Can Enterprise-Class Solutions Ever Deliver ROI?

The information technology industry has a great fondness for enterprise-class solutions and TLAs (two or three letter acronyms): ERP (Enterprise Resource Planning), DW (Data Warehousing), BI (Business Intelligence), MDM (Master Data Management), DG (Data Governance), DQ (Data Quality), CDI (Customer Data Integration), CRM (Customer Relationship Management), PIM (Product Information Management), BPM (Business Process Management), etc. — and new TLAs are surely coming soon.

But there is one TLA to rule them all, one TLA to fund them, one TLA to bring them all and to the business bind them—ROI.

 

Enterpri$e-Cla$$ $olution$

All enterprise-class solutions have one thing in common—they require a significant investment and total cost of ownership.

Most enterprise software/system licenses start in the six figures.  Due in large part to vendor consolidation, many are embedded within a consolidated enterprise application development platform with seamlessly integrated components offering an end-to-end solution that pushes the license well into seven figures. 

On top of the licensing, you have to add the annual maintenance fees, which are usually in the five figures—sometimes more.

Add to the total cost of the solution the professional services needed for training and consulting for installation, configuration, application development, testing, and production implementation, and you have another six figure annual investment.

With such a significant investment and total cost of ownership required, can enterprise-class solutions ever deliver ROI?

 

Should I refinance my mortgage?

As a quick (but relevant) tangent, let's use a simple analogy from the world of personal finance.

Similar to most homeowners, I get offers to refinance my mortgage all the time.  A common example is an offer that states I can reduce my monthly payments by $200 by refinancing.  Sounds great, $200 a month is an annual cost reduction of $2400. 

However, this great deal includes $3000 in refinancing costs.  Although I start paying $200 less a month immediately, I do not really start saving any money for 15 months, when the monthly “savings” break even with the $3000 in refinancing costs. 

Of course, saying only 15 months is ignoring possible tax implications as well as lost interest or returns that I could have earned since the $3000 likely came from either a savings or an investment account.

Additionally, refinancing might not be a good idea if I plan to sell the house in less than 15 months.  The $3000 could instead be invested in finishing my basement or repairing minor damages, which could help increase its value and therefore its sales price.

How does this analogy relate to enterprise-class solutions?

 

The Business Justification Paradox

Focusing solely on the technical features and ignoring the business benefits of an enterprise-class solution isn’t going to convince either the organization's executive management or its shareholders that the solution is required.

Therefore, emphasis has to placed on the need to make the business justification, where true ROI can only be achieved through tangible business impacts, such as mitigated risks, reduced costs, or increased revenues.

However, a legitimate business justification for any enterprise-class solution is often relatively easy to make.

The business justification paradox is that although an enterprise-class solution definitely has the long-term future potential to reduce costs, mitigate risks, and increase revenues, in the immediate future (and current fiscal year), it will only increase costs, decrease revenues, and therefore potentially increase risks.

In the mortgage analogy, the break even point on the opportunity cost of refinancing can be precisely calculated.  Is it even possible to accurately estimate the break even point on the opportunity cost of implementing an enterprise-class solution?

Furthermore, true ROI obviously has to be at least estimated to exceed simply breaking even on the investment.

Given the reality that the longer an initiative takes, the more likely its funding will either be reduced or completely cut, many advocate an agile methodology, which targets iterative cycles quickly delivering small, but tangible value.  However, the up-front costs of enterprise licenses and incremental costs of the ongoing efforts and maintenance still loom large on the balance sheet.

Even with “creative” accounting practices, the unquestionably real short-term “ROI high” of following an agile approach could still leave you “chasing the dragon” in search of at least breaking even on your enterprise-class solution's total cost of ownership.

 

A Call for Debate

My point in this blog post was neither to make the argument that organizations should not invest in enterprise-class solutions, nor to berate organizations for evaluating such possible investments using short-term thinking limited to the current fiscal year.

I am simply trying to encourage an open, honest, and healthy debate about the true ROI of enterprise-class solutions.

I am tired of hearing over-simplifications about how all you need to do is make a valid business justification, as well as attempting to decipher the mystical ROI and total cost of ownership calculations provided by vendors and industry analysts.

I am also tired of being told how emerging industry trends like open source, cloud computing, and software as a service (SaaS) are “less expensive” than traditional approaches.  Perhaps that is true, but can they deliver enterprise-class solutions and ROI?

This blog post is a call for debate.  Please post a comment.  All viewpoints are welcome.

Subterranean Computing

Cloud computing continues to receive significant industry buzz and endorsements from many industry luminaries:

  • Tim O'Reilly of O'Reilly Media calls cloud computing “the platform for all computing.”
  • Connor MacLeod of the Clan MacLeod says “there can be only one—and that one is cloud computing.”  
  • Marc Benioff of SalesForce.com refers to companies in the “anti-cloud crowd” as “innovationless.”
  • Lando Calrissian of Cloud City calls anyone not using cloud computing a “slimy, double-crossing, no-good swindler.”

Therefore, I was happy to hear a cogent alternative viewpoint from a member of the “anti-cloud crowd” when I recently interviewed Sidd Finch, the Founder and President of the New York based startup company Kremvax, which recently secured another $4.1 billion in venture capital to pursue an intriguing alternative to cloud computing called Subterranean Computing.

 

The Truth about Cloud Computing

Mr. Finch began the interview by discussing some of the common criticisms of cloud computing, which include issues such as data privacy, data protection, and data security.  However, I was most intrigued by the new research Mr. Finch cited from Professor Nat Tate of the College of Nephology at the University of Southern North Dakota at Hoople.

According to Professor Tate, here is the truth about cloud computing:

  • Cloud computing's viability depends greatly on the type of cloud, not public or private, but rather cirrus, stratus, or cumulus.
  • Cirrus clouds are not good for data privacy concerns because they tend to be wispy and therefore completely transparent.
  • Stratus clouds are not good for data protection concerns because “data drizzling” occurs frequently and without warning. 
  • Cumulus clouds are not good for data security concerns because “fair weather clouds” disperse at the first sign of trouble. 

 

The Underlying Premise of Subterranean Computing

Later in the interview, Mr. Finch described the underlying premise of subterranean computing:

“Instead of beaming your data up into the cloud, bury your data down underground.”  

According to Mr. Finch, here are the basic value propositions of subterranean computing:

  • Subterranean computing's viability is limited only to your imagination (but real money is required, and preferably cash).
  • Data privacy is not a concern because your data gets buried in its own completely (not virtually) private hole in the ground.
  • Data protection is not a concern because once it is buried, your data will never be used again for any purpose whatsoever.
  • Data security is not a concern, but for an additional fee, we bury your data where nobody will ever find it (we know a guy).

 

Brown is the new Green

Environmentally sustainable computing (i.e., “Green IT”) is another buzzworthy industry trend these days.  Reduce your carbon footprint, utilize electricity more efficiently, evaluate alternative power sources, and leverage recyclable materials. 

All great ideas.  But according to Mr. Finch, subterranean computing takes it to the next level by running entirely on geothermal power, a sustainable and renewable energy source, as well as converting your databases into Composting Data Stores (CDS).

In subterranean computing, your data is buried deep underground, where CDS can draw the very minimal amount of power it requires directly from the heat emanating from the Earth's core.  The CDS biodegradable data format (BDF) also minimizes your data storage requirements by automatically composting old data, which creates the raw material used to store your new data.

In the words of Kremvax customer and award-eligible environmentalist Isaac Bickerstaff: “brown is the new green.” 

Bickerstaff is the Lord Mayor of the English village of Spiggot, which has “gone subterranean” with its computing infrastructure.

 

Conclusion

So which new industry trend will your organization be implementing this year: cloud computing or subterranean computing? 

Well, before you make your final decision, please be advised that Industry Analyst Lirpa Sloof has recently reported rumors are circulating that Larry Ellison of Oracle is planning on announcing the first Cloud-Subterranean hybrid computing platform at the Oracle OpenWorld 2010 conference, which is also rumored to be changing its venue from San Francisco to Spiggot.

But whenever you're evaluating new technology, remember the wise words from Subterranean Homesick Blues by Bob Dylan:

“You don’t need a weatherman to know which way the wind blows.”

The Poor Data Quality Jar

The Poor Data Quality Jar

Today I am pondering whether or not the venerable tradition of The Swear Jar could be adapted to help organizations illustrate the costs of poor data quality.

As an example for those unfamiliar with the concept, my family used a swear jar when I was growing up.  Anytime a family member swore (i.e., used profanity), they put an amount of money into the jar based on the severity of the swear.

Of course in my family, what exactly constituted “profanity” as well as what the severity of a particular swear should be would often cause considerable debate, which somewhat ironically lead to the increased use of unquestionable profanity.

Therefore, The Swear Jar was far from a perfect system (at least for my family). 

But I am still imaging every organization instituting The Poor Data Quality Jar.

When an employee contributes to the organization's poor data quality, they put an amount of money into the jar based on the severity of the data quality issue, and perhaps with an increasing scale to be more punitive to repeat offenders.

Do you think The Poor Data Quality Jar can help your organization?  If so, how much would you charge for different types of data quality issues?  How would you determine the severity (i.e., financial impact) of each data quality issue?

 

Photo via Flickr (Creative Commons License) by: Karen Roe


Enterprise Data World 2010

Enterprise Data World 2010

Enterprise Data World 2010 was held March 14-18 in San Francisco, California at the Hilton San Francisco Union Square.

Congratulations and thanks to Tony Shaw, Maya Stosskopf, the entire Wilshire Conferences staff, as well as Cathy Nolan and everyone with DAMA International, for their outstanding efforts on delivering yet another wonderful conference experience.

I wish I could have attended every session on the agenda, but this blog post provides some quotes from a few of my favorites.

 

Applying Agile Software Engineering Principles to Data Governance

Conference session by Marty Moseley, CTO of Initiate Systems, an IBM company.

Quotes from the session:

  • “Data governance is 80% people and only 20% technology”
  • “Data governance is an ongoing, evolutionary practice”
  • “There are some organizational problems that are directly caused by poor data quality”
  • “Build iterative 'good enough' solutions – not 'solve world hunger' efforts”
  • “Traditional approaches to data governance try to 'boil the ocean' and solve every data problem”
  • “Agile approaches to data governance laser focus on iteratively solving one problem at a time”
  • “Quality is everything, don't sacrifice accuracy for performance, you can definitely have both”

Seven iterative steps of Agile Data Governance:

  1. “Form the Data Governance Board – Small guidance team of executives who can think cross-organizationally”
  2. “Define the Problem and the Team – Root cause analysis, build the business case, appoint necessary resources”
  3. “Nail Down Size and Scope – Prioritize the scope in order to implement the current iteration in less than 9 months”
  4. “Validate Your Assumptions – Challenge all estimates, perform data profiling, list data quality issues to resolve”
  5. “Establishing Data Policies – Measurable statements of 'what must be achieved' for which kinds of data”
  6. “Implement the data quality solution for the current iteration”
  7. “Evaluate the overall progress and plan for the next iteration”

 

Monitor the Quality of your Master Data

Conference session by Thomas Ravn, MDM Practice Director at Platon.

Quotes from the session:

  • “Ensure master data is taken into account each and every time a business process or IT system is changed”
  • “Web forms requiring master data attributes can NOT be based on a single country's specific standards”
  • “There is no point in monitoring data quality if no one within the business feels responsible for it”
  • “The greater the business impact of a data quality dimension, the more difficult it is to measure”
  • “Data quality key performance indicators (KPI) should be tied directly to business processes”
  • “Implement a data input validation rule rather than allow bad data to be entered”
  • “Sometimes the business logic is too ambiguous to be enforced by a single data input validation rule”
  • “Data is not always clean or dirty in itself – it depends on the viewpoint or defined standard”
  • “Data quality is in the eye of the beholder”

 

Measuring the Business Impact of Data Governance

Conference session by Tony Fisher, CEO of DataFlux, and Dr. Walid el Abed, CEO of Global Data Excellence.

