<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: William Antonio Guzmán Bernal</title>
    <description>The latest articles on DEV Community by William Antonio Guzmán Bernal (@wiangube).</description>
    <link>https://dev.to/wiangube</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1045831%2Fcdb63d1b-bc9a-4d4d-ba06-18d575467939.png</url>
      <title>DEV Community: William Antonio Guzmán Bernal</title>
      <link>https://dev.to/wiangube</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/wiangube"/>
    <language>en</language>
    <item>
      <title>Can AWS help us relive our childhood?</title>
      <dc:creator>William Antonio Guzmán Bernal</dc:creator>
      <pubDate>Wed, 01 Oct 2025 08:44:06 +0000</pubDate>
      <link>https://dev.to/aws-builders/can-aws-help-us-relive-our-childhood-15cl</link>
      <guid>https://dev.to/aws-builders/can-aws-help-us-relive-our-childhood-15cl</guid>
      <description>&lt;p&gt;I had the blessing to come from a family where love, support and affection came from my parents and siblings. I was always encouraged to do my best, and this increased my creativity through games. I grew up in Colombia during the 80s, and there was a game called “Estralandia”, which was quite similar in functionality to Lego figures. Dinosaurs, houses, helicopters, buildings... Everything I could think of, I tried to create with its red and white figures. My imagination was really the limit!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkci3lfx1ng98gn0cv89y.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkci3lfx1ng98gn0cv89y.webp" alt="Can AWS help us relive our childhood" width="800" height="450"&gt;&lt;/a&gt;&lt;br&gt;
That’s why, when I was at an AWS event for the very first time, the following phrase struck me:&lt;/p&gt;

&lt;p&gt;“Imagine that AWS is a big box of legos with which you can create things…..”&lt;/p&gt;

&lt;p&gt;And it is a quote that I still agree with. AWS is a big box with a LOT of things that allow you to build EVERYTHING.&lt;/p&gt;

&lt;p&gt;But perhaps due to stress, rush, or the day-to-day routine, you forget that these toys are not only designed to perform functions in companies, solve corporate problems, or optimize processes in industries. They should also entertain those who use them!&lt;/p&gt;

&lt;p&gt;I guess that’s why Jeff Bezos once said:&lt;/p&gt;

&lt;p&gt;“Work hard. Have fun. Make history”&lt;/p&gt;

&lt;p&gt;So, how do I keep having fun with AWS? How can I continue to marvel at the huge possibilities it allows? When I tried to answer these questions, I recalled my childhood and one of the activities I most enjoyed: creating things with my Estralandia.&lt;/p&gt;

&lt;p&gt;Immediately a new question arose: would it be possible that ‘Adult Me’ play together and have fun building stuff in AWW with ‘Inner Child Me’? Even better, how could a person over 40 years old explain to a child under 10 years old, concepts that sometimes seem so complex and unwieldy for an adult?&lt;/p&gt;

&lt;p&gt;¡Let’s give it a try!&lt;/p&gt;

&lt;p&gt;The first thing would be to tell him that in AWS we are going to work on a surface, and that this surface (despite the fact that we are going to do it on the floor) can be called ‘cloud’. In order to better explain the picture I’m trying to paint, I am going to use the LeoCAD software (&lt;a href="https://www.leocad.org/):" rel="noopener noreferrer"&gt;https://www.leocad.org/):&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fylixrc0rkiq8fg11og95.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fylixrc0rkiq8fg11og95.webp" alt="Can AWS help us relive our childhood" width="800" height="330"&gt;&lt;/a&gt;&lt;br&gt;
Then I would tell him that we would have to put up a ‘security fence’ so that our creations would not be invaded or attacked from the outside. We could do this with a barrier around what we are building.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0krijo0n5cyqvllj2upp.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0krijo0n5cyqvllj2upp.webp" alt="Can AWS help us relive our childhood" width="800" height="529"&gt;&lt;/a&gt;&lt;br&gt;
At that moment I would say that by having ‘fenced’ our cloud, we have made it private, either for our exclusive use or to give permission to those we want to access it.&lt;/p&gt;

&lt;p&gt;From here I can also explain that this functionality is not just for us, but we can also invite other children to play. By putting their figurines in our ‘virtual private cloud’ (as long as we allow it —thus introducing myself to the term ‘VPC’). We could put up a figurine in charge of letting more figurines (people) in, or not.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsp94ij6azezlv55rtv3l.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsp94ij6azezlv55rtv3l.webp" alt="Can AWS help us relive our childhood" width="800" height="410"&gt;&lt;/a&gt;&lt;br&gt;
This figurine would be responsible to confirm whether someone has a ‘username and password’ (this is especially meaningful to me because I used to love the show “Mission Impossible”). Then we can call this “combination of Username and Password” Identity, because they are precisely going to allow us to identify that person.&lt;/p&gt;

&lt;p&gt;Whoever wants to enter our VPC must first have a username and password we give them. After this, an ‘entry authentication’ to our VPC would be carried out. Also we can decide what allowances we give them, giving them ‘authorization’ within our VPC and restricting them to others. This way, if someone wanted to enter our cloud the first thing that they would find would be our gatekeeper, our “Identity and Access Manager” (IAM for short):&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fblplkilv6spb2ka8xixj.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fblplkilv6spb2ka8xixj.webp" alt="Can AWS help us relive our childhood" width="800" height="397"&gt;&lt;/a&gt;&lt;br&gt;
When our little friend IAM allows the user to enter, we can encounter the following scenarios:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fln555ll4w4m7wvq7jg4r.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fln555ll4w4m7wvq7jg4r.webp" alt="Can AWS help us relive our childhood" width="800" height="571"&gt;&lt;/a&gt;&lt;br&gt;
First scenario they can be a little ‘frustrated’, scratching their faces and saying:&lt;/p&gt;

&lt;p&gt;“How stingy! Nothing else will fits in there!”&lt;/p&gt;

&lt;p&gt;At this point, I would explain that the cloud can grow as much as we want. We could occupy the entire floor of the living room, plus the dining room, plus my parents’ bedroom, my siblings… And so. As much space as we would like to occupy! Or on the contrary, if we do not want to occupy the entire floor of the house, we could play with very few pieces. I would explain that this is one of the many advantages of the cloud, that we are able to ‘scale’ according to our needs.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhys8noxyseecxtbwc3wg.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhys8noxyseecxtbwc3wg.webp" alt="Can AWS help us relive our childhood" width="800" height="359"&gt;&lt;/a&gt;&lt;br&gt;
I would tell them that since we are not the only ones in the world playing with these tiles, there could be discounts on the tile prices for the number of children playing, and that this is called ‘economy of scale’.&lt;/p&gt;

&lt;p&gt;In my childhood I did not like mathematics very much. So then I would choose a tile that represents a calculator, so that I can perform basic functions (add, subtract, multiply and divide integers). And to confirm that these operations needed to be done quickly, we could use a rabbit to represent these functions. We can call this rabbit the “Lambda Function”, and it would allow us to use the calculator only when we need it. As long as it’s not running, this calculator isn’t going to consume any battery (or money).&lt;/p&gt;

&lt;p&gt;Once again, our IAM gatekeeper would be in charge of allowing a visiting figurine to reach our Lambda function.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmi5fsmohbomv0uz1bmcc.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmi5fsmohbomv0uz1bmcc.webp" alt="Can AWS help us relive our childhood" width="800" height="412"&gt;&lt;/a&gt;&lt;br&gt;
As a child I liked to read a lot (before I was 10 years old I had already read “The Bible” for the first time). I could spend whole afternoons reading books, with a lot of information in them, and therefore being able to find something was sometimes a real feat (at that time the Internet was not even a thought!)&lt;/p&gt;

