Aligning MDM and BPM for Master Data Governance, Stewardship, and Enterprise Processes Aligning MDM and BPM for Master Data Governance, Stewardship, and Enterprise Processes

Aligning MDM and BPM for Master Data Governance, Stewardship, and Enterprise Processes

Publisher Description

An enterprise can gain differentiating value by aligning its master data management (MDM) and business process management (BPM) projects. This way, organizations can optimize their business performance through agile processes that empower decision makers with the trusted, single version of information.

Many companies deploy MDM strategies as assurances that enterprise master data can be trusted and used in the business processes. IBM® InfoSphere® Master Data Management creates trusted views of data assets and elevates the effectiveness of an organization's most important business processes and applications.

This IBM Redbooks® publication provides an overview of MDM and BPM. It examines how you can align them to enable trusted and accurate information to be used by business processes to optimize business performance and bring more agility to data stewardship. It also provides beginning guidance on these patterns and where cross-training efforts might focus.

This book is written for MDM or BPM architects and MDM and BPM architects. By reading this book, MDM or BPM architects can understand how to scope joint projects or to provide reasonable estimates of the effort. BPM developers (or MDM developers with BPM training) can learn how to design and build MDM creation and consumption use cases by using the MDM Toolkit for BPM. They can also learn how to import data governance samples and extend them to enable collaborative stewardship of master data.

GENRE
Computers & Internet
RELEASED
2013
March 2
LANGUAGE
EN
English
LENGTH
212
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
4.8
MB
Enhance Inbound and Outbound Marketing with a Trusted Single View of the Customer Enhance Inbound and Outbound Marketing with a Trusted Single View of the Customer
2015
Building 360-Degree Information Applications Building 360-Degree Information Applications
2014
Implementing an Advanced Application Using Processes, Rules, Events, and Reports Implementing an Advanced Application Using Processes, Rules, Events, and Reports
2012
Patterns: Integrating WebSphere ILOG JRules with IBM Software Patterns: Integrating WebSphere ILOG JRules with IBM Software
2011
Modernizing IBM i Applications from the Database up to the User Interface and Everything in Between Modernizing IBM i Applications from the Database up to the User Interface and Everything in Between
2015
IBM DB2 Web Query for i: The Nuts and Bolts IBM DB2 Web Query for i: The Nuts and Bolts
2017
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009
Data Governance Essentials: Importance, Approach, and Roles Data Governance Essentials: Importance, Approach, and Roles
2023
Building Cloud Apps with Microsoft Azure Building Cloud Apps with Microsoft Azure
2014
Agile Project Manager’s Tool Kit Agile Project Manager’s Tool Kit
2014
Microsoft Azure Essentials Azure Automation Microsoft Azure Essentials Azure Automation
2015
Managing Risk and Information Security Managing Risk and Information Security
2013
Finance: Cloud Computing, Cyber Security and Cyber Heist Finance: Cloud Computing, Cyber Security and Cyber Heist
2015