What’s the Difference Between Data Integration and Data Engineering?

What’s the Difference Between Data Integration and Data Engineering?

Sometimes I write a blog because I’ve learned something new that I’m eager to share.  And sometimes I write a blog because we’ve just done something enlightening in one of my classes or client exercises.  But sometimes I write a blog because I don’t know anything about
Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks Nearly every IT professional dreads unplanned downtime. Depending on which systems are hit, it can mean angry communications from employees and the C-suite and often a Twitterstorm of customer ire. See the recent Samsung SmartThings dustup for an example of how

Citizen Engagement Literacy

The term “engagement literacy” is not commonly-used at this moment, but it is a concept that bears greater attention in an age where personal data is king. Citizens and consumers now provide two currencies to the retailers and companies around them. The first is actual money, transferred either electronically or by hand, but the second, which has much greater value, is that of data. Data has far greater ability to shape the future of a vendor’s business, since it compounds quickly when added to, or compared with other data.

data education passwords

Consumers are generally not aware of the power of this data. Tracking technologies and data gathering techniques used by websites, many of which have been around for years, are largely ignored, as is password management. So let’s look at these two in the context of citizen engagement literacy.

Engagement through Password Literacy

Many of the hacks and cyber-attacks that happen daily can be traced to human nature, including inadequate password strength, phishing scams, or simply being too trusting. People also resist having to memorize or carry numerous passwords, especially when they are long strings of unintelligible characters. Entire papers are dedicated to this topic, but for the purposes of this article, the point is this: there are many sophisticated and often free password management applications available that can take care of the creation and maintenance of strong passwords. It is up to the citizens themselves to learn how to use these, with the same degree of comfort and habit as they would with their home alarm system. That comprises part of “literacy” in the digital age.

Engagement through Data Literacy

Data

In a related fashion, customers must become more aware of the data they share and the power they have over this data. Very soon, more and more retail stores will start to take advantage of smartphone-based apps to identify shoppers and enhance the in-store experience by making offers based on past browsing and purchasing activities. Sales associates may even greet shoppers by name. Some people feel this is too much, even invasive, but the point is, the individual consumer can and should exercise control over which data is made available and to whom. Apps and online profiles have privacy settings, but too often these appear complex and intimidating to the average user.

Engagement Literacy

Engagement literacy is a requirement for functioning in the wireless world. As a comparison, in the physical world, most people can read and drive a car. These abilities require training and practice to master, but most people find they are able to do both (and sadly, with texting, they feel they can do both simultaneously).

Engagement literacy is something that should be taught, and more importantly, is something that citizens must recognize as essential to maintaining personal control while enjoying the growing benefits of a highly tailored retail and service environment.PrescriptionMeds

When the day comes that the smartphone entirely replaces the wallet, for payment, ID, medical information, and loyalty programs, there should be no fear. Managing and protecting the data that this smart phone can hold, including mitigation in the case of loss or theft of the device itself, should be effortless, comfortable and well-practiced. That is what engagement literacy is: privacy, protection and control of data – all in the palm of your hand.

For more on this topic, please visit businessvalueexchange.com, sponsored by HP Enterprise Services.

By Steve Prentice

Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

TOP ARCHIVES

Avoiding the IOT ‘Twister’ Business Strategy

Avoiding the IOT ‘Twister’ Business Strategy

IOT ‘Twister’ Most organizations’ ‪ IOT Strategy look like a game of ‪ ‘Twister’ with progress across important IOT capabilities such as architecture, technology, ...
Remote Patient Monitoring – One of the Most Important Applications of IoT in Healthcare

Remote Patient Monitoring – One of the Most Important Applications of IoT in Healthcare

Remote Patient Monitoring The application of IoT in Healthcare services is bringing the paradigm shift in terms of how this ...
Using Cloud Analytics To Improve Customer Experience

Using Cloud Analytics To Improve Customer Experience

Evolution of Cloud Analytics Moving data to the cloud, once considered a strenuous task, has now become commonplace in most ...
Being relevant, leading and remaining differentiated in the era of AI

Being relevant, leading and remaining differentiated in the era of AI

In the previous post "Yes, AI could be smart enough to take your job," I mentioned that AI would affect the way ...
Working with security researchers to make the web safer for everyone

Working with security researchers to make the web safer for everyone

Working with security researchers What do a 19-year-old researcher from Uruguay, a restaurant owner from Cluj, Romania and a Cambridge ...
12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

Business Intelligence Companies and Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To ...
Cloud Concerns - Strong Passwords and Data Encryption

Cloud Concerns – Strong Passwords and Data Encryption

Strong Passwords and Data Encryption For all the concerns and buzz surrounding cloud computing, some companies are still not buying in. The benefits that come from using the cloud are already well documented, and while adoption rates have risen in ...

Cloud Community Supporters

(ISC)²
AWS
HPE
CA Technologies
Cisco

Cloud community support comes from sponsorship, service opportunities and collaborative network partnership initiatives.