&lt;p&gt;With that in mind, I would take the opportunity to explain the concept of being able to store information, to control it, to control who can access it, or how quickly and easily a piece of information can be found. This could be the perfect opportunity to introduce the concept of ‘databases’ and, considering that I really liked dogs, I would use this animal figurine to represent how I could find information, just as a dog would find a bone to play with.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fveb1u6du3j1wszd0cfl4.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fveb1u6du3j1wszd0cfl4.webp" alt="Can AWS help us relive our childhood" width="800" height="563"&gt;&lt;/a&gt;&lt;br&gt;
To review everything thus far, let’s start with 2 figurines that would represent the people who want to use our ‘virtual private cloud’. First they’ll encounter the entry rules, and can only go to the parts of the cloud that we have allowed them to.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3td7e48ag8un47z4b6ga.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3td7e48ag8un47z4b6ga.webp" alt="Can AWS help us relive our childhood" width="800" height="422"&gt;&lt;/a&gt;&lt;br&gt;
Something to keep in mind is the importance of knowing who is doing what and where. Having that ‘ability to record’ (groups of logs) what happens in our cloud is vital. For that purpose we could have a ‘little notebook’ on the important points.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fad2pzlibbps71oex5mx8.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fad2pzlibbps71oex5mx8.webp" alt="Can AWS help us relive our childhood" width="800" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fym04q2uunorsouhndcwu.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fym04q2uunorsouhndcwu.webp" alt="Can AWS help us relive our childhood" width="800" height="405"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp13zsyhdtntx4l57zphc.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp13zsyhdtntx4l57zphc.webp" alt="Can AWS help us relive our childhood" width="800" height="392"&gt;&lt;/a&gt;&lt;br&gt;
These records (or logs) could go to a single central point throughout our cloud, so that our ‘watchman’ could have a broader viewpoint of our entire system. We are going to call this watchman (represented by an owl) “CloudWatch”, and we can ask him for each event that has happened and that has been registered in our cloud.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa7txpdime5uphileyuv8.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa7txpdime5uphileyuv8.webp" alt="Can AWS help us relive our childhood" width="800" height="616"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4wnz3zrvorktb2onfgyh.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4wnz3zrvorktb2onfgyh.webp" alt="Can AWS help us relive our childhood" width="800" height="480"&gt;&lt;/a&gt;&lt;br&gt;
Finally, I would keep in mind that some of the figurines could potentially have associated cost. Typically, the figurines would only incur a cost for as long as they are used (‘on demand’). All these values should also be centralized in a single point of billing and costs, which we can call “Billing and Cost Management”.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frfd6hdnaabr1vpp59kxr.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frfd6hdnaabr1vpp59kxr.webp" alt="Can AWS help us relive our childhood" width="800" height="377"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7aq3xvtdrxghnx41lgqm.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7aq3xvtdrxghnx41lgqm.webp" alt="Can AWS help us relive our childhood" width="800" height="504"&gt;&lt;/a&gt;&lt;br&gt;
It would be great if, at the end of playing, my ‘Current Self’ asked my ‘Child Self’:&lt;/p&gt;

&lt;p&gt;“Did you like the game? What do you think of AWS? Would you like to keep playing with AWS and keep building and learning more?”&lt;/p&gt;

&lt;p&gt;I think that last question applies consistently to all of us who are currently developing solutions with Amazon Web Services.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp5y5apnjzchsjjslgtrw.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp5y5apnjzchsjjslgtrw.webp" alt="Can AWS help us relive our childhood" width="800" height="529"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>vpc</category>
      <category>iam</category>
      <category>lambda</category>
    </item>
    <item>
      <title>Can some Biblical Principles be applied in the Amazon Leadership Principles?</title>
      <dc:creator>William Antonio Guzmán Bernal</dc:creator>
      <pubDate>Tue, 30 Sep 2025 15:38:19 +0000</pubDate>
      <link>https://dev.to/wiangube/can-some-biblical-principles-be-applied-in-the-amazon-leadership-principles-8kg</link>
      <guid>https://dev.to/wiangube/can-some-biblical-principles-be-applied-in-the-amazon-leadership-principles-8kg</guid>
      <description>&lt;p&gt;Next, I present an exclusively personal analysis.&lt;/p&gt;

&lt;p&gt;I believe in God as my Lord and my Heavenly Father. I believe in Jesus as my Savior and Teacher. And I believe in the Holy Spirit as my Guide and Counselor. I have seen how the Word of God has manifested itself in a powerful way in different aspects of my life. And as an IT Professional, I have been curious to know if the lessons offered by “The Bible” also have a place in my profession.&lt;/p&gt;

&lt;p&gt;I wasn’t surprised to confirm it does.&lt;br&gt;
To begin my analysis, I checked the “Leadership Principles” of Amazon, precisely because Amazon Web Services is the Leader in Cloud Computing, an area that I wanted to analyze.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.amazon.jobs/content/en/our-workplace/leadership-principles" rel="noopener noreferrer"&gt;https://www.amazon.jobs/content/en/our-workplace/leadership-principles&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The first of these principles is “Customer Obsession”, which establishes that:&lt;/p&gt;

&lt;p&gt;“Leaders start with the customer and work backwards. They work vigorously to earn and keep customer trust. Although leaders pay attention to competitors, they obsess over customers.”&lt;/p&gt;

&lt;p&gt;This reminded me of when Jesus was somehow questioned about the commandments in the law (Matthew 22:35–40):&lt;/p&gt;

&lt;p&gt;“One of them, an expert in the law, tested him with this question: Teacher, which is the greatest commandment in the Law? Jesus replied: ‘Love the Lord your God with all your heart and with all your soul and with all your mind.’ This is the first and greatest commandment. And the second is like it: ‘Love your neighbour as yourself.’ All the Law and the Prophets hang on these two commandments.”&lt;/p&gt;

&lt;p&gt;I want to emphasize “Love your neighbor as yourself”, since a client is a person or group of people who put their trust in us when they express their concerns or needs for Cloud Computing related projects. The Bible reminds us on several occasions of the value of trust, one of them being in Proverbs 3:29:&lt;/p&gt;

&lt;p&gt;“Do not plot harm against your neighbor, who lives trustfully near you.”&lt;/p&gt;

&lt;p&gt;For this reason, it is our responsibility to take the concerns or needs of our clients as if they were our own, and give them the priority and importance they deserve.&lt;/p&gt;

&lt;p&gt;In this same ‘thinking methodology’ about our clients as if they were ourselves, we find a benefit of cloud computing: “Cost savings”.&lt;/p&gt;

&lt;p&gt;“The cloud allows you to trade fixed expenses (such as data centers and physical servers) for variable expenses, and only pay for IT as you consume it. Plus, the variable expenses are much lower than what you would pay to do it yourself because of the economies of scale.”&lt;/p&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/what-is-cloud-computing/" rel="noopener noreferrer"&gt;https://aws.amazon.com/what-is-cloud-computing/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This benefit should be present in any solution to be implemented in the AWS Cloud. Not surprisingly, Amazon Web Services dedicates an entire pillar within its Well-Architected Framework (AWS Well-Architected Framework, &lt;a href="https://aws.amazon.com/architecture/well-architected" rel="noopener noreferrer"&gt;https://aws.amazon.com/architecture/well-architected&lt;/a&gt;) to Cost Optimization:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/cost-optimization-pillar/welcome.html" rel="noopener noreferrer"&gt;https://docs.aws.amazon.com/wellarchitected/latest/cost-optimization-pillar/welcome.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So far in my mind I had an idea similar to this:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd7yz943chtfz0smgs84p.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd7yz943chtfz0smgs84p.webp" alt="Biblical Principles applied in the Amazon Leadership Principles" width="800" height="383"&gt;&lt;/a&gt;&lt;br&gt;
In order to protect the interests of our clients and meet their needs, it is important to keep in constant learning and training. Almost every day new services are being created or new features are added to existing services on AWS. Trying to know each and every one of them can be a exhausting task, but one way to be aware (at least) of these news is to consult the official AWS blog page:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/blogs/" rel="noopener noreferrer"&gt;https://aws.amazon.com/blogs/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;and once in that website, select the topics that attract you the most or represent a greater individual interest. In my case I recommend at least the blogs of:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Architecture:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23architecture" rel="noopener noreferrer"&gt;https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23architecture&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS Cloud Financial Management:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23aws-cloud-financial-management" rel="noopener noreferrer"&gt;https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23aws-cloud-financial-management&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS Well-Architected:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23aws-well-architected" rel="noopener noreferrer"&gt;https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23aws-well-architected&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Analytics:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23analytics" rel="noopener noreferrer"&gt;https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23analytics&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Big Data:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23big-data" rel="noopener noreferrer"&gt;https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23big-data&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Developer Tools:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23developer-tools" rel="noopener noreferrer"&gt;https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23developer-tools&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Management &amp;amp; Governance:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23management-tools" rel="noopener noreferrer"&gt;https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23management-tools&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Security, Identity, &amp;amp; Compliance:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23security-identity-compliance" rel="noopener noreferrer"&gt;https://aws.amazon.com/blogs/?&amp;amp;awsf.blog-master-category=category%23security-identity-compliance&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Regardless of the strategy or tool used, it is important to apply the “Learn and Be Curious” Leadership principle, which states that:&lt;/p&gt;

