Keep It Separated
November 14, 2012
Respect data decentralization. That is the key to “The Challenge of Defensible Deletion of Distributed Legacy Data,” according to the eDiscovery Law & Tech Blog at X1 Discovery.
Blogger John Patzakis submits that, for large enterprises with data subject to governance requirements, centralization can make it hard to create a defensible retention schedule. Most archiving systems require that bits of data be pulled from their cozy homes on group and departmental silos and dumped into a central system before any retention and management process can even begin. He writes:
“Forcing centralization on these many pockets of productivity is highly disruptive and rarely effective due to scalability, network bandwidth and other logistical challenges. So what this leaves is the reality that for any information remediation process to be effective, it must be executed within these departmentalized information silos.”
Not surprisingly, Patzakis recommends one of X1’s own products, X1 Rapid Discovery, to do just that. The company has produced an hour-long webinar outlining their method. According to the article:
“X1 Rapid Discovery represents game-changing technology to effectuate the remediation of distributed legacy data due to its ability to install on demand virtually anywhere in the enterprise, including remote data silos, its light footprint web browser access, and intuitive interface. X1 Rapid Discovery enables for effective assessment, reporting, categorization and migration and remediation of distributed information assets by accessing, searching and managing the subject data in place without the need for migration to the appliance or a central repository.”
Sounds good. It may well be that X1 Rapid Discovery is the best solution for this process, or maybe not. Either way, the webinar could be worth a gander.X1 Discovery makes e-discovery tools and enterprise search solutions for IT and legal professionals. Founded by Idealab, the company is located in Pasadena, CA.
Cynthia Murrell, November 14, 2012
Sponsored by ArnoldIT.com, developer of Augmentext
The Huber Affair: Demining Now Underway
June 26, 2012
Google is working overtime to keep attention focused on technical issues. You can wallow in the smart software encomium in the New York Times. (See “How Many Computers to Identify a Cat? 16,000” in the June 27, 2012, environmentally unfriendly newspaper or you can give the newspaper’s maybe here, maybe gone link at http://goo.gl/Twl9I.) The Google I/O Conference fast approaches, so there are the concomitant write ups about a Google hardware and news in “Google’s I/O Conference: New Operating System, Tablet”.
But there are two personnel stories which seem to haunt the company at what is the apex of the Google techno-promo machine: Larry Page’s minor voice problem and a person few people outside of Google have heard about. Both of these are potential “information minefields.” Google does not, as far as I know, have an effective demining system in place.
I have avoided commenting directly on the health thing. You can get the story or what passes for a story in “Google CEO Larry Page and the Healthy Way to Answer, ‘What’s Wrong?’” But I do have an opinion about the wizard responsible for Local Search, Maps, Earth, Travel, Payments, Wallet, Offers, and Shopping. I read more about about one Google executive than I expected in “This Exec May Have The Hardest Job At Google, And His Colleagues Are Tired Of Seeing Him Get Trashed In The Press.”
The basic idea, as I understand it, is:
Last week, we [Business Insider] published a story headlined: “Depending On Whom You Ask, This Google Exec Is Either ‘Weak’ Or He Just Drew The Short Straw?
The publication did some digging and learned from “senior sources”:
Their view is that Huber is a top-notch Google executive who asked for the hardest challenge his boss could give him and he got it – in the form of nascent, unproven products and an executive reporting to him that ended up being vastly under-qualified for her job.
The weak link in the Google brain mesh was a person from PayPal. Yikes. A female goofed with some PayPal type projects. The story wraps up:
Yahoo and Governance: Semel to Scott Thompson
May 4, 2012
Short honk: I don’t much, if any, attention to Yahoo. My last big analysis of Yahoo was shortly after its then Chief Technology Officer tried to explain to a financial services client of mine that Yahoo was ahead of Google in search. Crazy assertion from a crazy outfit. In my report, I included an image of Terry Semel as the captain of the Titanic. Got a laugh. Yahoo got zero positives from me. (By the way is that Wikipedia profile of Mr. Semel accurate? Check it out between conference calls and SMS texting.)
