SlideShare a Scribd company logo
1 of 28
How to build and promote a successful MDM solution on a shoestring Pablo Riboldi, PhD Solution Manager for Information Governance & Quality The Church or Jesus Christ of Latter-day Saints
Master Data Management (MDM) is a set of processes, technologies, strategies to securely provide accurate and consistent enterprise data. 2 © IRI 2011 Master Data Management  - Definition
Large 13 million members in 160 countries 53,000 full-time missionaries Materials translated in 83 languages 264 centrally managed databases Largest Genealogy system in the world www.lds.org or www.mormon.org © IRI 2010 3 My Organization
Large Organization (Hierarchical) Governing Council (18 members) Departments (23) Silo Organization Independent information systems www.lds.org or www.mormon.org © IRI 2010 4 My Organization
Large Organization (Hierarchical) Non Profit Invite people to come to Jesus Christ by Proclaiming the gospel Perfecting the saints Redeeming the dead Clearly defined common purpose and Great people to work with www.lds.org or www.mormon.org © IRI 2010 5 My Organization
Data Management     Common Method		   MDM Sharing Consumer Systems Master Data Management Repository MDM Pass-through accounts  2800+ Views DB Links Systems of Record (Enterprise info) 6 © IRI 2011
Provide accurate data to Church applications  Improve consistency of data reporting across the Church  Ensure the security of data  Enforce policies for use of data  Reduce development time   Eliminate the need to maintain master data in each application  Decrease maintenance costs 7 © IRI 2011 MDM Goals
Designate authoritative sources of master data and select stewards  Provide interfaces for cleansing and enrichment of data  Share master data from the source with other applications  Create a common data model and interfaces for using master data in applications  Centralize administration of security and data use policies (at the application level)  8 © IRI 2011 MDM Strategy
How to store data in the MDM Repository Relational – Dimensional – Canonical Models Dimensional data models Relational data models ETL ,[object Object]
Denormalized: Star schema with dimensions (entities), facts (measures)
Optimized for Reporting (ad-hoc queries)
Used for transactional systems
Normalized (at least 3NF, usually at 5NF)
Optimized for CRUD transactions (insert, update, delete),[object Object]
Normalized (at least 3NF, usually at 5NF)
Optimized for CRUD transactions (insert, update, delete)
Used for reference by other systems
Semi-denormalized (1NF or 2NF)
Optimized for fast access by systems  (usually used in dropdowns),[object Object]
Every target receives the same data model.
The target receives the information via Replication, Database Link, or Web Service.,[object Object]
Establishing the repository: Selection of a data source (MDM_User or another source)  Publishing the repository: Create MDMR schema with a common data model in each consuming application database  Build applications that use foreign keys to the master data instead of copying the data Use Data Integrator to replicate data to MDMR schemas  Re-use same code for every application Use VPD to enforce data use policies specific to each application  Create a passthrough account on the source Administer MDMR data privileges for each application centrally (Integration team) 13 © IRI 2011 MDM Implementation includes:
Master Data Management – Architecture 1) Master data is integrated, cleansed, enriched, and transformed to the MDM data structuresfrom the systems of record. MDM Source Systems of Record (Master data) Organizations Leaders MDM_USER schema Finance Other systems 14 © IRI 2011
Master Data Management – Architecture 1) Master data is integrated, cleansed, enriched, and transformed to the MDM data structuresfrom the systems of record. 2) A set of security packages is defined to restrict columns and rows. MDM Source After Login Trigger Systems of Record (Master data) MDM_SEC schema Organizations Leaders MDM_USER schema Finance Other systems 15 © IRI 2011
3) The After-login trigger applies security policies to the MDM accounts. Master Data Management – Architecture 1) Master data is integrated, cleansed, enriched, and transformed to the MDM data structuresfrom the systems of record. 2) A set of security packages is defined to restrict columns and rows. MDM Source Business Objects Data Integrator After Login Trigger APP_PTM Systems of Record (Master data) MDM_SEC schema Organizations Leaders MDM_USER schema Finance Other systems 16 © IRI 2011
3) The After-login trigger applies security policies to the MDM accounts. 4) Security policies limit the rows and columns available to each MDM account. Master Data Management – Architecture 1) Master data is integrated, cleansed, enriched, and transformed to the MDM data structuresfrom the systems of record. 2) A set of security packages is defined to restrict columns and rows. MDM Source Business Objects Data Integrator After Login Trigger APP_PTM Systems of Record (Master data) MDM_SEC schema Organizations Leaders MDM_USER schema Finance Other systems 17 © IRI 2011
3) The After-login trigger applies security policies to the MDM accounts. 4) Security policies limit the rows and columns available to each MDM account. 5) Data is published to the MDMR at set frequencies. Master Data Management – Architecture 1) Master data is integrated, cleansed, enriched, and transformed to the MDM data structuresfrom the systems of record. 2) A set of security packages is defined to restrict columns and rows. Requesting Application Instance MDM Source Business Objects Data Integrator After Login Trigger APP_PTM Systems of Record (Master data) MDM_SEC schema Organizations Leaders MDMR schema MDM_USER schema Finance Other systems 18 © IRI 2011
3) The After-login trigger applies security policies to the MDM accounts. 6) Requesting App can use IDs as FKs, but should not copy data. . 4) Security policies limit the rows and columns available to each MDM account. 5) Data is published to the MDMR at set frequencies. Master Data Management – Architecture 1) Master data is integrated, cleansed, enriched, and transformed to the MDM data structuresfrom the systems of record. 2) A set of security packages is defined to restrict columns and rows. Requesting Application Instance MDM Source Business Objects Data Integrator After Login Trigger APP_PTM Application Systems of Record (Master data) App. schema APP_PTC MDM_SEC schema Organizations Leaders MDMR schema MDM_USER schema Finance Other systems 19 © IRI 2011

