SlideShare una empresa de Scribd logo
1 de 51
BIG DATA: THE ROLE OF THE CIO IN DEALING WITH
LARGE AMOUNTS OF UNSTRUCTURED INFORMATION

              Nick Patience, Director, product marketing & strategy
                                                          March 19 2013



                                 RECOMMIND PROPRIETARY & CONFIDENTIAL |   1
ABOUT RECOMMIND

 Founded in 2001
 450+ employees
 Recognized leader by top analyst
  firms
    ˗ Gartner Magic Quadrant Leader
    ˗ IDC MarketScape Leader

 Offices in San Francisco, Boston,
  NYC, London, Bonn & Sydney




                                      RECOMMIND PROPRIETARY & CONFIDENTIAL |   2
WHAT WE DO…


              Software solutions &
              infrastructure for large-
              volume unstructured
              information management
              and analysis



                               RECOMMIND PROPRIETARY & CONFIDENTIAL |   3
PRODUCTS AND SOLUTIONS


VERTICAL
MARKETS




ENTERPRISE
APPLICATIONS                                                                                            3rd
                                                                                  Solutions
                                                                                                       Party


                                              NoSQL                                    ENRICHED
                                                                ANALYTICS
CORE                                         DATABASE                                    INDEX
PLATFORM




ENTERPRISE
DATA
               Databases   Machine              Office             System                 Social       ESI
                                     Email                Web                    XML
                            Data              Documents             Logs                  Media




                                                                            RECOMMIND PROPRIETARY & CONFIDENTIAL |   4
SAMPLE CUSTOMERS




                   RECOMMIND PROPRIETARY & CONFIDENTIAL |   5
AGENDA

 Big Data and the importance of analysing both
  structured and unstructured information
 Role of the CIO in helping to alleviate risk &
  compliance issues within the enterprise
 How to categorise, find, manage and analyse
  information from disparate repositories into one
  overarching platform




                                                     RECOMMIND PROPRIETARY & CONFIDENTIAL |   6
BIG DATA RISKS &
OPPORTUNITIES
AND WHAT YOU CAN DO TO AVOID ONE AND EMBRACE THE OTHER




                                           RECOMMIND PROPRIETARY & CONFIDENTIAL |   7
BIG DATA DEFINITION




  “   Data that exceeds the processing
      capacity of conventional database
      systems. The data is too big, moves too
      fast, or doesn’t fit the structures of your
      database architectures.
                               ”
                                                            Source: Edd Dumbill, Forbes

                                      RECOMMIND PROPRIETARY & CONFIDENTIAL |     8
VOLUME, VARIETY AND VELOCITY
FURTHER DEFINE BIG DATA

 VOLUME (Petabytes)


                  >3500                                   >2000
                   North America                           Europe                    >250
                                                                                       China               >400
                                                                                                            Japan
                         >50
                                                          >200               >50
                                                           Middle East         India
                           Latin America


 VARIETY                                                         VELOCITY




PEOPLE             PEOPLE             MACHINE TO                 2.9 MILLION           20 HOURS             50 MILLION
TO PEOPLE          TO MACHINE         MACHINE                    Emails sent every     Of video uploaded    Tweets per
Email, social      Medical devices,   Sensors, GPS, bar          second                every minute         day
networks, blogs    ecommerce, bank    code scanners
                   transactions                                                           Source: McKinsey, comScore, Radicati

                                                                            RECOMMIND PROPRIETARY & CONFIDENTIAL |       9
TRADITIONAL VS. BIG DATA


TRADITIONAL DATA                       BIG DATA

Gigabytes to Terabytes            Petabytes to Exabytes


Centralised                             Distributed


Structured                             Unstructured


Known Relationships        Complex, Undefined Interrelationships




                                        RECOMMIND PROPRIETARY & CONFIDENTIAL |   10
MASSIVE GROWTH IN UNSTRUCTURED CONTENT

                                               Worldwide Corporate Data Growth

                                                80% of Data Growth is Unstructured
                  45,000
                  40,000
                  35,000
       Exabytes




                  30,000
                  25,000
                  20,000
                  15,000
                  10,000
                   5,000
                      0
                       2010      2011   2012     2013      2014    2015     2016     2017      2018       2019      2020
Source: IDC
The Digital Universe, Dec 2012
                                  Structured Data       Unstructured Data

                                                                                      RECOMMIND PROPRIETARY & CONFIDENTIAL |   11
WHAT BIG DATA IS NOT…



                               NOW
          THEN




           Doing what you did before
                - just scaled up
                               RECOMMIND PROPRIETARY & CONFIDENTIAL |   12
BUT…

   You can do things now you could not do
   a few years ago because of:




          • New analytics techniques
          • Faster, more powerful computers
          • New architectures, such as the cloud

                                         RECOMMIND PROPRIETARY & CONFIDENTIAL |   13
AGENDA

 Big Data and the importance of analysing both
  structured and unstructured information
 Role of the CIO in helping to alleviate risk &
  compliance issues within the enterprise
 How to categorise, find, manage and analyse
  information from disparate repositories into one
  overarching platform




                                                     RECOMMIND PROPRIETARY & CONFIDENTIAL |   14
[1]Source:   Horison Information Strategies
                                              RECOMMIND PROPRIETARY & CONFIDENTIAL |   15
INFORMATION VALUE DECLINES OVER
TIME, COST AND RISK DO NOT

                                                                      Risk-value
                                                                      delta




                                  Cost-value
                                  delta




                                     RECOMMIND PROPRIETARY & CONFIDENTIAL |   16
SPECIFIC BIG DATA RISKS


             •   Unmanaged file servers can pose legal and
                 compliance risks


             •   Unmanaged information represents a risk because it
                 makes it hard to find


             • When litigation occurs, if information cannot be
               found, organisations may ultimately face court sanctions


             • Compliance risks - sensitive client information may reside
               on servers that are not managed may be misused, lost or
               even destroyed
                                                 RECOMMIND PROPRIETARY & CONFIDENTIAL |   17
BIG DATA OPPORTUNITIES




                         RECOMMIND PROPRIETARY & CONFIDENTIAL |   18
BIG DATA MARKET OPPORTUNITIES BY
INDUSTRY




                                                                     Source: Gartner

                                   RECOMMIND PROPRIETARY & CONFIDENTIAL |   19
BIG DATA INVESTMENTS BY INDUSTRY

                     This Year    Next Year    Within 2 Years

   17%
               21%      15%
         29%                                     11%
                                 15%
   17%                                   21%
                        15%                                           9%
               11%                                        18%
                                                 17%                             18%
         12%                     20%
                                         18%                          18%
                                                          12%                     8%
   39%         36%      36%
         29%                                     31%
                                 25%     21%              22%         23%        23%




                                                                                           Source: Gartner

                                                         RECOMMIND PROPRIETARY & CONFIDENTIAL |   20
BIG DATA ANALYTICS - OPPORTUNITIES



   Recommendation                   Sentiment            Marketing Campaign                       Fraud
       Engines                       Analysis                   Analysis                         Analytics
  Match and recommend            Determine the how         Improve accuracy of            Identify fraudulent activity
 users to one another or to     consumers feel about     forecasting, prediction of        and stolen credit cards
 products and services by            particular             buyer behavior by             through active monitoring
 understanding profiles and    companies, brands or       reviewing increasingly                 of customer
      buyer behavior.         products from Tweets and      granular data, click           behavior, historical and
                                  Facebook posts.          streams, call details.              transaction data.




                                                                          RECOMMIND PROPRIETARY & CONFIDENTIAL |    21
FRAUD, WASTE AND ABUSE (FWA) IN
HEALTHCARE
According to a 2010 white paper by the US National Health Care
Anti-Fraud Association (NHCAA)
 The US Federal Bureau of Investigation (FBI) estimates that 3-
  10% of $2.34 trillion spent on healthcare in 2008 was lost to fraud
 Represents $70-$234 billion annually
 $234 billion is roughly equivalent to the gross domestic product
  (GDP) of Finland



Source: http://www.nhcaa.org/media/5994/whitepaper_oct10.pdf




                                                               RECOMMIND PROPRIETARY & CONFIDENTIAL |   22
BIG DATA ANALYTICS - OPPORTUNITIES



       Customer                  Network                    Contract                           Patent
        Churn                   Management                  Analysis                          Analysis
    Evaluate customer          Ingest data from        Mine large volumes of          Comb through enormous
    behavior to identify    servers, storage devices   transactional data and           volumes of text-based
   patterns that indicate    and other hardware to       documentation to            information and prior art to
 which customers are most       monitor network         determine risk and            assist in the development
    likely to leave for a      activity, diagnose      exposure of financial           of new products, guide
    competing vendor.             bottlenecks.                assets.                    portfolio strategies.




                                                                        RECOMMIND PROPRIETARY & CONFIDENTIAL |    23
MITIGATING BIG DATA RISKS
THROUGH DEFENSIBLE DELETION




                              RECOMMIND PROPRIETARY & CONFIDENTIAL |   24
THE LIFECYCLE OF DATA & DEFENSIBLE DELETION




                                     RECOMMIND PROPRIETARY & CONFIDENTIAL |   25
DEFENSIBLE DELETION: PIPE DREAM OR
REALITY?

•   Survey by Enterprise Strategy Group in Q4 2012
•   253 business and IT professionals familiar with their organisation’s data
    disposition policies (all organisations currently dispose of data)
     -   36% IT professionals
     -   64% business professionals
•   Midmarket (100 to 999 employees) and enterprise-class (1,000+
    employees) organisations
     -   32% midmarket
     -   68% enterprise-class
•   Multiple verticals



                                                       RECOMMIND PROPRIETARY & CONFIDENTIAL |   26
RESPONDENTS BY NUMBER OF EMPLOYEES

                    How many total employees does your organisation have worldwide?
                                               (N=253)


                                                                        100 to 249, 13%
                          20,000 or more, 21%
                                                                                 250 to 499, 10%



                             10,000 to                                         500 to 999, 9%
                            19,999, 13%


                                   5,000 to 9,999, 8%                        1,000 to 2,499, 13%
                                                  2,500 to 4,999, 12%
© 2012 Enterprise Strategy Group



                                                                                 RECOMMIND PROPRIETARY & CONFIDENTIAL |   27
RESPONDENTS BY INDUSTRY

               What is your organisation’s primary industry? (Percent of respondents, N=253)
                                                                                    Government
                                                                               (Federal/National, Sta
                                                                               te/Province/Local), 22
                                        Other, 28%                                       %




            Retail/Wholesale, 1%                                                        Manufacturing, 15%

                     Health Care, 5%

                                   Communications &                                  Financial
                                      Media, 6%         Business Services      (banking, securities, in
                                                      (accounting, consultin       surance), 12%
© 2012 Enterprise Strategy Group                        g, legal, etc.), 10%

                                                                                     RECOMMIND PROPRIETARY & CONFIDENTIAL |   28
HOW ORGANISATIONS DISPOSE OF DATA

                 Which of the following best describes the manner in which
                       your organisation disposes of data? (N=253)

                                                                Data is disposed
                                                                of on an ad hoc
                                                                   basis, 20%




                      We have a formal
                      data disposition
                          policy in
                        place, 80%
© 2012 Enterprise Strategy Group


                                                                       RECOMMIND PROPRIETARY & CONFIDENTIAL |   29
DRIVERS BEHIND DATA DISPOSITION
                            What are the biggest drivers behind your organisation’s data disposition?
                                             (N=253, multiple responses accepted)

     Improving overall data management for better future retrieval                                                                66%
 Mitigating the risk of exposing sensitive/confidential data past its
                                                                                                                         58%
      retention mandate to potential future security breaches
     Reducing exposure to risk from future e-discovery/regulatory
                                                                                                                        56%
                               productions

  Reducing costs of storing legacy data or records with third parties                                                   56%

                                      Improving systems performance                                               50%

        Reducing costs of future e-discovery/regulatory productions                                           46%
   Reducing maintenance costs (i.e., OPEX) associated with storing
                                                                                                              46%
                            data volumes
  Reducing systems costs (i.e., CAPEX) associated with storing data
                                                                                                              46%
                               volumes
                                                                        0%   10%   20%       30%      40%      50%      60%       70%
© 2012 Enterprise Strategy Group



                                                                                         RECOMMIND PROPRIETARY & CONFIDENTIAL |    30
APPLICATION OF DATA RETENTION POLICIES

                           Which of the following best describes your organisation’s application – or expected
                                             application – of data retention policies? (N=245)

             We have – or will have –
           retention policies or records                                                                                     85%
          management in place for paper…
              We retain – or will retain –
            regulated data according to its                                                                             80%
            mandated retention schedule

         We preserve – or will preserve –
                                                                                                                71%
             data under legal hold

                 We have – or will have –
               retention policies or records                                                                    71%
                management in place for…

© 2012 Enterprise Strategy Group               0%      10%     20%     30%    40%      50%       60%      70%         80%     90%


                                                                                    RECOMMIND PROPRIETARY & CONFIDENTIAL |    31
GROUPS RESPONSIBLE FOR CREATION AND
SETTING DATA DISPOSITION POLICIES
                     Which of the following groups assist/are expected to assist in the creation of data
                    disposition policies? Which group is/will be responsible for setting data disposition
                                       policies? (N=235, multiple responses accepted)

                Records management group                                               38%
                                                                                                             78%
       Legal department/general counsel                                    21%                                                  Group that
                                                                                                            77%
                                                                 11%                                                            sets – or will
                                                 IT                                                         77%                 set – data
                                    Executive team              9%                                                              disposition
                                                                                               54%
                                                                                                                                policies
                                    Business users         3%
                                                                                             51%                                All groups
                               Compliance group             6%                                                                  with input
                                                                                             49%
                                                                                                                                into data
                 Accounting or auditing firm               2%
                                                                                 31%                                            disposition
                                                           2%                                                                   policies
                                   Outside counsel                         23%
                                   Service provider        2%
                                                                 12%

© 2012 Enterprise Strategy Group
                                                      0%             20%          40%          60%         80%         100%


                                                                                                     RECOMMIND PROPRIETARY & CONFIDENTIAL |      32
GROUP RESPONSIBLE FOR EXECUTION OF DATA
DISPOSITION POLICIES
                               Which group is – or will likely be – responsible for the execution of
                              data disposition policies (i.e., actually removing data from systems)?
                                                               (N=235)
                      Service provider, 1%
                                                   Other, 2%
                       Accounting or
                      auditing firm, 1%                          Don’t know, 1%
                            Legal
                    department/general
                        counsel, 2%
                              Compliance
                               group, 3%
                             Business users, 4%                                           IT, 49%

                                      Records
                                   management
                                    group, 38%
© 2012 Enterprise Strategy Group



                                                                                     RECOMMIND PROPRIETARY & CONFIDENTIAL |   33
AMOUNT OF DATA DISPOSED ANNUALLY

                    On average, approximately how much data would you estimate your organisation
                                        disposed on an annual basis? (N=137)
     45%
                                        41%
     40%

     35%

     30%                                                                     27%
     25%

     20%
                                                          15%
     15%                12%
     10%

      5%
                                                                                                    4%

      0%

                Less than 1 TB      1 TB to 5 TB      6 TB to 10 TB     11 TB to 25 TB      More than 25 TB
© 2012 Enterprise Strategy Group



