#ogChat Summary – Big Data and Security
The Open Group hosted a tweet jam (#ogChat) to discuss Big Data security. In case you missed the conversation, here is a recap of the event. Continue reading →![]()
Aggregated enterprise architecture wisdom
The Open Group hosted a tweet jam (#ogChat) to discuss Big Data security. In case you missed the conversation, here is a recap of the event. Continue reading →![]()
Last week, we announced our upcoming tweet jam on Tuesday, January 22 at 9:00 a.m. PT/12:00 p.m. ET/5:00 p.m. BST, which will examine the impact of Big Data on security and how it will change the security landscape. The discussion will be guided by these six questions… Continue reading →![]()
Underlying both SOA governance and Cloud governance is a fundamental aspect that we have been dealing with ever since the dawn of IT—and that’s the data itself. Let us challenge ourselves with a few questions. Consider them the what, why, when, where, who and how of data governance. Continue reading →![]()
This is the final installment of a three-part series that discusses how our vocabulary affects the way we conceptualize Enterprise Architecture, Business Architecture and their relationship. To close, The Open Group’s Leonard Fehskens will consider the implications of a more inclusive concept of enterprise on the future of Enterprise Architecture. Continue reading →![]()
This is a three-part series that discusses how our vocabulary affects the way we conceptualize Enterprise Architecture, Business Architecture and their relationship. This second installment will examine the effect of our definition of enterprise on how we think about EA. Continue reading →![]()
In part 1 of a three-part series, The Open Group Vice President of Skills and Capabilities Len Fehskens discusses how our vocabulary affects the way we conceptualize Enterprise Architecture, Business Architecture and their relationship. Continue reading →![]()
What are the relationships between data, information, knowledge and wisdom? This is one of the classic challenges in the knowledge-management [KM] space. The usual way to describe those relationships is that it’s a stack, or a hierarchy, or a pyramid,…
Recently I was discussing a history project with my son. He was writing a paper about the inconsistencies in access to clean water in all parts of the world and their causes. In researching the history of urban water access, he came across the story of the outbreak of cholera in the mid-1800′s in London and the impact it had on modern medicine. A young doctor, John Snow, proposed that cholera was carried in contaminated food […]
If you liked this, you might also like:
By The Open Group Conference Team With the end of the first day of the conference, here are a few key takeaways from Monday’s key note sessions: “The Enterprise Architect: Architecting Business Success” Jeanne Ross, Director & Principal Resea…
Today, I participated in a focus group to help start up the BCIT School of Business Business Analytics Centre of Excellence. The room was full of Business Intelligence/Analytics/Insight leaders from around Vancouver. We were brought together by Ed …
Print PDF Guest post by Gary Loveland and Nalneesh Gaur It seems like today’s organized data criminals have re-doubled their efforts to get their hands onto your customer’s data, and into their wallets. A full 85% of all data-related security breaches today are masterminded by organized crime, according to a 2010 Verizon Data Breach research report. These criminals are using anything and everything to spy out opportunity and penetrate defenses: from viruses and malware and […]
If you liked this, you might also like: