. Data Management University Blog - EWSolutions

Teaching Data Management Since 1998

Data Management University

Request a free consultation with a DMU Expert

Search DMU Library


2 - 3 Minute Data Management Videos

16 Oct, 2019

Electronic Records: Definition, Principles, and Applications

16 October, 2019
Christopher J. Michael
Records and Information Management

Electronic records and their management have transformed how organizations collect, organize, and use a variety of information formats in any organization, not only pharmaceutical, biotechnology, and medical companies. Introduction The United States Food and Drug Administration (FDA) established regulations for electronic records and signatures in Title 21 CFR Part 11 of the Code of Federal Regula


8 Oct, 2019

7 Common Myths about the Zachman Architecture Framework

08 October, 2019
Ronald G. Ross with Gladys S.W. Lam
More Data Geekery

The Zachman Framework is a thinking tool. Its abstract nature has led to the proliferation of some myths that hinder its understanding and adoption. Introduction Widely misunderstood and misrepresented, the Zachman Architecture Framework is simply a thinking tool, not a methodology. Its fundamentally neutral position concerning methodology and implementation is the secret to its power and the reas


18 Sep, 2019

Business Analyst Mindset Defined

18 September, 2019
Yulia Kosarenko
Business Analysis

What makes a business analyst exceptional? Although skill competency is important, the business analyst mindset plays a crucial role in the success of any business change. Introduction Business analysis is widely acknowledged as a profession and a critical competency required to define, plan and implement business changes. Much has been written about business analysis tools and techniques, modelli


11 Sep, 2019

Basics of Blockchain Technology

11 September, 2019
William Hess
More Data Geekery

Blockchain is a combination of technology and processes used to allow the recording of transactions and their metadata permanently and with validation. It is an essential component of trusted security operations. Introduction The blockchain technology is a frequently mentioned term when talking about cryptocurrencies. However, many people have little to no idea how it actually works, what it is us


28 Aug, 2019

Fundamentals of Data Literacy

28 August, 2019
Anne Marie Smith, Ph.D.
Data Management

Every organization, in every industry, should adopt a data-literate culture. What does that mean? How can data literacy be socialized in existing organizations? Introduction In many organizations, data is the product. In most other enterprises, data is an essential component of operations and decision-making. Historically, the access to data has been in the hands of selected experts, such as analy


23 Aug, 2019

The Importance of Data Mapping for Data Integration Projects

23 August, 2019
Wayne Yaddrow
Data Integration

Data mapping (source-to-target mapping) is an essential activity for all data integration, business intelligence, and analytics initiatives Introduction Data mapping is among the most important design steps in data migration, data integration, and business intelligence projects. Mapping source to target data greatly influences project success – perhaps more than any other task. The outcome of th


14 Aug, 2019

Metadata based ETL Transforms Data Integration

14 August, 2019
Fred Zimmerman
Data Integration

Metadata-based extraction, transformation, and loading (ETL) can support a new approach to any organization’s data integration and development practices Introduction Traditional extraction, transformation and loading (ETL) software is a computer programming tool that enables a developer to create custom ETL code. Custom coding is a management challenge with expensive overhead and complex coordin


7 Aug, 2019

Most Popular Phishing Scams

07 August, 2019
Paul Bedford
Data Strategy

With cyber-crime on the rise and sophistication levels escalating, educating people against the most common attacks is essential Introduction Phishing is a technique that is used to get confidential data from individuals and companies into the hands of criminals with the purpose of extracting money, cloning identities, and ruining reputations. Here are the five most common types to be vigilant aga


1 Aug, 2019

Networking for Career Success

01 August, 2019
Margaret Resce Milkint
Professional Development

Relationship-building, career management, professional networking, career development are all essential components to a successful professional career Introduction Professional networks play a vital role in career management and development. As data science evolves, data management professionals are tasked with not only mastering technical skills, but also cultivating human skills, such as the abi


17 Jul, 2019

Implementing an Enterprise Data Services Office

17 July, 2019
Charles Ngando Black
Strategy & Roadmap

Development of a data-centric enterprise architecture requires a new approach to data management, one that respects business requirements. Introduction Moving toward a data-centric enterprise architecture also affects relationships between data stakeholders and requires rethinking the data management organization and rules. It also suggests that the integration of these changes in an enterprise ar



View all podcasts

View Our Podcasts

DMU provides regular podcasts of our best webinars, expert speaking events and our 3 minute Data Management Moment teaching videos.

View Our Upcoming Webinars

Click here to signup for our upcoming expert webinars and to view our previous webinars

WordPress Image Lightbox