value-focused-data-culture/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Fri, 20 Jan 2017 10:06:00 +0000</pubDate>
				<category><![CDATA[analytics]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[IT Management]]></category>
		<guid isPermaLink="false">https://newsroom.ict-hardware.com/?p=7403</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://www.ict-news.org/build-sustainable-value-focused-data-culture/">How to build a sustainable, value-focused data culture</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="container-wrap  main-color "  style="padding-top:40px;padding-bottom:40px" ><div class="section-container container"><div class="vc_row vc_row-fluid row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner "><div class="wpb_wrapper">
	<div class="kleo_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<h2>Financial services CDOs weigh in on how regulation, growth and cost drives their current efforts and how each will affect future endeavors.</h2>
<p>For many financial services organizations, the role of chief <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">data</span></span> officer (CDO) has evolved in response to the current regulatory focus on data. Much money and effort has been spent to comply with new regulations, but tangible benefits for the business aren’t accruing fast enough to justify sustained investment.</p>
<p>As a result, CDO longevity has been anything but, and organizations are starting to “reboot” their role and the focus of the CDO. The “tick the box” regulatory mentality has been both a blessing and a curse, providing much needed short-term funding while also generating an “are we done yet” sentiment around this investment. This sentiment is preventing CDOs from creating real and sustainable culture change – using data as a driver of innovation and growth<strong>.</strong></p>
<p>In a recent KPMG pulse survey of selected financial services CDOs in the U.S. and Canada, respondents were asked to what degree each factor – regulation, growth and cost – was driving their current efforts and to project two years out how they anticipate this changing. While the respondents see little movement in cost (+3 percent) over the next two years, most believe regulation (-23 percent) will be supplanted by growth (+20 percent) as the main driver for data related initiatives by 2018. This will have major impacts on how data is positioned within these organizations.</p>
<aside class="nativo-promo smartphone"></aside>
<figure class="large "><a class="zoom article-gallery cboxElement" title="kpmg survey chart" href="http://images.techhive.com/images/article/2017/01/kpmg-survey-chart-100704696-orig.jpg"><img src="http://images.techhive.com/images/article/2017/01/kpmg-survey-chart-100704696-large.jpg" alt="kpmg survey chart" width="700" height="300" border="0" /></a></p>
<div class="zoom-icon"></div>
<p><small class="credit">KPMG pulse survey</small></figure>
<p>In retrospect, the success or lack of success of the CDO organization has largely depended on looking beyond the goal of achieving regulatory compliance. The question they need to answer is “what role do they think data can play in expanding and growing their business. If organizations want to take advantage of disruptive technologies and opportunities for revenue growth, a “new normal” anchored in business value is needed.</p>
<p>There are no easy answers or perfect models for this for any <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">financial</span></span> services company. However, Freddie Mac‘s Single Family Business Unit, which represents approximately 80 percent of Freddie Mac’s mortgage volumes, has developed a comprehensive approach to the evolving CDO position, which is based on six key foundational principles.</p>
<p><strong>1. Embed in the business.</strong> A clear linkage to enabling the business strategy <em>in addition</em> to the regulatory and technology agendas is critical so that a sustainable value proposition is created.   Freddie Mac’s vice president of data governance for the Single-Family Business, reports to the head of Freddie Mac’s largest business unit&#8211; not to risk management or IT. This brings with it a heightened sensitivity focused on moving fast enough to be relevant to the business, otherwise, the businesses they support will find their own way forward which often does not align to or leverage new data focused capabilities and standards critical to organizational adoption. The vice president of Data Governance governs through collaboration, but retains a 51 percent vote on matters concerning their “data supply chain” and the platforms for which she is the business sponsor.</p>
<p><strong>2. Cultivate strong partnerships. </strong>The relationship with IT, including Architecture and IT Delivery, has been at the foundation of the program in both design and execution.   IT leadership in particular has been critical in helping align and refocus accountability for data with the business, and for jointly establishing and staffing a big data center of excellence to help bring advanced analytics to fruition. Partnership with third parties was also core to their approach. She used them to provide acceleration and put wins on the board early in her journey, reducing the “trial and error” time that her new and growing team would likely experience on their own.</p>
