There are many ways to describe the basic elements needed for trusted data discovery. I find I often look at this topic through two simples lenses. One is that of the BI administrator or IT owner of the BI landscape. What do they need to feel they have provided the best BI system for their business users whilst keeping the overall costs low and the maintaining their legal and regulatory obligations? The other lens is that of the business user. What do they need to do their job with analytics? To be able to find the right information or trust the results of a visualisation, report or dashboard?
We can explore these needs in more detail by breaking them down further and focusing them within the context of SAP Lumira:-
For BI administrators
– Enterprise readiness – the ability to deploy Lumira within the context of their existing managed and governed BI environments (LCM, administration, monitoring, etc).
– Governance – the ability to control who can do what with Lumira (authorization) and to track who has done what and when (audit), also includes data loss prevention.
– Operationalize content – the ability to ‘harden’ user generated content and promote and approve this to ‘trusted and governed’ status.
For Lumira Users
– Discovery – the ability to find and explore trusted data and content, from existing trusted IT sources such as SAP BW or an existing universes to other BI data sources such as reports and infospaces.
– Enrich, extend and expand – the ability to understand, format and model data in a way that is useful to them and that captures the operations performed and re-uses trusted entities.
– Trust – the ability to trust the data in existing Lumira content. Is this number from a trusted source? If not where is it from and how was it ‘created’ (lineage).
Some of these topics we can do today, some are coming very soon to SAP Lumira and others are a little further out. Future posts will take a look at what we can do today with SAP Lumira to give you a Trusted Data Discovery landscape.
Note: this is a follow on post to my previous blog post on Trusted Data Discovery