Most information platforms don’t fail with an enormous bang
they slowly degrade and lose impression.
appears to be like promising: dashboards are constructed, pipelines run, information turns into obtainable and groups begin exploring. However over time one thing shifts:
- definitions and possession are unclear
- the identical metric reveals completely different numbers in several dashboards, folks cease trusting information and don’t use options
- change and selections take longer as an alternative of sooner and really feel dangerous
- groups begin constructing their very own logic in isolation, spreading logic throughout programs
Nothing is “down” or technically damaged, but the group slowly loses management over how information is used.
On this article I define a sensible blueprint for constructing a information technique that helps you take again management and switch information into an asset as an alternative of a threat.
The Core of the Downside
It’s simple to level at know-how: perhaps the platform isn’t proper, perhaps we want an information lake, a brand new warehouse or higher tooling.
However in lots of instances that’s not the true downside.
The issue shouldn’t be the instruments. It’s the group missing a transparent approach to determine, personal, and use information constantly.
When that occurs, acquainted patterns emerge: definitions diverge, possession turns into unclear and logic spreads throughout dashboards, pipelines and advert hoc evaluation. Information shouldn’t be trusted and stops behaving like a strategic asset an begins behaving like an organizational threat.
An information technique may help resolve precisely that.
Why you want an information technique
An information technique connects the best stage of a company to essentially the most concrete selections. It hyperlinks imaginative and prescient to execution. This ensures that every one selections contribute to the group’s objectives.
An excellent information technique creates alignment throughout the group. It advantages each enterprise and IT.
- it helps ensures that information work contributes to enterprise objectives
- it provides route for troublesome selections (e.g. database alternative)
- it creates shared possession and accountability
- it builds belief by making selections extra constant and traceable.
What’s an information technique?
An information technique shouldn’t be a roadmap, listing of instruments or a set of greatest practices. It’s a chain that connects intention to motion:
An information technique defines how information is used to make selections, who’s accountable, and which trade-offs the group is prepared to make to make information work.
In observe, an information technique does two issues:
1 Outline rules (what issues)
Consider these because the guardrails. An instance might be “data is business-owned” or “definitions are shared”. These needs to be derived out of your (information) imaginative and prescient.
2 Outline selections (what you do below constraints)
The alternatives are just like the trade-offs you make. Will we select strict governance or flexibility? Batch or real-time pipelines? Will we arrange possession centrally or decentralized?
The rules outline the route, the technique emerges within the selections you make.
So a robust information technique connects organizational route (imaginative and prescient, mission) to day-to-day implementation. Many organizations skip this hyperlink step and soar straight from imaginative and prescient to e.g. instruments. They miss a vital step in between, resulting in the aforementioned issues.
Constructing a technique in three parts
Creating a technique is fairly laborious as a result of it hyperlinks the summary world of imaginative and prescient and route to the sensible world of implementation. We’ll break the information technique into three parts:
Element 1: Path
Path defines what you optimize for.

Technique ought to at all times be grounded within the group itself; primarily based off of the group’s objectives, imaginative and prescient and mission.
In case your information technique doesn’t clearly hook up with your organizational imaginative and prescient, it’s not a technique. It’s a set of initiatives.
We construct our information technique on prime of the information imaginative and prescient, which aligns with the group’s mission and imaginative and prescient:
Mission → Imaginative and prescient → Information Imaginative and prescient → Information Technique → ImplementationLet’s shortly undergo every half.
1.1. Mission & imaginative and prescient (why you exist)
The mission describes why the group exists. It’s normally steady, long-term and barely modifications.
A imaginative and prescient describes what success appears to be like like and the place the group is attempting to go.
Instance (Electrical automotive firm):
Mission: “To accelerate the world’s transition to sustainable energy”
Imaginative and prescient: “To create the most compelling car company of the 21st century by driving the world’s transition to electric vehicles.”