                                                                            RECOMMIND PROPRIETARY & CONFIDENTIAL |   34
PERCENT OF TOTAL AMOUNT OF DATA
DISPOSED OF ANNUALLY
            On average, what percentage of your organisation’s total amount of data do you
                          estimate is disposed on an annual basis? (N=171)
  40%
                           37%
  35%

  30%
            25%
  25%

  20%
                                           16%
  15%
                                                                              11%
  10%
                                                            9%

  5%
                                                                                                  2%
  0%

        Less than 5%    5% to 10%       11% to 15%      16% to 20%       21% to 25%        More than 25%

                                                                      RECOMMIND PROPRIETARY & CONFIDENTIAL |   35
IMPACT OF FORMAL DATA DISPOSITION
POLICIES
                       How significant has the impact of formal data disposition policies been on cost
                                    savings and/or risk avoidance for your organisation?
                                                           (N=203)


                                        Don’t know, 13%                   Very significant, 9%


                                   Too soon to
                                    tell, 13%


                               Insignificant, 2%
                                                                                  Significant, 39%


                                   Neither significant
                                           nor
© 2012 Enterprise Strategy Group
                                   insignificant, 23%

                                                                                  RECOMMIND PROPRIETARY & CONFIDENTIAL |   36
AGENDA

 Big Data and the importance of analysing both
  structured and unstructured information
 Role of the CIO in helping to alleviate risk &
  compliance issues within the enterprise
 How to categorise, find, manage and analyse
  information from disparate repositories into one
  overarching platform




                                                     RECOMMIND PROPRIETARY & CONFIDENTIAL |   37
CUSTOMER CASE STUDY –
US DEPT. OF ENERGY




                        RECOMMIND PROPRIETARY & CONFIDENTIAL |   38
CASE STUDY – US DEPARTMENT OF ENERGY



            The Challenge

           We have thousands of users
           generating many records a day. How
           do we manage this information like an
           asset so that it can be useful and we
           comply with the government’s records
           management mandate?




                                        RECOMMIND PROPRIETARY & CONFIDENTIAL |   39
EMAIL & RECORDS MANAGEMENT AT US
DEPARTMENT OF ENERGY
 Need to preserve history
 Importance of vital records for continuity of operations if
  emergencies arise
 Need to provide copies of records for legal actions or FOIA
  legal requests
 Lack of motivation to categorize content




                                                         RECOMMIND PROPRIETARY & CONFIDENTIAL |   40
AUTOMATIC CATEGORISATION APPROACH



                                                              Auto
                                                              Categorization
                        Uncategorized
          Journaling                            Content
                       Drop-Off Library


                          Categorized
                            Content
                           Organizer           Categorized




                                Mov
                                 e
                       Site 1         Site 2

                       Site 3         Site 4




                                                   RECOMMIND PROPRIETARY & CONFIDENTIAL |   41
IMPACT

 Requires one system administrator/engineer &
  two people to manage the electronic records
  center – for 1,000 users

 End users more productive due to no longer
  having to categorize content




                                                 RECOMMIND PROPRIETARY & CONFIDENTIAL |   42
EMAIL CATEGORISATION ACCURACY

   100%



    80%



    60%
             Accuracy Average
          B a s e d
          R u l e -




    40%




                                     86%
    20%



    0%
      Administrative Notices
                         Budget Records Customer Service
                                      IT         Management Improvement
                                                                 Procurement Records
                                                                                 Travel       Records



                                                                     RECOMMIND PROPRIETARY & CONFIDENTIAL |   43
SIMILAR USE CASES
 Email compliance in financial services
     ˗ Email archiving capture emails from target employees
     ˗ Random sampling & manual review of emails
     ˗ Automatic sampling, initial review & assignment to senior reviewers is more cost and time
       efficient, accurate & defensible
 Predictive coding in e-Discovery
     ˗ Predictive Sampling to estimate the percentage of responsive documents
     ˗ Predictive Analytics (Concepts, Phrases, Smart Filters) to find potentially relevant documents
     ˗ Complete iterative cycle until zero documents are computer-suggested or responsive
     ˗ Use Predictive Sampling to QC the non-reviewed documents
 Predictive modelling in healthcare:
     ˗ Find at risk patients using guided data mining against a pre-built, validated predictive model for a
       specific issue such as hospital acquired conditions
     ˗ Predict the patients who should be isolated upon arrival, and the most reliable approach to
       screening




                                                                                  RECOMMIND PROPRIETARY & CONFIDENTIAL |   44
DIFFERENT USE CASES, DIFFERENT ROIs



                                                                      • Predictive Analytics
                                                   Optimize           • Operational Efficiencies
                                                    Value             • Business Intelligence




                                     Lower
                                     Costs

        • Storage Management
        • Personnel optimization
        • Operational efficiencies                               Minimize
                                                                   Risk

                                             • Security Breaches
                                             • eDiscovery Costs
                                             • Data Leakage
                                             • Regulatory Inquiries




                                                                                                   RECOMMIND PROPRIETARY & CONFIDENTIAL |   45
CUSTOMER CASE STUDY –
SWISS RE INSURANCE




                        RECOMMIND PROPRIETARY & CONFIDENTIAL |   46
SWISS RE - ACCESS, COMPLIANCE & EDISCOVERY

                             100s of TB data
                             Index once, use many
                             True 360 degree view of enterprise data
                             Based on CORE platform




                                              Custom-built apps



                  NoSQL                    ENRICHED
                               ANALYTICS     INDEX
                 DATABASE




                                             RECOMMIND PROPRIETARY & CONFIDENTIAL |   47
PRODUCTS AND SOLUTIONS


VERTICAL
MARKETS




ENTERPRISE
APPLICATIONS                                                                                            3rd
                                                                                  Solutions
                                                                                                       Party


                                              NoSQL                                    ENRICHED
                                                                ANALYTICS
CORE                                         DATABASE                                    INDEX
PLATFORM




ENTERPRISE
DATA
               Databases   Machine              Office             System                 Social       ESI
                                     Email                Web                    XML
                            Data              Documents             Logs                  Media




                                                                            RECOMMIND PROPRIETARY & CONFIDENTIAL |   48
WHAT MAKES CORE UNIQUE?


                   Powerful and scalable indexing and retrieval
           FIND    Keyword and language-agnostic machine learning

                   Unstructured information “joins”
         CONNECT




                   Unstructured data extraction & analytics
         ANALYSE




                   Delivers ability to confidently act on data
           ACT




                                                  RECOMMIND PROPRIETARY & CONFIDENTIAL |   49
SUMMARY
 Big Data and the importance of analysing both structured and
  unstructured information
    ˗ What it is
    ˗ What it is not
    ˗ Risks & opportunities
 Role of the CIO in helping to alleviate risk & compliance issues
  within the enterprise
    ˗ Defensible deletion
    ˗ Categorization – US Dept of Energy
 How to categorise, find, manage and analyse information from
  disparate repositories into one overarching platform
    ˗ CORE platform
    ˗ Swiss Re



                                                       RECOMMIND PROPRIETARY & CONFIDENTIAL |   50
THANK YOU
– QUESTIONS?
@nickpatience
nick.patience@recommind.com


                              RECOMMIND PROPRIETARY & CONFIDENTIAL |   51

Más contenido relacionado

La actualidad más candente

The Accelerator's Guide to Digital Transformation
The Accelerator's Guide to Digital TransformationThe Accelerator's Guide to Digital Transformation
The Accelerator's Guide to Digital TransformationBMC Software
 
What is Digital Transformation?
What is Digital Transformation?What is Digital Transformation?
What is Digital Transformation?Lucy Newman
 
JETbox: Your Digital Transformation Journey
JETbox: Your Digital Transformation JourneyJETbox: Your Digital Transformation Journey
JETbox: Your Digital Transformation JourneyBill Jobes
 
