Systems | Development | Analytics | API | Testing

Blog

The Ultimate PII Checklist

Data breaches can happen to any company, regardless of size or technical resources. In April 2021, Facebook’s reputation took a massive hit when a data breach impacted more than half a billion users. The worst kind of data breach involves personally identifiable information (PII). PII is essentially any data that contains sensitive details about real people, such as customers and employees.

Product announcement: Say hello to the new and improved Storage UI

Keboola’s Storage UI now comes with a new - slicker - look which will improve the user experience for all Keboola veterans. (New to Keboola? Do not fear. Simply follow along with the guided tour when you sign up for free, and you can unlock all the new features after June 2nd).

Tips for Application Troubleshooting

It is easier to perform application troubleshooting when you know that protocols are in place. For instance, knowing the core features of the application and how the application functions is already a standard. Also, you’ll need to expand the coverage like the requirements of Quality of Service (QoS). Does the application need real-time performance or does it need to move a lot of data? Are there sub-applications running on the endpoints?

Mapping Your Automation Journey in Financial Services

Automation will fail to achieve most of its potential if treated as a specialty, single-function tool applied only to accelerate narrow parts of business processes. In most industries, financial services included, automation done properly is a journey that delivers a steady stream of benefits resulting from building a broader and increasingly powerful multilayered stack of automated processes and analytics.

Why Software Bugs Are Like Mini Outages

If this past year has shown us anything, it’s the importance of resilience. Businesses of all sorts have had to find creative ways to get through a very tough time. And one of those ways is through technology. Companies that never planned to be technology-driven are now having meetings on Zoom, managing a remote workforce, and adopting new software.

How to Establish an Effective BI Security Strategy

Business intelligence (BI) tools have been a shot in the arm of the enterprise. Teams can create their own visualizations and enjoy self-service analytics, without needing IT to compile reports or wrangle big data. But, of course, there’s a catch. BI tools expose data to a wider range of people, which means there are new issues of BI security (BISEC) and privacy to think about, especially in the age of GDPR. Here’s what you need to know.