Home Page Icon
Home Page
Table of Contents for
IBM Redbooks promotions
Close
IBM Redbooks promotions
by Kevin Shank, David Radley, Jay Limburn, Nigel L Jones, Mandy Chessell
Designing and Operating a Data Reservoir
Front cover
IBM Redbooks promotions
Notices
Trademarks
Preface
Authors
Now you can become a published author, too!
Comments welcome
Stay connected to IBM Redbooks
Chapter 1. Introduction to big data and analytics
1.1 Data is key to success
1.2 About this publication
1.3 Case study: Eightbar Pharmaceuticals
1.3.1 Introducing Erin Overview
1.3.2 Perspectives from the business users at EbP
1.3.3 Signs of deep change
1.3.4 Governance and compliance perspectives
1.3.5 Positioning the data reservoir in the enterprise architecture
1.3.6 The data reservoir
1.3.7 Inside the data reservoir
1.3.8 Initial mapping of the data reservoir architecture
1.3.9 Additional use cases enabled by a data reservoir
1.3.10 Security for the data reservoir
1.3.11 What does IBM security technology do?
1.4 Summary and next steps
Chapter 2. Defining the data reservoir ecosystem
2.1 How does the data reservoir support the business?
2.1.1 Extended data warehouse
2.1.2 Self-service information library
2.1.3 Shared analytics
2.1.4 Tailored consumption
2.1.5 Confident use
2.2 Process tools and lifecycles
2.2.1 The need for self-service
2.2.2 Facets of self-service
2.2.3 Enablers of self-service
2.2.4 Workflow for self-service
2.2.5 Catalog management for self-service
2.3 Defining the information governance program
2.3.1 Core elements of the governance program
2.3.2 Information governance principles
2.3.3 Classification schemes
2.3.4 Governance Rules
2.3.5 Business terminology glossary
2.3.6 EbP starts its governance program
2.3.7 Automating Curation Tasks
2.3.8 Policies for administering the reservoir
2.4 Creating a culture that gets value from a data reservoir
2.4.1 Reservoir as a vital daily tool
2.4.2 Reassuring information suppliers
2.5 Setting limits on the use of information
2.5.1 Controlling information access
2.5.2 Auditing and fraud prevention
2.5.3 Ethical use
2.5.4 Crossing national and jurisdictional boundaries
2.6 Conclusions
Chapter 3. Logical Architecture
3.1 The data reservoir from outside
3.1.1 Other data reservoirs
3.1.2 Information sources
3.1.3 Analytics Tools
3.1.4 Information curator
3.1.5 Governance, risk, and compliance team
3.1.6 Line-of-business applications
3.1.7 Data reservoir operations
3.2 Overview of the data reservoir details
3.3 Data reservoir repositories
3.3.1 Historical data
3.3.2 Harvested data
3.3.3 Deposited data
3.3.4 Shared operational data
3.3.5 Descriptive data
3.4 Information integration and governance
3.4.1 Enterprise IT interaction
3.4.2 Raw data interaction
3.4.3 Catalog interfaces
3.4.4 View-based interaction
3.5 Component interactions
3.5.1 Feeding data into the reservoir
3.5.2 Publishing feeds from the reservoir
3.5.3 Information integration and governance
3.6 Summary
Chapter 4. Developing information supply chains for the data reservoir
4.1 The information supply chain pattern
4.2 Standard information supply chains in the data reservoir
4.2.1 Information supply chains for data from enterprise IT systems
4.2.2 Information supply chain for descriptive data
4.2.3 Information supply chain for auditing the data reservoir
4.2.4 Information supply chain for deposited data
4.3 Implementing information supply chains in the data reservoir
4.3.1 Erin's perspective
4.3.2 Deciding on the subject areas that the data reservoir needs to support
4.3.3 Information sources: The beginning of the information supply chain
4.3.4 Position of data repositories in the information supply chain
4.3.5 Information supply chain triggers
4.3.6 Creating data refineries
4.3.7 Information virtualization
4.3.8 Service interfaces
4.3.9 Using information zones to identify where to store data in the data reservoir repositories
4.4 Summary
Chapter 5. Operating the data reservoir
5.1 Reservoir operations
5.2 Operational components
5.3 Operational workflow for the reservoir
5.3.1 Share
5.3.2 Govern
5.3.3 Use
5.4 Workflow roles
5.4.1 Workflow author
5.4.2 Workflow initiator
5.4.3 Workflow executor
5.4.4 Workflow owner
5.5 Workflow lifecycle
5.6 Types of workflow
5.6.1 Data quality management
5.6.2 Data curation
5.6.3 Data protection
5.6.4 Lifecycle management
5.6.5 Data movement and orchestration
5.7 Self service through workflow
5.7.1 The evolution of the data steward
5.8 Information governance policies
5.9 Governance rules
5.10 Monitoring and reporting
5.10.1 Policy monitoring
5.10.2 Workflow monitoring
5.10.3 People monitoring
5.10.4 Reporting
5.10.5 Audit
5.10.6 Iterative improvement
5.11 Collaboration
5.11.1 Instant collaboration
5.11.2 Expertise location
5.11.3 Notifications
5.11.4 Gamification in curation
5.12 Business user interfaces including mobile access
5.13 Reporting dashboards
5.13.1 Catalog interface
5.13.2 Mobile access
5.13.3 Summary
Chapter 6. Roadmaps for the data reservoir
6.1 Establishing the data reservoir foundation
6.1.1 Deploy the integration and governance fabric
6.1.2 Setting up the governance program
6.1.3 Adding a data repository
6.1.4 Adding an information source
6.1.5 Provisioning data from an information source
6.1.6 Enabling an information view
6.2 Data warehouse augmentation use case
6.2.1 Adding the data reservoir around the data warehouse
6.2.2 Working with new data
6.2.3 Enabling business access to new insight
6.3 Operational data for systems of engagement use case
6.3.1 Adding the data reservoir around the shared operational data
6.3.2 Adding the object cache
6.4 360 degree view of customer use case
6.4.1 Adding new data reservoir repositories
6.4.2 Adding new data from additional information sources
6.5 Self-service data use case
6.5.1 Self-managed data
6.5.2 Adding enterprise data to the data reservoir
6.5.3 Giving access to business users
6.6 Data distribution use case
6.7 Summary
Chapter 7. Technology Choices
7.1 Technology for the data repositories
7.2 Technology for the integration and governance fabric
7.3 Technology for the raw data interaction
7.4 Technology for the catalog
7.5 Technology for the view-based interaction subsystem
7.6 Technology for the continuous analytics subsystem
7.7 Summary
Chapter 8. Conclusions and summary
8.1 Summary of the data reservoir reference architecture
8.2 Further reading
Related publications
IBM Redbooks
Other publications
Online resources
Help from IBM
Back cover
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Note: Before using this information and the product it supports, read the information in “Notices” on page ix.
Next
Next Chapter
Notices
IBM Redbooks promotions
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset