Home Applications Don’t be a Big Data ostrich

Don’t be a Big Data ostrich

Don’t be a Big Data ostrich

About 10 years ago, I was working with two military sister organizations on some Knowledge Management projects. Both of these organizations had the same basic problem: unknown content everywhere, an enterprise content management system with unfindable content, and no ability to discover content to be routed to the content system. It wasn’t until we dug into the content that we uncovered a much BIGGER issue: unsecured personally identifiable information (PII). Each organization handled the outcome very differently and to this day it baffles me.

During the ingestion of the documents from the file systems, we put into place a data interrogation step.  During this step, the documents would automatically be scanned for social security numbers, credit card numbers and contract numbers. If any of these items were found, they were tagged and then ingested into the Big Data engine.

While we were ingesting the data, we were also working with the commanders on marketing the system, setting expectations, planning end user training and answering questions. The most asked question was “you aren’t going to be ingesting my hard drive, are you?” We assured the employees that we were not indexing their local hard drives and only the public file systems. This eased their mind as they knew everyone had access to the public folders.

Read the entire article here, Don’t be a Big Data ostrich

via the fine folks at HP Enterprise.

HP Enterprise Hewlett Packard Enterprise is an industry leading technology company that enables customers to go further, faster. With the industry's most comprehensive portfolio, spanning the cloud to the data center to workplace applications, our technology and services help customers around the world make IT more efficient, more productive and more secure.

Featured Resources:

Related Articles:


White Papers

    Application Lifecycle Management with Stratusphere UX – White Paper

    Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users […]


      Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

      Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

      On-Demand Webinars

        What’s Going on in EUC Printing – A Technical Deep Dive!

        The IGEL Community and ThinPrint invite you to watch the following technical deep dive webinar. The agenda is to technically bring you up to speed on what’s going on in the EUC Printing space today along with a deep dive into new methods, technologies, printing scenarios and a discussion on why printing still matters. You […]

        Latest Videos

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win big $$, visit ITBaller.com for more info!

          Visit Our Sponsors