Unique Threat Landscape of Digital Divide
Rural areas worldwide are disconnected in a landscape that nearly requires the internet to work or socially interact. But eventually, the entire planet will have equal, high-speed internet access....
View ArticleThe Impact of AI on the DBA
Artificial Intelligence, or AI, is having a significant impact on most industries and job roles these days, and it will only increase as AI techniques and algorithms improve over time. I’m sure you’ve...
View ArticleHow to Find the Right Tweener for Your Organization
Recently, I attended the CDIO Conference in Boston where I had the pleasure of hearing the two Toms (Tom Redman and Tom Davenport) — gurus of data — introduce the concept of tweeners to the data...
View ArticleThe Data-Centric Revolution: “RDF is Too Hard”
We hear this a lot. We hear it from very smart people. Just the other day we heard someone say they had tried RDF twice at previous companies and it failed both times. (RDF stands for Resource...
View ArticleHow to Maximize Multi-Cloud Data Governance
The transition from hybrid to multi-cloud environments is more than just a buzzword: It’s a fundamental shift in how organizations manage and utilize their data. As these complex architectures evolve,...
View ArticleCombining IoT and Blockchain Technology to Enhance Security
The Internet of Things (IoT) technology has taken the world by storm. From smart homes and wearables to connected cars and fitness trackers, IoT devices are becoming prevalent across various industries...
View ArticleExploring Cloud Computing Risks and Security Hurdles
The worldwide shift toward cloud computing significantly changes how businesses approach data management and operation. Regardless of whether private, public, or hybrid cloud models are employed, the...
View ArticleSelf-Service Data Access Best Practices
Today’s digital realm increasingly emphasizes the value of self-service data access. Firms are recognizing its potential to empower users and accelerate decision-making processes. However, with this...
View ArticleThe Role of Dark Data: Uncovering Insights in Unused Information
Dark data remains one of the greatest untapped resources in business. This is due to the vast amounts of usable data that exists within an organization, but is not utilized or analyzed to serve a...
View ArticleThe Data-Centric Revolution: Best Practices and Schools of Ontology Design
I was recently asked to present “Enterprise Ontology Design and Implementation Best Practices” to a group of motivated ontologists and wanna-be ontologists. I was flattered to be asked, but I really...
View ArticleThe Modern Data Stack: Why It Should Matter to Data Practitioners
In the rapidly evolving data landscape, data practitioners face a plethora of concepts and architectures. Data mesh argues for a decentralized approach to data and for data to be delivered as curated,...
View ArticleThe Rise of Zero-Trust Architecture
The cybersecurity landscape in 2024 is marked by complex, multi-faceted threats, necessitating advanced defensive strategies. This complexity arises from the expansive use of digital technologies and...
View Article5 Best Practices for Data Management in the Cloud
Organizations manage data in the cloud through strategic planning and the implementation of best practices tailored to their specific needs. This involves selecting the right cloud service providers...
View ArticleData-Centric: How Big Things Get Done (in IT)
I read “How Big Things Get Done” when it first came out about six months ago.[1] I liked it then. But recently, I read another review of it, and another coin dropped. I’ll let you know what the coin...
View ArticleThe End of Agile – Part 2 (Critiques of Agile)
In the first article, I laid out the basic premise for this series: an examination of how Agile has gone from the darling of the application development community to a virtual pariah that nobody wants...
View Article
More Pages to Explore .....