In this entry, I will explore (at a management level), what these components are, why they are important to you, and how they can help you with your NoSQL and BigData implementations.
We’ve been addressing the question: what happens to a Data Vault Model when NoSQL is involved as the platform? In this entry I will address this question at a management level. If you want to know more about the details, you’ll have to attend this years’ conference: http://wwDVC.com
An introductory look at the first step in turning a data swamp in to a useful data lake.
Come join the web-cast! I’m proud to announce that I am working with CA to help them become the worlds very first authorized Data Vault Tool. We are kicking off the efforts with a series about Data Vault modeling and ERWin – come check it out.
Hello everyone, and happy new year. I am proud to announce my new support for authorized and licensed trainers. For the best possible certification experience, I encourage you to seek out authorized and endorsed trainers. If they aren’t listed on my Teaching License page, then they are not currently authorized nor endorsed by me – […]
Events, Calendar, and tentative schedule for 2013. I am offering licensing to teach the Data Vault 2.0 Certification classes. I will also be in different parts of the world this coming year. Contact me for more information.
In this entry I will explore the use of implementation of Data Vault on Teradata. However, this entry is applicable to everyone in the Data Vault community, as it covers definitions and descriptions of primary keys, indexing, surrogate keys, natural keys, and performance and tuning.
The more I go, the less I like the idea of composite business keys being candidates for Hubs. Here, I present a source system scenario, and explain how it plays out in creating a Data Vault as far as creating Hubs go.
A short first look at what it might take to integrate Data Vault modeling with Hadoop.
This article was written by a couple of authors and submitted to a conference that happened recently. It walks through some of the conceptual modeling around Data Vault, as well as taking a look at Anchor Modeling, and common approaches. It is really well written, and worth a read if you have the desire.