{"data":{"allMarkdownRemark":{"edges":[{"node":{"id":"8f5d64c5-d97b-53f4-bfd2-c28d6ade86df","excerpt":"Digital or data transformation is a significant undertaking for any organisation. To go from an almost reluctant reliance on data (where managing and understanding data across the enterprise is viewed as necessary evil) to treating data as a primary…","frontmatter":{"date":"May 29, 2018","slug":"/blog/starting-on-a-transformational-journey","title":"Starting on a data transformation journey","featuredImage":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.5,"src":"/static/b3c93af5bc3d6b11005f7316f2f849fc/6a01c/starting-journey.jpg","srcSet":"/static/b3c93af5bc3d6b11005f7316f2f849fc/fd70a/starting-journey.jpg 135w,\n/static/b3c93af5bc3d6b11005f7316f2f849fc/4aadd/starting-journey.jpg 270w,\n/static/b3c93af5bc3d6b11005f7316f2f849fc/6a01c/starting-journey.jpg 540w,\n/static/b3c93af5bc3d6b11005f7316f2f849fc/b0ea9/starting-journey.jpg 810w,\n/static/b3c93af5bc3d6b11005f7316f2f849fc/7be99/starting-journey.jpg 1080w,\n/static/b3c93af5bc3d6b11005f7316f2f849fc/9f3aa/starting-journey.jpg 5389w","sizes":"(max-width: 540px) 100vw, 540px","maxHeight":360,"maxWidth":540}}}}}},{"node":{"id":"bb9a0666-b7ba-58ea-a3bd-9931927a04b4","excerpt":"IdentityServer really is the swiss army knife of Identity & Access Management (IAM). Especially for developers. Here, I explain how it was used on a recent project.  Intro I have recently been working for a client on a cloud migration project, where…","frontmatter":{"date":"May 22, 2018","slug":"/blog/identityserver-the-iam-swiss-army-knife","title":"IdentityServer - The IAM Swiss Army Knife","featuredImage":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.5,"src":"/static/8a06de7577998c9de4d9b6c7210036d2/6a01c/swiss-army-knifes.jpg","srcSet":"/static/8a06de7577998c9de4d9b6c7210036d2/fd70a/swiss-army-knifes.jpg 135w,\n/static/8a06de7577998c9de4d9b6c7210036d2/4aadd/swiss-army-knifes.jpg 270w,\n/static/8a06de7577998c9de4d9b6c7210036d2/6a01c/swiss-army-knifes.jpg 540w,\n/static/8a06de7577998c9de4d9b6c7210036d2/b0ea9/swiss-army-knifes.jpg 810w,\n/static/8a06de7577998c9de4d9b6c7210036d2/7be99/swiss-army-knifes.jpg 1080w,\n/static/8a06de7577998c9de4d9b6c7210036d2/a0b88/swiss-army-knifes.jpg 2914w","sizes":"(max-width: 540px) 100vw, 540px","maxHeight":360,"maxWidth":540}}}}}},{"node":{"id":"45d92117-900c-52ba-99ce-0c446cdf2e5e","excerpt":"Enterprise Architecture principles are a key component of the TOGAF framework for establishing an enterprise architecture capability. This post introduces a set of enterprise architecture principles I’ve collated from the public domain.  Others can…","frontmatter":{"date":"September 04, 2017","slug":"/blog/enteprise-architecture-principles-resource","title":"Enterprise Architecture Principles Resource","featuredImage":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.5,"src":"/static/85c2997b88646727d16c371094482883/6a01c/ea-resource.jpg","srcSet":"/static/85c2997b88646727d16c371094482883/fd70a/ea-resource.jpg 135w,\n/static/85c2997b88646727d16c371094482883/4aadd/ea-resource.jpg 270w,\n/static/85c2997b88646727d16c371094482883/6a01c/ea-resource.jpg 540w,\n/static/85c2997b88646727d16c371094482883/b0ea9/ea-resource.jpg 810w,\n/static/85c2997b88646727d16c371094482883/7be99/ea-resource.jpg 1080w,\n/static/85c2997b88646727d16c371094482883/b2533/ea-resource.jpg 3859w","sizes":"(max-width: 540px) 100vw, 540px","maxHeight":360,"maxWidth":540}}}}}}]}}}