Quotes from the session:

  • “The goal of data governance is to position the business to improve”
  • “Revenue optimization, cost control, and risk mitigation are the business drivers of data management”
  • “You don't manage data to manage data, you manage data to improve your business”
  • “Business rules are rules that data should comply with in order to have the process execute properly”
  • “For every business rule, define the main impact (cost of failure) and the business value (result of success)”
  • “Power Shift – Before: Having information is power – Now: Sharing information is power”
  • “You must translate technical details into business language, such as cost, revenue, risk”
  • “Combine near-term fast to value with long-term alignment with business strategy”
  • “Data excellence must be a business value added driven program”
  • “Communication is key to data excellence, make it visible and understood by all levels of the organization”

 

The Effect of the Financial Meltdown on Data Management

Conference session by April Reeve, Consultant at EMC Consulting.

Quotes from the session:

  • “The recent financial crisis has greatly increased the interest in both data governance and data transparency”
  • “Data Governance is a symbiotic relationship of Business Governance and Technology Governance”
  • “Risk management is a data problem in the forefront of corporate concern – now viewing data as a corporate asset”
  • “Data transparency increases the criticality of data quality – especially regarding the accuracy of financial reporting”

 

What the Business Wants

Closing Keynote Address by Graeme Simsion, Principal at Simsion & Associates.

Quotes from the keynote:

  • “You can get a lot done if you don't care who gets the credit”
  • “People will work incredibly hard to implement their own ideas”
  • “What if we trust the business to know what's best for the business?”
  • “Let's tell the business what we (as data professionals) do – and then ask the business what they want”

 

Social Karma

My Badge for Enterprise Data World 2010

I presented this session about the art of effectively using social media in business.

An effective social media strategy is essential for organizations as well as individual professionals.  Using social media effectively can definitely help promote you, your expertise, your company, and its products and services. However, too many businesses and professionals have a selfish social media strategy.  You should not use social media to exclusively promote only yourself or your business. 

You need to view social media as Social Karma.

For free related content with no registration required, click on this link: Social Karma

 

Live-Tweeting at Enterprise Data World 2010

Twitter at Enterprise Data World 2010

The term “live-tweeting” describes using Twitter to provide near real-time reporting from an event.  When a conference schedule has multiple simultaneous sessions, Twitter is great for sharing insights from the sessions you are in with other conference attendees at other sessions, as well as with the on-line community not attending the conference.

Enterprise Data World 2010 had a great group of tweeps (i.e., people using Twitter) and I want to thank all of them, and especially the following Super-Tweeps in particular:   

Karen Lopez – @datachick

April Reeve – @Datagrrl

Corinna Martinez – @Futureratti

Eva Smith – @datadeva

Alec Sharp – @alecsharp

Ted Louie – @tedlouie

Rob Drysdale – @projmgr

Loretta Mahon Smith – @silverdata 

 

Additional Resources

Official Website for DAMA International

LinkedIn Group for DAMA International

Twitter Account for DAMA International

Facebook Group for DAMA International

Official Website for Enterprise Data World 2010

LinkedIn Group for Enterprise Data World

Twitter Account for Enterprise Data World

Facebook Group for Enterprise Data World 

Enterprise Data World 2011 will take place in Chicago, Illinois at the Chicago Sheraton and Towers on April 3-7, 2011.

 

Related Posts

Enterprise Data World 2009

TDWI World Conference Chicago 2009

DataFlux IDEAS 2009

Recently Read: March 22, 2010

Recently Read is an OCDQ regular segment.  Each entry provides links to blog posts, articles, books, and other material I found interesting enough to share.  Please note “recently read” is literal – therefore what I share wasn't necessarily recently published.

 

Data Quality

For simplicity, “Data Quality” also includes Data Governance, Master Data Management, and Business Intelligence.