More Related Content

What's hot

Systems Lifecycle workbook
Systems Lifecycle workbookSystems Lifecycle workbook
Systems Lifecycle workbookMISY
 
MetaSuite productfolder- ETL-Tool für große Datenmengen
MetaSuite productfolder- ETL-Tool für große DatenmengenMetaSuite productfolder- ETL-Tool für große Datenmengen
MetaSuite productfolder- ETL-Tool für große DatenmengenMinerva SoftCare GmbH
 
CBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL PresentationCBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL PresentationGuru Ji
 
The METL Process in Investment Banking
The METL Process in Investment BankingThe METL Process in Investment Banking
The METL Process in Investment BankingAntony Benzing
 
SALES BASED DATA EXTRACTION FOR BUSINESS INTELLIGENCE
SALES BASED DATA EXTRACTION FOR BUSINESS INTELLIGENCESALES BASED DATA EXTRACTION FOR BUSINESS INTELLIGENCE
SALES BASED DATA EXTRACTION FOR BUSINESS INTELLIGENCEcscpconf
 
HEALTH CARE DATA WAREHOUSE SYSTEM ARCHITECTURE FOR INFLUENZA (FLU) DISEASES
HEALTH CARE DATA WAREHOUSE SYSTEM ARCHITECTURE FOR INFLUENZA (FLU) DISEASES HEALTH CARE DATA WAREHOUSE SYSTEM ARCHITECTURE FOR INFLUENZA (FLU) DISEASES
HEALTH CARE DATA WAREHOUSE SYSTEM ARCHITECTURE FOR INFLUENZA (FLU) DISEASES cscpconf
 
Lecture 02 - The Data Warehouse Environment
Lecture 02 - The Data Warehouse Environment Lecture 02 - The Data Warehouse Environment
Lecture 02 - The Data Warehouse Environment phanleson
 
Lecture 03 - The Data Warehouse and Design
Lecture 03 - The Data Warehouse and Design Lecture 03 - The Data Warehouse and Design
Lecture 03 - The Data Warehouse and Design phanleson
 
