SlideShare a Scribd company logo
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
link to paper
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
See: Decoupling
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Apps Break Data
Data-centric principles
Data is self-describing and does not rely on an
application for interpretation and meaning.
Data is expressed in open, non-proprietary formats.
Applications are allowed to visit the data, perform their
magic and express the results of their process back into
the data layer.
http://datacentricmanifesto.org
Apps Break Data

More Related Content

More from Ivo Velitchkov

What can Social Systems Theory bring to the VSM?
What can Social Systems Theory bring to the VSM?What can Social Systems Theory bring to the VSM?
What can Social Systems Theory bring to the VSM?
Ivo Velitchkov
 
SASSY Architecture
SASSY ArchitectureSASSY Architecture
SASSY Architecture
Ivo Velitchkov
 
Productive Paradoxes in Projects
Productive Paradoxes in ProjectsProductive Paradoxes in Projects
Productive Paradoxes in Projects
Ivo Velitchkov
 
Essential Balances In Organisations (workshop)
Essential Balances In Organisations (workshop)Essential Balances In Organisations (workshop)
Essential Balances In Organisations (workshop)
Ivo Velitchkov
 
The Mind of Enterprise
The Mind of EnterpriseThe Mind of Enterprise
The Mind of Enterprise
Ivo Velitchkov
 
Essential Balances in Organisations
Essential Balances in OrganisationsEssential Balances in Organisations
Essential Balances in Organisations
Ivo Velitchkov
 
Language and Meta-language for Enterprise Architecture
Language and Meta-language for Enterprise ArchitectureLanguage and Meta-language for Enterprise Architecture
Language and Meta-language for Enterprise Architecture
Ivo Velitchkov
 
Requisite Inefficiency 3
Requisite Inefficiency 3Requisite Inefficiency 3
Requisite Inefficiency 3
Ivo Velitchkov
 
Essential Balances in Projects
Essential Balances in ProjectsEssential Balances in Projects
Essential Balances in Projects
Ivo Velitchkov
 
Requisite Inefficiency
Requisite InefficiencyRequisite Inefficiency
Requisite Inefficiency
Ivo Velitchkov
 
Using Enterprise Architecture to harmonise national legislation
Using Enterprise Architecture to harmonise national legislationUsing Enterprise Architecture to harmonise national legislation
Using Enterprise Architecture to harmonise national legislation
Ivo Velitchkov
 
Ashby's law in the first hour of the day
Ashby's law in the first hour of the dayAshby's law in the first hour of the day
Ashby's law in the first hour of the day
Ivo Velitchkov
 
Reasoning with taskless BPMN
Reasoning with taskless BPMNReasoning with taskless BPMN
Reasoning with taskless BPMN
Ivo Velitchkov
 

More from Ivo Velitchkov (13)

What can Social Systems Theory bring to the VSM?
What can Social Systems Theory bring to the VSM?What can Social Systems Theory bring to the VSM?
What can Social Systems Theory bring to the VSM?
 
SASSY Architecture
SASSY ArchitectureSASSY Architecture
SASSY Architecture
 
Productive Paradoxes in Projects
Productive Paradoxes in ProjectsProductive Paradoxes in Projects
Productive Paradoxes in Projects
 
Essential Balances In Organisations (workshop)
Essential Balances In Organisations (workshop)Essential Balances In Organisations (workshop)
Essential Balances In Organisations (workshop)
 
The Mind of Enterprise
The Mind of EnterpriseThe Mind of Enterprise
The Mind of Enterprise
 
Essential Balances in Organisations
Essential Balances in OrganisationsEssential Balances in Organisations
Essential Balances in Organisations
 
Language and Meta-language for Enterprise Architecture
Language and Meta-language for Enterprise ArchitectureLanguage and Meta-language for Enterprise Architecture
Language and Meta-language for Enterprise Architecture
 
Requisite Inefficiency 3
Requisite Inefficiency 3Requisite Inefficiency 3
Requisite Inefficiency 3
 
Essential Balances in Projects
Essential Balances in ProjectsEssential Balances in Projects
Essential Balances in Projects
 
Requisite Inefficiency
Requisite InefficiencyRequisite Inefficiency
Requisite Inefficiency
 
Using Enterprise Architecture to harmonise national legislation
Using Enterprise Architecture to harmonise national legislationUsing Enterprise Architecture to harmonise national legislation
Using Enterprise Architecture to harmonise national legislation
 
Ashby's law in the first hour of the day
Ashby's law in the first hour of the dayAshby's law in the first hour of the day
Ashby's law in the first hour of the day
 
Reasoning with taskless BPMN
Reasoning with taskless BPMNReasoning with taskless BPMN
Reasoning with taskless BPMN
 

Recently uploaded

COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...
COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...
COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...
AimanAthambawa1
 