&lt;p&gt;“Leaders are never done learning and always seek to improve themselves. They are curious about new possibilities and act to explore them.”&lt;/p&gt;

&lt;p&gt;In this sense, The Bible gives us (once again) several verses where it supports us and invites us to learn and acquire intelligence and wisdom. One of them is found in Proverbs 12:1:&lt;/p&gt;

&lt;p&gt;“Whoever loves discipline loves knowledge, whoever hates correction is stupid.”&lt;/p&gt;

&lt;p&gt;Fortunately, learning doesn’t necessarily have to be restricted to just one pillar of the AWS Well-Architect framework. It can be applied to all 6 pillars, including the remaining 5:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Operational Excellence:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/operational-excellence-pillar/welcome.html" rel="noopener noreferrer"&gt;https://docs.aws.amazon.com/wellarchitected/latest/operational-excellence-pillar/welcome.html&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Security:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/welcome.html" rel="noopener noreferrer"&gt;https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/welcome.html&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Reliability:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/reliability-pillar/welcome.html" rel="noopener noreferrer"&gt;https://docs.aws.amazon.com/wellarchitected/latest/reliability-pillar/welcome.html&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Performance Efficiency:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/performance-efficiency-pillar/welcome.html" rel="noopener noreferrer"&gt;https://docs.aws.amazon.com/wellarchitected/latest/performance-efficiency-pillar/welcome.html&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Sustainability:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/sustainability-pillar/sustainability-pillar.html" rel="noopener noreferrer"&gt;https://docs.aws.amazon.com/wellarchitected/latest/sustainability-pillar/sustainability-pillar.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So now in my mind the ‘scheme’ was modified as follows:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff3mpe8muo3xhjd3hfqsw.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff3mpe8muo3xhjd3hfqsw.webp" alt="Biblical Principles applied in the Amazon Leadership Principles" width="800" height="756"&gt;&lt;/a&gt;&lt;br&gt;
Another leadership principle at Amazon invites us to support the growth of the members of our team. It takes quite an ‘altruistic’ spirit to understand that this may even mean that such growth is present in other areas of the company. I’m referring to the “Hire and Develop the Best” principle, which establishes that:&lt;/p&gt;

&lt;p&gt;“Leaders raise the performance bar with every hire and promotion. They recognize exceptional talent, and willingly move them throughout the organization. Leaders develop leaders and take seriously their role in coaching others. We work on behalf of our people to invent mechanisms for development like Career Choice.”&lt;/p&gt;

&lt;p&gt;I find this principle quite interesting, since it allows a ‘mentorship’ environment that is established almost as company policy. It is about understanding that not everyone have the same learning process, and we all rerequire ‘training’ in order to develop personally and professionally in the company. And if this learning involves from the beginning the design principles in each of the pillars of the AWS Well-Architected Framework, the person will be able to assimilate them more easily and incorporate them into their daily performance.&lt;/p&gt;

&lt;p&gt;It is also interesting to see how within the learning that exists between ‘Teacher — Student’ the 2 previous principles can and should be incorporated (“Customer Obsession” and “Learn and Be Curious”).&lt;/p&gt;

&lt;p&gt;For this statement we could take as biblical support the verse found in Proverbs 22:6:&lt;/p&gt;

&lt;p&gt;“Start children off on the way they should go, and even when they are old they will not turn from it.”&lt;/p&gt;

&lt;p&gt;Including this 3rd principle, my ‘mental map’ was modified:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6omn9uvhtonhqfdmgwln.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6omn9uvhtonhqfdmgwln.webp" alt="Biblical Principles applied in the Amazon Leadership Principles" width="800" height="478"&gt;&lt;/a&gt;&lt;br&gt;
I try in my daily activities to remember that beyond doing them for a person, I am doing them for God, applying what Colossians 3:23 teaches:&lt;/p&gt;

&lt;p&gt;“Whatever you do, work at it with all your heart, as working for the Lord, not for human masters,”&lt;/p&gt;

&lt;p&gt;It doesn’t mean that perfection is achieved (since only God is perfect), but as Vince Lombardi, American United States Football coach, said:&lt;/p&gt;

&lt;p&gt;“Perfection is not attainable, but if we chase perfection, we can catch excellence”&lt;/p&gt;

&lt;p&gt;And it is precisely this ‘pursuit of excellence’ that Amazon’s leadership principle “Insist on the Highest Standards” is about:&lt;/p&gt;

&lt;p&gt;“Leaders have relentlessly high standards — many people may think these standards are unreasonably high. Leaders are continually raising the bar and drive their teams to deliver high quality products, services, and processes. Leaders ensure that defects do not get sent down the line and that problems are fixed so they stay fixed.”&lt;/p&gt;

&lt;p&gt;Again, this foundation should be instilled in people who are beginning to walk through the Amazon Leadership Principles.&lt;/p&gt;

&lt;p&gt;For this first analysis, my resulting schema is as follows:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F07g0c2n7g5pd6jhk4jlu.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F07g0c2n7g5pd6jhk4jlu.webp" alt="Biblical Principles applied in the Amazon Leadership Principles" width="800" height="351"&gt;&lt;/a&gt;&lt;br&gt;
I hope in future opportunities to continue the analysis of the Amazon Leadership Principles, and their possible correlation with some Biblical Principles.&lt;/p&gt;

</description>
      <category>career</category>
      <category>discuss</category>
      <category>management</category>
      <category>aws</category>
    </item>
    <item>
      <title>Data Governance… when there's no Data nor Governance</title>
      <dc:creator>William Antonio Guzmán Bernal</dc:creator>
      <pubDate>Mon, 06 Jan 2025 20:37:19 +0000</pubDate>
      <link>https://dev.to/aws-builders/data-governance-when-theres-no-data-nor-governance-2lbi</link>
      <guid>https://dev.to/aws-builders/data-governance-when-theres-no-data-nor-governance-2lbi</guid>
      <description>&lt;p&gt;In 2006, during the Association of National Advertisers Conference, the following phrase was used for the first time: &lt;em&gt;&lt;strong&gt;"Data is the new oil (Clive Humby)"&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Filvwpoq67mig2ay2khtc.jpg" title="Data is the new oil (Clive Humby)" alt="Data is the new oil (Clive Humby)" width="800" height="571"&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Data is the new oil (Clive Humby)&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;It was the Mathematician and Data Scientist Clive Humby who 'coined' this phrase to express that both data and oil share key points (&lt;a href="https://www.forbes.com/sites/nishatalagala/2022/03/02/data-as-the-new-oil-is-not-enough-four-principles-for-avoiding-data-fires/" rel="noopener noreferrer"&gt;Data as The New Oil Is Not Enough: Four Principles For Avoiding Data Fires&lt;/a&gt;) among them, high value (which gives companies significant competitive advantages), serves as raw material (which must be processed and analyzed), drives growth (helps the digital revolution), has the gift of ubiquity (being crucial in several industries) and, last but not least, represents risks and considerations (privacy, security, monopolization, among others)..&lt;/p&gt;

