Systems | Development | Analytics | API | Testing

BigQuery admin reference guide: Tables & routines

Last week in our BigQuery Reference Guide series, we spoke about the BigQuery resource hierarchy - specifically digging into project and dataset structures. This week, we’re going one level deeper and talking through some of the resources within datasets. In this post, we’ll talk through the different types of tables available inside of BigQuery, and how to leverage routines for data transformation.

Interview With Cybersecurity Expert Tom Kirkham

For our latest expert interview on our blog, we’ve welcomed cybersecurity specialist Tom Kirkham to share his wealth of experience on the topic of cybersecurity. Tom is the founder and CEO of IronTech Security, a managed security service provider (MSSP) that focuses on educating and encouraging law firms, court systems, water utilities, and financial firms to establish a security-first environment with cybersecurity training programs for all workers to prevent successful attacks.

PII Pseudonymization: Explained in Plain English

Data processors handle an abundance of data — including personal information about individuals. As the collection and use of data become more widespread, governments continue to enact laws that protect personally identifiable information (PII). Failing to comply with such laws means risking serious fines and penalties, and damaging public trust. Masking PII through pseudonymization is one way to protect it.

Application Lifecycle Management: A Comprehensive Guide

Discipline is the key to success for all companies doing well in their field or reaching a trillion-dollar valuation. They manage the software and update it very frequently when it comes to providing services. So how are they able to manage it and keep their software updated every moment? The answer is ALM—Application Lifecycle Management. ALM includes the people, the software, the tools, and the processes included in software development, from planning to deploying it for end customers.

What's new with BigQuery ML: Unsupervised anomaly detection for time series and non-time series data

When it comes to anomaly detection, one of the key challenges that many organizations face is that it can be difficult to know how to define what an anomaly is. How do you define and anticipate unusual network intrusions, manufacturing defects, or insurance fraud? If you have labeled data with known anomalies, then you can choose from a variety of supervised machine learning model types that are already supported in BigQuery ML.

Interview With CTO & Co-founder Alexander De Ridder

For the newest instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed the CTO & co-founder of INK, Alexander De Ridder to share his journey to launching the first AI-based web content optimization editor. Alexander is the mastermind behind the award-winning technology that's helped deliver over a million more organic visitors per month for Fortune 100 companies and freelance content creators alike.

Privacy & Security Rules for Healthcare Marketers

Marketing is more complex if you're engaged in the healthcare field. Whether you work with patients or market to consumers interested in healthcare products, it's important to understand HIPAA guidelines. This article explains the basics of HIPAA Privacy and Security Rules, and how this legislation affects your marketing strategy.