The Database Environment Chapter 2
The Database Environment Chapter 2The Database Environment Chapter 2
The Database Environment Chapter 2Jeanie Arnoco
 
Data Ware House System in Cloud Environment
Data Ware House System in Cloud EnvironmentData Ware House System in Cloud Environment
Data Ware House System in Cloud EnvironmentIJERA Editor
 
Uses of dbms
Uses of dbmsUses of dbms
Uses of dbmsMISY
 
Structure of dbms
Structure of dbmsStructure of dbms
Structure of dbmsMegha yadav
 

What's hot (19)

Chapter23
Chapter23Chapter23
Chapter23
 
D01 etl
D01 etlD01 etl
D01 etl
 
Systems Lifecycle workbook
Systems Lifecycle workbookSystems Lifecycle workbook
Systems Lifecycle workbook
 
MetaSuite productfolder- ETL-Tool für große Datenmengen
MetaSuite productfolder- ETL-Tool für große DatenmengenMetaSuite productfolder- ETL-Tool für große Datenmengen
MetaSuite productfolder- ETL-Tool für große Datenmengen
 
CBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL PresentationCBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL Presentation
 
The METL Process in Investment Banking
The METL Process in Investment BankingThe METL Process in Investment Banking
The METL Process in Investment Banking
 
SALES BASED DATA EXTRACTION FOR BUSINESS INTELLIGENCE
SALES BASED DATA EXTRACTION FOR BUSINESS INTELLIGENCESALES BASED DATA EXTRACTION FOR BUSINESS INTELLIGENCE
SALES BASED DATA EXTRACTION FOR BUSINESS INTELLIGENCE
 
Database
DatabaseDatabase
Database
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
 
HEALTH CARE DATA WAREHOUSE SYSTEM ARCHITECTURE FOR INFLUENZA (FLU) DISEASES
HEALTH CARE DATA WAREHOUSE SYSTEM ARCHITECTURE FOR INFLUENZA (FLU) DISEASES HEALTH CARE DATA WAREHOUSE SYSTEM ARCHITECTURE FOR INFLUENZA (FLU) DISEASES
HEALTH CARE DATA WAREHOUSE SYSTEM ARCHITECTURE FOR INFLUENZA (FLU) DISEASES
 
Lecture 02 - The Data Warehouse Environment
Lecture 02 - The Data Warehouse Environment Lecture 02 - The Data Warehouse Environment
Lecture 02 - The Data Warehouse Environment
 
DBArtisan XE6 Datasheet
DBArtisan XE6 DatasheetDBArtisan XE6 Datasheet
DBArtisan XE6 Datasheet
 
Lecture 03 - The Data Warehouse and Design
Lecture 03 - The Data Warehouse and Design Lecture 03 - The Data Warehouse and Design
Lecture 03 - The Data Warehouse and Design
 
The Database Environment Chapter 2
The Database Environment Chapter 2The Database Environment Chapter 2
The Database Environment Chapter 2
 
Data Ware House System in Cloud Environment
Data Ware House System in Cloud EnvironmentData Ware House System in Cloud Environment
Data Ware House System in Cloud Environment
 
Cimo7e ppt ch03
Cimo7e ppt ch03Cimo7e ppt ch03
Cimo7e ppt ch03
 
Uses of dbms
Uses of dbmsUses of dbms
Uses of dbms
 
Structure of dbms
Structure of dbmsStructure of dbms
Structure of dbms
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 

Similar to How to Build and Promote a Successful MDM Solution on a Shoestring

UNIT - 1 Part 2: Data Warehousing and Data Mining
UNIT - 1 Part 2: Data Warehousing and Data MiningUNIT - 1 Part 2: Data Warehousing and Data Mining
UNIT - 1 Part 2: Data Warehousing and Data MiningNandakumar P
 
