Contact Info

One Campus Martius

Phone: 1-800-COMPUWARE

Web: compuware.com

In the below posts, learn how data on the mainframe spans a spectrum of interrelated concepts, from protection to management to visualization, among a variety of others. Each of these areas are able to work in tandem to improve the many facets of an organization that customers’ personal information is associated with.

Considering we’re in the era of Big Data, where personal information continues to increase in size and depth, organizations must remain vigilant in finding ways to improve management of people’s personal information by employing a means to efficiently categorize and track interrelationship between datasets. On another level, organizations must stay prepared to comply with new privacy laws that governments are increasingly updating to stricter standards that significantly improve privacy and deter internal and external breaches.

Whether your organization seeks a method for improving data management, such as using a solution that offers visualization, or how it maintains security, we recommend staying in the loop by reading some of the educational content below.

Application Auditing: How to Prevent Internal Data Breaches

By | April 4th, 2016|Agile Dev, App Performance, Data, Security|

If a breach happens after a review of access to data assets, you need to identify the employees involved and resolve it as quickly as possible. Your ability to respond in reasonable time will be considered when penalties are decided for the General Data Protection Regulation (GDPR), so it’s a wise move to consider how quick response time can be achieved.

Comments Off on Application Auditing: How to Prevent Internal Data Breaches

Exit Strategies: Why Not Use the Best?

By | March 28th, 2016|Agile Dev, COBOL, Code Quality, Data, DevOps|

Here at Compuware we converted from CA Endevor to ISPW for our Source Code Management (SCM). I noticed right away that ISPW used a superior way to implement exits. You simply go to a panel and select the exit you need to modify from a list of all available exits. This is important because there is no hunting around to find the exits—they are all listed.

Comments Off on Exit Strategies: Why Not Use the Best?

Application Testing: How Can You Ensure Secure Testing by Your Outsourcer?

By | February 16th, 2016|Agile Dev, App Performance, Data, DevOps, Security|

The General Data Protection Regulation (GDPR) is increasingly causing headaches for senior IT management. In the media the main focus is on consent, but there are many other areas that need attention. One of them is testing.

Comments Off on Application Testing: How Can You Ensure Secure Testing by Your Outsourcer?

Five Big Mistakes You Can Make with Big Data

By | October 6th, 2014|Data|

There's a lot of talk and hype about Big Data and with that comes confusion and mistakes. Here are five big mistakes you can make when starting a Big Data initiative. Ignore the source of your data. Don't pay attention to the origins of your data; it will just slow [...]

Comments Off on Five Big Mistakes You Can Make with Big Data

3 Big Data Lessons from a “Big 3” Company – Ford

By | February 24th, 2014|Data|

In a recent interview from Gigaom Structure Show podcast, Ford Data Science Leader, Michael Cavaretta discussed lessons learned in harnessing the power of big data, (large complex data sets requiring advanced processing), and how to best put it to use. “Big data” at Ford can mean anything from data coming [...]

Comments Off on 3 Big Data Lessons from a “Big 3” Company – Ford