Navigate to “Scott Thompson Resume Scandal Is Not an Inadvertent Mistake—He Also Claimed Comp Sci Degree as CTO of PayPay.” I want to comment on the spelling of résumé but who cares? That’s my attitude to the coverage of an executive fudging a biography. Furthermore, in my analysis Yahoo is the type of outfit which lives in a world of illusion, silos, and confusion.
The fact that a senior executive would take the time to do a little digging is absolutely no surprise to me. I hear the phrase “I’m too busy” from people whom I know are not too busy. Some of these people ask me for work and then tell me, “We have a spring vacation.” I heard this phrase from a company president who is guiding a company which is losing millions of dollars each quarter. Right. Vacation. Spring break.
I think we have plenty of solid evidence of a core governance problem at Yahoo, but the same issue exists in many US organizations. Whether it is the confusion about the actions of US government employees or the unfortunate Google Street View incident, governance is not a core competency in many US organizations. Enron, Lehman Brothers, Tyco—remember these executive edifices?
Furthermore I don’t think governance can be fixed quickly, if at all.
When an individual professional does not do the basics like checking key facts, the egregious mistakes will continue and most likely increase.
Governance problems are not black swans.
Governance problems are a direct outcome of people who do not focus, gather information, analyze, and reflect.
Rushing to meetings, asking for others to collect information, and staring at mobile devices—these are flashing signals of trouble at Yahoo and elsewhere.
Fiddling with a biography is either effective public relations, impactful marketing, or the shortest distance between a person and the top of Maslow’s hierarchy. For me, Yahoo and fake credentials are no big deal.
Baloney is the business of many businesses.
Desperation marketing is the new normal marketing.
Stephen E Arnold, May 4, 2012
Sponsored by no one but me.
Google Search Saves the Day
March 1, 2012
According to the Nextgov article “Solyndra Investigation Led to New Search Tool at Energy” Google Search has joined the fight against crime. A “congressional investigation into alleged mishandling of a $528 million Energy Department loan guarantee” to Solyndra caused a data overload for Energy’s Loan Department. Energy workers were trying to provide congressional investigators with the information they needed but their current document search tools simply created even bigger problems. According to Energy Chief Technology Officer Peter Tseronis the searches “resulted in “GS-15s standing at printers hitting print, print, print, copy, copy, copy for emails, attachments, PDFs — information that was just voluminous.” In response to this mounting problem the CTO office joined forces with an outside vendor to help modify their existing Google search system. Users throughout the department then had the ability to index as well as sort through various emails, Word documents etc. Looks like Google Search was ready and saved the day.
April Holmes, March 1, 2012
Sponsored by Pandia.com
Autonomy Serves US Government with Governance
February 2, 2012
It seems our nation is finally getting its records in digital order. The Sacramento Bee reports, “Autonomy Empowers U.S. to Meet President Obama’s New Memorandum on Government Records.” According to the Memorandum, government agencies must standardize their content policies and transfer relevant files to the U.S. National Archives and Records Administration. The press release presents Autonomy as the tool for the job:
Autonomy delivers a comprehensive suite of information governance solutions that addresses the broad and varying needs of enterprises and government agencies. With support for over 150 languages and access to over 1,000 file types through 400 pre-built connectors to disparate content sources, repositories and legacy systems, the Autonomy solutions can apply policy consistently to every information source in the enterprise simultaneously, while managing content in place and reducing duplicates across all enterprise repositories.
Autonomy, owned by HP, is a leader in the field of unstructured data management and serves prominent public and private organizations around the globe. The company was founded in 1996, and has made its fortune on the fruit of research originally performed at Cambridge University.
Cynthia Murrell, February 2, 2012
Sponsored by Pandia.com
United Nations and Its Tech Challenges
December 20, 2011
From the “Why Am I Not Surprised” Department. News Flash.
UN Computer System Failure
A flub at the United Nations— an estimated nearly $400 million flub– has been made public as UN officials are scrambling to get the botched project back on track. Perhaps “flub” is too strong? Maybe in UN speak, the error was an administrative concern. Yes, that’s it. Administrative concern.