  • The Data Quality Herald Magazine – Dylan Jones, the founder and community manager of Data Quality Pro, recently released the first edition of a unique new magazine focused squarely on the needs of the data quality community.
  • Defining Master Data for Your Organization – Loraine Lawson recaps a recent David Loshin MDM vendor panel discussion, and looks at both the simple answer and the complex, but more useful, answer to the question “what is master data?”
  • What is Data Quality anyway? – Henrik Liliendahl Sørensen asks two excellent questions in this blog post (which also received great comments): “is data quality an independent discipline?” and “is data quality an independent technology?”
  • Business logic – Peter Thomas provides a hilarious adapted comic strip.
  • Police Untelligence – from IQTrainwrecks.com, which is provided by the IAIDQ, read the story about the home of an elderly Brooklyn couple that has been raided by the New York City Police Department 50 times over the last 4 years.
  • Metadata and 3-D Glasses – David Loshin explains the data governance, data stewardship, and metadata/harmonization albatross hanging around the neck of the common question “what is the definition of ‘customer’?”
  • No Enterprise wide Data Model – Ken O’Connor continues his excellent series about common enterprise wide data governance issues with this entry about the impact of not having an enterprise wide data model.
  • Putting data on the web – Rich Murnane shares an excellent recent TED video by Tim Berners-Lee showing some of the benefits of shared data on the web.
  • Building your Data Governance Board – Marty Moseley continues his overview of agile data governance by discussing how you select a data governance board, and how you establish data governance priorities.
  • The Change Paradox – Carol Newcomb examines the “change is good, but change is bad” paradox often encountered in consulting when recommended new technology or new methodology conflicts with your client's corporate culture.  
  • Data Quality Non-Believers – Phil Simon takes on the data quality non-believers making “dataless decisions” by relying on gut instincts to explain such things as customer churn, employee turnover, and intelligent spending of corporate funds. 
  • Data Cleansing to Achieve Information Quality – Jackie Roberts raises some interesting questions regarding the efforts needed to cleanse data though multiple stages of analytics and processes to achieve appropriate information quality.
  • Data Quality Principles within the PMO – Phil Wright provides a list of six excellent principles that must be met in order to help embed a culture of data quality, data assurance, and data governance within each new project.
  • Is computer analysis accurate? – Julian Schwarzenbach considers the accuracy of computer analysis in decision making, especially automated decision making that attempts to mimic human logic, intuition, and insight.

 

Related Posts

Recently Read: March 6, 2010

Recently Read: January 23, 2010

Recently Read: December 21, 2009

Recently Read: December 7, 2009

Recently Read: November 28, 2009

 

Recently Read Resources

Data Quality via My Google Reader

Blogs about Data Quality, Data Governance, Master Data Management, and Business Intelligence

Books about Data Quality, Data Governance, Master Data Management, and Business Intelligence

Social Karma (Part 8)

This post is the conclusion of a series about the art of effectively using social media in business, which is an essential strategy for organizations as well as individual professionals.

Using social media effectively can definitely help promote you, your expertise, your company, and its products and services.

However, too many businesses and professionals have a selfish social media strategy.

You should not use social media to exclusively promote only yourself or your business.

You need to view social media as Social Karma.

 

Social Karma: The Art of Effectively Using Social Media in Business

 

If you are having trouble viewing this video, then you can watch it on Vimeo by clicking on this link: Social Karma Video

To download the presentation as an Adobe Acrobat Document (.pdf file) click on this link: Social Karma Presentation 

 

The Complete Series

Social Karma (Part 1) – Series Introduction

Social Karma (Part 2) – Social Media Preparation

Social Karma (Part 3) – Listening Stations, Home Base, and Outposts

Social Karma (Part 4) – Blogging Best Practices

Social Karma (Part 5) – Connection, Engagement, and ROI Basics

Social Karma (Part 6) – Social Media Books

Social Karma (Part 7) – Twitter 

Social Karma (Part 7)

In Part 6 of this series:  We discussed some of the books that have been the most helpful to my social media education.

In Part 7, we will discuss some recommended best practices and general guidelines for using Twitter.

 

Frosted Cheerios are Yummy

Frosted Cheerios are Yummy

In social media, one of the most common features is some form of microblogging or short message service (SMS) that allows users to share brief status updates.  Twitter is currently built on only this feature and uses status updates (referred to as tweets) that are limited to a maximum of 140 characters, which at first glance may appear to indicate an obvious limitation. 

Twitter is a rather pithy platform that many people argue is incompatible with meaningful communication, especially of a professional nature.  Most people who have never (as well as some who have) tried it, assume Twitter is a source of nothing but inane babble such as what its users are eating for breakfast.  I must admit that this was my opinion as well—at least at first.

However, Twitter is not only one of the most popular microblogging and social networking services, but if used effectively, it can easily become one of the most powerful weapons in your social media arsenal.

 

Twitter as Research

Twitter as Research

In addition to a listening station and an outpost (concepts discussed in Part 2 and Part 3), I use Twitter as a research tool.

