The 6 “V’s” of Data

The 6 “V’s” of Data

The amount and variety of data is accelerating in most businesses at almost an exponential rate, largely driven by digital transformation initiatives as well as dealing with all the legacy data, both physical and digitized.

In a world where data is everything and for all intense and purposes has always been everything, the ability to handle it for business benefits as well as areas such as compliance and security have increased in priority.

Looking at all aspects of data can be summarised as follows based on six V’s, and potentially might serve useful in your on-going and future initiatives.

Volume

The shear amount of data now entering a business has to be reviewed in order to scope out how to handle it, as it now comes from many sources both internally and externally

Velocity

The speed at which it is arriving is becoming unprecedented and the ability to cope with this needs to be reviewed, especially in the light of faster networks and projects such as edge, IOT, AI, etc.

Variety

They types of data is increasing from unstructured, structured and object, when did you last review how different types of formats exist within your business

Veracity

Understanding the dependency to other existing or potentially additional data, needs to be considered in order to make it more meaningful, in areas such as trends, analytics, and various other models

Value

Data in many instances can decline in importance and potential value but still needs to be kept for compliance reasons and future audits and as such, this may have an impact on how its is dealt with and kept.

Validity

Is the data actually reliable and can it be validated from the source it comes from as the decisions based on this could be badly affect business considerations, the old phrase that still is true Garbage In Garbage Out.

Pulsant offers a variety of services from connectivity, edge computing, data centre services, hybrid clouds and cyber security, that can assist in how you handle data to help shape and grow your business.

要查看或添加评论,请登录

Karl Fontanari的更多文章

  • Units of Data Storage

    Units of Data Storage

    The units of data storage are not finite but their current definitions are, thought it would be interesting to post…

  • Zero Trust "never trust, always verify,"

    Zero Trust "never trust, always verify,"

    Implementing a detailed Zero Trust strategy in cybersecurity involves a comprehensive approach to securing an…

  • Open Source v Closed Source

    Open Source v Closed Source

    The debate between open source and closed source (proprietary) software has been ongoing in the software development…

  • Mainframe Modernization

    Mainframe Modernization

    I have been working on, selling to and generally living with Mainframe through my various roles for many decades…

    6 条评论
  • Is Cloud for everyone?

    Is Cloud for everyone?

    While many organizations continue to adopt and expand their use of cloud computing, some may choose to move back from…

  • Fundamentals of effective Data Storage Management

    Fundamentals of effective Data Storage Management

    Data storage management refers to the processes, policies, and technologies used to effectively store, organize…

  • Why IBM Power?

    Why IBM Power?

    IBM Power Systems, commonly referred to as IBM Power, is a family of server products that are built on IBM's POWER…

  • 13 Cyber Security Cloud Challenges

    13 Cyber Security Cloud Challenges

    Cyber security challenges around public cloud environments have become increasingly complex due to the widespread…

  • What is “Edge Computing”?

    What is “Edge Computing”?

    The ‘Edge’ refers to having computing infrastructure closer to the source of data. It is the distributed framework…

    3 条评论
  • 6 R's of Cloud Migration

    6 R's of Cloud Migration

    Why Move an Application to the Cloud? There are three typical drivers for undertaking the effort of migrating an…

社区洞察

其他会员也浏览了