The Important Difference Between Data and Information

b2ap3_thumbnail_information_data_400.jpgYou can’t have IT without information, you can’t have information without data, and technology is what creates data so that you can better use your company’s technology to increase sales. Got it? Understanding the flow of data can be confusing. It’s important to have a handle on it so you can leverage your data for the success of your business.

First off, we have to mention that most businesses use the two terms “data” and “information” interchangeably. This is true for White Mountain IT Services and it’s an acceptable practice within the industry, especially for marketing purposes. Although, to get technical about it, there’s a significant difference between the two terms.

Essentially, data is raw numbers collected by technology. Data looks like a bunch of ones and zeros, and if one were to read data, it would make zero sense. Subsequently, information is data that’s been processed and interpreted so that meaning can be attributed to it. Once you, the business owner, understand the meaning of the provided information, you can use the information to make informed decisions for your business.

This is why it’s so important that your company’s data-collection process is sound. Otherwise, your information may not be accurate, which will in turn lead to poor decision making. As you can imagine, how data goes from a seemingly-random number to become helpful information used to direct your organization, can be a bit of a process. If just one aspect of this process is weak, so will the end result.

One way to view this data-transformation process is with the DIKW Pyramid. This is a four-tier pyramid where wisdom is on the top and data at the bottom.

dikw pyramid

Business 2 Community provides us with a salad metaphor to describe the DIKW pyramid levels.

  • Data: I have one item. The data displays a 1, not a zero.
  • Information: It’s a tomato. Now, we understand the item and its characteristics.
  • Knowledge: A tomato is a fruit. We can identify patterns in the information and apply them to the item.
  • Wisdom: Tomato is never added to a fruit salad. There is an underlying, commonly understood principle that governs the item’s purpose.

B2C goes on to say that “bad data costs time and effort, gives false impressions, results in poor forecasts, and devalues everything else in the continuum.” You can see why it’s in your company’s best interest to place a high priority on having data quality software that ensures your data is as reliable as possible.

Additionally, if your servers and computers are functioning properly and your company’s communications are efficiently mapped out, there will be less chance of leaking and corrupting corporate data. As you can tell from the DIKW pyramid, if something were to happen to your data, you’d lose your company’s foundation. White Mountain IT Services can help meet both of these concerns with our managed IT services and our Backup and Disaster Recovery solution. Call us at 603-889-0800 to learn more.

Related Articles

  • Could You Spot a Social Engineering Attack? As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources, as we will review later. If your business and its ...
  • Tip of the Week: Prime Your Business for a Successful 2019 As 2018 progresses, certain technologies and implementations are becoming more prominently used by businesses. These trends are anticipated to continue, so it only makes sense to embrace these technologies sooner rather than later. Today, we’ll review some of these technologies, why they are expecte...
  • What To Do When You’ve Had Enough of Your Broken Technology Chances are that you’ve dealt with the following scenario: You are working along fine and you try to open an application only to be rebuked by an error message on the screen that tells you that there is some type of critical error. You close that out hoping that it was a one-time exception, but nope...
  • Tip of the Week: How Small Business Goes About Utilizing Tec... No matter how big a business is, it has to leverage at least some IT in order to be efficient. Unfortunately, some organizations are reluctant to implement new technology if they don’t seem to need it immediately. What these businesses don’t know is that the reason they typically don’t implement new...
  • The Future of IT; 2019 is The Year Your Business Hires a Man... Chances are that if you are a business owner that has been in business for a decade you’ve seen how emerging technologies have changed the face of business. Technologies like cloud computing have opened up opportunities for many businesses to get the powerful computing infrastructures they need with...
  • Help! My Staff Hates My Company’s IT! Fellow business owners, do you ever feel like you need to walk around on eggshells when it comes time to implement a new process or policy with your employees? Does it seem like your staff fights back tooth and nail when there is any technology change or IT restriction? You aren’t alone. More oft...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.



White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064


 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions