Taming the Tech Stack: Leverage Your Existing Tech Stack Securely With an Analytics Layer

Analytics and data visualizations have the power to elevate a software product, making it a powerful tool that helps each user fulfill their mission more effectively. To stand apart from the competition, today’s software applications need to deliver a lot more than just transaction processing. They must also provide insights that help drive better decisions, alert users to matters that require their attention, and deliver up-to-the-minute information about the things that matter most.

The Case for Embedded Analytics: How to Invest and Implement

In the past, most software applications were all about “data processing.” In the parlance of old-school management information systems, that meant an almost exclusive focus on keeping accurate transactional records alongside any master data necessary to complete that mission. Transaction processing is important, of course, but in today’s world, applications are expected to deliver a lot more than that.

Transformation for Analysis of Unintegrated Data-A Software Tautology

What pray tell is a tautology? A tautology is something that, under all conditions, is true. It is kind of like gravity. You can throw a ball in the air and, for a few seconds, it seems to be suspended. But soon gravity takes hold, and the ball falls back to earth.

How Keboola benefits from using Keboola Connection - There's no party like 3rd party

Oh boy, it’s been more than a year again since my last HKBFUKC article (yep, that’s a new standard abbreviation). This is the fourth article in the series. You can always check out the first, second and third on our blog. Again, loads of stuff has happened since the last time. I made the top 16 at the 4 Seasons MTG Legacy tournament in Bologna, I visited Lego House in Billund and I got married!

Cybersecurity: A Big Data Problem

Information technology has been at the heart of governments around the world, enabling them to deliver vital citizen services, such as healthcare, transportation, employment, and national security. All of these functions rest on technology and share a valuable commodity: data. Data is produced and consumed in ever-increasing amounts and therefore must be protected. After all, we believe everything that we see on our computer screens to be true, don’t we?