Database Computer presentation file .pptx
Database Computer presentation file .pptxDatabase Computer presentation file .pptx
Database Computer presentation file .pptxMisqalezara
 
Database administration
Database administrationDatabase administration
Database administrationAnish Gupta
 
LESSON 1 - DATABASE MANAGEMENT SYSTEM.pptx
LESSON 1 - DATABASE MANAGEMENT SYSTEM.pptxLESSON 1 - DATABASE MANAGEMENT SYSTEM.pptx
LESSON 1 - DATABASE MANAGEMENT SYSTEM.pptxcalf_ville86
 
Database Management system
Database Management systemDatabase Management system
Database Management systemVijay Thorat
 
Data warehouse
Data warehouseData warehouse
Data warehouseRajThakuri
 
Database Systems
Database SystemsDatabase Systems
Database SystemsUsman Tariq
 
Warehouse Planning and Implementation
Warehouse Planning and ImplementationWarehouse Planning and Implementation
Warehouse Planning and ImplementationSHIKHA GAUTAM
 
World2016_T1_S8_How to upgrade your cubes from 9.x to 10 and turn on optimize...
World2016_T1_S8_How to upgrade your cubes from 9.x to 10 and turn on optimize...World2016_T1_S8_How to upgrade your cubes from 9.x to 10 and turn on optimize...
World2016_T1_S8_How to upgrade your cubes from 9.x to 10 and turn on optimize...Karthik K Iyengar
 
Process management seminar
Process management seminarProcess management seminar
Process management seminarapurva_naik
 
MC0088 Internal Assignment (SMU)
MC0088 Internal Assignment (SMU)MC0088 Internal Assignment (SMU)
MC0088 Internal Assignment (SMU)Krishan Pareek
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
SELF LEARNING REAL TIME EXPERT SYSTEM
SELF LEARNING REAL TIME EXPERT SYSTEMSELF LEARNING REAL TIME EXPERT SYSTEM
SELF LEARNING REAL TIME EXPERT SYSTEMcscpconf
 

Similar to How to Build and Promote a Successful MDM Solution on a Shoestring (20)

UNIT - 1 Part 2: Data Warehousing and Data Mining
UNIT - 1 Part 2: Data Warehousing and Data MiningUNIT - 1 Part 2: Data Warehousing and Data Mining
UNIT - 1 Part 2: Data Warehousing and Data Mining
 
Database Computer presentation file .pptx
Database Computer presentation file .pptxDatabase Computer presentation file .pptx
Database Computer presentation file .pptx
 
Database modeling and security
Database modeling and securityDatabase modeling and security
Database modeling and security
 
Database administration
Database administrationDatabase administration
Database administration
 
LESSON 1 - DATABASE MANAGEMENT SYSTEM.pptx
LESSON 1 - DATABASE MANAGEMENT SYSTEM.pptxLESSON 1 - DATABASE MANAGEMENT SYSTEM.pptx
LESSON 1 - DATABASE MANAGEMENT SYSTEM.pptx
 
Database Management system
Database Management systemDatabase Management system
Database Management system
 
Data warehouse
Data warehouseData warehouse
Data warehouse
 
Database Systems
Database SystemsDatabase Systems
Database Systems
 
DMDW 1st module.pdf
DMDW 1st module.pdfDMDW 1st module.pdf
DMDW 1st module.pdf
 
Warehouse Planning and Implementation
Warehouse Planning and ImplementationWarehouse Planning and Implementation
Warehouse Planning and Implementation
 
Dbms models
Dbms modelsDbms models
Dbms models
 
World2016_T1_S8_How to upgrade your cubes from 9.x to 10 and turn on optimize...
World2016_T1_S8_How to upgrade your cubes from 9.x to 10 and turn on optimize...World2016_T1_S8_How to upgrade your cubes from 9.x to 10 and turn on optimize...
World2016_T1_S8_How to upgrade your cubes from 9.x to 10 and turn on optimize...
 
