Foreword |
|
ix | |
Preface |
|
xi | |
|
1 The Disruption of Data Management |
|
|
1 | (16) |
|
|
2 | (3) |
|
Analytics Is Fragmenting the Data Landscape |
|
|
5 | (1) |
|
Speed of Software Delivery Is Changing |
|
|
6 | (1) |
|
Networks Are Getting Faster |
|
|
7 | (1) |
|
Privacy and Security Concerns Are a Top Priority |
|
|
8 | (1) |
|
Operational and Transactional Systems Need to Be Integrated |
|
|
9 | (1) |
|
Data Monetization Requires an Ecosystem-to-Ecosystem Architecture |
|
|
9 | (1) |
|
Enterprises Are Saddled with Outdated Data Architectures |
|
|
10 | (5) |
|
Enterprise Data Warehouse and Business Intelligence |
|
|
10 | (3) |
|
|
13 | (2) |
|
|
15 | (1) |
|
|
15 | (2) |
|
2 Introducing the Scaled Architecture: Organizing Data at Scale |
|
|
17 | (34) |
|
Universally Acknowledged Starting Points |
|
|
18 | (2) |
|
Each Application Has an Application Database |
|
|
18 | (1) |
|
Applications Are Specific and Have Unique Context |
|
|
18 | (1) |
|
|
18 | (1) |
|
There's No Escape from the Data Integration Dilemma |
|
|
19 | (1) |
|
Applications Play the Roles of Data Providers and Data Consumers |
|
|
19 | (1) |
|
Key Theoretical Considerations |
|
|
20 | (13) |
|
Object-Oriented Programming Principles |
|
|
21 | (1) |
|
|
22 | (3) |
|
|
25 | (8) |
|
Communication and Integration Patterns |
|
|
33 | (2) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (14) |
|
Golden Sources and Domain Data Stores |
|
|
36 | (2) |
|
Data Delivery Contracts and Data Sharing Agreements |
|
|
38 | (1) |
|
Eliminating the Siloed Approach |
|
|
39 | (1) |
|
Domain-Driven Design on an Enterprise Scale |
|
|
40 | (3) |
|
|
43 | (1) |
|
Data Layer as a Holistic Picture |
|
|
44 | (3) |
|
Metadata and the Target Operating Model |
|
|
47 | (2) |
|
|
49 | (2) |
|
3 Managing Vast Amounts of Data: The Read-Only Data Stores Architecture |
|
|
51 | (34) |
|
Introducing the RDS Architecture |
|
|
51 | (1) |
|
Command and Query Responsibility Segregation |
|
|
52 | (6) |
|
|
52 | (2) |
|
|
54 | (4) |
|
Read-Only Data Store Components and Services |
|
|
58 | (20) |
|
|
59 | (2) |
|
|
61 | (2) |
|
|
63 | (1) |
|
|
64 | (3) |
|
Integrating Commercial Off-the-Shelf Solutions |
|
|
67 | (1) |
|
Extracting Data from External APIs and SaaSs |
|
|
67 | (1) |
|
|
68 | (3) |
|
|
71 | (2) |
|
|
73 | (1) |
|
|
74 | (2) |
|
File Manipulation Service |
|
|
76 | (1) |
|
Delivery Notification Service |
|
|
76 | (1) |
|
De-Identification Service |
|
|
76 | (1) |
|
Distributed Orchestration |
|
|
77 | (1) |
|
Intelligent Consumption Services |
|
|
78 | (3) |
|
Populating RDSs on Demand |
|
|
81 | (1) |
|
RDS Direct Usage Considerations |
|
|
82 | (1) |
|
|
82 | (3) |
|
4 Services and API Management: The API Architecture |
|
|
85 | (36) |
|
Introducing the API Architecture |
|
|
85 | (1) |
|
What Is Service-Oriented Architecture? |
|
|
86 | (13) |
|
Enterprise Application Integration |
|
|
89 | (3) |
|
|
92 | (3) |
|
|
95 | (1) |
|
Public Services and Private Services |
|
|
96 | (1) |
|
Service Models and Canonical Data Models |
|
|
97 | (1) |
|
Similarities Between SOA and Enterprise Data Warehousing Architecture |
|
|
98 | (1) |
|
|
99 | (7) |
|
|
100 | (1) |
|
|
101 | (2) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
106 | (7) |
|
The Role of the API Gateway Within Microservices |
|
|
107 | (1) |
|
|
108 | (2) |
|
|
110 | (1) |
|
|
111 | (1) |
|
Microservices Within the API Reference Architecture |
|
|
112 | (1) |
|
|
113 | (2) |
|
API-Based Communication Channels |
|
|
115 | (2) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (2) |
|
Using RDSs for Real-Time and Intensive Reads |
|
|
119 | (1) |
|
|
120 | (1) |
|
5 Event and Response Management: The Streaming Architecture |
|
|
121 | (34) |
|
Introducing the Streaming Architecture |
|
|
121 | (1) |
|
The Asynchronous Event Model Makes the Difference |
|
|
122 | (1) |
|
What Do Event-Driven Architectures Look Like? |
|
|
123 | (4) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
125 | (2) |
|
A Gentle Introduction to Apache Kafka |
|
|
127 | (4) |
|
|
129 | (1) |
|
|
130 | (1) |
|
The Streaming Architecture |
|
|
131 | (16) |
|
|
131 | (3) |
|
|
134 | (2) |
|
|
136 | (1) |
|
Event Sourcing and Command Sourcing |
|
|
137 | (2) |
|
|
139 | (1) |
|
|
140 | (3) |
|
Streaming Consumption Patterns |