Twitter provides near real-time updates about my online community and my areas of professional interest.  For example, the above tweet alerted me to an excellent LinkedIn discussion about the business benefits of master data management (MDM).

I chose this particular tweet in order to clarify an important distinction about Twitter.

Unlike other social networking services, you do not need an account on Twitter for read-only access to its content, which means that anyone could have seen this tweet.  (Of course, Twitter does provide privacy options for both tweets and accounts).

However, in order to click on the URL in this tweet and read the discussion from the Master Data Management Interest Group, you would require both an account on LinkedIn and need your group membership request approved by the group's owner.

Therefore, because it's not a “walled garden” you could leverage Twitter as a listening station only without creating an account.

With or without an account, Twitter Search provides the ability to search for relevant content.  Tweets often include embedded search terms called “hashtags” since they are prefaced with the hash (#) symbol.  You can also save search queries as RSS feeds.

If you are not familiar with how to use it, then check out my video tutorial by following this link:  Twitter Search Tutorial

 

Twitter as Social Networking

Twitter as Social Networking

As we discussed in Part 5, the difference between connection and engagement is going beyond simply establishing a presence and achieving active participation within the online community.

Active participation can take on many different forms.  However, as we also discussed, “social media is not about you.”

A focus on helping others is what separates social networking from (especially shameless) self-promotion. 

In the example above, I was helping a fellow Twitter user promote his new blog.  However, conversations are better examples of social networking—and not just on Twitter.  Tweets between users can be public or private (referred to as direct messages). 

As with any public conversation, you should use extreme caution and avoid sharing any sensitive or confidential information.

 

The Art of the Re-Tweet

The Art of the Re-Tweet

Re-tweeting is the act of “forwarding” another user's tweet.  Many bloggers use Twitter to promote their content by tweeting links to their new blog posts.  Therefore, many re-tweets are attempts to share this content with your online community.

A simple re-tweet is easy to do.  However, a few recommended best practices include the following:

  • Make your re-tweets (and tweets) re-tweetable by leaving enough unused characters to prevent truncation on re-tweet, which is important since a link is usually at or near the end of the message and truncation would send a broken link
  • If you are re-tweeting a link, verify that the link is neither broken nor spam—and if you're not sure, then don't re-tweet it
  • If the tweet uses a URL shortener (e.g., a bit.ly link), then reuse it since the user may be relying on its associated analytics
  • Space permitting, add relevant hashtags to the re-tweet to make it more compatible with related Twitter searches
  • Prove that you're not a robot by providing a meaningful description of what you're re-tweeting (as in the above example)

 

Following, Followers, and Lists

Following, Followers, and Lists

The Twitter term for connecting with other users is “following.”  Unlike other social networking services, Twitter is not permission based, which means connections do not have to be first requested and then approved.

This creates two different perspectives on your Twitter world—those following you and those you are following.

Unless you only follow a few people, it is a tremendous challenge to actually follow every user you follow.  Twitter Search as well as tools and services (see below) can help with making following a more manageable activity.  Twitter also has a list feature that helps organize the users you are following—and you can follow the lists created by other users.

However, as we discussed in Part 5, social media is not a popularity contest.  Therefore, Twitter is not about the quantity of followers you are able to collect and count, but instead the quality of relationships you are able to form and maintain.

 

Twitter Tools and Services

Twitter tools and services that I personally use (listed in no particular order):

  • TweetDeck Connecting you with your contacts across Twitter, Facebook, and LinkedIn
  • Digsby – Digsby = Instant Messaging (IM) + E-mail + Social Networks
  • HootSuite – The professional Twitter client
  • Twitterfeed – Feed your blog to Twitter
  • TweetMeme – Add a Retweet Button to your blog
  • Ping.fm – Update all of your social networks at once 

 

“Thanks”

Thanks

I haven't performed the actual analysis, but I am willing to bet the word that appears most often in my tweets is: “Thanks”

I named this series Social Karma for a reason—beyond simply being a cute pun for social media.

I view the “Social” in Social Karma as the technical variable in the social media equation.  Social is the strategy for accomplishing our goals, the creation of our own content, the effective use of the tools—the technology. 

