For many years, I have built, authored and maintained the #Datavault standards. This includes Data Vault 1.0, and Data Vault 2.0. There are others in the community who believe that “these standards should evolve and be changed by consensus of the general public”. (more…)
I have published brand new updated standards for Data Vault Modeling. V2.0.1 The document is available for FREE, but you must register on http://DataVaultAlliance.com to get it. Don’t worry, you can ALWAYS unsubscribe after if you like. (more…)
In this entry, I will explore (at a management level), what these components are, why they are important to you, and how they can help you with your NoSQL and BigData implementations.
We’ve been addressing the question: what happens to a Data Vault Model when NoSQL is involved as the platform? In this entry I will address this question at a management level. If you want to know more about the details, you’ll have to attend this years’ conference: http://wwDVC.com
An introductory look at the first step in turning a data swamp in to a useful data lake.
Come join the web-cast! I’m proud to announce that I am working with CA to help them become the worlds very first authorized Data Vault Tool. We are kicking off the efforts with a series about Data Vault modeling and ERWin – come check it out.
Hello everyone, and happy new year. I am proud to announce my new support for authorized and licensed trainers. For the best possible certification experience, I encourage you to seek out authorized and endorsed trainers. If they aren’t listed on my Teaching License page, then they are not currently authorized nor endorsed by me – […]
Events, Calendar, and tentative schedule for 2013. I am offering licensing to teach the Data Vault 2.0 Certification classes. I will also be in different parts of the world this coming year. Contact me for more information.
In this entry I will explore the use of implementation of Data Vault on Teradata. However, this entry is applicable to everyone in the Data Vault community, as it covers definitions and descriptions of primary keys, indexing, surrogate keys, natural keys, and performance and tuning.
The more I go, the less I like the idea of composite business keys being candidates for Hubs. Here, I present a source system scenario, and explain how it plays out in creating a Data Vault as far as creating Hubs go.