Remove tag
article thumbnail

Data governance use cases – 3 ways to implement

Collibra

For example, if you don’t have an approved taxonomy of what data exists in the business, then you can’t adequately tag data as it flows into your lake. Oftentimes, organizations interpret the above definition as a reason to dump any data in the lake and let the consumer worry about the rest. Data lake management: Prevent a data swamp.

article thumbnail

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake

Reltio

Yes you have customers but does your definition of customer make sense in the real world? We are also using tagging of data to help with the linking and consumption of data – as you do in social networks. We also like to collaborate with suppliers of similar technologies like Reltio and others out there on the market. “It

MDM 49
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Asset management vs. parts inventory management: What’s the difference?

IBM Big Data Hub

Let’s start with definitions of the two terms. In addition to an asset’s location, RFID tags can transmit the temperature and humidity of the environment where its being kept. In addition to an asset’s location, RFID tags can transmit the temperature and humidity of the environment where its being kept.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

Only 5 definitely haven’t had data breached. TB Turtlemint Source (New) Insurance India Yes 1,800,000 Chunghwa Telecom Source (New) Telecoms Taiwan Yes 1.7 110 of them are known to have had data exfiltrated, exposed or otherwise breached. We also found 7 organisations providing a significant update on a previously disclosed incident.