Systems | Development | Analytics | API | Testing

Why User-Level Security Is Crucial for Business Intelligence

Picking the right business intelligence (BI) tool is essential to helping you beat your competitors, better serve your customers, and make smarter data-driven decisions. However, there's no one-size-fits-all tool for every enterprise. Not all BI users are created equal, and not all users should have the same level of access to sensitive and confidential data.

ETL with Apache Airflow

Written in Python, Apache Airflow is an open-source workflow manager used to develop, schedule, and monitor workflows. Created by Airbnb, Apache Airflow is now being widely adopted by many large companies, including Google and Slack. Being a workflow management framework, Apache Airflow differs from other frameworks in that it does not require exact parent-child relationships. Instead, you only need to define parents between data flows, automatically organizing them into a DAG (directed acyclic graph).

Should You Leave Your Company's PII Data Unprotected?

Personally identifiable information (PII) is some of the most valuable data that organizations can have. It's also some of the most dangerous if you don't follow data security best practices. If you don't treat this data with care, you could end up in the headlines as the victim of the latest data breach, costing you money and damaging your reputation. Of course, you should never leave PII data unprotected. So what is the best way to protect the confidential and sensitive PII that you handle?

PII Substitution: 4 Ways to Protect Your Sensitive Data

News of the latest massive data breach is always in the headlines. How can you avoid being next on the list? In order to function, businesses of all sizes and industries need to collect personally identifiable information (PII) about their employees and customers—but they also need to take proactive steps to keep this information secure and defend against PII breaches. PII substitution is an effective tactic to shield your sensitive and confidential data from prying eyes.

The Complete Guide to Student Data Privacy

Are you handling students' education records or personally identifiable information (PII)? If so, it's crucial that you're familiar with what student privacy laws such as the Family Educational Rights and Privacy Act (FERPA) have to say. In this article, we'll go over what educators and administrators need to know about FERPA and student data privacy.

Create a Salesforce ETL Pipeline in 30 Minutes

Salesforce is one of the world’s most popular CRM (customer relationship management) software platforms, helping businesses of all sizes and industries beat their competitors and better serve their clients. But instead of keeping your Salesforce data inside the CRM platform itself, you can make better use of this information by moving it into a target data warehouse.

Amazon Redshift Database Developer Guide

Amazon Redshift is one of the most prominent data warehousing leaders across companies of all industries and sizes, providing applications in analytics, reporting, business intelligence, etc. Using Amazon redshift will allow you to retrieve, compare, and evaluate large amounts of data in multiple-stage operations to deliver the desired outcome.

SOA vs. Microservices

Most individuals who work in technology — and in particular, cloud computing — are likely aware of how service-oriented architecture (SOA) and microservices work. There is much discussion, however, regarding the best approaches for various situations. There are crucial differences in data governance, component sharing, and the architecture between SOA vs. microservices. In this article, you'll learn the basics of SOA vs.