<aside class="nativo-promo tablet desktop"></aside>
<p><strong>3. Focus on strategic <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">value</span></span> alongside control.</strong> While <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">data</span></span> control and governance are one pillar of accountability, from the beginning Freddie Mac focused on building a foundation of capabilities that <strong>empower</strong> the business lines through more efficient access to different types of high quality data. This helps the business innovate and ultimately make better informed decisions. In doing so, the impact of data investments is more directly felt in business.</p>
<p><strong>4. Examine the entire “data supply chain” for benefits.</strong> Freddie Mac is driving simplification and reuse from data sources in the front-end systems to where models, reports or analytics consume that data. They strive for data to be captured once, quality-checked and reused again and again. This has the benefits of cutting costs, shortening development time, and improving confidence levels for the business.</p>
<p><strong>5. Transformation requires constant, consistent communication.</strong> Freddie Mac has adopted an internal brand focusing on empowerment, simplification, reuse and control.   This simple message is at the forefront of all communications and training &#8212; driving the employees at Freddie Mac to think about data and their role as data producers and consumers differently. This has also been an important ingredient in helping to manage expectations of the business lines and helping them connect the dots between Morton’s group and business value.</p>
<p>These efforts are clearly starting to pay off, as demonstrated through the results of a recent employee <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">data</span></span> survey. The results showed that not only did the vast majority of the 300 analysts and modellers know what metadata is, but they also understood its strategic value in cutting down on the time spent using the “friends and family” network to find, assess and define data needed for their reports.   Given this importance, communication planning and execution utilizes 50% of a fully dedicated individual, along with approximately 30-40% of Morton’s time.</p>
<p><strong>6. 100 wins in 100 days program</strong> – Early on, Freddie Mac recognized that “wins” drive momentum. Wins come in many forms – whether they are decisions made, delivery of new capabilities or achievement of operational benchmarks.   Programs like this helped to cement a culture of urgency where it’s everyone’s job to create momentum for the team. There are few big-bang events when transforming an organization’s data culture. Celebrating wins, big or small, demonstrates progress and connects value to the many milestones achieved along the way.</p>
<p>The active focus on the “data supply chain” to serve analytics and reporting for the financial services industry is here to stay. In spite of the fact that so much of the day to day focus is currently dominated by regulatory drivers, the industry needs to start transitioning towards a “new normal” where the business views investments in data as helping drive innovation and growth in addition to compliance.</p>
<p>A first step toward a sustainable, value focused data culture is beginning to leverage current regulatory driven investments and adding a relatively small incremental spend, to generate value for the business.</p>
<p>A small investment will often generate disproportionately more incremental value and create a tangible connection that moves the business toward its goals. The catch is that the business needs have to be considered upfront during regulatory planning. Facing tight regulatory deadlines, it’s not intuitive for those charged with implementing to add any more scope than is absolutely necessary.</p>
<p>Sponsorship is key. Extracting this incremental value will require a change in the tone at the top in order to affect this shift in mindset and in doing so, start to unlock the broader business value.</p>
<p>As with any major transformation, this transition toward more value driven and sustainable <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">data</span></span> focus won’t happen overnight &#8212; this is one more reason to start now.</p>
<p>By Jodi Morton and Robert Parr, source by <a href="http://www.itworld.com/">ITWorld</a></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> for more information</p>

		</div> 
	</div> </div></div></div></div></div></section><!-- end section -->
<p>The post <a rel="nofollow" href="https://www.ict-news.org/build-sustainable-value-focused-data-culture/">How to build a sustainable, value-focused data culture</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/build-sustainable-value-focused-data-culture/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
