Top 10 Best Practices for Data Integration - Slide 2

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Data integration is a family of diverse but related techniques-2 Next

Data integration is a family of diverse but related techniques

Data integration is a family of techniques, most commonly including ETL (extract, transform, and load), data federation, database replication, data synchronization, sorting, and changed data capture. All these techniques require support for a wide range of interfaces, so the resulting DI solution can access databases, applications, and files to extract or load data. Solutions based on these techniques may be hand-coded, based on a vendor’s tool, or a mix of both.

The data management discipline known as data integration (DI) has undergone an impressive expansion over the last decade. Today it has reached a critical mass of multiple techniques used in diverse applications and business contexts. Vendor products have achieved maturity; users have grown their DI teams to epic proportions; competency centers regularly staff DI work; and DI as a discipline has earned its autonomy from related practices like data warehousing and database administration.

Given all this change, it’s not surprising that people in the field might not be up to speed on the current incarnation of DI. Even DI specialists and the colleagues who depend on them sometimes forget the new techniques, diversity, independence, collaboration, and governance typical of modern DI practices. Many suffer misconceptions and out-of-date mindsets that need adjustment.

The 10 practices in this slideshow, from a TDWI report sponsored by SAS, paint a modern landscape of current DI practices. They also bust a few DI myths that are still too common. Moreover, they raise the bar on DI, showing how sophisticated and powerful a DI solution can be—at least when DI is driven by modern best practices using up-to-date tools.

If you let it all soak in, this checklist  will redefine DI for you and your peers. And it will help you set higher goals and aspirations for DI work and its outcome. The practices listed here can be the guidelines that help you achieve more modern, high-value, diverse, independent, well-designed, far-reaching, green, collaborative, and well-governed uses of DI tools and techniques.

More Slideshows:

Tips on Controlling Your E-mail So It Doesn't Control You Get a handle on frequent interruptions caused by incoming e-mail.

Restoring Files: A $9 Billion Waste of Time Survey finds that a staggering amount of IT personnel time is wasted on restoring files.

Top 10 Wireless Predictions for 2011 Juniper Research has drawn up a list of predictions for 2011.


Related Topics : Application Security, IT Process Management, Six Sigma

More Slideshows

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Analytics21-190x128 5 Ways to Avoid Becoming 'Digital Prey'

Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ...  More >>

NETSCOUTShadowIT0x 6 Tips for Combating Shadow IT Once and for All

To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.