Systems | Development | Analytics | API | Testing

January 2021

The Biggest Threat to the Security of Healthcare Data

When cyberattacks take out business systems, organizations suffer from direct and indirect financial losses. When healthcare systems go down, it’s a matter of life and death. Healthcare organizations were already a frequent target of cybercriminals, and the pandemic has made this situation worse. Infosecurity Magazine reports that healthcare data breaches will increase by 3x in 2021, at a time when so many healthcare providers are burnt out and exhausted from battling the pandemic.

Why Data Engineers Should Consider Microsoft Azure

Modern applications don’t function in isolation. To get the most out of the enterprise apps you build or buy, you’ll have to connect them to other applications. In other words, data engineers have to engage in effective application integration to achieve their business goals. Sometimes, this means connecting one application directly to another. But this is a rare occurrence in digitally transformed industries.

5 Ways to Process Small Data with Hadoop

From system logs to web scraping, there are many good reasons why you might have extremely large numbers of small data files at hand. But how can you efficiently process and analyze these files to uncover the hidden insights that they contain? You might think that you could process these small data files using a solution like Apache Hadoop, which has been specifically designed for handling large datasets.

Common Regulations that Data-Driven Entities Need to Know

For public and private entities, data collection is a way of life. That fact has led to the proliferation of common regulations to protect consumers and individuals from unacceptable use or storage of their private data. But it's not just data collection laws companies have to adhere to. There are many US-based and international statutes that put constraints on how they do business. What follows summarizes the most common regulations and how they can affect the work you do, day to day.

Talend vs. MuleSoft vs. Xplenty: Which One Does ETL Better?

The key differences between Talend, MuleSoft, and Xplenty: Enterprise data volumes are increasing by 63 percent per month, according to a recent study. Twenty percent of organizations draw from 1,000 or more data sources. How do these companies extract and move all this data to a centralized destination for business analytics? As we know, Extract, Transform, and Load (ETL) streamlines this entire process. But smaller organizations lack the coding skills required for successful implementation.

What is Low-Code? Low-Code vs. No-Code, Low-Code Development Tools, and More

A developer's primary job is to work seamlessly, rapidly, and accurately to create software, apps, or websites that match business requirements. Unfortunately, there is a huge margin for error if you have to write lines and lines of complex code. Additionally, many basic tasks in the use of data-related software and other solutions, require extensive coding knowledge that many employees simply don't have. One solution to this is low-code software and development.

How to Comply with Sweden's PII Data Protection Act

Personal Identifiable Information (PII) has become a headache for most digital-first businesses in recent years. Everyone agrees we need rules to keep personal data safe, but there’s no universal PII Data Protection Act we can all follow. Instead, there is a worldwide patchwork of regulations, many of which have global implications. Sweden is one of the pioneers in data security laws.

Stitch vs. Jitterbit vs. Xplenty: What's the Difference?

The key differences between Stitch, Jitterbit, and Xplenty: The average business pulls data from 400 different locations, which makes it tricky to generate valuable data insights. Data-driven organizations use an Extract, Transform, and Load (ETL) platform to pull all this information into a data lake or warehouse for deeper analysis. However, many businesses lack the technical skills (like coding) to facilitate this process. The three tools in this review make ETL workflows easier.

How to Prevent and Respond to Data Breaches

Cybercriminals are currently enjoying a golden age. The sudden shift to remote working, combined with the digitization of everyday life, means endless opportunities to compromise systems and access sensitive data. If you don't want your organization to be their next victim, you must have to know how to prevent data breaches.