Opening Keynote: What is Digital Transformation, Really?
Opening Keynote: What is Digital Transformation, Really? Opening Keynote: What is Digital Transformation, Really?
Opening Keynote: What is Digital Transformation, Really? InnoTech
 
Digital Transformation Management Software
Digital Transformation Management Software Digital Transformation Management Software
Digital Transformation Management Software Corporater
 
Accenture technology-vision-2013
Accenture technology-vision-2013Accenture technology-vision-2013
Accenture technology-vision-2013ruttens.com
 
Digital Transformation - Why? How? What?
Digital Transformation - Why? How? What?Digital Transformation - Why? How? What?
Digital Transformation - Why? How? What?Orkhan Gasimov
 
Lcty (Get Social) 2011 Keynote Pc March 2011
Lcty (Get Social) 2011 Keynote Pc March 2011Lcty (Get Social) 2011 Keynote Pc March 2011
Lcty (Get Social) 2011 Keynote Pc March 2011pchandor
 
7 considerations to your digital transformation journey
7 considerations to your digital transformation journey7 considerations to your digital transformation journey
7 considerations to your digital transformation journeyTarang Rai
 
The State of Digital Transformation 2018 - 2019 by Brian Solis
The State of Digital Transformation 2018 - 2019 by Brian SolisThe State of Digital Transformation 2018 - 2019 by Brian Solis
The State of Digital Transformation 2018 - 2019 by Brian SolisBrian Solis
 
Digital Transformation - How the world is changing for you
Digital Transformation - How the world is changing for youDigital Transformation - How the world is changing for you
Digital Transformation - How the world is changing for youIlesh Mistry
 
Steps to success in Digital Transformation | Digital transformation key compo...
Steps to success in Digital Transformation | Digital transformation key compo...Steps to success in Digital Transformation | Digital transformation key compo...
Steps to success in Digital Transformation | Digital transformation key compo...hakuna matata solutions
 
On the Road to Digital: Practical Encounters
On the Road to Digital: Practical EncountersOn the Road to Digital: Practical Encounters
On the Road to Digital: Practical EncountersCognizant
 
Digital Transformation by William Poos
Digital Transformation by William PoosDigital Transformation by William Poos
Digital Transformation by William PoosNRB
 
Leading digital summary
Leading digital summaryLeading digital summary
Leading digital summaryGMR Group
 
The Four Essential Pillars of Digital Transformation
The Four Essential Pillars of Digital TransformationThe Four Essential Pillars of Digital Transformation
The Four Essential Pillars of Digital TransformationIan Thomas
 
Iron Mountain: The Essential Guide To Understanding Digital Transformation
Iron Mountain: The Essential Guide To Understanding Digital TransformationIron Mountain: The Essential Guide To Understanding Digital Transformation
Iron Mountain: The Essential Guide To Understanding Digital TransformationMighty Guides, Inc.
 
Digital transformation presentation
Digital transformation presentationDigital transformation presentation
Digital transformation presentationAsim Ali
 

La actualidad más candente (20)

The Accelerator's Guide to Digital Transformation
The Accelerator's Guide to Digital TransformationThe Accelerator's Guide to Digital Transformation
The Accelerator's Guide to Digital Transformation
 
Digital transformation
Digital transformationDigital transformation
Digital transformation
 
What is Digital Transformation?
What is Digital Transformation?What is Digital Transformation?
What is Digital Transformation?
 
JETbox: Your Digital Transformation Journey
JETbox: Your Digital Transformation JourneyJETbox: Your Digital Transformation Journey
JETbox: Your Digital Transformation Journey
 
Opening Keynote: What is Digital Transformation, Really?
Opening Keynote: What is Digital Transformation, Really? Opening Keynote: What is Digital Transformation, Really?
Opening Keynote: What is Digital Transformation, Really?
 
Digital Transformation Management Software
Digital Transformation Management Software Digital Transformation Management Software
Digital Transformation Management Software
 
Accenture technology-vision-2013
Accenture technology-vision-2013Accenture technology-vision-2013
Accenture technology-vision-2013
 
Digital Transformation - Why? How? What?
Digital Transformation - Why? How? What?Digital Transformation - Why? How? What?
Digital Transformation - Why? How? What?
 
Digital Enterprise
Digital EnterpriseDigital Enterprise
Digital Enterprise
 
Lcty (Get Social) 2011 Keynote Pc March 2011
Lcty (Get Social) 2011 Keynote Pc March 2011Lcty (Get Social) 2011 Keynote Pc March 2011
Lcty (Get Social) 2011 Keynote Pc March 2011
 
7 considerations to your digital transformation journey
7 considerations to your digital transformation journey7 considerations to your digital transformation journey
7 considerations to your digital transformation journey
 
The State of Digital Transformation 2018 - 2019 by Brian Solis
The State of Digital Transformation 2018 - 2019 by Brian SolisThe State of Digital Transformation 2018 - 2019 by Brian Solis
The State of Digital Transformation 2018 - 2019 by Brian Solis
 
Digital Transformation - How the world is changing for you
Digital Transformation - How the world is changing for youDigital Transformation - How the world is changing for you
Digital Transformation - How the world is changing for you
 
Steps to success in Digital Transformation | Digital transformation key compo...
Steps to success in Digital Transformation | Digital transformation key compo...Steps to success in Digital Transformation | Digital transformation key compo...
Steps to success in Digital Transformation | Digital transformation key compo...
 
On the Road to Digital: Practical Encounters
On the Road to Digital: Practical EncountersOn the Road to Digital: Practical Encounters
On the Road to Digital: Practical Encounters
 
Digital Transformation by William Poos
Digital Transformation by William PoosDigital Transformation by William Poos
Digital Transformation by William Poos
 
Leading digital summary
Leading digital summaryLeading digital summary
Leading digital summary
 
The Four Essential Pillars of Digital Transformation
The Four Essential Pillars of Digital TransformationThe Four Essential Pillars of Digital Transformation
The Four Essential Pillars of Digital Transformation
 
Iron Mountain: The Essential Guide To Understanding Digital Transformation
Iron Mountain: The Essential Guide To Understanding Digital TransformationIron Mountain: The Essential Guide To Understanding Digital Transformation
Iron Mountain: The Essential Guide To Understanding Digital Transformation
 
Digital transformation presentation
Digital transformation presentationDigital transformation presentation
Digital transformation presentation
 

Destacado

Tendencias Storage
Tendencias StorageTendencias Storage
Tendencias StorageFran Navarro
 
Unlocking value in your (big) data
Unlocking value in your (big) dataUnlocking value in your (big) data
Unlocking value in your (big) dataOscar Renalias
 
[Open Technet Summit 2014] 쓰기 쉬운 Hadoop 기반 빅데이터 플랫폼 아키텍처 및 활용 방안
[Open Technet Summit 2014] 쓰기 쉬운 Hadoop 기반 빅데이터 플랫폼 아키텍처 및 활용 방안[Open Technet Summit 2014] 쓰기 쉬운 Hadoop 기반 빅데이터 플랫폼 아키텍처 및 활용 방안
[Open Technet Summit 2014] 쓰기 쉬운 Hadoop 기반 빅데이터 플랫폼 아키텍처 및 활용 방안치완 박
 
[SSA] 01.bigdata database technology (2014.02.05)
[SSA] 01.bigdata database technology (2014.02.05)[SSA] 01.bigdata database technology (2014.02.05)
[SSA] 01.bigdata database technology (2014.02.05)Steve Min
 
201210 그루터 빅데이터_플랫폼_아키텍쳐_및_솔루션_소개
201210 그루터 빅데이터_플랫폼_아키텍쳐_및_솔루션_소개201210 그루터 빅데이터_플랫폼_아키텍쳐_및_솔루션_소개
201210 그루터 빅데이터_플랫폼_아키텍쳐_및_솔루션_소개Gruter
 
