Subject Areas

Under subject areas, you can find a sample of the things I like working with. There are some general themes in this blog which I will summarise here.

Big Data vs. Data Warehousing

My basic architectural argument is that you should target data warehouse products to systems that HAVE a data model and that Big Data is best used where the model is more loosely defined and near schema-less – which include many of the data structures traditionally used for auditing and history tracking.

If you think of the data flow at a very high level, from a source to the warehouse, this is my approach:


I have written quite a few blog posts that I hope you will find are coming together in a coherent theme of design guidelines. To make it easier to locate them, I have provided the index below.

Keys and how to handle them

In order to deliver clean and integrated data, the proper and high performance handlings of keys is crucial. I have blogged extensively about this here:

Warehouse Knowledge

Information about large databases and how they work.

Myth Busting

I like to put “common sense” recommendations from the database community to the test. Here are the posts I have written about this so far:


  1. Pingback: Good keys, what are they like? « Thomas Kejser's Database Blog

  2. Pingback: Intermezzo–Data Modeling « Thomas Kejser's Database Blog

  3. Pingback: Defining the Good Data Model « Thomas Kejser's Database Blog

  4. Pingback: Don’t Become a One-trick Architect « Thomas Kejser's Database Blog

  5. Pingback: Why “Date BETWEEN FromDate AND ToDate” is a dangerous join criteria « Thomas Kejser's Database Blog

  6. Pingback: Boosting INSERT Speed by Generating Scalable Keys « Thomas Kejser's Database Blog

  7. Pingback: Why Surrogate Keys are not Good Keys « Thomas Kejser's Database Blog

  8. Pingback: Physically Placing the Maps in the architecture « Thomas Kejser's Database Blog

  9. Pingback: Transforming Source Keys to Real Keys – Part 2: Using Maps To Fix Key Problems « Thomas Kejser's Database Blog

  10. Pingback: Transforming Source Keys to Real Keys – Part 1: Introducing Map tables « Thomas Kejser's Database Blog

  11. Pingback: An Overview of Source Key Pathologies « Thomas Kejser's Database Blog

  12. Pingback: Why Integer Keys are the Right Choice! « Thomas Kejser's Database Blog

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code class="" title="" data-url=""> <del datetime=""> <em> <i> <q cite=""> <strike> <strong> <pre class="" title="" data-url=""> <span class="" title="" data-url="">