Systems | Development | Analytics | API | Testing

%term

How Yellowfin created an innovation culture

I often get asked why Yellowfin is always the first to market with new products - it’s because of our innovation culture. Our innovation is something that we’ve even been recognized for by BARC and Gartner. Here are three things that we do to create a culture of innovation that enables us to live and breathe new ideas.

Unraveling the Complex Streaming Data Pipelines of Cybersecurity

Earlier this year, Unravel released the results of a survey that looked at how organizations are using modern data apps and general trends in big data. There were many interesting findings, but I was most struck by what the survey revealed about security. First, respondents indicated that they get the most value from big data when leveraging it for use in security applications. Fraud detection was listed as the single most effective use case for big data, while cybersecurity intelligence was third.

You didn't say there was going to be a test!

I clip in and drive down on the pedals with all of my energy, legs turning and lungs burning as my heart rate soars during this cycling test. I continue to push my limits during this eight-minute, all-out effort. Why would anyone put themselves through such an exercise? The answer is testing. It is a great method to determine the current baseline, establish targeted areas for development and set milestone events.

Stitch and Talend: Working Together To Make Data Integration Easy

Data integration is one of the hardest things developers have to do, but the talented members of the Talend User Group have lots of ideas on how to make it easier. Stitch, now part of Talend, recently hosted the inaugural meeting of the Philadelphia Talend User Group in their office. It was a great time characterized by interesting presentations, tons of food, and a chance to meet and talk with peers who use Talend products.

You Can't Secure What You Can't See: Protecting APIs

Last year, it was briefly possible for anyone with rudimentary technical knowledge to upload and host files — including potentially malware — on a .gov website. The vulnerability resulted in protest posts and pranks but, thankfully, no lasting damage. Even so, as the most devious or most paranoid among you likely already recognize, this vulnerability had all the makings of a dangerous and effective phishing campaign.