Idc japan presentation at cloudian seminar 2014
Idc japan presentation at cloudian seminar 2014Idc japan presentation at cloudian seminar 2014
Idc japan presentation at cloudian seminar 2014CLOUDIAN KK
 
オブジェクトストレージのユースケース (Cloudweek2014 講演資料)
オブジェクトストレージのユースケース (Cloudweek2014 講演資料)オブジェクトストレージのユースケース (Cloudweek2014 講演資料)
オブジェクトストレージのユースケース (Cloudweek2014 講演資料)CLOUDIAN KK
 
スケールアウト型オブジェクトストレージの企業ITにおける使いどころ
スケールアウト型オブジェクトストレージの企業ITにおける使いどころスケールアウト型オブジェクトストレージの企業ITにおける使いどころ
スケールアウト型オブジェクトストレージの企業ITにおける使いどころCLOUDIAN KK
 
2012 빅데이터 big data 발표자료
2012 빅데이터 big data 발표자료2012 빅데이터 big data 발표자료
2012 빅데이터 big data 발표자료Wooseung Kim
 

Destacado (9)

Tendencias Storage
Tendencias StorageTendencias Storage
Tendencias Storage
 
Unlocking value in your (big) data
Unlocking value in your (big) dataUnlocking value in your (big) data
Unlocking value in your (big) data
 
[Open Technet Summit 2014] 쓰기 쉬운 Hadoop 기반 빅데이터 플랫폼 아키텍처 및 활용 방안
[Open Technet Summit 2014] 쓰기 쉬운 Hadoop 기반 빅데이터 플랫폼 아키텍처 및 활용 방안[Open Technet Summit 2014] 쓰기 쉬운 Hadoop 기반 빅데이터 플랫폼 아키텍처 및 활용 방안
[Open Technet Summit 2014] 쓰기 쉬운 Hadoop 기반 빅데이터 플랫폼 아키텍처 및 활용 방안
 
[SSA] 01.bigdata database technology (2014.02.05)
[SSA] 01.bigdata database technology (2014.02.05)[SSA] 01.bigdata database technology (2014.02.05)
[SSA] 01.bigdata database technology (2014.02.05)
 
201210 그루터 빅데이터_플랫폼_아키텍쳐_및_솔루션_소개
201210 그루터 빅데이터_플랫폼_아키텍쳐_및_솔루션_소개201210 그루터 빅데이터_플랫폼_아키텍쳐_및_솔루션_소개
201210 그루터 빅데이터_플랫폼_아키텍쳐_및_솔루션_소개
 
Idc japan presentation at cloudian seminar 2014
Idc japan presentation at cloudian seminar 2014Idc japan presentation at cloudian seminar 2014
Idc japan presentation at cloudian seminar 2014
 
オブジェクトストレージのユースケース (Cloudweek2014 講演資料)
オブジェクトストレージのユースケース (Cloudweek2014 講演資料)オブジェクトストレージのユースケース (Cloudweek2014 講演資料)
オブジェクトストレージのユースケース (Cloudweek2014 講演資料)
 
スケールアウト型オブジェクトストレージの企業ITにおける使いどころ
スケールアウト型オブジェクトストレージの企業ITにおける使いどころスケールアウト型オブジェクトストレージの企業ITにおける使いどころ
スケールアウト型オブジェクトストレージの企業ITにおける使いどころ
 
2012 빅데이터 big data 발표자료
2012 빅데이터 big data 발표자료2012 빅데이터 big data 발표자료
2012 빅데이터 big data 발표자료
 

Similar a Nick Patience, Director Product Marketing & Strategy at Recommind - Big Data: The role of The CIO in dealing with large amounts of unstructured information

A Strategic View of Enterprise Reporting and Analytics: The Data Funnel
A Strategic View of Enterprise Reporting and Analytics: The Data FunnelA Strategic View of Enterprise Reporting and Analytics: The Data Funnel
A Strategic View of Enterprise Reporting and Analytics: The Data FunnelInside Analysis
 
01 im overview high level
01 im overview high level01 im overview high level
01 im overview high levelJames Findlay
 
2012 02-07 sql denali presentatie microsoft
2012 02-07 sql denali presentatie microsoft2012 02-07 sql denali presentatie microsoft
2012 02-07 sql denali presentatie microsoftCombell NV
 
Kim Escherich - How Big Data Transforms Our World
Kim Escherich - How Big Data Transforms Our WorldKim Escherich - How Big Data Transforms Our World
Kim Escherich - How Big Data Transforms Our WorldBigDataViz
 
Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...
Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...
Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...Cloudera, Inc.
 
Public private-cloud
Public private-cloudPublic private-cloud
Public private-cloudJamie Taylor
 
Day 2 aziz apj aziz_big_datakeynote_press
Day 2 aziz apj aziz_big_datakeynote_pressDay 2 aziz apj aziz_big_datakeynote_press
Day 2 aziz apj aziz_big_datakeynote_pressIntelAPAC
 
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Mark Heid
 
Technically Speaking: How Self-Service Analytics Fosters Collaboration
Technically Speaking: How Self-Service Analytics Fosters CollaborationTechnically Speaking: How Self-Service Analytics Fosters Collaboration
Technically Speaking: How Self-Service Analytics Fosters CollaborationInside Analysis
 
Die Big Data Fabric als Enabler für Machine Learning & AI
Die Big Data Fabric als Enabler für Machine Learning & AIDie Big Data Fabric als Enabler für Machine Learning & AI
Die Big Data Fabric als Enabler für Machine Learning & AIDenodo
 
Cutting Big Data Down to Size with AMD and Dell
Cutting Big Data Down to Size with AMD and DellCutting Big Data Down to Size with AMD and Dell
Cutting Big Data Down to Size with AMD and DellAMD
 
Robert LeBlanc - Why Big Data? Why Now?
Robert LeBlanc - Why Big Data? Why Now?Robert LeBlanc - Why Big Data? Why Now?
Robert LeBlanc - Why Big Data? Why Now?Mauricio Godoy
 
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
EDF2012   Wolfgang Nimfuehr - Bringing Big Data to the EnterpriseEDF2012   Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the EnterpriseEuropean Data Forum
 
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...DATAVERSITY
 
Intel Cloud Summit: Big Data
Intel Cloud Summit: Big DataIntel Cloud Summit: Big Data
Intel Cloud Summit: Big DataIntelAPAC
 
Big data and big content
Big data and big contentBig data and big content
Big data and big contentJohn Mancini
 
The Comprehensive Approach: A Unified Information Architecture
The Comprehensive Approach: A Unified Information ArchitectureThe Comprehensive Approach: A Unified Information Architecture
The Comprehensive Approach: A Unified Information ArchitectureInside Analysis
 
LinkedIn Overview Feb 2012
LinkedIn Overview Feb 2012LinkedIn Overview Feb 2012
LinkedIn Overview Feb 2012Dan Green
 

Similar a Nick Patience, Director Product Marketing & Strategy at Recommind - Big Data: The role of The CIO in dealing with large amounts of unstructured information (20)

A Strategic View of Enterprise Reporting and Analytics: The Data Funnel
A Strategic View of Enterprise Reporting and Analytics: The Data FunnelA Strategic View of Enterprise Reporting and Analytics: The Data Funnel
A Strategic View of Enterprise Reporting and Analytics: The Data Funnel
 
01 im overview high level
01 im overview high level01 im overview high level
01 im overview high level
 
2012 02-07 sql denali presentatie microsoft
2012 02-07 sql denali presentatie microsoft2012 02-07 sql denali presentatie microsoft
2012 02-07 sql denali presentatie microsoft
 
Kim Escherich - How Big Data Transforms Our World
Kim Escherich - How Big Data Transforms Our WorldKim Escherich - How Big Data Transforms Our World
Kim Escherich - How Big Data Transforms Our World
 
Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...
Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...
Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...
 
Public private-cloud
Public private-cloudPublic private-cloud
Public private-cloud
 
The New Enterprise Data Platform
The New Enterprise Data PlatformThe New Enterprise Data Platform
The New Enterprise Data Platform
 
Day 2 aziz apj aziz_big_datakeynote_press
Day 2 aziz apj aziz_big_datakeynote_pressDay 2 aziz apj aziz_big_datakeynote_press
Day 2 aziz apj aziz_big_datakeynote_press
 
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
 
Technically Speaking: How Self-Service Analytics Fosters Collaboration
Technically Speaking: How Self-Service Analytics Fosters CollaborationTechnically Speaking: How Self-Service Analytics Fosters Collaboration
Technically Speaking: How Self-Service Analytics Fosters Collaboration
 
Die Big Data Fabric als Enabler für Machine Learning & AI
Die Big Data Fabric als Enabler für Machine Learning & AIDie Big Data Fabric als Enabler für Machine Learning & AI
Die Big Data Fabric als Enabler für Machine Learning & AI
 
Cutting Big Data Down to Size with AMD and Dell
Cutting Big Data Down to Size with AMD and DellCutting Big Data Down to Size with AMD and Dell
Cutting Big Data Down to Size with AMD and Dell
 
Accelerate Return on Data
Accelerate Return on DataAccelerate Return on Data
Accelerate Return on Data
 
Robert LeBlanc - Why Big Data? Why Now?
Robert LeBlanc - Why Big Data? Why Now?Robert LeBlanc - Why Big Data? Why Now?
Robert LeBlanc - Why Big Data? Why Now?
 
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
EDF2012   Wolfgang Nimfuehr - Bringing Big Data to the EnterpriseEDF2012   Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
 
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
 
Intel Cloud Summit: Big Data
Intel Cloud Summit: Big DataIntel Cloud Summit: Big Data
Intel Cloud Summit: Big Data
 
Big data and big content
Big data and big contentBig data and big content
Big data and big content
 
The Comprehensive Approach: A Unified Information Architecture
The Comprehensive Approach: A Unified Information ArchitectureThe Comprehensive Approach: A Unified Information Architecture
The Comprehensive Approach: A Unified Information Architecture
 
LinkedIn Overview Feb 2012
LinkedIn Overview Feb 2012LinkedIn Overview Feb 2012
LinkedIn Overview Feb 2012
 

Más de Global Business Events

Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...Global Business Events
 
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...Global Business Events
 
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...Global Business Events
 
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...Global Business Events
 
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...Global Business Events
 
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT ModernisationHakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT ModernisationGlobal Business Events
 
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...Global Business Events
 
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...Global Business Events
 
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...Global Business Events
 
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...Global Business Events
 
John Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security AnxietyJohn Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security AnxietyGlobal Business Events
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Global Business Events
 
Keith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined EverythingKeith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined EverythingGlobal Business Events
 
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseDavid Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseGlobal Business Events
 
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...Global Business Events
 
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...Global Business Events
 
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...Global Business Events
 
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...Global Business Events
 
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...Global Business Events
 

Más de Global Business Events (20)

Cio Event
Cio EventCio Event
Cio Event
 
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
 
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
 
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
 
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
 
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
 
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT ModernisationHakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
 
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
 
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
 
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
 
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
 
John Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security AnxietyJohn Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security Anxiety
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Keith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined EverythingKeith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined Everything
 
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseDavid Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
 
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
 
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
 
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
 
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
 
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
 

Nick Patience, Director Product Marketing & Strategy at Recommind - Big Data: The role of The CIO in dealing with large amounts of unstructured information