&lt;p&gt;In an ideal scenario, we could assume that companies are just starting their data projects and we can propose everything from scratch, following the Best Practices available. But what to do when they already have data and there are already projects underway? It could even happen that they do not have visibility over all the data and information they are generating, and therefore, they do not have adequate management to access this data.&lt;/p&gt;

&lt;p&gt;They probably require our support in order to get the most out of them, in the most cost-efficient way possible, and with constant optimization. With this objective in mind, a first step would be to identify what type of industry or vertical they belong to. To make this classification, we could remember that each company starts with one or several inputs, which may or may not undergo processes to generate products that will ultimately be purchased by customers or end users. With these elements in common, we could classify companies into the following categories: (&lt;a href="https://www.netsuite.com/portal/resource/articles/erp/manufacturing-supply-chains.shtml" rel="noopener noreferrer"&gt;Manufacturing Supply Chains Explained | NetSuite&lt;/a&gt;): Products / Services, Suppliers and Vendors, Raw Materials, Production, Storage and Warehousing, Distribution / Transportation, Retailers, Maintenance and Repair, or Recycling.&lt;/p&gt;

&lt;p&gt;At this point, we should be able to clearly identify which industry or vertical the company we want to support belongs to. The next step is to confirm whether the company has full visibility of its data. In other words, does the company know what data it has, what it needs to monitor, and what it should be leveraging? To address these concerns, we could look for data in reports, dashboards, metrics, Key Performance Indicators (KPIs), notifications/alerts, and corporate objectives.&lt;/p&gt;

&lt;p&gt;Our first point of contact could be the stakeholders or BI analysts within the company. Why them? Because they are usually the ones who have access to the already processed data, they are the ones who make the decisions or support those who make them, so that everything is as informed as possible.&lt;/p&gt;

&lt;p&gt;In some cases, this data access is done through BI tools (such as Amazon QuickSight) or through SQL queries (using services such as Amazon Athena).&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flc1w6ni0g5e5hzcm5v2l.png" title="Data Consumption Reference Architecture" alt="Data Consumption Reference Architecture" width="522" height="521"&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Data Consumption Reference Architecture&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;But we can't just ask them, as such a conversation wouldn't be the most 'friendly' at the time. As consultants we should avoid conversations like this:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Consultant:&lt;/strong&gt;&lt;/em&gt; What dashboards do we have?&lt;br&gt;
&lt;em&gt;&lt;strong&gt;BI Analyst/Stakeholder:&lt;/strong&gt;&lt;/em&gt; Why? What do you need?&lt;/p&gt;

&lt;p&gt;Remember that we cannot find the right answers if we ask the wrong questions. Instead of having the above conversation, we could have this conversation:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Consultant:&lt;/strong&gt; I would like to help improve/optimize our processes. Where can I find information to get started? Especially related to the data we collect/process. Where should I look first?&lt;br&gt;
&lt;strong&gt;BI Analyst/Stakeholder:&lt;/strong&gt;&lt;br&gt;
a) You should ask …&lt;br&gt;
b) You can't, because for that you would have to belong to the team/area of…&lt;br&gt;
c) You need authorization from…&lt;br&gt;
d) You can check our Intranet, check this page….&lt;br&gt;
&lt;strong&gt;Consultant:&lt;/strong&gt; Ok, thank you very much.&lt;/p&gt;

&lt;p&gt;We start with a friendly approach, we put ourselves in the person's shoes. We know that we are doing something for the good of the company, but we do not want to be seen as a risk or danger to anyone. In some circumstances or companies, when someone asks this type of question it could generate distrust and we need to earn the trust of the work team. In addition, following the last example, the BI analyst or stakeholder could be guiding us (in a natural and fluid way) to one or several sponsors that we require for our work.&lt;/p&gt;

&lt;p&gt;In other cases, the answers to this first conversation could lead us directly to the Potential Owner(s) of the Existing Data, which could be IT, Support or Maintenance Personnel. We could ask them what Protocols or Compliance are already implemented in the company, if there is a User Profiling, or even if they have a Cloud Center of Excellence. (AWS Cloud Center of Excellence, &lt;a href="https://docs.aws.amazon.com/prescriptive-guidance/latest/cloud-center-of-excellence/ccoe-tenets.html" rel="noopener noreferrer"&gt;The CCoE tenets - AWS Prescriptive Guidance&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;At this point it would be important to pause. What would happen if someone asked you NOT to think about a red box?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyw7qo4rhyt03idr77iho.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyw7qo4rhyt03idr77iho.png" title="Red Box" alt="Red Box" width="241" height="241"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;VERY likely the first thing that will come to mind is precisely the red box. This is because our brain reacts differently to a negative response than you would think. (&lt;a href="https://www.nyu.edu/about/news-publications/news/2024/may/how-does--not--affect-what-we-understand--scientists-find-negati.html" rel="noopener noreferrer"&gt;How Does “Not” Affect What We Understand? Scientists Find Negation Mitigates Our Interpretation of Phrases&lt;/a&gt;). By telling someone “NOT to think about a red box,” the brain is actually mitigating that thought, rather than reversing it. In other words, our brain would think about a red box, only smaller. For this reason, it is important to be careful about our communication with other people (&lt;em&gt;“Don’t think about the costs…”&lt;/em&gt; vs. &lt;em&gt;“Think about the benefits…”&lt;/em&gt;) and even with ourselves (&lt;em&gt;“I am going to learn/start/do…”&lt;/em&gt; vs. &lt;em&gt;“I am learning/starting/doing…”&lt;/em&gt;).&lt;/p&gt;

&lt;p&gt;We can start to guess that we are going to have quite a few interactions with the client's team. So, let's get ready for meetings!&lt;/p&gt;

&lt;p&gt;Some points to consider when having meetings:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Listen to understand, not to respond. Also, listen with your eyes (establish and maintain respectful eye contact).&lt;/li&gt;
&lt;li&gt;Take notes (this can be on sheets of paper), but do not take dictation, i.e. do not type on a keyboard, as this can sometimes cause distractions and give the client the feeling that they are not being listened to properly. In this regard, it is best to ask for permission to record the meeting.&lt;/li&gt;
&lt;li&gt;Get as much context as possible before starting the meeting (who the client is, what they are about, what their products or services are, their potential competitors…)&lt;/li&gt;
&lt;li&gt;During the course of the meeting, identify whether the meeting attendees have an administrative, commercial/sales, or technical/development profile (or even a combination of these).&lt;/li&gt;
&lt;li&gt;For each of the attendees, also identify knowledge of the project, business, needs or requirements; clarity of objectives; technical level&lt;/li&gt;
&lt;li&gt;BANT (Budget, Authority, Needs, Timing)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffth6kq3rtjgdnjozpaew.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffth6kq3rtjgdnjozpaew.png" title="Who - Why" alt="Who - Why" width="644" height="189"&gt;&lt;/a&gt;&lt;br&gt;
where we can have:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;&lt;strong&gt;Who =&lt;/strong&gt;&lt;/em&gt; Ejecutivos C-Level; Product Owners; Project Managers; Business Analysts; External Dependencies; Sales Representatives; Developers; Designers; Architects&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;&lt;strong&gt;Why =&lt;/strong&gt;&lt;/em&gt; Company-level goals (H1, H2, Q1…); Optimization, Automation, or Improvements; Success Criteria; Metrics or KPIs; SLAs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If we have the &lt;em&gt;&lt;strong&gt;“Who”&lt;/strong&gt;&lt;/em&gt; and the &lt;em&gt;&lt;strong&gt;“Why”&lt;/strong&gt;&lt;/em&gt;, organically we will obtain the &lt;em&gt;&lt;strong&gt;“What”&lt;/strong&gt;&lt;/em&gt; for each one of the participants. The &lt;em&gt;&lt;strong&gt;“How”&lt;/strong&gt;&lt;/em&gt; will come later.&lt;/p&gt;

