Information Management

What is Information Management?

Information management (also IM) concerns a cycle of organizational activity: the acquisition of data, information, applications, and services from one or more sources, the custodianship and the distribution of that data, information, applications, and services to those who need it, and its ultimate disposition through archiving or deletion.

Information Management Up Until Now

Matching Demand for Services with the Availability of Services

Until 2017, Information Management has mainly focused on the IT department visiting business departments and doing an inventory of their issues, needs, and requirements concerning data, information, applications, and services.

Based on the results of the inventory of data, information, applications, and services, new ones were realized, and obsolete ones were abandoned. Yearly, the planning was made for when data, information, applications, and services were acquired or built and when they would be implemented or provided to users.

This often led to long waiting times for the business, and they often did not get what they wanted. If the waiting times took too long, they sometimes bought a solution that did not fit the corporate standards and was hard to integrate with the rest. Ultimately, it causes technical debt, cost explosions, unnecessary complexity, and other risk-increasing aspects.

Dragon1 can be used perfectly to inventory data, information, applications, and services and design, develop, implement them, and monitor their usage, incidents, and issues.

BISL is a framework for Information Management. Dragon1 supports working with BISL.

SaaS, Cloud and Virtualization as New Technologies

Information Management from now on does not have anymore these long waiting times. New technologies like SaaS, Virtualization, and the Cloud have allowed new data, information, applications, and services to be tried, tested, implemented, and provided within minutes, hours, or days. This enabled iterations with the business on what they needed, which was impossible.

The cloud can be seen as a flexible network provided via the Internet that can be scaled up in no time: if you want extra computers, storage, or servers, order them, and seconds later, they are available.

Virtualization can be seen as software versions of hardware. If you have one physical server and you install software on it, that physical server can emulate thousands of physical servers.

SaaS can be seen as Software as a Service. If you want a new CRM system, HR system, or Stock Inventory system, create an account on a website, log in, and have your new system.

These three technologies enable fast, scalable, and reliable professional IT infrastructure for small and large enterprises.

Currently, every organization is or should be moving all of its IT to the cloud, taking security into account. However, not moving to the cloud will put your company behind its competitors.

Big Data and Artificial Intelligence

Today, we do not have to delete data anymore. Data storage is so cheap we can archive everything we would like. This enables a new concept called Data Lakes: an unstructured huge set of archived data. Having tons of data enables you to do data mining and search for patterns you can use to make better decisions.

Artificial Intelligence (AI) or Machine Learning is another new technology. AI is about using (instant or historical) knowledge of the behavior of humans/users to hint and guide them directly or indirectly. And, of course, data lakes can be used for this and everything we know about people's behavior. Think of Artificial Intelligence as the second pair of brains you get with an IQ of 200.

Dragon1 supports data mining and discovering the possibilities of artificial intelligence by designing new services for the organization.


Cyber Security is Information Management Security

The downside of innovation and technologies is that criminals get smarter. One of the things that every company in the world is facing is cybercrime. Constantly, criminals are trying to enter your computer systems and steal your data or disrupt your operations.

Dragon1 supports cybersecurity by enabling you to design and implement security business processes, information systems, and IT infrastructure using enterprise architecture. This ensures security at a mature level and that all security principles are implemented effectively.

GDPR for Information Compliance

GDPR: General Data Protection Regulation is also important to mention here. From now on, we need to clarify the data type and which system to use. If certain data is sensitive, like personal client data, that data may not be stored in certain systems or exchanged with certain parties. How you are going to handle client data has to be transparent under the order of GDPR.

Dragon1 supports working with GDPR and even extends it. You can create or generate visualization showing what type of data is in which type of system and if that complies or breaches certain regulations.

Read Also

On Wikipedia you can read more about Information Management solutions

Here we have a page on the Information Management definition and Data Mining definition.

Architecting Solutions

DEMO: Concept Mapping Software

How to use Dragon1 EA Tool

Learn to generate architecture diagrams using repositories
DEMO: BPMN Onboarding Process Example

DEMO: BPMN Onboarding Process Diagram - Measure Rules Compliance

Manufacturing, Financial Solutions
DEMO: Enterprise Architecture Blueprint Template

DEMO: Generate an Enterprise Architecture Blueprint to discover and solve RISK

Banking, Logistics, Healthcare
DEMO: Data Mapping Software

DEMO: Generate Application Landscape for SECURITY

Automotive, Financial Services, Health Care
DEMO: Strategy Mapping Software

DEMO: Generate Strategy Map for CLOUD ADOPTION

Government, Logistics, Banking
DEMO: Process Application Map

DEMO: Generate Process Application Landscape for RPA

Retail, Agriculture, Energy, Oil & Gas