  • 1. BIG DATA: THE ROLE OF THE CIO IN DEALING WITH LARGE AMOUNTS OF UNSTRUCTURED INFORMATION Nick Patience, Director, product marketing & strategy March 19 2013 RECOMMIND PROPRIETARY & CONFIDENTIAL | 1
  • 2. ABOUT RECOMMIND  Founded in 2001  450+ employees  Recognized leader by top analyst firms ˗ Gartner Magic Quadrant Leader ˗ IDC MarketScape Leader  Offices in San Francisco, Boston, NYC, London, Bonn & Sydney RECOMMIND PROPRIETARY & CONFIDENTIAL | 2
  • 3. WHAT WE DO… Software solutions & infrastructure for large- volume unstructured information management and analysis RECOMMIND PROPRIETARY & CONFIDENTIAL | 3
  • 4. PRODUCTS AND SOLUTIONS VERTICAL MARKETS ENTERPRISE APPLICATIONS 3rd Solutions Party NoSQL ENRICHED ANALYTICS CORE DATABASE INDEX PLATFORM ENTERPRISE DATA Databases Machine Office System Social ESI Email Web XML Data Documents Logs Media RECOMMIND PROPRIETARY & CONFIDENTIAL | 4
  • 5. SAMPLE CUSTOMERS RECOMMIND PROPRIETARY & CONFIDENTIAL | 5
  • 6. AGENDA  Big Data and the importance of analysing both structured and unstructured information  Role of the CIO in helping to alleviate risk & compliance issues within the enterprise  How to categorise, find, manage and analyse information from disparate repositories into one overarching platform RECOMMIND PROPRIETARY & CONFIDENTIAL | 6
  • 7. BIG DATA RISKS & OPPORTUNITIES AND WHAT YOU CAN DO TO AVOID ONE AND EMBRACE THE OTHER RECOMMIND PROPRIETARY & CONFIDENTIAL | 7
  • 8. BIG DATA DEFINITION “ Data that exceeds the processing capacity of conventional database systems. The data is too big, moves too fast, or doesn’t fit the structures of your database architectures. ” Source: Edd Dumbill, Forbes RECOMMIND PROPRIETARY & CONFIDENTIAL | 8
  • 9. VOLUME, VARIETY AND VELOCITY FURTHER DEFINE BIG DATA VOLUME (Petabytes) >3500 >2000 North America Europe >250 China >400 Japan >50 >200 >50 Middle East India Latin America VARIETY VELOCITY PEOPLE PEOPLE MACHINE TO 2.9 MILLION 20 HOURS 50 MILLION TO PEOPLE TO MACHINE MACHINE Emails sent every Of video uploaded Tweets per Email, social Medical devices, Sensors, GPS, bar second every minute day networks, blogs ecommerce, bank code scanners transactions Source: McKinsey, comScore, Radicati RECOMMIND PROPRIETARY & CONFIDENTIAL | 9
  • 10. TRADITIONAL VS. BIG DATA TRADITIONAL DATA BIG DATA Gigabytes to Terabytes Petabytes to Exabytes Centralised Distributed Structured Unstructured Known Relationships Complex, Undefined Interrelationships RECOMMIND PROPRIETARY & CONFIDENTIAL | 10
  • 11. MASSIVE GROWTH IN UNSTRUCTURED CONTENT Worldwide Corporate Data Growth 80% of Data Growth is Unstructured 45,000 40,000 35,000 Exabytes 30,000 25,000 20,000 15,000 10,000 5,000 0 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 Source: IDC The Digital Universe, Dec 2012 Structured Data Unstructured Data RECOMMIND PROPRIETARY & CONFIDENTIAL | 11
  • 12. WHAT BIG DATA IS NOT… NOW THEN Doing what you did before - just scaled up RECOMMIND PROPRIETARY & CONFIDENTIAL | 12
  • 13. BUT… You can do things now you could not do a few years ago because of: • New analytics techniques • Faster, more powerful computers • New architectures, such as the cloud RECOMMIND PROPRIETARY & CONFIDENTIAL | 13
  • 14. AGENDA  Big Data and the importance of analysing both structured and unstructured information  Role of the CIO in helping to alleviate risk & compliance issues within the enterprise  How to categorise, find, manage and analyse information from disparate repositories into one overarching platform RECOMMIND PROPRIETARY & CONFIDENTIAL | 14
  • 15. [1]Source: Horison Information Strategies RECOMMIND PROPRIETARY & CONFIDENTIAL | 15
  • 16. INFORMATION VALUE DECLINES OVER TIME, COST AND RISK DO NOT Risk-value delta Cost-value delta RECOMMIND PROPRIETARY & CONFIDENTIAL | 16
  • 17. SPECIFIC BIG DATA RISKS • Unmanaged file servers can pose legal and compliance risks • Unmanaged information represents a risk because it makes it hard to find • When litigation occurs, if information cannot be found, organisations may ultimately face court sanctions • Compliance risks - sensitive client information may reside on servers that are not managed may be misused, lost or even destroyed RECOMMIND PROPRIETARY & CONFIDENTIAL | 17
  • 18. BIG DATA OPPORTUNITIES RECOMMIND PROPRIETARY & CONFIDENTIAL | 18
  • 19. BIG DATA MARKET OPPORTUNITIES BY INDUSTRY Source: Gartner RECOMMIND PROPRIETARY & CONFIDENTIAL | 19
  • 20. BIG DATA INVESTMENTS BY INDUSTRY This Year Next Year Within 2 Years 17% 21% 15% 29% 11% 15% 17% 21% 15% 9% 11% 18% 17% 18% 12% 20% 18% 18% 12% 8% 39% 36% 36% 29% 31% 25% 21% 22% 23% 23% Source: Gartner RECOMMIND PROPRIETARY & CONFIDENTIAL | 20
  • 21. BIG DATA ANALYTICS - OPPORTUNITIES Recommendation Sentiment Marketing Campaign Fraud Engines Analysis Analysis Analytics Match and recommend Determine the how Improve accuracy of Identify fraudulent activity users to one another or to consumers feel about forecasting, prediction of and stolen credit cards products and services by particular buyer behavior by through active monitoring understanding profiles and companies, brands or reviewing increasingly of customer buyer behavior. products from Tweets and granular data, click behavior, historical and Facebook posts. streams, call details. transaction data. RECOMMIND PROPRIETARY & CONFIDENTIAL | 21
  • 22. FRAUD, WASTE AND ABUSE (FWA) IN HEALTHCARE According to a 2010 white paper by the US National Health Care Anti-Fraud Association (NHCAA)  The US Federal Bureau of Investigation (FBI) estimates that 3- 10% of $2.34 trillion spent on healthcare in 2008 was lost to fraud  Represents $70-$234 billion annually  $234 billion is roughly equivalent to the gross domestic product (GDP) of Finland Source: http://www.nhcaa.org/media/5994/whitepaper_oct10.pdf RECOMMIND PROPRIETARY & CONFIDENTIAL | 22
  • 23. BIG DATA ANALYTICS - OPPORTUNITIES Customer Network Contract Patent Churn Management Analysis Analysis Evaluate customer Ingest data from Mine large volumes of Comb through enormous behavior to identify servers, storage devices transactional data and volumes of text-based patterns that indicate and other hardware to documentation to information and prior art to which customers are most monitor network determine risk and assist in the development likely to leave for a activity, diagnose exposure of financial of new products, guide competing vendor. bottlenecks. assets. portfolio strategies. RECOMMIND PROPRIETARY & CONFIDENTIAL | 23
  • 24. MITIGATING BIG DATA RISKS THROUGH DEFENSIBLE DELETION RECOMMIND PROPRIETARY & CONFIDENTIAL | 24
  • 25. THE LIFECYCLE OF DATA & DEFENSIBLE DELETION RECOMMIND PROPRIETARY & CONFIDENTIAL | 25
  • 26. DEFENSIBLE DELETION: PIPE DREAM OR REALITY? • Survey by Enterprise Strategy Group in Q4 2012 • 253 business and IT professionals familiar with their organisation’s data disposition policies (all organisations currently dispose of data) - 36% IT professionals - 64% business professionals • Midmarket (100 to 999 employees) and enterprise-class (1,000+ employees) organisations - 32% midmarket - 68% enterprise-class • Multiple verticals RECOMMIND PROPRIETARY & CONFIDENTIAL | 26
  • 27. RESPONDENTS BY NUMBER OF EMPLOYEES How many total employees does your organisation have worldwide? (N=253) 100 to 249, 13% 20,000 or more, 21% 250 to 499, 10% 10,000 to 500 to 999, 9% 19,999, 13% 5,000 to 9,999, 8% 1,000 to 2,499, 13% 2,500 to 4,999, 12% © 2012 Enterprise Strategy Group RECOMMIND PROPRIETARY & CONFIDENTIAL | 27
  • 28. RESPONDENTS BY INDUSTRY What is your organisation’s primary industry? (Percent of respondents, N=253) Government (Federal/National, Sta te/Province/Local), 22 Other, 28% % Retail/Wholesale, 1% Manufacturing, 15% Health Care, 5% Communications & Financial Media, 6% Business Services (banking, securities, in (accounting, consultin surance), 12% © 2012 Enterprise Strategy Group g, legal, etc.), 10% RECOMMIND PROPRIETARY & CONFIDENTIAL | 28
  • 29. HOW ORGANISATIONS DISPOSE OF DATA Which of the following best describes the manner in which your organisation disposes of data? (N=253) Data is disposed of on an ad hoc basis, 20% We have a formal data disposition policy in place, 80% © 2012 Enterprise Strategy Group RECOMMIND PROPRIETARY & CONFIDENTIAL | 29
  • 30. DRIVERS BEHIND DATA DISPOSITION What are the biggest drivers behind your organisation’s data disposition? (N=253, multiple responses accepted) Improving overall data management for better future retrieval 66% Mitigating the risk of exposing sensitive/confidential data past its 58% retention mandate to potential future security breaches Reducing exposure to risk from future e-discovery/regulatory 56% productions Reducing costs of storing legacy data or records with third parties 56% Improving systems performance 50% Reducing costs of future e-discovery/regulatory productions 46% Reducing maintenance costs (i.e., OPEX) associated with storing 46% data volumes Reducing systems costs (i.e., CAPEX) associated with storing data 46% volumes 0% 10% 20% 30% 40% 50% 60% 70% © 2012 Enterprise Strategy Group RECOMMIND PROPRIETARY & CONFIDENTIAL | 30