&lt;p&gt;One mistake to avoid when trying to identify data (and its corresponding governance) is to postpone contact with the purely technical team. This could create a ‘resistance or refusal’ to collaborate in our purpose of analyzing data that may require more detailed control. For this reason, it is important to involve the IT team in charge of observability, maintenance, access and security of the platform we are analyzing. Some of the services that the IT team may be using in their tasks in AWS may be IAM, CloudWatch, EventBridge and SNS.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6ew2dc6tuufxcj7nil6f.png" title="Reference Architecture IT Team" alt="Reference Architecture IT Team" width="642" height="801"&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Reference Architecture IT Team&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;If we want to find out what data may be being overlooked, we should answer these questions: Are there standard metrics in that industry? KPIs? And for this point we can rely on institutions, organizations, best practices of each industry, among others. Some examples could be, depending on the industry:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Financial (&lt;a href="https://hub-analytics.com/financial-metrics-to-track/" rel="noopener noreferrer"&gt;15 Essential Financial Metrics for Advisors, Consultants, and Investors&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Healthcare (&lt;a href="https://www.clearpointstrategy.com/blog/25-healthcare-metrics-kpis" rel="noopener noreferrer"&gt;30 Healthcare KPIs &amp;amp; Metrics To Start Tracking Today&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Software (&lt;a href="https://www.maxio.com/blog/saas-metrics" rel="noopener noreferrer"&gt;7 SaaS Metrics Every SaaS Company Should Care About&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Security (&lt;a href="https://www.breachsense.com/blog/data-security-metrics/" rel="noopener noreferrer"&gt;18 Data Security Metrics &amp;amp; KPIs You Need To Track&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The goal is to find out which metrics are not being considered by the client.&lt;/p&gt;

&lt;p&gt;Before you start ‘touching the data’, it is worth asking yourself the following questions related to Security (a topic that should be included from the ‘initial moment’). Investigate whether there are security protocols and, if they do not exist, propose one based on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What data is handled in the organization?&lt;/li&gt;
&lt;li&gt;Why does this data exist?&lt;/li&gt;
&lt;li&gt;Who owns the data? Who should own it?&lt;/li&gt;
&lt;li&gt;Who needs access to what data?&lt;/li&gt;
&lt;li&gt;Who should authorize that access?&lt;/li&gt;
&lt;li&gt;How long should this access be granted?&lt;/li&gt;
&lt;li&gt;How should this access be authorized (email, ticket...)?&lt;/li&gt;
&lt;li&gt;Where should the data be stored?&lt;/li&gt;
&lt;li&gt;Are there compliance laws or regulations applied to that data (local, national or global)?&lt;/li&gt;
&lt;li&gt;What are the actions to be taken in the event of a data leak or breach?&lt;/li&gt;
&lt;li&gt;Are there data backup or retention policies?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is an excellent time to create a flow chart of the lifecycle of that data explaining the protocol created, and organize meetings to inform the appropriate people. Again, involving people in data governance management gives them the proper treatment of respect and consideration in the decisions to be made.&lt;/p&gt;

&lt;p&gt;Once this ‘draft data security protocol’ has been drawn up, the analysis of the data flow (from right to left) can continue.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5ic135wlpgeca3oxilgx.png" title="Reference Architecture Security" alt="Reference Architecture Security" width="800" height="695"&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Reference Architecture Security&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;It is always good to remember that, like any architecture to be deployed in AWS, it should be guided by the Key Concepts, Design Principles and Architecture Best Practices contained in the &lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/framework/welcome.html" rel="noopener noreferrer"&gt;AWS Well-Architected Framework&lt;/a&gt;, which includes the following pillars:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Operational excellence&lt;/li&gt;
&lt;li&gt;Security&lt;/li&gt;
&lt;li&gt;Reliability&lt;/li&gt;
&lt;li&gt;Performance efficiency&lt;/li&gt;
&lt;li&gt;Cost optimization&lt;/li&gt;
&lt;li&gt;Sustainability&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;At this point we can introduce the concept of Governance (&lt;a href="https://aws.amazon.com/products/management-and-governance/" rel="noopener noreferrer"&gt;Management and Governance on AWS&lt;/a&gt;) como &lt;em&gt;“the ability to implement executive board policies that your AWS cloud environment must comply with”&lt;/em&gt; (&lt;a href="https://aws.amazon.com/solutions/guidance/governance-on-aws/" rel="noopener noreferrer"&gt;Guidance for Governance on AWS&lt;/a&gt;). The power of AWS is that this concept is not 'bound' or 'restricted' to a particular point or area, but can be applied &lt;em&gt;“across the AWS ecosystem, including accounts, infrastructure, and environments owned and operated in the AWS Cloud”&lt;/em&gt; (&lt;a href="https://aws.amazon.com/cloudops/cloud-governance/" rel="noopener noreferrer"&gt;Cloud Governance&lt;/a&gt;).&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo4ot7sa6fq84a5g4lqjd.png" title="Reference Architecture Governance" alt="Reference Architecture Governance" width="800" height="571"&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Reference Architecture Governance&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Now it’s time to give the ‘official welcome’ to the Technical and Development Area!&lt;/p&gt;

&lt;p&gt;Let's remember that we must preserve the essence of teamwork:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;stakeholders,&lt;/li&gt;
&lt;li&gt;IT team,&lt;/li&gt;
&lt;li&gt;security,&lt;/li&gt;
&lt;li&gt;governance&lt;/li&gt;
&lt;li&gt;and now, development&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By understanding who each of these areas is, and why they should be involved in data governance, we can understand what each area really does and then analyze the best way to actively involve them in generating Data Governance.&lt;/p&gt;

&lt;p&gt;Ask in each area how they are now. (&lt;em&gt;&lt;strong&gt;“As Is”&lt;/strong&gt;&lt;/em&gt;), if there are differences with respect to the goals that should have already been met at that time (&lt;em&gt;&lt;strong&gt;“To Be”&lt;/strong&gt;&lt;/em&gt;), and how they think they should be (&lt;em&gt;&lt;strong&gt;“Should Be”&lt;/strong&gt;&lt;/em&gt;).&lt;/p&gt;

&lt;p&gt;This analysis will probably lead to definitions of technology stacks, dependencies (both internal and external), possible automations, documentation protocols and testing. Remember that &lt;em&gt;“Documentation is a love letter that you write to your future selves.”&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Also keep in mind this simple &lt;em&gt;'formula'&lt;/em&gt;:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Monitoring + Alerts + Responses = Sleep Well&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This goes hand in hand with confirming whether there are disaster recovery plans.&lt;/p&gt;

&lt;p&gt;Also confirming whether there are corporate standards for coding, Best Practices to follow, patterns; whether internal talks are held to share knowledge (chapters).&lt;/p&gt;

&lt;p&gt;If at any point we find that something is missing to implement or create, if possible propose it. To summarize in one sentence:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Be discreetly disruptive!&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Continuing with our analysis from ‘right to left’, we could now ask ourselves this question: where are we going to get (or are we already getting) our data from?&lt;/p&gt;

&lt;p&gt;For this, there is a set of representative AWS services to take data from different sources, which could be ‘cataloged’ in a data ingestion layer.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faantg33gwundrw7qn34f.png" title="Reference Architecture - Data Ingestion" alt="Reference Architecture - Data Ingestion" width="800" height="400"&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Reference Architecture - Data Ingestion&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Let's look at which of these services (or similar ones) are currently in use, which data sources they are connected to, and which data is NOT being brought to consumption by stakeholders or IT. We may be looking at useful, unused data.&lt;/p&gt;

