Loading
Preparing the page...
Loading
Preparing the page...
Structural foundation for a templates experience. Browse categories to see curated previews across architecture, engineering, and governance disciplines.
Categories
Structured coverage from cybersecurity architecture to operating models.
Structures for threat modelling, controls, and resilient delivery.
Lineage, stewardship, retention, and trustworthy analytics foundations.
Model lifecycle, guardrails, and responsible deployment patterns.
Target states, capability maps, and portfolio roadmapping.
Service shapes, contracts, and interoperability playbooks.
Evidence-led controls, audit readiness, and change governance.
Patterns for reliability, observability, and operability at scale.
Decision rights, funding models, and measurable outcomes.
Insight workflows, decision registers, and experiment hygiene.
All templates
Search across categories. Open previews or use interactive runners where available.
Track adoption signals and engagement metrics.
Generate an Architecture Decision Record draft and export it.
Capture context, options, and impacts for architecture decisions.
Plan metrics, baselines, and risks for an AI model evaluation before rollout.
Milestones for data, training, eval, deployment, and monitoring.
Rate data, model, and impact risks with quick mitigations.
Gauge data sensitivity, criticality, and monitoring coverage for AI use cases.
A quick checklist score for API contract clarity, stability, and consumer ergonomics.
Decide between REST, GraphQL, and gRPC based on context.
Draft a lightweight versioning and deprecation policy with clear consumer expectations.
Generate an assurance checklist for digital programmes.
Plan audit trail events, retention, and access.
Create simple charts from small uploaded data samples.
Track benefits with baseline, target, owner, and due date.
Draft C4 context, container, and component diagrams as Mermaid text.
Plan caching layers, invalidation, and risks.
Quickly scope a capability map slice and identify the first 3 capabilities to detail.
Assess capability maturity with 0-5 scoring.
Draft a CI pipeline blueprint with stages and checks.
High-level cost estimation worksheet with assumptions.
Generates a CSP string with guidance for common directives.
Plan contract tests across services and consumer integrations.
Prioritise which controls to evidence first and outline what ‘good evidence’ looks like.
Quickly assess whether a scenario has prevention, detection, and recovery controls covered.
Explains local storage, session storage, and cookies currently set.
Decide whether CQRS is worth the complexity for your use case.
Score likelihood, impact, and control coverage to prioritise mitigations.
Score likelihood and impact, colour-coded risk, and mitigation notes for scenarios.
Create a quick risk entry with likelihood, impact, and control strength to focus on the right mitigations.
Assess governance, standards, tooling, and skills to gauge data architecture maturity.
Quick profiling for small samples with summary stats.
Check completeness, uniqueness, and freshness signals for a dataset.
Define a minimal quality checklist: completeness, validity, timeliness, and ownership.
Define checks per field with severity and export a ruleset.
Non-legal template prompts for a data sharing agreement.
Profile CSV columns, missing values, and type hints with local-only processing.
Score how well a decision is documented (context, options, metrics, follow-up) to improve learning loops.
Capture dependency risks and SBOM follow-up actions.
Assign R/A/C/I roles for a digital programme.
Compare options using criteria and weighted scoring.
Shape a digital strategy with outcomes, sponsorship, and delivery focus.
Capture a one-page digital strategy canvas.
Design a star schema with facts, dimensions, and grain.
Passive DNS lookups with safety guardrails.
Plan token-aware chunk sizes and overlaps for RAG.
A quick screening to decide whether a DPIA is likely required and what to document.
Quick privacy and risk triage checklist for datasets.
Baseline vs current distribution comparison planner.
Explain common encoding issues and provide a safe fixer checklist.
Create a simple ER diagram (Mermaid) for a data model.
Capture events, commands, and actors for a small workflow.
Stress-test a hypothesis for clarity, measurability, and decision impact.
Generate hashes with WebCrypto for quick integrity checks.
Sign messages with HMAC using WebCrypto to illustrate authenticity.
Adjust learning rate, epochs, and regularisation with guidance.
