Business Rules – February 2009
Data professionals are prone to equating “integrity constraint” with “business rule.” Are they the same? Probing deeper, it’s generally accepted…
Data professionals are prone to equating “integrity constraint” with “business rule.” Are they the same? Probing deeper, it’s generally accepted…
Bill Lewis describes a model for application requirements based on a bill-of-materials metamodel.
This is a complete review of the book The Last Lecture by Randy Pausch. This review is written by the…
Reference data is the Rodney Dangerfield of the data world – it gets no respect. However, it is feared. Malcolm…
Craig Mullins reviews the DBMS marketplace during the fourth quarter of 2008.
When playing the role of analyst, architect or modeler, it is important to distinguish structured data from unstructured data because…
Larry Burns describes Agile Development and discusses the positive advantages of this approach to application development.
This article discusses how IT organizations face challenges when data volume explodes and how grid technology has proven to be…
Bob Dominko looks at what we can expect in 2009 for the wireless and digital industries.
This article provides advice for recruiting IT professionals.