Preventing Continuous Integration Pipeline Leaks
The notorious SolarWinds hack of 2020 sent shock waves across the software as a service world. In the attack, hackers…
Data Architecture Articles
The notorious SolarWinds hack of 2020 sent shock waves across the software as a service world. In the attack, hackers…
Bounded Contexts / Ubiquitous Language My new book, Data Model Storytelling,[i] contains a section describing some of the most significant…
As an IT professional, you’re probably used to the constant treadmill of new ideas, technologies, and concepts that you need…
As we enter a new cloud-first era, advancements in technology have helped companies capture and capitalize on data as much…
If you are currently a DBA, I bet you can relate to the title of this article. Doesn’t it seem…
In her groundbreaking article, How to Move Beyond a Monolithic Data Lake to a Distributed Data Mesh, Zhamak Dehghani made the…
Today’s enterprise data landscape is very complex. Data is coming to the enterprise from everywhere and anywhere at high speed…
A null represents missing or unknown information at the column level. A null is not the same as 0 (zero)…
Risk-Based Security’s 2020 Q3 study indicates that between January and September 2020, about 36 billion databases were hacked. While this…
Fundamentally, the purpose of technology in business is to manage the treasure trove of data captured within sophisticated technological systems.…