SlideShare a Scribd company logo
1 of 40
“It is not the strongest of the species that survives, nor the most intelligent that survives. It is the one that is the most adaptable to change” 														Charles Darwin Data Vault is anevolutionary step Data Vaultfirmlypositioned data warehousing in EA Data Vaultforksinto different species Andyes, we can speed up evolution
3:1 mileage Expensive to buy Slow…. Inflexible Carbon based, polluting! Need specialists to drive Need specialists to repair
It can go anywhere It can go anytime It can be used by anyone Very fast!! Of course, extremely energy efficient However…. 	It won’t fly
Sorry, not more than 100 miles Oh, charging takes like 5 hours Batteries are somewhat expensive Prone to (electric) failure No infrastructure yet
Utilize new methods and technologies Make it effective with todays legacy Utilizing todays infrastructure As well as adapting to new ones Retain the good, get rid of the bad Make it efficient, better mileage Make it durable Make it repeatable Make it affordable Make it Agile Make it fit in the environment
What products are asked? What are the quality characteristics? How are these products made?
What
Product & Services What
What Compliant Adaptible Sustainable Decoupled Centralized Standardized & Industrialized Effective
How ‘Calculating risk’ Source ‘Yield modules’ Source ‘Customer segmentation’ Semantic gap
How 4. Generate (BI) products 3. Enrich and cleanse data 2. Register & (anchorize data) 1. Get the raw (uncut) data Information Delivery Proces
Recipient End-user (Local) 4 4 4 4 4 Data & function service 3 3 3 3 3 Information Delivery process 2 2 2 2 2 1 1 1 1 1 Generic BI proces (Central) Data sources(internal & external)
Key Design Decisions Adaptable Sustainable Compliant Centralized
Adaptable Effectiveness Sustainable Decoupled Compliant Centralized
Key Design Decisions Compliant Adaptable
View: Component view 1 2 3 4 Company xxx data warehouse & Business Intelligence  Domain 4 Sources BI apps Reports 3 2 Source store 1”, 2” Business View, Data feeds BI AppsAnalysis 1 Enterprise Data Warehouse BI Apps Ad-hoc Function, ‘How’ External sources Data, ‘What’ ‘Where’, ‘Whom’
Sourcestore to BV Sourcestore to product Source to product EDW (DV) Adaptable Sustainable Compliant Decoupled Effective Standardized Centralized
View: Component view 1 2 3 4 Company xxx data warehouse & Business Intelligence  Domain 4 Sources BI apps Reports 3 2 Source store 1”, 2” Business View, Data feeds BI AppsAnalysis 1 Enterprise Data Warehouse BI Apps Ad-hoc Function, ‘How’ External sources Data, ‘What’ ‘Where’, ‘Whom’
Administrative process Information Delivery Process Decision- & control Data & Information recipients Generate& Distribute Enrich Register (& anchorize) Attain Proces PDCA DV basedData Warehouse Systems(internal &external) Information products Compliance reporting Risk Management Supply/Data Demand/Function Performance Management Data products Businessrules Supply chain optimization Staging Fraud detection Market basket analysis Control / Metadata
Offensive Governance DefensiveGovernance Factory Mode ,[object Object]
Performance of the systems has direct effect on    efficiency of users
 Most core business activities are ‘one line’
 Systems work is mostly maintenance
 Systems workprovideslittlestrategicdifferen-tation or dramaticcostreductionStrategic Mode ,[object Object]
Performance of the systems has direct effect on   efficiency of users
 New systems promise major processand  service improvement
 New systems promise major costreduction
 New systems will close significant cost, service   or process performance withcompetitersSupport Mode ,[object Object]
 Performance of the system has no direct effect  on efficiency of users
 Company canquicklyrevertto manual   procedures
 Systems work is mostly maintenanceTurnaround Mode ,[object Object]
 New systems promise major costreductions
 New systems will close significant cost, service   or process performance withcompetiters
 IT constitutes more than 50% of capitalspending
 IT makes up more than 15% of total  corporate expensesData Vault & Governance Strategy Need for reliability in IT Need for innovation with IT
Offensive Governance Defensive Governance Data Vault & Governance Strategy Focus on: AdaptabilityandAgility ,[object Object]
Externalfocused
Competitative intelligence

