Epunchng - Most read newspaper in Nigeria Nov 30 2017 | Page 3
Gadget smart
With
THURSDAY, NOVEMBER 30, 2017
3
09080019063
[email protected]
Ife Ogunfuwa
Five steps in data cleansing process
• Source: www.informatica.com
D
ATA cleansing is hard to do, hard to maintain, and
hard to know where to start. There seem to always
be errors, dupes, or format inconsistencies. One of the
most challenging aspects of data cleansing has got to
be maintaining a clean list of data, whether it’s sourced
from multiple vendors or manually entered by your hard-
working interns, or a combination of both.
According to www.salesify.com, one mistype could
create a whole myriad of problems within your database,
and can lead to hours upon hours of manual cleansing that
could so easily have been avoided. So, what is the solution
to these frustrating, time-consuming problems?
A simple, five-step data cleansing process that can help
you target the areas where your data is weak and needs
more attention. From the first planning stage up to the
last step of monitoring your cleansed data, the process
will help your team zone in on dupes and other problems
within your data. What’s important to remember about the
five-step process, is that it’s a continuous cycle. So you can
start small and make incremental changes, repeating the
process several times to continue improving data quality.
Plan
Firstly, you want to identify the set of data that is
critical for making your marketing efforts the best they
can possibly be. When looking at data you should focus
on high priority data, and start small. The fields you will
want to identify will be unique to your business and what
information you are specifically looking for, but it may
include: job title, role, email address, phone, industry,
revenue, among others.
It would be beneficial to create and put into place specific
validation rules at this point to standardise and cleanse the
existing data as well as automate this process for the future.
For example, making sure your postal codes and state codes
agree, making sure the addresses are all standardised the
same way, and so on. Seek out your IT team members in
help with setting these up! They are more help than just
deleting a virus!
Analyse to cleanse
After you have an idea of the priority data your company
desires, it’s important to go through the data you already
have in order to see what is missing, what can be thrown
out, and what, if any, are the gaps between them.
You will also need to identify a set of resources to handle
and manually cleanse exceptions to your rules. The amount
of manual intervention is directly correlated to the amount
of acceptable levels of data quality you have. Once you
build out a list of rules or standards, it’ll be much easier to
actually begin cleansing.
#Takeaway
Keylogger
A
keylogger is a programme that records the keystrokes
on a computer. It does this by monitoring a user’s
input and keeping a log of all keys that are pressed.
The log may be saved to a file or even sent to another
machine over a network or the Internet, www.techterms.
com says.
Keylogger programmes are often deemed spyware
because they usually run without the user knowing it.
They can be maliciously installed by hackers to spy on
what a user is typing.
By examining the keylog data, it may be possible
to find private information such as a username and
password combination. Therefore, keyloggers can be a
significant security risk if they are unknowingly installed
on a computer.
The best way to protect yourself from keylogger
programmes is to install anti-virus or security software
that warns you when any new programmes are being
installed. You should also make sure no unauthorised
people have access to your computer. This is especially
true in work environments. You can also periodically
check the current processes running on your computer to
make sure no keyloggers or other malware programmes
are active. While it is unlikely that you have a keylogger
programmes installed on your computer, it is definitely
worth it to check.
Implement automation
Once you have started clean, you should begin to
standardise and cleanse the flow of new data as it enters the
system by creating scripts or workflows. These can be run
in real-time or in batch (daily, weekly, monthly) depending
on how much data you’re working with. These routines
can be applied to new data, or to previously keyed-in data.
Append missing data
Step four is important, especially for records that cannot
be automatically corrected. Examples of this are emails,
phone numbers, industry, company size, among others.
It is important to identify the correct way of getting
a hold of the missing data, whether it’s from 3rd party
append sites, reaching out to the contacts or just via good
old-fashioned Google.
Monitor
You will want to set up a periodic review so that you can
monitor issues before they become a major problem. You
should be monitoring your database on a whole as well as
in individual units, the contacts, accounts, and so on. You
should also be aware of bounce rates, and keep track of
bounced emails as well as response rates.
It is important to keep up-to-date with who is working
at the company; so if a customer does not reply to any
campaign in more than six months, it’s a good idea to dig
a little deeper and make sure that that person still holds
that position, is still at that company, or quite frankly,
depending on how well you’ve maintained the database,
hasn’t already kicked the bucket.
The end of this cycle, or step six if you will, is to bring
the whole process full circle. Revisit your plans from the
first step and re-evaluate. Can your priorities be changed?
Do the rules you implemented still fit into your overall
business strategy?
Pinpointing these necessary changes will equip you to
work through the cycle; make changes that benefit your
process and conduct periodic reviews to make sure that
your data cleansing is running with smoothness and
accuracy.
Follow this cycle and you’ll be well on your way to having
the cleanest and thus most effective data.