&lt;p&gt;When we find this &lt;em&gt;'orphaned'&lt;/em&gt; data (it is being ingested but does not have a 'parent' in the consumption area), we can find ourselves in the last layer we are going to review: the data processing area.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc8oit5mthbpbx3ludcn8.png" title="Reference Architecture - Data Processing" alt="Reference Architecture - Data Processing" width="800" height="348"&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Reference Architecture - Data Processing&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;If we wanted to summarize the mental process for generating data governance in companies that do not currently have it, involving data that may have gone unnoticed until now, we could say that we need to identify:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;data&lt;/li&gt;
&lt;li&gt;stakeholders&lt;/li&gt;
&lt;li&gt;BI components&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;already existing, to then propose:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;missing BI components&lt;/li&gt;
&lt;li&gt;required protocols&lt;/li&gt;
&lt;li&gt;automation / optimization&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In the course of this analysis, the most important thing is to always remember that we are dealing with a human factor, susceptible to errors, feelings, personal and group objectives. With the best possible intention and will, always have empathy for each and every person who gives us their time, experience and advice to achieve building an effective and useful Data Governance for the company.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>data</category>
      <category>governance</category>
      <category>cloudcomputing</category>
    </item>
    <item>
      <title>Gobierno de Datos… cuando no hay Gobierno ni Datos</title>
      <dc:creator>William Antonio Guzmán Bernal</dc:creator>
      <pubDate>Mon, 06 Jan 2025 16:28:12 +0000</pubDate>
      <link>https://dev.to/aws-builders/gobierno-de-datos-cuando-no-hay-gobierno-ni-datos-ahi</link>
      <guid>https://dev.to/aws-builders/gobierno-de-datos-cuando-no-hay-gobierno-ni-datos-ahi</guid>
      <description>&lt;p&gt;En el año 2006 durante la Conferencia de la Asociación Nacional de Anunciantes se utilizó por primera vez la frase: &lt;em&gt;&lt;strong&gt;"Los Datos son el nuevo Petróleo (Clive Humby)"&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Filvwpoq67mig2ay2khtc.jpg" title="Los Datos son el nuevo Petróleo (Clive Humby)" alt="Los Datos son el nuevo Petróleo (Clive Humby)" width="800" height="571"&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Los Datos son el nuevo Petróleo (Clive Humby)&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Fue el Matemático y Científico de Datos Clive Humby quien ‘acuñó’ esta frase para expresar que tanto los datos como el petróleo comparten puntos clave (&lt;a href="https://www.forbes.com/sites/nishatalagala/2022/03/02/data-as-the-new-oil-is-not-enough-four-principles-for-avoiding-data-fires/" rel="noopener noreferrer"&gt;Data as The New Oil Is Not Enough: Four Principles For Avoiding Data Fires&lt;/a&gt;) entre ellos un alto valor (que le otorga a las empresas ventajas competitivas significativas), sirven de materia prima (la cual debe ser procesada y analizada), impulsa el crecimiento (ayuda a la revolución digital), tiene el don de la ubicuidad (al ser crucial en varias industrias) y, finalmente pero no menos importante, representa riesgos y consideraciones (privacidad, seguridad, monopolización, entre otros).&lt;/p&gt;

&lt;p&gt;En un escenario ideal podríamos suponer que las empresas están comenzando sus proyectos de datos y se puede proponer todo desde cero, siguiendo las mejores prácticas disponibles. Pero, ¿qué hacer cuando ya tienen datos y ya existen proyectos en curso? Incluso podría suceder que no tengan visibilidad sobre todos los datos e información que estén generando, y por ende, tampoco tengan una administración adecuada para acceder a estos datos.&lt;/p&gt;

&lt;p&gt;Probablemente requieran de nuestro apoyo para poder obtener el mayor provecho de ellos, de la manera más eficiente posible en costos, y con una optimización constante. Con este objetivo en mente, un primer paso sería identificar a qué tipo de industria o vertical pertenece. Para hacer esta clasificación podríamos recordar que cada empresa comienza con uno o varios insumos, los cuales pueden o no someterse a procesos para generar productos que finalmente serán adquiridos por los clientes o usuarios finales. Con estos elementos en común, podríamos clasificar las empresas en las siguientes categorías (&lt;a href="https://www.netsuite.com/portal/resource/articles/erp/manufacturing-supply-chains.shtml" rel="noopener noreferrer"&gt;Manufacturing Supply Chains Explained | NetSuite&lt;/a&gt;): Productos/servicios, Proveedores y vendedores, Materias primas, Producción, Almacenamiento y depósito, Distribución / Transporte, Minoristas, Mantenimiento y reparación, o Reciclaje.&lt;/p&gt;

&lt;p&gt;En este punto deberíamos poder identificar con claridad a qué industria o vertical pertenece la empresa que deseamos apoyar. El siguiente paso es confirmar si dicha empresa tiene visibilidad completa de sus datos. En otras palabras, ¿la empresa sabe qué datos tiene, cuáles le falta supervisar, y cuáles debería estar aprovechando? Para resolver estas inquietudes podríamos buscar datos en informes, dashboards, métricas, Indicadores Clave de Rendimiento (KPI), notificaciones/alertas, y objetivos corporativos.&lt;/p&gt;

&lt;p&gt;Nuestro primer punto de contacto podrían ser los stakeholders o analistas BI dentro de la empresa. ¿Por qué ellos? Porque por lo general son ellos quienes tienen acceso a los datos ya procesados, son los que toman las decisiones o apoyan a quienes las toman, para que todo sea de la manera más informada posible.&lt;/p&gt;

&lt;p&gt;En algunos casos este acceso a los datos se realiza a través de herramientas BI (como por ejemplo, Amazon QuickSight) o por consultas SQL (utilizando servicios como Amazon Athena).&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F464ustrp8ozzkf5ll462.png" title="Arquitectura Referencial de Consumo de Datos" alt="Arquitectura Referencial de Consumo de Datos" width="521" height="521"&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Arquitectura Referencial de Consumo de Datos&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Pero no podemos llegar simplemente a preguntarles, ya que dicha conversación no sería la más ‘amigable’ en un momento. Como consultores deberíamos evitar conversaciones como esta:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Consultor:&lt;/strong&gt;&lt;/em&gt; ¿Qué dashboards tenemos?&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Analista BI/Stakeholder:&lt;/strong&gt;&lt;/em&gt; ¿Por qué? ¿Qué necesita?&lt;/p&gt;

&lt;p&gt;Recordemos que no podemos encontrar las respuestas correctas si hacemos las preguntas equivocadas. En vez de tener la anterior conversación, podríamos seguir esta charla:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Consultor:&lt;/strong&gt; Me gustaría ayudar a mejorar/optimizar nuestros procesos. ¿Dónde puedo encontrar información para comenzar? Especialmente la relacionada con los datos que recopilamos/procesamos. ¿Dónde debería revisar primero?&lt;br&gt;
&lt;strong&gt;Analista BI/Stakeholder:&lt;/strong&gt;&lt;br&gt;
a) Usted debería preguntarle a …..&lt;br&gt;
b) No puede, porque para eso usted debería pertenecer al equipo/área de…&lt;br&gt;
c) Necesita autorización de…&lt;br&gt;
d) Puede revisar en nuestra Intranet, revise en esta página….&lt;br&gt;
&lt;strong&gt;Consultor:&lt;/strong&gt; Listo, muchas gracias.&lt;/p&gt;

&lt;p&gt;Comenzamos con un enfoque amigable, ‘nos ponemos en los zapatos’ de la persona, sabemos que estamos haciendo algo en bien de la empresa, pero no queremos que nos vean como un riesgo o peligro para nadie. En algunas circunstancias o empresas, cuando alguien hace este tipo de preguntas podría generar desconfianza y precisamente necesitamos ganarnos sinceramente la confiabilidad del equipo de trabajo. Además, siguiendo el último ejemplo el analista BI o stakeholder nos podría estar guiando (de manera natural y fluida) a uno o varios sponsors que requerimos para nuestras labores.&lt;/p&gt;

