Литмир - Электронная Библиотека
Литмир - Электронная Библиотека > Berson Alex (EN) > MASTER DATA MANAGEMENT AND DATA GOVERNANCE, 2/E
MASTER DATA MANAGEMENT AND DATA GOVERNANCE, 2/E
Добавить похожую книгу
Jewish Holiday Cooking
Автор: Cohen Jayne (EN)
Похожа
Непохожа
Common Sense and Nuclear Warfare
Похожа
Непохожа
English Prim Educ Pt1 Ils 226
Автор: Blyth W.A.L. (EN)
Похожа
Непохожа
MASTER DATA MANAGEMENT AND DATA GOVERNANCE, 2/E
Author:Berson Alex (EN)
Language of a book: Английский
Language of an original book: Английский
Publisher: Gardners Books

    The latest techniques for building a customer-focused enterprise environment "The authors have appreciated that MDM is a complex multidimensional area, and have set out to cover each of these dimensions in sufficient detail to provide adequate practical guidance to anyone implementing MDM. While this necessarily makes the book rather long, it means that the authors achieve a comprehensive treatment of MDM that is lacking in previous works." -- Malcolm Chisholm, Ph.D., President, AskGet.com Consulting, Inc. Regain control of your master data and maintain a master-entity-centric enterprise data framework using the detailed information in this authoritative guide. Master Data Management and Data Governance, Second Edition provides up-to-date coverage of the most current architecture and technology views and system development and management methods. Discover how to construct an MDM business case and roadmap, build accurate models, deploy data hubs, and implement layered security policies. Legacy system integration, cross-industry challenges, and regulatory compliance are also covered in this comprehensive volume. Plan and implement enterprise-scale MDM and Data Governance solutions Develop master data model Identify, match, and link master records for various domains through entity resolution Improve efficiency and maximize integration using SOA and Web services Ensure compliance with local, state, federal, and international regulations Handle security using authentication, authorization, roles, entitlements, and encryption Defend against identity theft, data compromise, spyware attack, and worm infection Synchronize components and test data quality and system performance

    Поделиться:
    ]]>Facebook :0]]>  ]]>Twitter :0]]>  ]]>В контакте :0]]>  ]]>Livejournal :0]]>  ]]>Мой мир :0]]>  ]]>Gmail :1]]>  Email :0  ]]>Скачать :0]]>  
    Мой статус книги:
    Чтобы оставить свою оценку и комментарий вам нужно зайти на сайт или зарегистрироваться

    {"b":"298763","o":30}