Part 2 of my guest blog post for ShellBlack.com
The scenario described in our previous blog post on analyzing data during a migration tells a very realistic story of a user just trying to get her job done while challenged with capturing required information for management. There was no malice or ill-conceived attempt to sabotage the company’s data, but nevertheless the data that resulted from that scenario had very little value. It requires a little care and effort to extract out what is valuable and to leave behind all that is not.
So let’s discuss some ways to identify and manage some of the more common data entry issues I find while performing data migration analysis.