Guiding Principles

The beliefs that shape every decision

01

Business Value Over Tools

Technology exists to serve business outcomes. Every investment must demonstrate clear value.

02

Governance Before Scaling

Establish guardrails first, then enable growth. Ungoverned expansion creates technical debt.

03

Automation First

If a process runs more than twice, automate it. Human effort is too valuable for repetitive tasks.

04

Security by Design

Security is not a feature to add later. It's foundational to every architecture decision.

05

Data as an Asset

Treat data with the same rigor as financial assets. Quality, governance, and protection matter.

06

Simplicity Wins

The best solution is often the simplest. Complexity is the enemy of adoption and maintenance.

Business Applications Strategy

A vision for scalable, governed, and value-driven enterprise systems

"Technology that serves the business, not the other way around"

My approach to Business Applications centers on creating a unified, scalable ecosystem where ERP, identity, automation, and business systems work together seamlessly to drive measurable business outcomes.

Enterprise Resource Planning

Centralizing financial, operational, and supply chain processes into a single source of truth that enables data-driven decision making.

Identity & Access Management

Implementing zero-trust principles with streamlined access governance, ensuring security without sacrificing user experience.

Intelligent Automation

Eliminating manual processes through strategic automation, freeing talent to focus on high-value activities.

Integrated Business Systems

Breaking down silos through purpose-built integrations that enable real-time data flow across the enterprise.

Application Selection Principles

01

Business Value First

Every application must demonstrate clear ROI and alignment with strategic objectives before consideration.

02

Scalability by Design

Solutions must accommodate 10x growth without architectural redesign or prohibitive cost increases.

03

Governance-Ready

Built-in compliance, audit trails, and role-based access are non-negotiable requirements.

04

Integration Capability

Preference for applications with robust APIs and proven integration patterns within the Microsoft ecosystem.

Application & Infrastructure Landscape

The enterprise systems and IT infrastructure I architect, manage, and govern

ERP

Core business operations and financial management

Microsoft 365

Productivity and collaboration platform

Identity & Access

Security and access governance

Automation

Process automation and orchestration

Integrations

System connectivity and data flow

Data & Reporting

Business intelligence and analytics

Server & Virtualization

On-premises and hybrid server infrastructure

Networking & Firewalls

Network infrastructure and perimeter security

ITSM & Operations

IT service management and operational processes

Enterprise Architecture

Architectural blueprints across key domains

ERP Architecture

Business Central as the core ERP with extensions and satellite systems

Business Central Online

Core ERP

Custom Extensions

Industry-specific functionality

Power Apps

User-facing applications

Azure Functions

Background processing

Principles

Single source of truth for transactionsExtension-based customizationAPI-first integrations

Identity Architecture

Zero-trust identity with Entra ID at the center

Entra ID

Identity provider

Conditional Access

Policy enforcement

PIM

Privileged access

B2B/B2C

External identities

Principles

Verify explicitlyLeast privilege accessAssume breach

Integration Architecture

Event-driven integration with Azure as the backbone

Service Bus

Message broker

Logic Apps

Orchestration

API Management

API gateway

Event Grid

Event routing

Principles

Loose couplingAsynchronous by defaultIdempotent operations

Data Architecture

Layered data platform enabling analytics and AI

Azure SQL

Relational data

Dataverse

Low-code data

Data Lake

Raw data storage

Power BI

Visualization

Principles

Data quality at sourceSelf-service with guardrailsPrivacy by design