More Related Content

More from Prudenza B.V

Keynote 5 juni 2014 - dutch data vault masters - shu-ha-ri
Keynote   5 juni 2014 - dutch data vault masters - shu-ha-riKeynote   5 juni 2014 - dutch data vault masters - shu-ha-ri
Keynote 5 juni 2014 - dutch data vault masters - shu-ha-riPrudenza B.V
 
Keynote 22 mei 2014 - dwh automation - 4 Quadrant
Keynote   22 mei 2014 - dwh automation - 4 QuadrantKeynote   22 mei 2014 - dwh automation - 4 Quadrant
Keynote 22 mei 2014 - dwh automation - 4 QuadrantPrudenza B.V
 
20130527 jill dyche - im ronald [Dutch]
20130527   jill dyche - im ronald [Dutch]20130527   jill dyche - im ronald [Dutch]
20130527 jill dyche - im ronald [Dutch]Prudenza B.V
 
20130527 jill dyche - im ronald
20130527   jill dyche - im ronald20130527   jill dyche - im ronald
20130527 jill dyche - im ronaldPrudenza B.V
 
Tdwi agile data warehouse - dv, what is the buzz about
Tdwi   agile data warehouse - dv, what is the buzz aboutTdwi   agile data warehouse - dv, what is the buzz about
Tdwi agile data warehouse - dv, what is the buzz aboutPrudenza B.V
 
[Dutch] Data Health Care: hoe je data in goede gezondheid te krijgen
[Dutch] Data Health Care: hoe je data in goede gezondheid te krijgen[Dutch] Data Health Care: hoe je data in goede gezondheid te krijgen
[Dutch] Data Health Care: hoe je data in goede gezondheid te krijgenPrudenza B.V
 
[Dutch] Analytics is waarde-loos
[Dutch] Analytics is waarde-loos[Dutch] Analytics is waarde-loos
[Dutch] Analytics is waarde-loosPrudenza B.V
 
Data Vault automation conference - all presentations
Data Vault automation conference - all presentationsData Vault automation conference - all presentations
Data Vault automation conference - all presentationsPrudenza B.V
 

More from Prudenza B.V (8)

Keynote 5 juni 2014 - dutch data vault masters - shu-ha-ri
Keynote   5 juni 2014 - dutch data vault masters - shu-ha-riKeynote   5 juni 2014 - dutch data vault masters - shu-ha-ri
Keynote 5 juni 2014 - dutch data vault masters - shu-ha-ri
 
Keynote 22 mei 2014 - dwh automation - 4 Quadrant
Keynote   22 mei 2014 - dwh automation - 4 QuadrantKeynote   22 mei 2014 - dwh automation - 4 Quadrant
Keynote 22 mei 2014 - dwh automation - 4 Quadrant
 
20130527 jill dyche - im ronald [Dutch]
20130527   jill dyche - im ronald [Dutch]20130527   jill dyche - im ronald [Dutch]
20130527 jill dyche - im ronald [Dutch]
 
20130527 jill dyche - im ronald
20130527   jill dyche - im ronald20130527   jill dyche - im ronald
20130527 jill dyche - im ronald
 
Tdwi agile data warehouse - dv, what is the buzz about
Tdwi   agile data warehouse - dv, what is the buzz aboutTdwi   agile data warehouse - dv, what is the buzz about
Tdwi agile data warehouse - dv, what is the buzz about
 
[Dutch] Data Health Care: hoe je data in goede gezondheid te krijgen
[Dutch] Data Health Care: hoe je data in goede gezondheid te krijgen[Dutch] Data Health Care: hoe je data in goede gezondheid te krijgen
[Dutch] Data Health Care: hoe je data in goede gezondheid te krijgen
 