Data Mining
Data MiningData Mining
Data Mining
 
AtomicDBCoreTech_White Papaer
AtomicDBCoreTech_White PapaerAtomicDBCoreTech_White Papaer
AtomicDBCoreTech_White Papaer
 
IT6701-Information management question bank
IT6701-Information management question bankIT6701-Information management question bank
IT6701-Information management question bank
 
Database, Lecture-1.ppt
Database, Lecture-1.pptDatabase, Lecture-1.ppt
Database, Lecture-1.ppt
 
Process management seminar
Process management seminarProcess management seminar
Process management seminar
 
MC0088 Internal Assignment (SMU)
MC0088 Internal Assignment (SMU)MC0088 Internal Assignment (SMU)
MC0088 Internal Assignment (SMU)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
SELF LEARNING REAL TIME EXPERT SYSTEM
SELF LEARNING REAL TIME EXPERT SYSTEMSELF LEARNING REAL TIME EXPERT SYSTEM
SELF LEARNING REAL TIME EXPERT SYSTEM
 

More from DATAVERSITY

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...DATAVERSITY
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceDATAVERSITY
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data LiteracyDATAVERSITY
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsDATAVERSITY
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for YouDATAVERSITY
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?DATAVERSITY
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?DATAVERSITY
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling FundamentalsDATAVERSITY
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectDATAVERSITY
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at ScaleDATAVERSITY
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?DATAVERSITY
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...DATAVERSITY
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?DATAVERSITY
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsDATAVERSITY
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayDATAVERSITY
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise AnalyticsDATAVERSITY
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best PracticesDATAVERSITY
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?DATAVERSITY
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best PracticesDATAVERSITY
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageDATAVERSITY
 

More from DATAVERSITY (20)

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and Governance
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data Literacy
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business Goals
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for You
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling Fundamentals
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic Project
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at Scale
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and Forwards
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement Today
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best Practices
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best Practices
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive Advantage
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

