About this course
Course Overview
The focus of this Advanced Data Vault Modeling course is modeling. In particular this course is focused on providing students a deeper understanding of the various options available within the Data Vault Ensemble modeling approach.
The goal of this course is to enable data modelers and architects to make the most informed and best possible modeling decisions when establishing their specific modeling pattern in their organization.
This course follows an example-driven approach based on over a dozen real-life modeling cases. For each modeling scenario there is a business case that leads to a set of alternatives. Through interactive group analysis and discussions, and drawing on the experiences of the students in the class, the various alternatives are uncovered, considered, often ranked, and ultimately classified and categorized based on best practice considerations, pros & cons, and how appropriate they might be given the specific business scenarios.
Target Audience
This course if for data modelers, data architects, information modelers, and other data warehousing and business intelligence professionals who work with the design of conceptual, logical or physical data. Students attending this course should be certified CDVDM modelers, who have taken and passed the Data Vault certification exam.Course Objectives
The goal of this course is to enable data modelers and architects to make the most informed and best possible modeling decisions when establishing their specific modeling pattern in their organization.Course Content
- Modeling Events (and the role of links)
- Modeling Context Arrays (impact on satellite design)
- Modeling for Big Data, Cloud & Streaming Deployments (leveraging new platforms)
- Modeling UOW – Event based UOW (advanced link design)
- Modleing UOW – Keyed Instance UOW (hubs vs links)
- Modeling Address (context close to key)
- Modeling the BK in and EDW (dealing with lack of Enterprise Key – also include Anchor/Focal alternatives)
- Modeling the Shuttle for Fuzzy Integration (dealing with realistic integration)
- Modeling the SAT BOK (alternate, degenerate keys, etc.)
- Modeling for Personally Identifiable Information and Privacy (PID)
- Architecture – Defining and Deploying the RAW and BDV (establish approach)
- Ensemble Logical Form (ELF) and Virtualization (in memory)
- Modeling Automation – the Play Book (how and when to automate)