Big Data Disruptions Can Be Tamed with Enterprise Architecture

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6
Previous Big Data Disruptions Can Be Tamed with Enterprise Architecture-1 Next

Click through for four critical impacts of big data, and how enterprise architects can address these issues, as identified by Gartner, Inc.

Enterprise architecture (EA) practitioners have a major role in ensuring their organizations maximize the business opportunities posed by big data, according to Gartner, Inc.

Big data makes organizations smarter and more productive by enabling people to harness diverse data types previously unavailable and to find previously unseen opportunities. However, Gartner analysts said big data poses big challenges as well — and that's where enterprise architects can help. As navigators of strategic change, the task for EA practitioners is to chart the right course for big data across the most critical dimensions of the organization: business, culture, talent and technology.

“Traditional approaches to EA are significantly impacted by big data,” said David Newman, research vice president at Gartner. “For the EA practitioner, the balance shifts from a focus on optimization and standardization within the organization, to lightweight approaches that focus on harmonization and externalization across the broader enterprise ecosystem. Big data disrupts traditional information architectures — from a focus on data warehousing (data storage and compression) toward data pooling (flows, links and information shareability). In the age of big data, the task for the EA practitioner is clear: Design business outcomes that exploit big data opportunities inside and outside the organization.

Gartner has identified four critical impacts of big data and how enterprise architects can address these issues.

More Slideshows:

Battle of the Enterprise-Ready Mobile OS The platforms were each scored on a combination of factors including built-in security, application security, authentication, device wipe, device firewall, virtualization and many others.

Five Web Application Security Myths Many companies fail to make the first step towards security because of misconceptions and security myths.

Five Keys to Creating the Data Center of Tomorrow Five strategic IT moves that will help CIOs push their data center forward.


Related Topics : Fujitsu, Storage Virtualization, Desktop Virtualization, Virtual Tape Library, InfiniBand

More Slideshows

infra97-290x195 7 Tips to Improve Data Backup and Ensure Business Continuity

With today's modern solutions, enterprises should be able to transform backup and recovery from a low-level legacy IT function to a modern function delivering continuity and value to the entire business. ...  More >>

OwnBackupCloudDataRisk0x Top 3 Cloud Backup Dangers and How to Avoid Them

The top three data dangers lurking in cloud environments and tips for how to manage data protection and backup in a SaaS-based world. ...  More >>

infra93-190x128.jpg 5 Ways to Mitigate Costs Associated with Machine Data

To keep up with machine data growth and avoid costs it traditionally incurs, companies need to combine on-premises storage performance and availability with the elasticity and economics of the cloud. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.