NoSQL and Multi-Model Database Use Cases
NoSQL database systems continue to gain traction, but they are still not widely understood. There is more than one type…
Data Architecture Articles
NoSQL database systems continue to gain traction, but they are still not widely understood. There is more than one type…
It’s past time for a comprehensive data security strategy Information Security professionals tend to focus on network, cloud, application, and…
In 2006, the world learned an inconvenient truth. The planet we call “home” was getting hotter and we were to…
“Technical debt” refers to the implied cost of future refactoring or rework to improve the quality of an asset to…
“First thing we do, let’s banish all of the CIOs.” Too harsh? Shakespeare was much harder on lawyers. But the…
Data Mesh and Data as a Product In the first article, I introduced and explained the approach to application development…
MDD and Analysis vs. Code Models In the first article, I introduced and explained the approach to application development called…
Canonical Data Models and Overlapping Connections In the previous article, I introduced and explained the approach to application development called…
Data is considered by some to be the world’s most valuable resource. Going far beyond the limitations of physical resources,…
The notorious SolarWinds hack of 2020 sent shock waves across the software as a service world. In the attack, hackers…