[Dutch] Analytics is waarde-loos
[Dutch] Analytics is waarde-loos[Dutch] Analytics is waarde-loos
[Dutch] Analytics is waarde-loos
 
Data Vault automation conference - all presentations
Data Vault automation conference - all presentationsData Vault automation conference - all presentations
Data Vault automation conference - all presentations
 

Recently uploaded

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 

Recently uploaded (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 

Data Warehousing, Data Vault as evolutionary step

  • 1. “It is not the strongest of the species that survives, nor the most intelligent that survives. It is the one that is the most adaptable to change” Charles Darwin Data Vault is anevolutionary step Data Vaultfirmlypositioned data warehousing in EA Data Vaultforksinto different species Andyes, we can speed up evolution
  • 2.
  • 3.
  • 4. 3:1 mileage Expensive to buy Slow…. Inflexible Carbon based, polluting! Need specialists to drive Need specialists to repair
  • 5. It can go anywhere It can go anytime It can be used by anyone Very fast!! Of course, extremely energy efficient However…. It won’t fly
  • 6. Sorry, not more than 100 miles Oh, charging takes like 5 hours Batteries are somewhat expensive Prone to (electric) failure No infrastructure yet
  • 7. Utilize new methods and technologies Make it effective with todays legacy Utilizing todays infrastructure As well as adapting to new ones Retain the good, get rid of the bad Make it efficient, better mileage Make it durable Make it repeatable Make it affordable Make it Agile Make it fit in the environment
  • 8. What products are asked? What are the quality characteristics? How are these products made?
  • 11. What Compliant Adaptible Sustainable Decoupled Centralized Standardized & Industrialized Effective
  • 12. How ‘Calculating risk’ Source ‘Yield modules’ Source ‘Customer segmentation’ Semantic gap
  • 13. How 4. Generate (BI) products 3. Enrich and cleanse data 2. Register & (anchorize data) 1. Get the raw (uncut) data Information Delivery Proces
  • 14. Recipient End-user (Local) 4 4 4 4 4 Data & function service 3 3 3 3 3 Information Delivery process 2 2 2 2 2 1 1 1 1 1 Generic BI proces (Central) Data sources(internal & external)
  • 15. Key Design Decisions Adaptable Sustainable Compliant Centralized
  • 16. Adaptable Effectiveness Sustainable Decoupled Compliant Centralized
  • 17. Key Design Decisions Compliant Adaptable
  • 18. View: Component view 1 2 3 4 Company xxx data warehouse & Business Intelligence Domain 4 Sources BI apps Reports 3 2 Source store 1”, 2” Business View, Data feeds BI AppsAnalysis 1 Enterprise Data Warehouse BI Apps Ad-hoc Function, ‘How’ External sources Data, ‘What’ ‘Where’, ‘Whom’
  • 19. Sourcestore to BV Sourcestore to product Source to product EDW (DV) Adaptable Sustainable Compliant Decoupled Effective Standardized Centralized
  • 20. View: Component view 1 2 3 4 Company xxx data warehouse & Business Intelligence Domain 4 Sources BI apps Reports 3 2 Source store 1”, 2” Business View, Data feeds BI AppsAnalysis 1 Enterprise Data Warehouse BI Apps Ad-hoc Function, ‘How’ External sources Data, ‘What’ ‘Where’, ‘Whom’
  • 21. Administrative process Information Delivery Process Decision- & control Data & Information recipients Generate& Distribute Enrich Register (& anchorize) Attain Proces PDCA DV basedData Warehouse Systems(internal &external) Information products Compliance reporting Risk Management Supply/Data Demand/Function Performance Management Data products Businessrules Supply chain optimization Staging Fraud detection Market basket analysis Control / Metadata
  • 22.
  • 23. Performance of the systems has direct effect on efficiency of users
  • 24. Most core business activities are ‘one line’
  • 25. Systems work is mostly maintenance
  • 26.
  • 27. Performance of the systems has direct effect on efficiency of users