&lt;p&gt;En otros casos, las respuestas a esta primera conversación podrían llevarnos directamente a los Propietario(s) Potencial(es) de los Datos ya Existentes, pudiendo ser el Personal de TI,  Soporte o Mantenimiento. A ellos podríamos preguntarles cuáles Protocolos o Compliance ya se tienen implementados en la empresa, si existe un Perfilamiento de Usuarios, o incluso si tienen un Centro de Excelencia en la Nube (AWS Cloud Center of Excellence, &lt;a href="https://docs.aws.amazon.com/es_es/prescriptive-guidance/latest/cloud-center-of-excellence/ccoe-tenets.html" rel="noopener noreferrer"&gt;Los principios del CoE - AWS Guía prescriptiva&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;En este momento sería importante hacer una pausa. ¿Qué pasaría si alguien les pide que NO piensen en un cuadro rojo?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyw7qo4rhyt03idr77iho.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyw7qo4rhyt03idr77iho.png" title="Cuadro Rojo" alt="Cuadro Rojo" width="241" height="241"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;MUY probablemente lo primero que llegará a la mente es, precisamente, el cuadro rojo. Esto debido a que nuestro cerebro ante una negativa reacciona de manera diferente a lo que se pensaría (&lt;a href="https://www.nyu.edu/about/news-publications/news/2024/may/how-does--not--affect-what-we-understand--scientists-find-negati.html" rel="noopener noreferrer"&gt;How Does “Not” Affect What We Understand? Scientists Find Negation Mitigates Our Interpretation of Phrases&lt;/a&gt;). Al decirle a alguien &lt;em&gt;“que NO piense en un cuadro rojo”&lt;/em&gt;, el cerebro lo que hace es mitigar ese pensamiento, más que invertirlo. Dicho de otra forma, nuestro cerebro pensaría en un cuadro rojo, solo que más pequeño. Por esta razón es importante cuidar nuestra comunicación con otras personas (&lt;em&gt;“No piense en los costos…”&lt;/em&gt; vs &lt;em&gt;“Piense en las ventajas…”&lt;/em&gt;) e incluso con nosotros mismos (&lt;em&gt;“Voy a aprender / comenzar / hacer…”&lt;/em&gt; vs &lt;em&gt;“Estoy aprendiendo / comenzando / haciendo…”&lt;/em&gt;).&lt;/p&gt;

&lt;p&gt;Podríamos comenzar a deducir que vamos a tener bastantes interacciones con el equipo de trabajo del cliente. Es decir, ¡preparémonos para reuniones!&lt;/p&gt;

&lt;p&gt;Algunos puntos a considerar al momento de tener reuniones:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Escuchar para entender, no para contestar. Además de ‘escuchar con los ojos’ (establecer y mantener un respetuoso contacto visual).&lt;/li&gt;
&lt;li&gt;Tomar notas (puede ser en hojas de papel), pero no tomar ‘dictados’, es decir, no escribir en teclado ya que esto en algunos momentos puede generar distracciones y dar la sensación al cliente de que no se le está escuchando apropiadamente. En este sentido es mejor pedir autorización para grabar la reunión.&lt;/li&gt;
&lt;li&gt;Obtener tanto contexto como sea posible antes de comenzar la reunión (quién es el cliente, de qué trata, cuáles son sus productos o servicios, sus posibles competidores…)&lt;/li&gt;
&lt;li&gt;En el transcurso de la reunión identificar si los asistentes de la reunión son de perfil administrativo, comercial/ventas, o técnico/desarrollo (o incluso, una combinación entre ellos).&lt;/li&gt;
&lt;li&gt;Para cada uno de los asistentes identificar también conocimiento del proyecto,  negocio, necesidades o requerimientos; claridad en objetivos; nivel técnico&lt;/li&gt;
&lt;li&gt;BANT (Budget, Authority, Needs, Timing)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsphbdy1ymcr91io3kjyu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsphbdy1ymcr91io3kjyu.png" title="Quién - Por qué" alt="Quién - Por qué" width="758" height="250"&gt;&lt;/a&gt;&lt;br&gt;
en donde podemos tener:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;&lt;strong&gt;Quién =&lt;/strong&gt;&lt;/em&gt; Ejecutivos C-Level; Product Owners; Project Managers; Business Analysts; Dependencias Externas; Representantes de Ventas; Desarrolladores; Diseñadores; Arquitectos&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;&lt;strong&gt;Por qué =&lt;/strong&gt;&lt;/em&gt; Metas a nivel de compañía (H1, H2, Q1…); Optimización, Automatización, o Mejoras; Criterios de Éxito; Métricas o KPIs; SLAs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Si tenemos el &lt;em&gt;&lt;strong&gt;“Quién”&lt;/strong&gt;&lt;/em&gt; y el &lt;em&gt;&lt;strong&gt;“Por qué”&lt;/strong&gt;&lt;/em&gt;, de forma orgánica obtendremos el &lt;em&gt;&lt;strong&gt;“Qué”&lt;/strong&gt;&lt;/em&gt; para cada uno de los participantes. El &lt;em&gt;&lt;strong&gt;“Cómo”&lt;/strong&gt;&lt;/em&gt; vendrá más adelante.&lt;/p&gt;

&lt;p&gt;Un error que se debe evitar al intentar identificar los datos (y su correspondiente gobierno) es postergar el contacto con el equipo netamente técnico. Esto podría crear una ‘resistencia o rechazo’ a colaborar en nuestro propósito de analizar los datos que pueden requerir un control más detallado. Por esto es importante involucrar al equipo de TI encargado de la observabilidad, mantenimiento, acceso y seguridad de la plataforma que estamos analizando. Algunos de los servicios que el equipo TI puede estar usando en sus tareas en AWS pueden ser IAM, CloudWatch, EventBridge y SNS.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fekm0hho36xphna7my57c.png" title="Arquitectura Referencial Equipo TI" alt="Arquitectura Referencial Equipo TI" width="642" height="801"&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Arquitectura Referencial Equipo TI&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Si queremos descubrir qué datos pueden estar pasándose por alto, deberíamos dar respuesta a estas preguntas: ¿Existen métricas estándares en esa industria? ¿KPIs? Y para este punto podemos apoyarnos en instituciones, organizaciones, mejores prácticas de cada industria, entre otros. Algunos ejemplos pueden ser, según la industria:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Financiera (&lt;a href="https://hub-analytics.com/financial-metrics-to-track/" rel="noopener noreferrer"&gt;15 Essential Financial Metrics for Advisors, Consultants, and Investors&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Ciencias de la Salud (&lt;a href="https://www.clearpointstrategy.com/blog/25-healthcare-metrics-kpis" rel="noopener noreferrer"&gt;30 Healthcare KPIs &amp;amp; Metrics To Start Tracking Today&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Software (&lt;a href="https://www.maxio.com/blog/saas-metrics" rel="noopener noreferrer"&gt;7 SaaS Metrics Every SaaS Company Should Care About&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Seguridad (&lt;a href="https://www.breachsense.com/blog/data-security-metrics/" rel="noopener noreferrer"&gt;18 Data Security Metrics &amp;amp; KPIs You Need To Track&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;La meta es encontrar cuáles métricas no están siendo consideradas por el cliente.&lt;/p&gt;

&lt;p&gt;Antes de comenzar a ‘tocar los datos’, vale la pena plantearse las siguientes preguntas relacionadas con la Seguridad (un tema que debería incluirse desde el ‘momento inicial’). Investigar si existen protocolos de seguridad y, en caso de que no existan, proponer uno en función de:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;¿Qué datos se manipulan en la organización?&lt;/li&gt;
&lt;li&gt;¿Por qué existen estos datos?&lt;/li&gt;
&lt;li&gt;¿Quién es el propietario de los datos? ¿Quién debería ser su propietario?&lt;/li&gt;
&lt;li&gt;¿Quién necesita acceder a qué datos?&lt;/li&gt;
&lt;li&gt;¿Quién debería autorizar ese acceso?&lt;/li&gt;
&lt;li&gt;¿Por cuánto tiempo se debe conceder este acceso?&lt;/li&gt;
&lt;li&gt;¿Cómo se debe autorizar este acceso (correo electrónico, ticket...)?&lt;/li&gt;
&lt;li&gt;¿Dónde se deben almacenar los datos?&lt;/li&gt;
&lt;li&gt;¿Existen leyes de cumplimiento o regulaciones aplicadas a esos datos (locales, nacionales o mundiales)?&lt;/li&gt;
&lt;li&gt;¿Cuáles son las acciones a tomar en caso de fuga o violación de datos?&lt;/li&gt;
&lt;li&gt;¿Existen políticas de copia de seguridad o retención de datos?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Este es un excelente momento para crear un diagrama de flujo del ciclo de vida de esos datos explicando el protocolo creado, y organizar reuniones para informar a las personas adecuadas. De nuevo, el involucrar a las personas en la gestión del gobierno de datos les da el tratamiento adecuado de respeto y consideración en las decisiones a tomar.&lt;/p&gt;