Plan rotations, crops, and noise with a local-only preview.
Simple image classification demo with privacy-first defaults.
Timeline plan for detection, containment, eradication, recovery, and lessons learned.
Assess readiness for detection, containment, recovery, and communications.
Classify severity based on user impact, duration, and data exposure indicators.
Capture incident events, roles, and timestamps for review and export.
Plan key entities and information flows.
Choose an integration style (sync, async, batch) based on reliability, latency, and coupling.
Checklist for standards, APIs, semantics, and security.
Looks up IP reputation indicators and ASN summary with safe defaults.
Validates PEM headers and explains key and certificate basics.
Define KPIs with formula, grain, sources, and caveats.
Allocate latency budgets across layers and dependencies.
Define dataset metadata fields ready for a catalogue.
Define guardrails and anti-gaming checks for a KPI or north star metric.
Chooses MFA methods based on threat fit and device context.
Capture purpose, data, evaluation, risks, and mitigations into a model card.
Assess readiness to publish a model card with governance details.
Draft a monitoring plan: performance, drift, safety signals, and review cadence.
Define a north star metric with guardrails and anti-gaming checks.
Plan OCR input quality checks and privacy constraints without uploading documents.
Draft OKRs and sanity-check alignment wording.
Generate a minimal OpenAPI path snippet for a dataset API.
Identify the top decision areas and clarify who decides, who inputs, and who executes.
Create a simple RACI for a capability or process and expose ownership gaps.
Explore outliers using robust stats on small numeric samples.
Scores passwords and suggests stronger passphrases.
Pick a design pattern based on scenario and constraints.
Generates a tailored security checklist based on role and device use.
Analyses email text and headers for phishing signals.
Score an email scenario for likely phishing risk with clear next actions.
Rank a portfolio slice using value, feasibility, risk, and dependency load.
Generate a PIR template with prompts and outputs.
Plan product roles, cadences, and decision rights.
Compose safe, structured prompts with variables and constraints.
Designs roles, entitlements, and review cadence.
Plan a repository structure for clarity and scale.
Map requirements to components and identify gaps.
Create and rank risks with owners, treatments, and export options.
Capture and rank digital programme risks.
Infer a lightweight JSON schema from a sample payload.
Estimate readiness to infer a stable schema from sample data.
Map controls to confidentiality, integrity, and availability coverage and note gaps.
Map capabilities to candidate service boundaries.
Capture service catalogue entries and owners.
Evaluates session lifetimes, refresh, rotation, and cookie settings.
Turn an availability target into an error budget and response policy.
Set a starter SLO and estimate an error budget to align engineering and product expectations.
Draft availability and latency objectives with a rough error budget.
Create an evidence checklist for access, change management, and monitoring controls.
Text-based rubric to spot likely SOLID problems.
Plan stakeholders, influence, and comms cadence.
Compare source vs summary with rubric hints.
Score suppliers against criteria and export results.
Encrypt and decrypt sample text with AES-GCM via WebCrypto.
Draft a concise target state: outcomes, principles, key capabilities, and constraints.
Score tech options against criteria and export a decision table.
Score a scenario with likelihood, impact, and control strength to get a focused recommendation.
Build a layered test strategy (unit, integration, contract, e2e).
Compare text snippets with local similarity heuristics.
Capture assets, entry points, threats, and mitigations.
Card-based mapping of assets, actors, entry points, trust boundaries, and mitigations.
Capture assets, threat actors, and entry points to prioritise mitigations.
Fetches certificate metadata for allowed hosts and highlights issues.
Visualise simple train/test splits and leakage hints.
Checks URLs for risky patterns and produces a quick decision.
Summarises registration and age for permitted domains.
Support
Donations help maintain and improve the site. No paywalls. No forced sign ups. You keep full access either way.
Payments are not enabled yet in this build. This card is informational only.
Policy (placeholder)
Commercial users must keep author credit. Internal use may remove branding. Donation or permission required for commercial redistribution. Not enforced automatically yet.
Read the template licence placeholder