How to Build and Promote a Successful MDM Solution on a Shoestring

  • 1. How to build and promote a successful MDM solution on a shoestring Pablo Riboldi, PhD Solution Manager for Information Governance & Quality The Church or Jesus Christ of Latter-day Saints
  • 2. Master Data Management (MDM) is a set of processes, technologies, strategies to securely provide accurate and consistent enterprise data. 2 © IRI 2011 Master Data Management - Definition
  • 3. Large 13 million members in 160 countries 53,000 full-time missionaries Materials translated in 83 languages 264 centrally managed databases Largest Genealogy system in the world www.lds.org or www.mormon.org © IRI 2010 3 My Organization
  • 4. Large Organization (Hierarchical) Governing Council (18 members) Departments (23) Silo Organization Independent information systems www.lds.org or www.mormon.org © IRI 2010 4 My Organization
  • 5. Large Organization (Hierarchical) Non Profit Invite people to come to Jesus Christ by Proclaiming the gospel Perfecting the saints Redeeming the dead Clearly defined common purpose and Great people to work with www.lds.org or www.mormon.org © IRI 2010 5 My Organization
  • 6. Data Management Common Method MDM Sharing Consumer Systems Master Data Management Repository MDM Pass-through accounts 2800+ Views DB Links Systems of Record (Enterprise info) 6 © IRI 2011
  • 7. Provide accurate data to Church applications Improve consistency of data reporting across the Church Ensure the security of data Enforce policies for use of data Reduce development time  Eliminate the need to maintain master data in each application Decrease maintenance costs 7 © IRI 2011 MDM Goals
  • 8. Designate authoritative sources of master data and select stewards Provide interfaces for cleansing and enrichment of data Share master data from the source with other applications Create a common data model and interfaces for using master data in applications Centralize administration of security and data use policies (at the application level) 8 © IRI 2011 MDM Strategy
  • 9.
  • 10. Denormalized: Star schema with dimensions (entities), facts (measures)
  • 11. Optimized for Reporting (ad-hoc queries)
  • 13. Normalized (at least 3NF, usually at 5NF)
  • 14.
  • 15. Normalized (at least 3NF, usually at 5NF)
  • 16. Optimized for CRUD transactions (insert, update, delete)
  • 17. Used for reference by other systems
  • 19.
  • 20. Every target receives the same data model.
  • 21.
  • 22. Establishing the repository: Selection of a data source (MDM_User or another source) Publishing the repository: Create MDMR schema with a common data model in each consuming application database Build applications that use foreign keys to the master data instead of copying the data Use Data Integrator to replicate data to MDMR schemas Re-use same code for every application Use VPD to enforce data use policies specific to each application Create a passthrough account on the source Administer MDMR data privileges for each application centrally (Integration team) 13 © IRI 2011 MDM Implementation includes:
  • 23. Master Data Management – Architecture 1) Master data is integrated, cleansed, enriched, and transformed to the MDM data structuresfrom the systems of record. MDM Source Systems of Record (Master data) Organizations Leaders MDM_USER schema Finance Other systems 14 © IRI 2011
  • 24. Master Data Management – Architecture 1) Master data is integrated, cleansed, enriched, and transformed to the MDM data structuresfrom the systems of record. 2) A set of security packages is defined to restrict columns and rows. MDM Source After Login Trigger Systems of Record (Master data) MDM_SEC schema Organizations Leaders MDM_USER schema Finance Other systems 15 © IRI 2011
  • 25. 3) The After-login trigger applies security policies to the MDM accounts. Master Data Management – Architecture 1) Master data is integrated, cleansed, enriched, and transformed to the MDM data structuresfrom the systems of record. 2) A set of security packages is defined to restrict columns and rows. MDM Source Business Objects Data Integrator After Login Trigger APP_PTM Systems of Record (Master data) MDM_SEC schema Organizations Leaders MDM_USER schema Finance Other systems 16 © IRI 2011
  • 26. 3) The After-login trigger applies security policies to the MDM accounts. 4) Security policies limit the rows and columns available to each MDM account. Master Data Management – Architecture 1) Master data is integrated, cleansed, enriched, and transformed to the MDM data structuresfrom the systems of record. 2) A set of security packages is defined to restrict columns and rows. MDM Source Business Objects Data Integrator After Login Trigger APP_PTM Systems of Record (Master data) MDM_SEC schema Organizations Leaders MDM_USER schema Finance Other systems 17 © IRI 2011