1.2. Information Imaginative and prescient
Defines the function of knowledge within the group and the way information helps the group’s objectives. It builds the bridge between enterprise and information.
Instance (Electrical automotive firm):
“We operates with real-time, globally accessible data to enable rapid decision-making, optimize production and distribution, and accelerate market expansion.”
1.3. Information technique (the way you make it occur)
Technique interprets route into selections. The imaginative and prescient defines the route, the information technique defines the trade-offs.
That is the place selections are made about possession, governance, construction, and working mannequin, guided by the information imaginative and prescient.
Instance (electrical automotive firm)
“Because we prioritize fast, data-driven decision-making, we choose real-time pipelines over batch processing, accepting higher complexity and cost in exchange for speed and availability.”
Element 2: Construction
On this half we create a set of deliberate selections impressed by the information imaginative and prescient. Collectively, these selections type the core of the information technique.
Within the subsequent half we’ll undergo every of the themes, outline what they’re all about, listing signs or issues that this theme ought to sole and see some clear, sensible examples.

You don’t essentially have to “implement” these theme. Use them to stress-test your information technique. Use it so see the place we made express selections and the place we’re counting on assumptions.
These 5 themes aren’t the technique itself. The technique emerges from the alternatives which are made. Briefly:
These themes don’t outline your technique; they allow you to see whether or not you even have one.
Specific vs implicit selections
If sure themes aren’t addressed explicitly, they nonetheless exist however emerge implicitly:
- implicit governance → selections made informally
- implicit definitions → tribal data as an alternative of shared that means
- implicit possession → whoever shouts the loudest
That is the place factor begin to break down. Issues like these aren’t technical, however fairly the results of lacking construction.
🧭 2.1 Alignment
How information connects to actual selections and enterprise worth.
This theme ought to encompass selections that make sure that information is tied to make use of instances and concrete selections, and contributes on to enterprise objectives. It ensures that information is used to make selections, not simply to provide info. With out this information turns into a technical train as an alternative of a enterprise asset.
What issues present up right here?
- dashboards exist, however no person makes use of them
- groups don’t know why sure information exists
- information work is pushed by IT as an alternative of enterprise wants
- unclear possession of metrics and outcomes
Examples of selections that cowl this theme:
- “We prioritize building data products for specific decisions, not generic datasets.”
This trades increased adoption and impression for much less flexibility for advert hoc evaluation - “We assign ownership of data (definitions, meaning) to business domains.”
Stronger accountability and relevance at the price of much less central management and standardization - “We focus on a limited number of use cases that directly impact business outcomes.”
Clear ROI and focus however some use instances are delayed decrease prio
🧱 2.2 Information basis
Information can’t scale with out shared that means and consistency.
This theme covers selections that make sure that information can be utilized throughout the group. Take into consideration shared and documented core definitions, constantly structured information and satisfactory metadata that explains what information means and the place it comes from.
What issues present up right here?
- the identical metric has a number of definitions
- groups argue about numbers as an alternative of utilizing them
- information is difficult to grasp with out asking somebody
- combining datasets results in inconsistencies
Examples of selections that cowl this theme
- “We define key business concepts (e.g. revenue, customer) centrally and reuse them.”
Consistency and belief at the price of pace of change and adaptability - “We enforce consistent modeling patterns across datasets.”
Simpler collaboration and reuse however much less freedom for groups - “We make data self-explanatory through documentation and lineage.”
Simpler onboarding and utilization however upfront effort and upkeep.
⚙️ 2.3 Operations
Reliability and day-to-day functioning of knowledge programs.
This theme ensures that e.g. pipelines are steady and monitored, information high quality is actively managed and safety and entry are managed. With out this information can’t be trusted, even when every part else is effectively designed.
What issues present up right here?
- pipelines break or silently fail
- information high quality points go unnoticed
- numbers all of a sudden change with out rationalization
- entry to information is inconsistent or insecure
Examples:
- “We build validation and testing into pipelines instead of fixing issues afterward.”
increased belief and reliability however extra upfront growth effort - “We actively monitor pipelines and data quality.”
sooner situation detection however extra operational overhead - “We define clear access rules for sensitive data.”