I view the “Karma” in Social Karma as the human variable in the social media equation.  Karma is the transparency of our intentions, the appreciation of the content created by others, the sharing of ourselves—our humanity.

The most important variable in the social media equation is the human variable. 

In other words, I want to say thanks to all of you for being the most important aspect of my social media experience.

 

In Part 8 of this series:  The series concludes with my Social Karma presentation for Enterprise Data World 2010.

 

Related Posts

Yet Another 140 Chars Joke

Social Karma (Part 1) – Series Introduction

Social Karma (Part 2) – Social Media Preparation

Social Karma (Part 3) – Listening Stations, Home Base, and Outposts

Social Karma (Part 4) – Blogging Best Practices

Social Karma (Part 5) – Connection, Engagement, and ROI Basics

Social Karma (Part 6) – Social Media Books

The Wisdom of the Social Media Crowd

The Twitter Clockwork is NOT Orange

Video: Twitter Search Tutorial

Live-Tweeting: Data Governance

Brevity is the Soul of Social Media

If you tweet away, I will follow

Data Quality Mad Libs (Part 2)

Data Quality Mad Libs is an ongoing OCDQ series.

For the uninitiated, Mad Libs are sentences with several of their key words or phrases left intentionally blank.

Next to each blank is indicated what type of word should be entered, but you get to choose the actual words.

The completed sentence can be as thought-provoking, comical, or nonsensical as you want to make it.

 

Data Quality Mad Lib

“If you want to

_______________ (verb or phrase)

your

_______________ (noun or phrase)

initiative, then

_______________ (verb)

your

_______________ (noun or phrase)

that

_______________ (phrase)

is highly recommended.”

 

My Version

“If you want to doom your data quality initiative, then advise your technical stakeholders that ignoring the business context is highly recommended.”

 

Share Your Version

Post a comment below and share your completed version of this Data Quality Mad Lib.

 

Related Posts

Data Quality Mad Libs (Part 1)

Recently Read: March 6, 2010

Recently Read is an OCDQ regular segment.  Each entry provides links to blog posts, articles, books, and other material I found interesting enough to share.  Please note “recently read” is literal – therefore what I share wasn't necessarily recently published.

 

Data Quality

For simplicity, “Data Quality” also includes Data Governance, Master Data Management, and Business Intelligence.

  • Let the Data Geeks Play – Rob Paller is hosting a contest on his blog challenging all data geeks to submit an original song (or parody of an existing one) related to MDM, Data Governance, or Data Quality.  Deadline for submissions is March 20.
  • The First Step on your Data Quality Roadmap – Phil Wright describes how to learn lessons from what has happened before, and use this historical analysis as a basis for planning a successful strategy for your data quality initiative.
  • Bad word?: Data Owner – Henrik Liliendahl Sørensen examines how the common data quality terms “data owner” and “data ownership” are used and whether they are truly useful.  Excellent commentary was also received on this blog post.
  • Data as a smoke screen – Charles Blyth discusses how to get to the point where your consumers trust the data that you are providing to them.  This post includes a great graphic and received considerable commentary.
  • MDM Streamlines the Supply Chain – Evan Levy ruminates on the change management challenge for MDM—where change truly is constant—and how the supply chain can become incredibly flexible and streamlined as a result of MDM.
  • MDM as a Vendor Fight to Own Enterprise Data – Loraine Lawson (with help from actor Peter Boyle) looks at another angle of the recent MDM vendor consolidation, based on the recent remark “MDM is the new ERP” made by Jill Dyché. 
  • Data Quality Open Issues and Questions? – Jackie Roberts of DATAForge issues the blogosphere challenge of discussing real-world best practices for MDM, data governance, and data quality.  This blog post received some great comments.
  • Noise and Signal – David Loshin examines the implications of the rising volumes of unstructured data (especially from social media sources) and the related need for data (and metadata) quality to help filter out the signal from the noise.  
  • A gold DQ team! – Daniel Gent, inspired by the recent Winter Olympics and his country's success in ice hockey, discusses the skills and characteristics necessary for assembling a golden data quality team. 
  • Unpredictable Inaccuracy – Henrik Liliendahl Sørensen incites another thought-provoking discussion in the comments section of his blog with this post about the impact on data quality initiatives caused by the challenging reality of time.
  • Does your data quality help customers succeed? – Dylan Jones searches for the holy grail of data quality—providing your customers with great information quality that enables them to achieve their goals as quickly and simply as possible.
  • Charm School: It’s Not Just for IT Anymore – Jill Dyché reminds the business that it’s their business, too—and illustrates the need for a sustained hand-off cycle between IT and the business—and the days of the IT-business mind-meld are over.
  • Data Quality Lip Service – Phil Simon examines why leaders at many organizations merely pay lip service to data quality, and makes some recommendations for getting data quality its due.  Simon Says: “Read this blog post!”
  • What is the name of that block? – Rich Murnane provides a fascinating discussion about looking at things differently by sharing a TED video with Derek Sivers, who explains the different way locations are identified in Japan.
  • Aphorism of the week – Peter Thomas recently (and thankfully) returned to active blogging.  This blog post is a great signature piece representative of his excellent writing style, which proves that long blog posts can be worth reading.
  • How tasty is your data quality cheese? – Julian Schwarzenbach explains data quality using a cheese analogy, where cheese represents a corporate data set, mold represents poor data quality, which causes indigestion—and poor business decisions.
  • Wild stuff: Nines complement date format – Thorsten Radde provides a great example of the unique data quality challenges presented by legacy applications by explaining the date format known as Nine’s complement