  • 27. 3) The After-login trigger applies security policies to the MDM accounts. 4) Security policies limit the rows and columns available to each MDM account. 5) Data is published to the MDMR at set frequencies. Master Data Management – Architecture 1) Master data is integrated, cleansed, enriched, and transformed to the MDM data structuresfrom the systems of record. 2) A set of security packages is defined to restrict columns and rows. Requesting Application Instance MDM Source Business Objects Data Integrator After Login Trigger APP_PTM Systems of Record (Master data) MDM_SEC schema Organizations Leaders MDMR schema MDM_USER schema Finance Other systems 18 © IRI 2011
  • 28. 3) The After-login trigger applies security policies to the MDM accounts. 6) Requesting App can use IDs as FKs, but should not copy data. . 4) Security policies limit the rows and columns available to each MDM account. 5) Data is published to the MDMR at set frequencies. Master Data Management – Architecture 1) Master data is integrated, cleansed, enriched, and transformed to the MDM data structuresfrom the systems of record. 2) A set of security packages is defined to restrict columns and rows. Requesting Application Instance MDM Source Business Objects Data Integrator After Login Trigger APP_PTM Application Systems of Record (Master data) App. schema APP_PTC MDM_SEC schema Organizations Leaders MDMR schema MDM_USER schema Finance Other systems 19 © IRI 2011
  • 29. How are the policies defined? A database package is defined for each object to be protected. The database package functions reference information stored in the Application Context of the current database session and returns the SQL fragment to be either: Appended to the Where Clause or Used to determine whether or not to show the column contents in the result.
  • 30. Sample policy package CREATE OR REPLACE package MDM_ORG_SEC_PKG as function SET_PREDICATE (OBJECT_SCHEMA VARCHAR2,OBJECT_NAME VARCHAR2) return VARCHAR2; -- row policies ... function VIEW_TIMEZONE (OBJECT_SCHEMA VARCHAR2,OBJECT_NAME VARCHAR2) return VARCHAR2; -- column policies end MDM_ORG_SEC_PKG; / CREATE OR REPLACE package body MDM_ORG_SEC_PKG as CTX_VALUE VARCHAR2(2000) :=NULL; CTX_NAME VARCHAR2(30) :='MDM_SEC_CTX'; -- defines the application context function SET_PREDICATE (OBJECT_SCHEMA VARCHAR2,OBJECT_NAME VARCHAR2) return VARCHAR2 as begin CTX_VALUE:=NULL; CTX_VALUE:=SYS_CONTEXT('USERENV','SESSION_USER'); -- identifies the user associated with this session IF CTX_VALUE = OBJECT_SCHEMA THEN RETURN '1=1'; -- if the user is the same as the object owner, enable all access END IF; CTX_VALUE:=NULL; CTX_VALUE:=SYS_CONTEXT(CTX_NAME,'ORG_PREDICATE',2000); -- gets the where clause fragment to be appended IF CTX_VALUE IS NULL THEN RETURN '1=0'; -- if there is no information in the context, deny all access ELSE RETURN CTX_VALUE; -- return the row constraints END IF; EXCEPTION WHEN OTHERS THEN RETURN '1=0'; end; ... function VIEW_TIMEZONE (OBJECT_SCHEMA VARCHAR2,OBJECT_NAME VARCHAR2) return VARCHAR2 as begin …
  • 31. How do we connect the policy to the database object? First, we define the objects and protected column lists in the MDM repository security tables. Then we execute a set of scripts to: Create a stored procedure that will be used to populated the application context when the user connects. Create the application context and tie to the above stored procedure. Tie the VPD policies to the database objects.
  • 32. MDM Repository Security Tables (part 1) Defines the objects (tables, views, synonyms) to be protected Defines the columns to be protected
  • 33. MDM Repository Security Tables (part 2) For the specific user, this defines the where clause fragment … and the column sets to include with the default columns.
  • 34. We’re done! Now, when the SQL statement is executed: SELECT * FROM MDM_ORG Only those rows / columns authorized are returned in the result set.
  • 35. What do we have in our MDM? Reference Data Sets Languages Geopolitical Locations (Countries, Regions, etc.) Currencies Exchange Rates Master Data Sets Organizations Leaders Employees & reporting hierarchy – in progress Physical Facilities (Churches, Temples, Seminaries, etc.) – in progress
  • 36. How successful is our MDM? We replicate authorized master data to 54 other productions systems (230+ instances) daily. Developers become familiar with the canonical models for master data, which reduces the development cost of using master data. Web services deliver master data from the MDM repository. It takes about 20 minutes to provision master data to a new consumer. Changes in source systems are completely transparent to the consuming systems. Reduce number of DB links to source systems.
  • 37. Thank you! Questions & Answers Pablo Riboldi Solution Manager for Information Governance & Quality riboldipj@ldschurch.org The Church or Jesus Christ of Latter-day Saints Visit us at www.mormon.org

Editor's Notes

  1. Also… Over 27,800 Local congregations Hundreds of global and local information systems Broadcasting network using all types of infrastructure
  2. - Governing councils include the First Presidency, Quorum of the Twelve Apostles, and the Presiding Bishopric. Elder Hales: “The wheels of the Church move slowly, but grind really fine.” Information systems have been traditionally built to answer the needs of a specific department or division.
  3. - For more information: www.mormon.org or www.lds.org