Safety and compliance however lowered ease of entry
🚀 2.4 Evolvability
How simply does your information setup adapt to alter, progress and innovation?
An information technique ought to make change simpler, not tougher.
Information needs to be modular and reusable throughout groups and domains. We must always construct on current foundations, not reinvent them. Shared that means permits groups to mix and use information with out fixed translation. With out this, change is pricey, and progress slows down.
What issues present up right here?
- each new use case requires rebuilding logic
- groups duplicate work throughout domains
- modifications are sluggish and dangerous
- scaling information use turns into painful
Examples:
- “We design data models to be reused across multiple use cases.”
Sooner future growth however extra upfront design effort - “We build loosely coupled components that can evolve independently.”
flexibility and scalability however improve design complexity - “We invest in shared meaning (e.g. semantic layers, ontologies).”
interoperability throughout groups however governance and coordination effort
🏛️ 2.5 Governance
How selections about information are made and who’s accountable.
This theme is about clearly defining possession, express decision-making processes and points which are tracked and resolved. You create construction in who owns a definition, who decides when one thing modifications and how priorities are decided.With out governance selections develop into inconsistent and points stay unresolved.
What issues present up right here?
- no person is aware of who owns a dataset or definition
- modifications occur with out coordination
- information points stay unresolved
- priorities are unclear
Examples:
- “We assign clear owners for data domains and definitions.”
Accountability however dependency on people - “We define how changes to data are proposed and approved.”
Consistency and management however slower resolution cycles - “We track and prioritize data issues transparently.”
Higher prioritization and backbone however extra overhead course of
Element 3: Execution
A technique solely issues if it turns into actuality. This element is the place we transfer from intention to operation.

That is the place many methods fail: they give the impression of being good on paper however there isn’t any concrete implementation plan that helps us embed the technique in how the group truly works.
A sensible approach to design execution is thru three dimensions:
- Individuals → who’s accountable
- Course of → the way it works
- Know-how → what helps it
If a strategic alternative shouldn’t be mirrored in folks, course of, and know-how, it doesn’t exist.
Instance: business-owned information
One a part of your technique might be:
“We want data to be owned by the business.”
We make this assertion actual by defining what wants to truly occur in the true world; e.g:
- Individuals → assign information homeowners inside enterprise domains
- Course of → outline possession workflows (definition modifications, situation dealing with, prioritization)
- Know-how → allow visibility (information catalogs, lineage, entry management)
Solely when all three are in place does possession truly exist.
Why this issues
Execution forces readability. It exposes gaps reminiscent of:
- possession with out accountability
- processes with out accountability
- instruments with out adoption
It additionally reveals trade-offs like centralized vs decentralized possession, pace vs management and adaptability vs standardization
Along with simply implementation, the execution element can be a approach to validate your technique.
For each strategic alternative, it is best to be capable to reply:
- Who owns it? (Individuals)
- How does it work? (Course of)
- What helps it? (Know-how)
If one is lacking, the technique is incomplete.
Conclusion
An information technique is a series that connects intention to motion. We’ve damaged this down in three parts:

- Path ensures that information contributes to what truly issues, with out route you construct the flawed issues.
- Construction ensures that the appropriate situations are in place. With out it, issues don’t scale or keep constant.
- Execution ensures that these situations develop into actuality, with out this nothing truly modifications.
When all three parts are aligned, selections develop into sooner, change turns into safer and belief will increase.
When information behaves like an asset as an alternative of a threat you have got an information technique that works.
I hope this text was as clear as I meant it to be but when this isn’t the case please let me know what I can do to make clear additional. Within the meantime, take a look at my different articles on every kind of programming-related subjects.
Comfortable coding!
— Mike
P.s: like what I’m doing? Comply with me!



