What Happens When Your Cyber Defenses Are Breached?
It’s past time for a comprehensive data security strategy Information Security professionals tend to focus on network, cloud, application, and…
Data Architecture Articles
It’s past time for a comprehensive data security strategy Information Security professionals tend to focus on network, cloud, application, and…
In 2006, the world learned an inconvenient truth. The planet we call “home” was getting hotter and we were to…
“Technical debt” refers to the implied cost of future refactoring or rework to improve the quality of an asset to…
“First thing we do, let’s banish all of the CIOs.” Too harsh? Shakespeare was much harder on lawyers. But the…
Data Mesh and Data as a Product In the first article, I introduced and explained the approach to application development…
MDD and Analysis vs. Code Models In the first article, I introduced and explained the approach to application development called…
Canonical Data Models and Overlapping Connections In the previous article, I introduced and explained the approach to application development called…
Data is considered by some to be the world’s most valuable resource. Going far beyond the limitations of physical resources,…
The notorious SolarWinds hack of 2020 sent shock waves across the software as a service world. In the attack, hackers…
Bounded Contexts / Ubiquitous Language My new book, Data Model Storytelling,[i] contains a section describing some of the most significant…