Systems | Development | Analytics | API | Testing

Latest News

Dear Load Balancers,

When I started my journey into Kubernetes, you were always there for me when I needed to expose a service externally. We started small with just exposing one service, and you were dependable and easy to set up. But things have changed. My application has grown, and now the cluster has 10 services that need to be exposed externally. This has made communication difficult. I wonder what will happen when we have 50 services?

Introducing table-level access controls in BigQuery

We’re announcing a key capability to help organizations govern their data in Google Cloud. Our new BigQuery table-level access controls (table ACLs) are an important step that enables you to control your data and share it at an even finer granularity. Table ACLs also bring closer compatibility with other data warehouse systems where the base security primitives include tables—allowing migration of security policies more easily.

How Rabobank is Facilitating Financial Independence Through Real-time Data Insights

Banking and financial services organizations are all about customer relationships. By connecting with customers and assisting alongside their financial journeys, these organizations become trusted partners. Building trust and confidence increases the share of wallet and lifetime value. To achieve that on a global scale, you need to leverage big data and predictive analytics. As customers navigate their personal finances, they are looking for a bank they can trust.

Creating Digital Confidence with Data

Digital confidence, the feeling that everyone in your organization expects your application to work exactly as it was designed, is a journey that requires a number of strategic and tactical considerations. From cultural buy-in from the top to tooling and resources that help support continuous testing at scale, there are a number of things that can help build confidence that your applications are providing flawless user experiences.

Using MQTT on Angular Apps

When you’re building a website that needs to be updated in real-time, your first thought is probably to add WebSockets to your application. However Websockets is a low-level protocol and to use it, you’ll need to add another layer on top to manage the information you want to get. This is where MQTT is handy, as it’s a higher-level protocol that simplifies working with data streams.

7 Approaches to Legacy System Modernization

Legacy system modernization is a hot topic in business strategy right now. As the need increases for new technologies and intelligent business solutions, so too does the need for legacy system modernization. That means upgrading legacy systems, improving existing software, and otherwise bolstering operational efficiency. This article will provide a quick recap of the basics and explain how they fit into a number of legacy system modernization strategies.

Enterprise data strategy: the right way to the cloud

Clive Humby stated, as far back as 2006, “data is the new oil.” The quote really took off following this 2017 report from The Economist. As a former chemical process engineer, oil immediately makes me think of refining it. Today’s analytics platform for the complete data lifecycle does the same for data as the refinery distillation columns does for crude oil: distilling value.

New Coronavirus Dashboards Reveal Which U.S. Counties May Start Spending First

Snowflake customer, Merkle Inc., has created a new set of COVID-19 interactive dashboards for businesses to use for free to determine which counties in the U.S. will most likely experience an economic recovery first. As economies reopen, states hit hardest by COVID-19, or states that relax social distancing measures sooner rather than later, will not reveal local market opportunities as they emerge.

Snowflake Service Account Security: Part 2

In Part 1, we covered the high-level objectives and methods for attacking service accounts. In Part 2 we discuss defense-in-depth mitigations to those methods. By the end of this blog, you will be able to apply secure-by-default mitigations to threats impacting Snowflake service accounts. The following table from Part 1 highlights the objectives and methods we want to mitigate: These secure-by-default mitigations help prevent and constrain credential misuse from theft and guessing attacks.