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
FIDO Alliance
 
Improving Learning Content Efficiency with Reusable Learning Content
Improving Learning Content Efficiency with Reusable Learning ContentImproving Learning Content Efficiency with Reusable Learning Content
Improving Learning Content Efficiency with Reusable Learning Content
Enterprise Knowledge
 
Zaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdfZaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdf
AmandaCheung15
 
Redefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI CapabilitiesRedefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI Capabilities
Priyanka Aash
 
The Path to General-Purpose Robots - Coatue
The Path to General-Purpose Robots - CoatueThe Path to General-Purpose Robots - Coatue
The Path to General-Purpose Robots - Coatue
Razin Mustafiz
 
How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...
DianaGray10
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
Steven Carlson
 
History and Introduction for Generative AI ( GenAI )
History and Introduction for Generative AI ( GenAI )History and Introduction for Generative AI ( GenAI )
History and Introduction for Generative AI ( GenAI )
Badri_Bady
 
Perth MuleSoft Meetup July 2024
Perth MuleSoft Meetup July 2024Perth MuleSoft Meetup July 2024
Perth MuleSoft Meetup July 2024
Michael Price
 
Required Documents for ISO 17021 Certification.PPT
Required Documents for ISO 17021 Certification.PPTRequired Documents for ISO 17021 Certification.PPT
Required Documents for ISO 17021 Certification.PPT
mithun772
 
kk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdfkk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdf
KIRAN KV
 
BLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
BLOCKCHAIN TECHNOLOGY - Advantages and DisadvantagesBLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
BLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
SAI KAILASH R
 
Semantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software DevelopmentSemantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software Development
Baishakhi Ray
 
Retrieval Augmented Generation Evaluation with Ragas
Retrieval Augmented Generation Evaluation with RagasRetrieval Augmented Generation Evaluation with Ragas
Retrieval Augmented Generation Evaluation with Ragas
Zilliz
 
NVIDIA at Breakthrough Discuss for Space Exploration
NVIDIA at Breakthrough Discuss for Space ExplorationNVIDIA at Breakthrough Discuss for Space Exploration
NVIDIA at Breakthrough Discuss for Space Exploration
Alison B. Lowndes
 
Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...
Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...
Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...
OnBoard
 
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
bellared2
 
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision MakingConnector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
DianaGray10
 
Demystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity ApplicationsDemystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity Applications
Priyanka Aash
 

Recently uploaded (20)

COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...
COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...
COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...
 
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
 
Improving Learning Content Efficiency with Reusable Learning Content
Improving Learning Content Efficiency with Reusable Learning ContentImproving Learning Content Efficiency with Reusable Learning Content
Improving Learning Content Efficiency with Reusable Learning Content
 
Zaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdfZaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdf
 
Redefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI CapabilitiesRedefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI Capabilities
 
The Path to General-Purpose Robots - Coatue
The Path to General-Purpose Robots - CoatueThe Path to General-Purpose Robots - Coatue
The Path to General-Purpose Robots - Coatue
 
How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
 
History and Introduction for Generative AI ( GenAI )
History and Introduction for Generative AI ( GenAI )History and Introduction for Generative AI ( GenAI )
History and Introduction for Generative AI ( GenAI )
 
Perth MuleSoft Meetup July 2024
Perth MuleSoft Meetup July 2024Perth MuleSoft Meetup July 2024
Perth MuleSoft Meetup July 2024
 
Required Documents for ISO 17021 Certification.PPT
Required Documents for ISO 17021 Certification.PPTRequired Documents for ISO 17021 Certification.PPT
Required Documents for ISO 17021 Certification.PPT
 
kk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdfkk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdf
 
BLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
BLOCKCHAIN TECHNOLOGY - Advantages and DisadvantagesBLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
BLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
 
Semantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software DevelopmentSemantic-Aware Code Model: Elevating the Future of Software Development
Semantic-Aware Code Model: Elevating the Future of Software Development
 
Retrieval Augmented Generation Evaluation with Ragas
Retrieval Augmented Generation Evaluation with RagasRetrieval Augmented Generation Evaluation with Ragas
Retrieval Augmented Generation Evaluation with Ragas
 
NVIDIA at Breakthrough Discuss for Space Exploration
NVIDIA at Breakthrough Discuss for Space ExplorationNVIDIA at Breakthrough Discuss for Space Exploration
NVIDIA at Breakthrough Discuss for Space Exploration
 
Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...
Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...
Mastering Board Best Practices: Essential Skills for Effective Non-profit Lea...
 
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
 
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision MakingConnector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
 
Demystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity ApplicationsDemystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity Applications
 

Apps Break Data

  • 42. Data-centric principles Data is self-describing and does not rely on an application for interpretation and meaning. Data is expressed in open, non-proprietary formats. Applications are allowed to visit the data, perform their magic and express the results of their process back into the data layer. http://datacentricmanifesto.org