 

Social Media

For simplicity, “Social Media” also includes Blogging, Writing, Social Networking, and Online Marketing.

  • Ten Things Social Media Can't Do – B.L. Ochman provides a healthy reminder for properly setting realistic expectations about social media, and provides a great list of ten things you should not expect from social media.
  • A Manifesto for Social Business – Graham Hill discusses how the nature of business is inexorably changing into a new kind of Social Business that is driven by social relationships, and lists fifteen themes (the Manifesto) of this change.
  • Framing Your Social Media Efforts – Chris Brogan explains there are three fundamental areas of practice for social media: (1) Listening, (2) Connecting, and (3) Publishing.
  • Minding the Gap – Tara Hunt examines the gap between the underlying values of business and the underlying human values that drive community.  This blog post also includes an excellent SlideShare presentation that I highly recommend.
  • The Albert Einstein Guide to Social Media – Amber Naslund channels the wisdom of Albert Einstein by using some of his most insightful quotes to frame a practical guide to a better understanding of social media.

 

Book Quotes

An eclectic list of quotes from some recently read (and/or simply my favorite) books.

  • From Linchpin: Are You Indispensable? by Seth Godin – “You don't become indispensable merely because you are different.  But the only way to be indispensable is to be different.  That's because if you're the same, so are plenty of other people.  The only way to get what you're worth is to stand out, to exert emotional labor, to be seen as indispensable, and to produce interactions that organizations and people care deeply about.”

 

Related Posts

Recently Read: January 23, 2010

Recently Read: December 21, 2009

Recently Read: December 7, 2009

Recently Read: November 28, 2009

 

Recently Read Resources

Data Quality via My Google Reader

Social Media via My Google Reader

Books about Data Quality, Data Governance, Master Data Management, and Business Intelligence

Blogs about Data Quality, Data Governance, Master Data Management, and Business Intelligence

Books about Social Media, Blogging, Social Networking, and Online Marketing

Blogs and Websites about Social Media, Social Networking, and Online Marketing

Adventures in Data Profiling

Data profiling is a critical step in a variety of information management projects, including data quality initiatives, MDM implementations, data migration and consolidation, building a data warehouse, and many others.

Understanding your data is essential to using it effectively and improving its quality – and to achieve these goals, there is simply no substitute for data analysis.

 

Webinar

In this vendor-neutral eLearningCurve webinar, I discuss the common functionality provided by data profiling tools, which can help automate some of the work needed to begin your preliminary data analysis.

You can download (no registration required) the webinar (.wmv file) using this link: Adventures in Data Profiling Webinar

 

Presentation

You can download the presentation (no registration required) used in the webinar as an Adobe Acrobat Document (.pdf file) using this link: Adventures in Data Profiling Presentation

 

Complete Blog Series

You can read (no registration required) the complete OCDQ blog series Adventures in Data Profiling by following these links: