<b>The Only Complete Technical Primer for MDM Planners, Architects, and Implementers</b><br /><br />Companies moving toward flexible SOA architectures often face difficult information management and integration challenges. The master data they rely on is often stored and managed in ways that are red
Enterprise master data management: an SOA approach to managing core information
✍ Scribed by Dreibelbis, Allen;Hechler, Eberhard;Milman, Ivan;Oberhofer, Martin
- Publisher
- IBM Press, Pearson plc
- Year
- 2008
- Tongue
- English
- Leaves
- 657
- Series
- IT Pro
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
The Only Complete Technical Primer for MDM Planners, Architects, and Implementers
Companies moving toward flexible SOA architectures often face difficult information management and integration challenges. The master data they rely on is often stored and managed in ways that are redundant, inconsistent, inaccessible, non-standardized, and poorly governed. Using Master Data Management (MDM), organizations can regain control of their master data, improve corresponding business processes, and maximize its value in SOA environments.
Enterprise Master Data Managementprovides an authoritative, vendor-independent MDM technical reference for practitioners: architects, technical analysts, consultants, solution designers, and senior IT decisionmakers. Written by the IBM(R) data management innovators who are pioneering MDM, this book systematically introduces MDM's key concepts and technical themes, explains its business case, and illuminates how it interrelates with and enables SOA.
Drawing on their experience with cutting-edge projects, the authors introduce MDM patterns, blueprints, solutions, and best practices published nowhere else--everything you need to establish a consistent, manageable set of master data, and use it for competitive advantage.
Coverage includes
How MDM and SOA complement each other Using the MDM Reference Architecture to position and design MDM solutions within an enterprise Assessing the value and risks to master data and applying the right security controls Using PIM-MDM and CDI-MDM Solution Blueprints to address industry-specific information management challenges Explaining MDM patterns as enablers to accelerate consistent MDM deployments Incorporating MDM solutions into existing IT landscapes via MDM Integration Blueprints Leveraging master data as an enterprise asset--bringing people, processes, and technology together with MDM and data governance Best practices in MDM deployment, including data warehouse and SAP integration
✦ Table of Contents
Cover......Page 1
Contents......Page 12
Foreword......Page 20
Foreword......Page 22
Preface......Page 24
Acknowledgments......Page 32
About the Authors......Page 34
1.1 Introduction to Master Data Management......Page 38
1.2.1 A Cross-LOB Perspective......Page 43
1.2.2 A Cross-Channel Perspective......Page 44
1.2.3 A Cross-Business Subdomain Perspective......Page 45
1.2.4 A Cross-Application/Technology Perspective......Page 46
1.2.5 Mergers and Acquisitions......Page 47
1.3 What Is a Master Data Management System?......Page 49
1.3.1 Master Data Domains......Page 50
1.3.2 Methods of Use......Page 52
1.3.3 System of Record vs. System of Reference......Page 60
1.3.4 Consistency of Data......Page 61
1.3.5 MDM Implementation Styles......Page 62
1.3.6 Categorizing Data......Page 69
1.4.1 Consistent Understanding and Trust of Master Data Entities......Page 74
1.4.2 Consistent Use of Master Data Across the Organization......Page 78
1.4.3 Accommodate and Manage Change......Page 84
References......Page 90
2.1 Overview......Page 92
2.2 Brief Introduction to SOA......Page 94
2.2.1 SOA Enterprise Architecture......Page 96
2.2.2 SOA Characteristics and Master Data Management......Page 101
2.3.1 Information as a Service, Introduction......Page 120
2.3.2 Information as a Service, Concept......Page 121
2.3.3 Information as a Service, Characteristics......Page 122
2.4.1 MDM as an SOA Enabler......Page 123
2.4.3 MDM and Evolvability, Flexibility, and Adaptability......Page 124
References......Page 127
3.1 Definitions and Terms......Page 130
3.2 Conceptual Architecture Overview......Page 135
3.2.1 Key Functional and Technical Capabilities......Page 138
3.3 MDM Conceptual Architecture......Page 143
3.4 Architecture Principles......Page 147
3.5 MDM Logical Architecture......Page 151
3.6.1 MDM Interface Services......Page 156
3.6.2 MDM Lifecycle Management Services......Page 158
3.6.3 MDM Data Quality Management Services......Page 160
3.6.4 MDM Authoring Services......Page 162
3.6.5 MDM Master Data Event Management Services......Page 164
3.6.6 MDM Hierarchy and Relationship Management Services......Page 166
3.6.7 MDM Base Services......Page 167
3.6.8 MDM Master Data Repository......Page 169
3.6.9 Information Integration Services......Page 171
3.6.10 Identity Analytic Services......Page 173
3.7 Component Relationship Diagram......Page 176
3.8 Master Data Management Component Interaction Diagrams......Page 178
3.8.1 MDM Collaborative Authoring Scenario......Page 182
3.8.2 MDM Operational Scenario—Transactional Interception for Updates......Page 185
3.8.3 MDM Operational Scenario—Federated Query......Page 188
3.8.4 MDM Coexistence Scenario—Information Synchronization......Page 190
3.8.5 MDM Scenario—Distribution of Updates via Batch Processing......Page 193
3.8.6 MDM Scenario—Data Governance......Page 195
3.8.7 MDM Scenario—Incremental Updates to a Data Warehouse......Page 197
Conclusion......Page 199
References......Page 203
4.1 Introduction......Page 204
4.2 Information Risk Management for Master Data......Page 206
4.2.1 Information Risk Management Overview......Page 207
4.2.2 Information Risk Management for Master Data Management......Page 211
4.3 Security Considerations in MDM......Page 216
4.3.1 Security in the Context of the MDM Reference Architecture......Page 217
4.3.2 Identity Propagation, Mapping and Provisioning......Page 218
4.3.3 Authorization......Page 221
4.3.4 Audit......Page 222
4.3.5 Data Protection......Page 223
4.4 Logical SOA Security Architecture......Page 224
4.4.1 Capabilities of a Security Reference Model......Page 225
4.5 Applying the Security Reference Model to MDM......Page 236
4.5.1 Security Requirements......Page 237
4.5.2 Business Security Services......Page 239
4.5.3 IT Security Services......Page 241
4.5.4 Security Enablers......Page 247
4.5.5 Security Policy Management......Page 248
4.5.6 Addressing Security Considerations with MDM Implementation Styles and Methods of Use......Page 249
4.6 Privacy......Page 250
References......Page 253
5.1 Introduction to Patterns......Page 256
5.2.1 Definition of Pattern......Page 258
5.2.2 Value of Patterns......Page 259
5.2.3 Types of Patterns......Page 260
5.2.4 Architecture Patterns......Page 261
5.3 MDM Architecture Patterns Overview......Page 263
5.3.1 Types of Architecture Patterns for MDM......Page 264
5.3.2 Architecture Pattern Overview......Page 266
5.3.3 Attributes of Architecture Patterns......Page 269
5.4 MDM Hub Patterns......Page 272
5.4.1 Registry Hub Pattern......Page 273
5.4.2 Coexistence Hub Pattern......Page 279
5.4.3 Transaction Hub Pattern......Page 286
5.4.4 MDM Hub Pattern Comparison......Page 290
5.4.5 High Availability and Disaster Recovery......Page 293
5.5.1 Introduction of Relevant Information Integration Patterns......Page 296
5.5.2 Effect of Information as a Service on Information Integration Patterns......Page 297
5.5.3 Initial Load Pattern......Page 298
5.5.4 Information Synchronization Patterns......Page 308
5.6.1 Transaction Interception Patterns......Page 313
5.6.2 ESB Pattern......Page 319
5.6.3 Messaging Pattern......Page 320
5.7 Enterprise System Deployment Patterns......Page 322
5.7.1 MDM-DW Integration Pattern......Page 323
5.7.2 MDM-BI Analytical System Integration Pattern......Page 327
5.7.3 MDM-CRM Integration and MDM-ERP Integration Pattern......Page 332
5.8 Pattern Selection and Pattern Composition......Page 339
Conclusion......Page 341
References......Page 342
6.1 Introduction to Master Data Management Solutions Blueprints......Page 344
6.2 Terms and Definitions......Page 345
6.3 New Product Introduction (NPI) Solution Blueprint for Consumer Electronics Industry......Page 347
6.3.1 Business Context......Page 348
6.3.2 Relevant Business Patterns......Page 353
6.3.3 Relation between Business Patterns and Architecture Patterns......Page 354
6.3.4 MDM Solution Blueprint Overview......Page 355
6.3.5 Advantages......Page 363
6.3.6 Alternatives and Possible Extensions......Page 364
6.4.1 Business Context......Page 365
6.4.4 MDM Solution Blueprint Overview......Page 372
6.4.6 Alternatives and Possible Extensions......Page 380
6.5.1 Business Context......Page 381
6.5.2 Relevant Business Patterns......Page 392
6.5.4 MDM Solution Blueprint Overview......Page 393
6.5.5 Security Aspects of MDM Deployments......Page 400
6.5.7 Alternatives and Possible Extensions......Page 405
References......Page 406
7.1 Introduction......Page 408
7.2.1 Business Context......Page 409
7.2.2 Relevant Business Patterns......Page 415
7.2.4 MDM Solution Blueprint Overview......Page 416
7.2.5 Advantages......Page 426
7.3.1 Business Context......Page 427
