Systems | Development | Analytics | API | Testing

%term

Insights from Booz Allen: Mission Advancers accelerate IT modernization projects through low-code

IT modernization used to be an overwhelming concept, often evoking fears of spending billions of dollars with no guarantees of success. While it used to pose the threat of taking years to implement, that is no longer the reality. Low-code has changed the game, allowing agencies to accelerate modernization timelines to the point where they can see an impact in a matter of months, not years.

The Official 2021 Checklist for HIPAA Compliance

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a U.S. federal law. It sets national standards for health care providers to maintain the privacy of patients' protected health information (PHI), including electronically protected health information (ePHI). If you collect, store, or process any kind of patient or medical data, you need to be aware of HIPAA and how it affects your operations. But what does it really mean to be HIPAA compliant?

Is your data healthy?

It’s no secret that what companies need from their data and what they can actually get from their data are two very different things. According to our recent survey, most executives work with data every day, but only 40% of them always trust the data they work with. We also discovered that 78% of them have challenges making data-driven decisions. Virtually every business is collecting more data than ever before, so lack of data can’t be the issue.

How to use Apache Spark with CDP Operational Database Experience

Apache Spark is a very popular analytics engine used for large-scale data processing. It is widely used for many big data applications and use cases. CDP Operational Database Experience Experience (COD) is a CDP Public Cloud service that lets you create and manage operational database instances and it is powered by Apache HBase and Apache Phoenix.

Tested Recipe for Optimizing and Securing Your Hybrid Cloud Environments

Enterprises are quickly evolving from a posture that approached the cloud as a kind of playground to one that goes all in to achieve cloud-first, cloud-native IT. With this transition from free-for-all to mature-business-service architecture, usually involving multiple public cloud providers, comes the need to answer some thorny questions. It’s no longer sufficient to endlessly pile on additional cloud services to a growing hybrid or distributed cloud infrastructure.

Okta and Kong Konnect Part 3: Implementing Introspection Flow

In our third Kong and Okta tutorial, we’ll go through the introspection flow implementation. The introspection flow is part of the token validation process. Kong Gateway evaluates the injected token at the request processing time to see if it's still valid to the upstream services. The evaluation hits a specific Okta endpoint, passing the received token. Based on the response provided by Okta, Kong Gateway accepts or rejects the request.