A short walk through what the Data Vault is really about. I hope you enjoy this lesson. I’ve got plenty of customers achieving / receiving real business value – monetary value, from their Data Vault 2.0 solutions, and yes, they are able to see the data as an asset as a result of this process.
A short entry explaining the thought process behind the switch in DV2 away from sequences over to hash keys. Also describes some of the issues if Natural or Business keys are selected instead of hashes as PRIMARY KEYS in the Data Vault Model.
The second in a series describing the nature of attaching VALUE to your data, and why business keys are SO important, especially with NoSQL, Big Data, and Data Lakes.
a look at address and people based business keys, how they are sticky, and the best possible solution to deal with them
The more I go, the less I like the idea of composite business keys being candidates for Hubs. Here, I present a source system scenario, and explain how it plays out in creating a Data Vault as far as creating Hubs go.
A quite lengthy entry on the nature of business keys, and the discussion of how the Data Vault model plays a role in architecture and design.
A short trip down memory lane in exploring MD5 hashes as primary keys in the Data Vault. I also discuss the business Data Vault, and the operational data vault in passing.
Short discussion on business keys, and what to do when you can’t find the right one for the hub’s purposes.