7.3.3 Relation between Business Patterns and Architecture Patterns......Page 432
7.3.4 MDM Solution Blueprint Overview......Page 433
7.3.6 Alternatives and Possible Extensions......Page 446
7.4.1 Business Context......Page 447
7.4.3 Relation between Business Patterns and Architecture Patterns......Page 450
7.4.4 MDM Solution Blueprint Overview......Page 451
7.4.5 Advantages......Page 459
7.4.6 Alternatives and Possible Extensions......Page 460
7.5.1 Business Context......Page 461
7.5.3 Relation between Business Patterns and Architecture Patterns......Page 468
7.5.4 MDM Solution Blueprint Overview......Page 469
Conclusion......Page 474
References......Page 475
8.1 Introduction to MDM Integration Blueprints......Page 478
8.2.1 Business Context......Page 479
8.2.3 Relation between Business Patterns and Architecture Patterns......Page 484
8.2.4 MDM Integration Blueprint Overview......Page 485
8.2.6 Alternatives and Possible Extensions......Page 491
8.3.1 Introduction......Page 492
8.3.2 Forces......Page 495
8.3.3 Only Using SAP UI for Master Data Authoring and Maintenance......Page 499
8.3.4 Only Using MDM UI for Master Data Authoring and Maintenance......Page 506
8.3.5 Comparison of the Four Integration Options......Page 510
8.3.7 Summary......Page 511
References......Page 512
9.1 Governance......Page 514
9.1.1 Case Study: JK Enterprises......Page 515
9.1.2 Governance in Related Disciplines......Page 517
9.1.3 Data Governance......Page 519
9.2 MDM Project Lifecycle and Data Governance......Page 526
9.2.1 Assessment and Planning......Page 527
9.2.2 Initial Rollout and Ongoing Support......Page 532
9.4.1 Introduction to Data Quality......Page 533
9.4.3 Data Quality Services......Page 535
References......Page 544
Appendix A: MDM User Roles......Page 546
A.1 User Roles for Solution Evaluation......Page 547
A.2 User Roles for Solution Development......Page 548
A.2.2 The Solution Architect......Page 549
A.2.3 The Developer......Page 551
A.2.5 Master Data Development......Page 553
A.3.2 The Operational Data Steward......Page 556
A.3.3 The Data Administrator......Page 558
A.3.5 The Auditor......Page 559
A.3.7 The IT Operator......Page 560
A.3.8 The Resilience Engineer......Page 561
A.3.9 The Administrator......Page 562
A.3.10 The Problem Analyst......Page 564
A.5 Relations between User Roles......Page 565
References......Page 569
Appendix B: Software and Solution Offerings for MDM Deployments......Page 570
B.3 External Data Providers......Page 571
B.6 Security......Page 572
B.8 Links to Relevant Homepages......Page 573
C.1 Introduction......Page 576
C.2 Regulations......Page 577
References......Page 595
Appendix D: Standards and Specifications......Page 596
A......Page 612
B......Page 614
C......Page 615
D......Page 617
E......Page 619
G......Page 620
I......Page 621
J......Page 623
M......Page 624
O......Page 628
P......Page 629
R......Page 630
S......Page 631
T......Page 632
V......Page 633
X......Page 634
A......Page 636
C......Page 637
D......Page 638
F......Page 640
I......Page 641
L......Page 643
M......Page 644
O......Page 646
P......Page 647
R......Page 649
S......Page 650
T......Page 653
Z......Page 654
📜 SIMILAR VOLUMES
Information and its management is central to modern society. Organizations – private and public, national and international – have recognized that information is a key resource and that its management is critical for success. Existing books on information management focus on the abilities of com
Content: <br>Preface</span></a></h3>, <i>Pages xiii-xviii</i><br>1 - Introduction</span></a></h3>, <i>Pages 1-24</i><br>2 - Who owns information?</span></a></h3>, <i>Pages 25-46</i><br>3 - Data quality in practice</span></a></h3>, <i>Pages 47-72</i><br>4 - Economic framework of data quality and the
In an increasingly digital economy, mastering the quality of data is an increasingly vital yet still, in most organizations, a considerable task. The necessity of better governance and reinforcement of international rules and regulatory or oversight structures (Sarbanes Oxley, Basel II, Solvency II,
<p><span>Unsure of how or where to get started with Azure API Management, Microsoft’s managed service for securing, maintaining, and monitoring APIs? Then this guide is for you. Azure API Management integrates services like Azure Kubernetes Services (AKS), Function Apps, Logic Apps, and many other
<p><span>Unsure of how or where to get started with Azure API Management, Microsoft’s managed service for securing, maintaining, and monitoring APIs? Then this guide is for you. Azure API Management integrates services like Azure Kubernetes Services (AKS), Function Apps, Logic Apps, and many other