The United Nations’ project, known as Umoja, is a computer and software system that promised to reform the organization but has been at a standstill since June. Umoja, which was intended to be an administrative system to cut down on waste and fraud, was led by Secretary General Ban Ki-moon. Fox News’ article, “UN’s Botched Computer-System Overhaul: A Major ‘Failure’ of Ban Ki-Moon’s Management” tells us more:
Ban’s officials are scrambling to get the jinxed project known as Umoja (Swahili for unity) back on track after a key UN budget committee heard from Ban’s office last week that the sweeping information technology overhaul, already a year behind schedule, won’t be finished until 2015, three years beyond the original target date. The committee also said it was “deeply disturbed and dismayed” by the UN’s “apparent lack of awareness and foreknowledge” about the sputtering status of the project.”
This is entropy from top to bottom. Is this the UN’s approach to information management? It appears that guessing about technology may not work and the organization should probably make more solidified plans before pushing such a large and costly project forward. From peacekeeping to computing, the UN is rowing against the current of competence in my opinion.
Andrea Hayden, December 20, 2011
Sponsored by Pandia.com
Business Process Is Not Information Management
November 15, 2011
We continue to run across some interesting stories about Enterprise Data. This one from Catherine Lamsfuss caused quite a debate at lunch. Here’s what we read:
As the amount of data within a business or industry grows the question of what to do with it arises. The article, “Business Process Management and Mastering Data in the Enterprise“, on Capgemini’s website explains how Business Process Management (BPM) is not the ideal means for managing data.
According the article as more and more operations are used to store data the process of synchronizing the data becomes increasingly difficult.
As for using BPM to do the job, the article explains,
While BPM tools have the infrastructure to do hold a data model and integrate to multiple core systems, the process of mastering the data can become complex and, as the program expands across ever more systems, the challenges can become unmanageable. In my view, BPMS solutions with a few exceptions are not the right place to be managing core data[i]. At the enterprise level MDM solutions are for more elegant solutions designed specifically for this purpose.
The answer to this ever-growing problem was happened upon by combining knowledge from both a data perspective and a process perspective. The article suggests that a Target Operating Model (TOM) would act as a rudder for the projects aimed at synchronizing data. After that was in place a common information model be created with enterprise definitions of the data entities which then would be populated by general attributes fed by a single process project.
While this is just one man’s answer to the problem of data, it is a start. Regardless of how businesses approach the problem it remains constant–process management alone is not efficient enough to meet the demands of data management.
“It’s not the process its the people that implement and use the process that matter” stated Jasmine Ashton in a final summary of the lunch debate. We had to agree. However, as we looked through the Polyspot data management description that Ms. Lamsfuss’ article pointed us to we had to agree that starting with a good technology implementation could go a long way towards helping the people follow the processes.
Constance Ard November 15, 2011
Protected: More Products for SharePoint Governance Problems
November 1, 2011
Data Breach Leaves 5 Million Patients Holding the Bag
October 11, 2011
A data breach of military health care records from the past 19 years has left nearly 5 million past and current patients vulnerable to identity theft and other acts of malintent.
Tricare, the healthcare program serving current and former military service members, revealed that contractor Science Applications International Corp. (SAIC) lost backup tapes containing health data and other personal information of about 4.9 million people. The tapes were stolen out of an SAIC employee’s car during a Sept.13 burglary.
Tricare released a statement saying that the risk of harm to patients has been judged low and this is why the do not intend to provide the people affected with credit monitoring services.
According to the Information Week article, Military Health Plan Data Breach Threatens 4.9 Million, Ruby Raley, director of healthcare solutions at IT integration and security company said:
Unlike HIPAA, FTC regulations don’t require entities to sign agreements with ‘business associates’ that hold third parties to the same standards when handling sensitive data. Also, HIPAA regulations require organizations to provide a year of credit monitoring to anyone who may have been affected by a breach. They’re only [offering] fraud protection for 90 days.
While no financial records were stolen, this incident leads us to wonder whether government enitites should be forced to follow HIPAA regulations, instead of less strict FTC regulations. This may prevent similar problems from occuring down the road.
Jasmine Ashton, Oct 11, 2011
Protected: SharePoint: The Management Tool for the Future?
October 3, 2011