  • 28. New systems promise major processand service improvement
  • 29. New systems promise major costreduction
  • 30.
  • 31. Performance of the system has no direct effect on efficiency of users
  • 32. Company canquicklyrevertto manual procedures
  • 33.
  • 34. New systems promise major costreductions
  • 35. New systems will close significant cost, service or process performance withcompetiters
  • 36. IT constitutes more than 50% of capitalspending
  • 37. IT makes up more than 15% of total corporate expensesData Vault & Governance Strategy Need for reliability in IT Need for innovation with IT
  • 38.
  • 41.
  • 42. Control of assets
  • 46. Efficiency / Cost Control
  • 51. Stable ArchitectureData Function Need for reliability in IT Need for innovation with IT
  • 52. Data Vault & Self ServiceThe development model Central functiondevelopment CentrallycoordinatedInfrastructuredevelopment Gedelegeerde Ontwikkeling Localfunctiondevelopment Localfunctiondevelopment Selfservice development Delegateddevelopment Selfservice development Delegateddevelopment Function (Opportunisticdevelopment) Data (Systematic development) Data CentrallycoordinatedICT development
  • 54. 1 - Classic Data Vault Business Transaction System Data Vault Data Marts Staging Out Business Transaction System Generic Business Rules Rule Vault Structure transformation Hub = business keys Business rule execution Structure and value transformation Standardized Centralized Adaptable Effectiveness Sustainable Decoupled Compliant ? ?
  • 55. 2 - Source Data Vault Business Data Vault Staging Vault Business Transaction System Data Marts Business Transaction System Staging Vault Structure transformation No integration, Hub=surrogate keys Persisting staging in DV format Business rule execution Integration DV modelled Structure transformation Standardized Centralized Adaptable Effectiveness Sustainable Decoupled Compliant ? ? ?
  • 56. Source Source 100% Semantic gap Business DV Source Staging DV Source Staging DV 100% Semantic gap Still the source Integration, cleansing, consolidation Business rule execution upstream ?? DV modelled
  • 57. Source Source 100% Semantic gap Data Warehouse Business DV Source Source Staging DV Source Source Staging DV 100% Semantic gap Still the source Integration, cleansing, consolidation Business rule execution upstream ?? DV modelled
  • 58.
  • 62. Information maturity; conceptual business process knowledge present
  • 63. Scale and complexity of data and/or organization
  • 64. Relatively big semantic gap between Source  Requirement
  • 66. Scale and complexity of data and/or organization
  • 68. Business keys hard to identify
  • 69. Information maturity; no conceptual business process knowledge present
  • 72.
  • 73. 1b – Classic Data Vault Business Transaction System Data Vault Data Marts Staging Out Business Transaction System Generic Business Rules Rule Vault Business Transaction System Data Vault Data Marts Staging Out Business Transaction System Generic Business Rules Rule Vault Structure transformation Light integration on the business keys Specific business rule execution Structure and value transformation Consolidation
  • 74. Speeding up Data Vault Evolution?
  • 76.
  • 77.
  • 79. Not everything can be generated, be real
  • 81. Do not underestimate the complexity
  • 82. It is a pretty steep learning cycle
  • 86. Generation software only in combo with modeling software and ETL software
  • 87.
  • 88. Aim is to be 100% declarative
  • 89.
  • 90. More advanced; generating XML code for 2nd gen. ETL tooling
  • 91.
  • 92.
  • 93. Both DV species will live next to others
  • 94. Technology will push the envelope
  • 95. Automation typologies will be pushed even more towards metadata driven automation
  • 96. WE – the people – need to evolve:
  • 97. We need more talented engineers
  • 98. We need more focused education
  • 99. We need more knowledge sharing
  • 100.

Editor's Notes

  1. Shared