ABSTRACT

The key to mitigating this potential threat is to follow the guidelines in requirement 4, above, and make sure the technology selection team understands the need for integration. Most of the organizations I discussed this with take the time to map out their business workflows and ask at every step, “Do we need data integration here or not?”