Systems | Development | Analytics | API | Testing

BI

Power BI Levels of Security to Meet Compliance

We can all agree that protecting your organization’s sensitive and confidential data, including personally identifiable information (PII), is a crucial obligation. Unfortunately, far too many businesses aren’t sure of the best way to fend off attackers or insider threats, so they often fall victim to devastating data breaches.

Your Super: Healthy data supports healthier people

Co-founded by a professional tennis player stricken with cancer at age 24 and his wife, Your Super is an eCommerce company focused on helping people improve their health with nutritious superfoods. Even in its early days, the company focused on using their data to uncover customer wants and help them get the most value out of their purchases. “When I first started, the company was maybe 20 people,” explains Gabriel Freeman, Business Intelligence Manager for Your Super.

KPIs are a shortcut to success - if you know how to triage

Let’s start with a hard truth: If you try to do everything, you won’t excel at anything. In a growing business, there’s no shortage of things that need attention, but you can’t do everything at once. Instead, you have to decide where to focus your resources to get the greatest impact. In a word, you must become a master of triage.

Data Decay Can Be Deadly - Mastering "Data Into Action' Will Be Vital to Organizational Growth

Most enterprises that have embarked on their digital business journey have quickly realized that data is the foundation of every digital business. No successful digital business has succeeded without a data strategy. So, when I joined Joe DosSantos, Chief Data Officer at Qlik, on the Data Brilliant podcast, we discussed how data has been democratized, why certain organizations have succeeded with digital transformation, and what factors are required to build the culture for success.

SaaS in 60 - New Qlik Application Automation Connectors

Recently we added some Data Warehouse connectors for Amazon Redshift, Google Big Query and Snowflake allowing your workflows to utilize data management operations such as inserts, deletions, updates, SQL queries and even API requests. We’ve also added a connector to work with our new automated machine learning environment AutoML as well as a number of remote application and event management connectors that work with Dbt, UI Path and Splunk.

Security Reference Architecture Summary for Cloudera Data Platform

This blog will summarise the security architecture of a CDP Private Cloud Base cluster. The architecture reflects the four pillars of security engineering best practice, Perimeter, Data, Access and Visibility. The release of CDP Private Cloud Base has seen a number of significant enhancements to the security architecture including: Before diving into the technologies it is worth becoming familiar with the key security principle of a layered approach that facilitates defense in depth.

Expanding the Data Cloud with Apache Iceberg

The Snowflake Data Cloud is a powerful place to work with data because we have made it easy to do difficult things with data, such as breaking down data silos, safely sharing complex data sets, and querying massive amounts of data. As customers move to the Data Cloud, their needs and timelines vary—our goal is to meet every customer where they are on their Data Cloud journey.

Cloudera Streaming Analytics 1.6 Release Notes

We are excited to announce the release of Cloudera Streaming Analytics (CSA) 1.6 for CDP Private Cloud Base. With this release, we build on the foundation on 1.4 and 1.5 – with a number of fixes, enhancements, and features. Starting with this release, we now have an aligned release cycle for CSA Community Edition (CE). You can now expect simultaneous releases of CSA for both CE and CDP Private Cloud Base versions.