The data management discipline known as data integration (DI) has undergone an impressive expansion over the last decade. Today it has reached a critical mass of multiple techniques used in diverse applications and business contexts. Vendor products have achieved maturity; users have grown their DI teams to epic proportions; competency centers regularly staff DI work; and DI as a discipline has earned its autonomy from related practices like data warehousing and database administration.
Given all this change, it’s not surprising that people in the field might not be up to speed on the current incarnation of DI. Even DI specialists and the colleagues who depend on them sometimes forget the new techniques, diversity, independence, collaboration, and governance typical of modern DI practices. Many suffer misconceptions and out-of-date mindsets that need adjustment.
The 10 practices in this slideshow, from a TDWI report sponsored by SAS, paint a modern landscape of current DI practices. They also bust a few DI myths that are still too common. Moreover, they raise the bar on DI, showing how sophisticated and powerful a DI solution can be—at least when DI is driven by modern best practices using up-to-date tools.
If you let it all soak in, this checklist will redefine DI for you and your peers. And it will help you set higher goals and aspirations for DI work and its outcome. The practices listed here can be the guidelines that help you achieve more modern, high-value, diverse, independent, well-designed, far-reaching, green, collaborative, and well-governed uses of DI tools and techniques.
Tips on Controlling Your E-mail So It Doesn't Control You Get a handle on frequent interruptions caused by incoming e-mail.
Restoring Files: A $9 Billion Waste of Time Survey finds that a staggering amount of IT personnel time is wasted on restoring files.
Top 10 Wireless Predictions for 2011 Juniper Research has drawn up a list of predictions for 2011.
IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ... More >>
Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ... More >>
To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. ... More >>