|
|
143 | (2) |
|
Event-Carried State Transfer |
|
|
145 | (1) |
|
Playing the Role of an RDS |
|
|
146 | (1) |
|
Using Streaming to Populate RDSs |
|
|
146 | (1) |
|
Controls and Policies for Guiding the Domains |
|
|
147 | (1) |
|
Streaming as the Operational Backbone |
|
|
147 | (1) |
|
Guarantees and Consistency |
|
|
148 | (3) |
|
|
148 | (1) |
|
"At Least Once, Exactly Once, and at Most Once" Processing |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
Streaming Interoperability |
|
|
150 | (1) |
|
Metadata for Governance and Self-Service Models |
|
|
151 | (1) |
|
|
152 | (3) |
|
|
155 | (30) |
|
Recap of the Architectures |
|
|
155 | (4) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
157 | (2) |
|
Enterprise Interoperability Standards |
|
|
159 | (10) |
|
|
159 | (3) |
|
|
162 | (1) |
|
Accessible and Addressable Data |
|
|
163 | (1) |
|
Crossing Network Principles |
|
|
164 | (5) |
|
Enterprise Data Standards |
|
|
169 | (13) |
|
Consumption-Optimization Principles |
|
|
170 | (3) |
|
Discoverability of Metadata |
|
|
173 | (3) |
|
|
176 | (4) |
|
Supplying the Corresponding Metadata |
|
|
180 | (1) |
|
Data Origination and Movements |
|
|
180 | (2) |
|
|
182 | (2) |
|
|
184 | (1) |
|
7 Sustainable Data Governance and Data Security |
|
|
185 | (34) |
|
|
185 | (15) |
|
Organization: Data Governance Roles |
|
|
187 | (2) |
|
Processes: Data Governance Activities |
|
|
189 | (2) |
|
People: Trust and Ethical, Social, and Economic Considerations |
|
|
191 | (1) |
|
Technology: Golden Source, Ownership, and Application Administration |
|
|
191 | (2) |
|
Data: Golden Sources, Golden Datasets, and Classifications |
|
|
193 | (7) |
|
|
200 | (9) |
|
|
201 | (1) |
|
Unified Data Security for Architectures |
|
|
201 | (2) |
|
|
203 | (1) |
|
Security Reference Architecture and Data Context Approach |
|
|
204 | (1) |
|
|
205 | (4) |
|
|
209 | (8) |
|
|
209 | (2) |
|
|
211 | (4) |
|
|
215 | (1) |
|
Intelligent Learning Engine |
|
|
216 | (1) |
|
|
217 | (2) |
|
8 Turning Data into Value |
|
|
219 | (30) |
|
|
220 | (3) |
|
Using Read-Only Data Stores Directly |
|
|
220 | (1) |
|
|
221 | (2) |
|
|
223 | (1) |
|
Data Professionals as a Target User Group |
|
|
224 | (1) |
|
|
225 | (1) |
|
Nonfunctional Requirements |
|
|
226 | (1) |
|
Building the Data Pipeline and Data Model |
|
|
227 | (6) |
|
Distributing Integrated Data |
|
|
233 | (2) |
|
Business Intelligence Capabilities |
|
|
235 | (1) |
|
Self-Service Capabilities |
|
|
236 | (3) |
|
|
239 | (4) |
|
Standard Infrastructure for Automated Deployments |
|
|
240 | (1) |
|
|
240 | (1) |
|
Prescripted and Configured Workbenches |
|
|
240 | (1) |
|
Standardize on Model Integration Patterns |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
Advanced Analytics Reference Architecture |
|
|
243 | (4) |
|
|
247 | (2) |
|
9 Mastering Enterprise Data Assets |
|
|
249 | (16) |
|
Demystifying Master Data Management |
|
|
250 | (1) |
|
Master Data Management Styles |
|
|
250 | (2) |
|
MDM Reference Architecture |
|
|
252 | (4) |
|
Designing a Master Data Management Solution |
|
|
253 | (1) |
|
|
254 | (1) |
|
Master Identification Numbers |
|
|
255 | (1) |
|
Reference Data Versus Master Data |
|
|
256 | (1) |
|
Determining the Scope of Your Enterprise Data |
|
|
256 | (3) |
|
MDM and Data Quality as a Service |
|
|
259 | (1) |
|
|
259 | (3) |
|
|
260 | (1) |
|
|
260 | (1) |
|
Reusable Components and Integration Logic |
|
|
261 | (1) |
|
|
261 | (1) |
|
Relation to Data Governance |
|
|
262 | (1) |
|
|
262 | (3) |
|
10 Democratizing Data with Metadata |
|
|
265 | (22) |
|
|
265 | (2) |
|
Enterprise Metadata Model |
|
|
267 | (7) |
|
Enterprise Knowledge Graph |
|
|
274 | (4) |
|
Architectural Approaches for Metadata Management |
|
|
278 | (4) |
|
Metadata Interoperability |
|
|
279 | (1) |
|
|
280 | (2) |
|
Marketplace to Provide Rapid Access to Authorized Data |
|
|
282 | (3) |
|
|
285 | (2) |
|
|
287 | (10) |
|
|
288 | (4) |
|
Fully Decentralized Approach |
|
|
289 | (1) |
|
Partially Decentralized Approach |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
292 | (1) |
|
The Decline of Traditional Enterprise Architecture |
|
|
293 | (2) |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
295 | (2) |
Glossary |
|
297 | (14) |
Index |
|
311 | |