Abstract of KSA NDMO PDP.4.2 P2 compliance guidelines This paper explores the strategic importance of implementing and documenting Data Subject Rights Management processes as per the National Data Management Office’s …
Professional Journey – A Momentary Look
Career Snapshot Master’s degree in computer science with Specialization in Software Engineering and Earned PGD in Management Information System. Accumulated 20+ years’ Information Technology, Data Governance, Data Management, and Compliance …
Build the Data Management Organization – Part 02
Identify and Analyze Stakeholders Data Security Management Understanding Stakeholders A stakeholder is any person or group that can influence or be affected by the Data Security Management program. Stakeholders can …
Data Quality Program – Implementation Guidelines
Data Quality Implementation Guidelines Typically, a hybrid approach to executing data quality initiatives works best – top-down for sponsorship, consistency, and resources, but bottom-up to discover what is actually broken …
Data Quality – Causes of Data Quality Issues – Part-03
Data Quality Issues Part-03 Issues Caused by System Design Failure to Enforce Uniqueness Constraints Multiple copies of data instances within a table or file expected to contain unique instances. If …
Data Quality – Causes of Data Quality Issues – Part-01
Common Data Quality Issues – Part 1: Causes and Consequences Common Data Quality issues can emerge at any point in the data lifecycle, from creation to disposal. When investigating root …
OLAP – ROLAP, MOLAP and HOLAP
How OLAP, ROLAP, MOLAP, and HOLAP Work OLAP – Online Analytical Processing It is a technology used to organize large business databases and supports performing complex and multidimensional analysis, at …
DII – Data Interaction Models – P2P, Canonical and Publish/Subscribe
Data Interaction Models in DII Canonical Model (Hub-and-Spoke) A Canonical Data Model is a common model used by an organization or data exchange group that standardizes the format in which …