Autonomy Serves US Government with Governance
February 2, 2012
It seems our nation is finally getting its records in digital order. The Sacramento Bee reports, “Autonomy Empowers U.S. to Meet President Obama’s New Memorandum on Government Records.” According to the Memorandum, government agencies must standardize their content policies and transfer relevant files to the U.S. National Archives and Records Administration. The press release presents Autonomy as the tool for the job:
Autonomy delivers a comprehensive suite of information governance solutions that addresses the broad and varying needs of enterprises and government agencies. With support for over 150 languages and access to over 1,000 file types through 400 pre-built connectors to disparate content sources, repositories and legacy systems, the Autonomy solutions can apply policy consistently to every information source in the enterprise simultaneously, while managing content in place and reducing duplicates across all enterprise repositories.
Autonomy, owned by HP, is a leader in the field of unstructured data management and serves prominent public and private organizations around the globe. The company was founded in 1996, and has made its fortune on the fruit of research originally performed at Cambridge University.
Cynthia Murrell, February 2, 2012
Sponsored by Pandia.com
United Nations and Its Tech Challenges
December 20, 2011
From the “Why Am I Not Surprised” Department. News Flash.
UN Computer System Failure
A flub at the United Nations— an estimated nearly $400 million flub– has been made public as UN officials are scrambling to get the botched project back on track. Perhaps “flub” is too strong? Maybe in UN speak, the error was an administrative concern. Yes, that’s it. Administrative concern.
The United Nations’ project, known as Umoja, is a computer and software system that promised to reform the organization but has been at a standstill since June. Umoja, which was intended to be an administrative system to cut down on waste and fraud, was led by Secretary General Ban Ki-moon. Fox News’ article, “UN’s Botched Computer-System Overhaul: A Major ‘Failure’ of Ban Ki-Moon’s Management” tells us more:
Ban’s officials are scrambling to get the jinxed project known as Umoja (Swahili for unity) back on track after a key UN budget committee heard from Ban’s office last week that the sweeping information technology overhaul, already a year behind schedule, won’t be finished until 2015, three years beyond the original target date. The committee also said it was “deeply disturbed and dismayed” by the UN’s “apparent lack of awareness and foreknowledge” about the sputtering status of the project.”
This is entropy from top to bottom. Is this the UN’s approach to information management? It appears that guessing about technology may not work and the organization should probably make more solidified plans before pushing such a large and costly project forward. From peacekeeping to computing, the UN is rowing against the current of competence in my opinion.
Andrea Hayden, December 20, 2011
Sponsored by Pandia.com
Business Process Is Not Information Management
November 15, 2011
We continue to run across some interesting stories about Enterprise Data. This one from Catherine Lamsfuss caused quite a debate at lunch. Here’s what we read:
As the amount of data within a business or industry grows the question of what to do with it arises. The article, “Business Process Management and Mastering Data in the Enterprise“, on Capgemini’s website explains how Business Process Management (BPM) is not the ideal means for managing data.
According the article as more and more operations are used to store data the process of synchronizing the data becomes increasingly difficult.
As for using BPM to do the job, the article explains,
While BPM tools have the infrastructure to do hold a data model and integrate to multiple core systems, the process of mastering the data can become complex and, as the program expands across ever more systems, the challenges can become unmanageable. In my view, BPMS solutions with a few exceptions are not the right place to be managing core data[i]. At the enterprise level MDM solutions are for more elegant solutions designed specifically for this purpose.
The answer to this ever-growing problem was happened upon by combining knowledge from both a data perspective and a process perspective. The article suggests that a Target Operating Model (TOM) would act as a rudder for the projects aimed at synchronizing data. After that was in place a common information model be created with enterprise definitions of the data entities which then would be populated by general attributes fed by a single process project.
While this is just one man’s answer to the problem of data, it is a start. Regardless of how businesses approach the problem it remains constant–process management alone is not efficient enough to meet the demands of data management.
“It’s not the process its the people that implement and use the process that matter” stated Jasmine Ashton in a final summary of the lunch debate. We had to agree. However, as we looked through the Polyspot data management description that Ms. Lamsfuss’ article pointed us to we had to agree that starting with a good technology implementation could go a long way towards helping the people follow the processes.
Constance Ard November 15, 2011
Protected: More Products for SharePoint Governance Problems
November 1, 2011
Data Breach Leaves 5 Million Patients Holding the Bag
October 11, 2011
A data breach of military health care records from the past 19 years has left nearly 5 million past and current patients vulnerable to identity theft and other acts of malintent.
Tricare, the healthcare program serving current and former military service members, revealed that contractor Science Applications International Corp. (SAIC) lost backup tapes containing health data and other personal information of about 4.9 million people. The tapes were stolen out of an SAIC employee’s car during a Sept.13 burglary.
Tricare released a statement saying that the risk of harm to patients has been judged low and this is why the do not intend to provide the people affected with credit monitoring services.
According to the Information Week article, Military Health Plan Data Breach Threatens 4.9 Million, Ruby Raley, director of healthcare solutions at IT integration and security company said:
Unlike HIPAA, FTC regulations don’t require entities to sign agreements with ‘business associates’ that hold third parties to the same standards when handling sensitive data. Also, HIPAA regulations require organizations to provide a year of credit monitoring to anyone who may have been affected by a breach. They’re only [offering] fraud protection for 90 days.
While no financial records were stolen, this incident leads us to wonder whether government enitites should be forced to follow HIPAA regulations, instead of less strict FTC regulations. This may prevent similar problems from occuring down the road.
Jasmine Ashton, Oct 11, 2011
Protected: SharePoint: The Management Tool for the Future?
October 3, 2011