&lt;p&gt;Una vez elaborado este ‘borrador de protocolo de seguridad en datos’, se puede continuar el análisis del flujo de los datos (de derecha a izquierda).&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcdcbivy9fzviy6oruotx.png" title="Arquitectura Referencial Seguridad" alt="Arquitectura Referencial Seguridad" width="800" height="696"&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Arquitectura Referencial Seguridad&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Siempre es bueno recordar que, como toda arquitectura a ser desplegada en AWS, debería ser guiada por los Conceptos Clave, Principios de Diseño y Mejores Prácticas de Arquitectura contenidos en el &lt;a href="https://docs.aws.amazon.com/es_es/wellarchitected/latest/framework/welcome.html" rel="noopener noreferrer"&gt;Marco de AWS Well-Architected&lt;/a&gt;, el cual incluye los siguientes pilares:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Excelencia operativa&lt;/li&gt;
&lt;li&gt;Seguridad&lt;/li&gt;
&lt;li&gt;Fiabilidad&lt;/li&gt;
&lt;li&gt;Eficiencia del rendimiento&lt;/li&gt;
&lt;li&gt;Optimización de costos&lt;/li&gt;
&lt;li&gt;Sostenibilidad&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;En este punto podemos introducir el concepto de Gobernanza (&lt;a href="https://aws.amazon.com/products/management-and-governance/" rel="noopener noreferrer"&gt;Management and Governance on AWS&lt;/a&gt;) como &lt;em&gt;“la capacidad de implementar políticas de la junta ejecutiva que su entorno de nube de AWS debe cumplir”&lt;/em&gt; (&lt;a href="https://aws.amazon.com/solutions/guidance/governance-on-aws/" rel="noopener noreferrer"&gt;Guidance for Governance on AWS&lt;/a&gt;). El poder que tiene AWS es que este concepto no queda ‘sujeto’ o ‘restringido’ a un punto o área en particular, sino que se puede aplicar &lt;em&gt;“en todo el ecosistema de AWS, incluyendo cuentas, infraestructura y entornos que se posean y operen en la nube de AWS”&lt;/em&gt; (&lt;a href="https://aws.amazon.com/cloudops/cloud-governance/" rel="noopener noreferrer"&gt;Cloud Governance&lt;/a&gt;).&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvds2onfrlgdzjarglmzu.png" title="Arquitectura Referencial Gobernanza" alt="Arquitectura Referencial Gobernanza" width="800" height="571"&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Arquitectura Referencial Gobernanza&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;¡Ahora es momento de darle la &lt;em&gt;‘bienvenida oficial’&lt;/em&gt; al Área Técnica y Desarrollo!&lt;/p&gt;

&lt;p&gt;Recordemos que debemos conservar la esencia del trabajo en equipo:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;stakeholders,&lt;/li&gt;
&lt;li&gt;equipo TI,&lt;/li&gt;
&lt;li&gt;seguridad,&lt;/li&gt;
&lt;li&gt;gobierno&lt;/li&gt;
&lt;li&gt;y ahora, desarrollo&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Si entendemos quién es cada una de estas áreas, y por qué debería involucrarse en el gobierno de datos, podremos entender qué realmente le compete a cada área y, posteriormente, analizar la mejor forma de involucrarlos activamente en la generación del Gobierno de Datos.&lt;/p&gt;

&lt;p&gt;Preguntar en cada área cómo se encuentran ahora (&lt;em&gt;&lt;strong&gt;“As Is”&lt;/strong&gt;&lt;/em&gt;), si existen diferencias con respecto a las metas que deberían tener ya cumplidas en ese instante (&lt;em&gt;&lt;strong&gt;“To Be”&lt;/strong&gt;&lt;/em&gt;), y cómo consideran que deberían estar (&lt;em&gt;&lt;strong&gt;“Should Be”&lt;/strong&gt;&lt;/em&gt;).&lt;/p&gt;

&lt;p&gt;Probablemente en este análisis surjan las definiciones de stacks de tecnología, dependencias (tanto internas como externas), posibles automatizaciones, protocolos de documentación y pruebas. Recordar que &lt;em&gt;“la Documentación es una carta de amor que ustedes escriben a sus futuros ustedes”&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Además tener presente esta sencilla &lt;em&gt;‘fórmula’&lt;/em&gt;:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Monitoreo + Alertas + Respuestas = Dormir bien&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Esto va de la mano de confirmar si existen planes de recuperación ante desastres.&lt;/p&gt;

&lt;p&gt;También confirmar si existen estándares corporativos para codificación, Mejores Prácticas a seguir, patrones; si se realizan charlas internas para compartir conocimientos (chapters).&lt;/p&gt;

&lt;p&gt;Si en algún punto nos encontramos con que falta algo por implementar o crear, en lo posible proponerlo. Para resumir en una frase:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;¡Sean disimuladamente disruptivos!&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Siguiendo con nuestro análisis ‘de derecha a izquierda’, ahora bien podríamos plantearnos esta pregunta: ¿de dónde vamos a obtener (o ya estamos obteniendo) nuestros datos?&lt;/p&gt;

&lt;p&gt;Para esto existe un conjunto de servicios de AWS representativos para tomar datos desde diferentes orígenes, los cuales podrían ‘catalogarse’ en una capa de ingesta de datos.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcj8rsfqfpp9aofbie8nm.png" title="Arquitectura Referencial - Ingesta de Datos" alt="Arquitectura Referencial - Ingesta de Datos" width="800" height="400"&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Arquitectura Referencial - Ingesta de Datos&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Busquemos cuáles de estos servicios (o similares) se encuentran actualmente en uso, cuáles son los orígenes de datos a los que están conectados, y cuáles datos NO se están llevando hasta el consumo de los stakeholders o el equipo TI. Quizás estemos presenciando datos útiles no utilizados.&lt;/p&gt;

&lt;p&gt;Cuando encontremos estos datos &lt;em&gt;‘huérfanos’&lt;/em&gt; (se están ingestando pero no tienen un ‘padre o madre’ en el área de consumo), nos podremos encontrar con la última capa que vamos a revisar: el área de procesamiento de datos.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcx9b4oao2t93jv4lqbwk.png" title="Arquitectura Referencial - Procesamiento de Datos" alt="Arquitectura Referencial - Procesamiento de Datos" width="800" height="348"&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Arquitectura Referencial - Procesamiento de Datos&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Si quisiéramos resumir el proceso mental para generar un gobierno de datos en empresas donde no lo tengan actualmente, involucrando datos que quizás hayan pasado desapercibidos hasta el momento, podríamos decir que necesitamos identificar:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;datos&lt;/li&gt;
&lt;li&gt;stakeholders&lt;/li&gt;
&lt;li&gt;componentes BI &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;ya existentes, para posteriormente proponer:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;componentes BI faltantes&lt;/li&gt;
&lt;li&gt;protocolos requeridos&lt;/li&gt;
&lt;li&gt;automatización / optimización&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;En el transcurso de este análisis lo más importante es recordar siempre que se está tratando con un factor humano, susceptible a errores, sentimientos, objetivos propios y grupales. Con la mejor intención y voluntad posibles, siempre tener una empatía por todas y cada una de las personas que nos proporcionen su tiempo, experiencia y consejos para lograr construir un Gobierno de Datos eficaz y útil para la empresa.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>data</category>
      <category>governance</category>
      <category>cloudcomputing</category>
    </item>
  </channel>
</rss>
