Podcast: How to craft an effective MDM strategy

In this podcast interview, Andy Hayler gives advice on how to create and implement an MDM strategy that is ruthlessly focused on business value.

Corporate organisations in the UK are being compelled to develop information management strategies that give them better views of their customers and help them make better use of their data assets and meet new compliance regimes.

But where to start? How should organisations develop master data management programme strategies and MDM technology plans? How can you create an MDM programme that is ruthlessly focused on business strategy? And how to build an intra-organizational political consensus that will make the programme more likely to succeed?

In this podcast Andy Hayler, the CEO and co-founder of analyst firm The Information Difference, talks to Brian McKenna, news and site editor, SearchDataManagementUK.

Play now:
Download for later:

Andy Hayler on business trained MDM

  • Internet Explorer: Right Click > Save Target As
  • Firefox: Right Click > Save Link As

 

Andy Hayler is co-founder and CEO of analyst firm The Information Difference and a regular keynote speaker at international conferences on MDM, data governance and data quality. He is also a respected restaurant critic and author (see www.andyhayler.com).

This was last published in May 2012

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Master data management (MDM) and integration

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close