  • 31. APPLICATION OF DATA RETENTION POLICIES Which of the following best describes your organisation’s application – or expected application – of data retention policies? (N=245) We have – or will have – retention policies or records 85% management in place for paper… We retain – or will retain – regulated data according to its 80% mandated retention schedule We preserve – or will preserve – 71% data under legal hold We have – or will have – retention policies or records 71% management in place for… © 2012 Enterprise Strategy Group 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% RECOMMIND PROPRIETARY & CONFIDENTIAL | 31
  • 32. GROUPS RESPONSIBLE FOR CREATION AND SETTING DATA DISPOSITION POLICIES Which of the following groups assist/are expected to assist in the creation of data disposition policies? Which group is/will be responsible for setting data disposition policies? (N=235, multiple responses accepted) Records management group 38% 78% Legal department/general counsel 21% Group that 77% 11% sets – or will IT 77% set – data Executive team 9% disposition 54% policies Business users 3% 51% All groups Compliance group 6% with input 49% into data Accounting or auditing firm 2% 31% disposition 2% policies Outside counsel 23% Service provider 2% 12% © 2012 Enterprise Strategy Group 0% 20% 40% 60% 80% 100% RECOMMIND PROPRIETARY & CONFIDENTIAL | 32
  • 33. GROUP RESPONSIBLE FOR EXECUTION OF DATA DISPOSITION POLICIES Which group is – or will likely be – responsible for the execution of data disposition policies (i.e., actually removing data from systems)? (N=235) Service provider, 1% Other, 2% Accounting or auditing firm, 1% Don’t know, 1% Legal department/general counsel, 2% Compliance group, 3% Business users, 4% IT, 49% Records management group, 38% © 2012 Enterprise Strategy Group RECOMMIND PROPRIETARY & CONFIDENTIAL | 33
  • 34. AMOUNT OF DATA DISPOSED ANNUALLY On average, approximately how much data would you estimate your organisation disposed on an annual basis? (N=137) 45% 41% 40% 35% 30% 27% 25% 20% 15% 15% 12% 10% 5% 4% 0% Less than 1 TB 1 TB to 5 TB 6 TB to 10 TB 11 TB to 25 TB More than 25 TB © 2012 Enterprise Strategy Group RECOMMIND PROPRIETARY & CONFIDENTIAL | 34
  • 35. PERCENT OF TOTAL AMOUNT OF DATA DISPOSED OF ANNUALLY On average, what percentage of your organisation’s total amount of data do you estimate is disposed on an annual basis? (N=171) 40% 37% 35% 30% 25% 25% 20% 16% 15% 11% 10% 9% 5% 2% 0% Less than 5% 5% to 10% 11% to 15% 16% to 20% 21% to 25% More than 25% RECOMMIND PROPRIETARY & CONFIDENTIAL | 35
  • 36. IMPACT OF FORMAL DATA DISPOSITION POLICIES How significant has the impact of formal data disposition policies been on cost savings and/or risk avoidance for your organisation? (N=203) Don’t know, 13% Very significant, 9% Too soon to tell, 13% Insignificant, 2% Significant, 39% Neither significant nor © 2012 Enterprise Strategy Group insignificant, 23% RECOMMIND PROPRIETARY & CONFIDENTIAL | 36
  • 37. AGENDA  Big Data and the importance of analysing both structured and unstructured information  Role of the CIO in helping to alleviate risk & compliance issues within the enterprise  How to categorise, find, manage and analyse information from disparate repositories into one overarching platform RECOMMIND PROPRIETARY & CONFIDENTIAL | 37
  • 38. CUSTOMER CASE STUDY – US DEPT. OF ENERGY RECOMMIND PROPRIETARY & CONFIDENTIAL | 38
  • 39. CASE STUDY – US DEPARTMENT OF ENERGY The Challenge We have thousands of users generating many records a day. How do we manage this information like an asset so that it can be useful and we comply with the government’s records management mandate? RECOMMIND PROPRIETARY & CONFIDENTIAL | 39
  • 40. EMAIL & RECORDS MANAGEMENT AT US DEPARTMENT OF ENERGY  Need to preserve history  Importance of vital records for continuity of operations if emergencies arise  Need to provide copies of records for legal actions or FOIA legal requests  Lack of motivation to categorize content RECOMMIND PROPRIETARY & CONFIDENTIAL | 40
  • 41. AUTOMATIC CATEGORISATION APPROACH Auto Categorization Uncategorized Journaling Content Drop-Off Library Categorized Content Organizer Categorized Mov e Site 1 Site 2 Site 3 Site 4 RECOMMIND PROPRIETARY & CONFIDENTIAL | 41
  • 42. IMPACT  Requires one system administrator/engineer & two people to manage the electronic records center – for 1,000 users  End users more productive due to no longer having to categorize content RECOMMIND PROPRIETARY & CONFIDENTIAL | 42
  • 43. EMAIL CATEGORISATION ACCURACY 100% 80% 60% Accuracy Average B a s e d R u l e - 40% 86% 20% 0% Administrative Notices Budget Records Customer Service IT Management Improvement Procurement Records Travel Records RECOMMIND PROPRIETARY & CONFIDENTIAL | 43
  • 44. SIMILAR USE CASES  Email compliance in financial services ˗ Email archiving capture emails from target employees ˗ Random sampling & manual review of emails ˗ Automatic sampling, initial review & assignment to senior reviewers is more cost and time efficient, accurate & defensible  Predictive coding in e-Discovery ˗ Predictive Sampling to estimate the percentage of responsive documents ˗ Predictive Analytics (Concepts, Phrases, Smart Filters) to find potentially relevant documents ˗ Complete iterative cycle until zero documents are computer-suggested or responsive ˗ Use Predictive Sampling to QC the non-reviewed documents  Predictive modelling in healthcare: ˗ Find at risk patients using guided data mining against a pre-built, validated predictive model for a specific issue such as hospital acquired conditions ˗ Predict the patients who should be isolated upon arrival, and the most reliable approach to screening RECOMMIND PROPRIETARY & CONFIDENTIAL | 44
  • 45. DIFFERENT USE CASES, DIFFERENT ROIs • Predictive Analytics Optimize • Operational Efficiencies Value • Business Intelligence Lower Costs • Storage Management • Personnel optimization • Operational efficiencies Minimize Risk • Security Breaches • eDiscovery Costs • Data Leakage • Regulatory Inquiries RECOMMIND PROPRIETARY & CONFIDENTIAL | 45
  • 46. CUSTOMER CASE STUDY – SWISS RE INSURANCE RECOMMIND PROPRIETARY & CONFIDENTIAL | 46
  • 47. SWISS RE - ACCESS, COMPLIANCE & EDISCOVERY  100s of TB data  Index once, use many  True 360 degree view of enterprise data  Based on CORE platform Custom-built apps NoSQL ENRICHED ANALYTICS INDEX DATABASE RECOMMIND PROPRIETARY & CONFIDENTIAL | 47
  • 48. PRODUCTS AND SOLUTIONS VERTICAL MARKETS ENTERPRISE APPLICATIONS 3rd Solutions Party NoSQL ENRICHED ANALYTICS CORE DATABASE INDEX PLATFORM ENTERPRISE DATA Databases Machine Office System Social ESI Email Web XML Data Documents Logs Media RECOMMIND PROPRIETARY & CONFIDENTIAL | 48
  • 49. WHAT MAKES CORE UNIQUE? Powerful and scalable indexing and retrieval FIND Keyword and language-agnostic machine learning Unstructured information “joins” CONNECT Unstructured data extraction & analytics ANALYSE Delivers ability to confidently act on data ACT RECOMMIND PROPRIETARY & CONFIDENTIAL | 49
  • 50. SUMMARY  Big Data and the importance of analysing both structured and unstructured information ˗ What it is ˗ What it is not ˗ Risks & opportunities  Role of the CIO in helping to alleviate risk & compliance issues within the enterprise ˗ Defensible deletion ˗ Categorization – US Dept of Energy  How to categorise, find, manage and analyse information from disparate repositories into one overarching platform ˗ CORE platform ˗ Swiss Re RECOMMIND PROPRIETARY & CONFIDENTIAL | 50
  • 51. THANK YOU – QUESTIONS? @nickpatience nick.patience@recommind.com RECOMMIND PROPRIETARY & CONFIDENTIAL | 51

Notas del editor

  1. Unmanaged file servers can pose legal and compliance risks and may cause vast disruption if a company is asked to produce documents to a court or for an internal enquiry and this is an essential starting point in that process. Unmanaged information also represents a risk because it makes it hard to find information – particularly when much of that information is unstructuredWhen litigation occurs, if information cannot be found, organisations may ultimately face court sanctions – or settle on punitive termsCompliance risks - sensitive client information may reside on servers that are not managed may be misused, lost or even destroyed.
  2. Who is answering this - ?
  3. How do we Preserve email in accordance with Departments records management policies and regulatory requirementsUp to 10k users with thousands of emails a day who’s emails are not being classifiedData everywhereOver 50,000 emails received a dayInconsistency classification when done manuallyLack of ownershipRequirementsEasy for employees to useComplies with Departments RM policiesAutomatically categorizes recordsOperates within the Departments information architectureIs easily modifiable to meet future needs