Solving the data doom loop

Ken Stott, Field CTO of API platform Hasura, tells Ryan about the data doom loop: the concept that organizations are spending lots of money on data systems without seeing improvements in data quality or efficiency. Their conversation touches on the challenges of data management, the impact of microservices, the importance of feedback loops in ensuring data quality, and how a data architecture that uses a supergraph would enhance data accessibility and quality. https://stackoverflow.blog/2025/02/14/solving-the-data-doom-loop/

Created 4mo | Feb 14, 2025, 7:20:02 AM


Login to add comment

Other posts in this group

After 30 years, Java is still brewing up new features

It’s Java’s 30th anniversary! Ryan welcomes back Georges Saab,  Senior VP of Development for the Java Platform Group and Chair of the OpenJDK Governing Board, to reflect on Java’s changes over the las

Jun 17, 2025, 6:30:08 AM | StackOverflow blog
“We’re not worried about compute anymore”: The future of AI models

Ryan Donovan and Ben Popper sit down with Jamie de Guerre, SVP of Product at Together AI, to discuss the evolving landscape of AI and open-source models. They explore the significance of infrastructur

Jun 13, 2025, 5:10:08 AM | StackOverflow blog
Better vibes and vibe coding with Gemini 2.5

Ryan and Ben welcome Tulsee Doshi and Logan Kilpatrick from Google's DeepMind to discuss the advanced capabilities of the new Gemini 2.5, the importance of feedback loops for model improvement and red

Jun 10, 2025, 5:20:08 AM | StackOverflow blog
Banking on a serverless world

Kathleen Vignos, VP of Software Engineering at Capital One, sits down with Ryan to explore shifting to 100% serverless architecture in enterprise, deploying talent for better customer experience, and

Jun 6, 2025, 6:20:07 AM | StackOverflow blog
If an attacker can edit your mobile code, how do you defend your app?

Ryan is joined by Jan Seredynski, Mobile Security Researcher and Pentester at Guardsquare, to talk about how you protect your app when the attackers control the code and the device it runs on. https:/

Jun 4, 2025, 2:50:07 PM | StackOverflow blog