Systems | Development | Analytics | API | Testing

Latest Blogs

Automating Healthcare Data to Improve Patient Outcomes

Healthcare organizations like yours are riddled with mountains of data and document streams coming in each day. Whether it’s patient records, claims, denials, remits, or clinician credentials… the list goes on. All these items can quickly create chaos and confusion without proper organization protocols in place to handle this data deluge. When employees are tasked with manually handling inbound document management, there is the potential for a wide array of complications, including.

Meeting Medical Device Data Privacy, Governance, and Security Challenges

Medical devices have become increasingly complex as technology evolves, and the sheer number of these devices now being worn or implanted has grown exponentially over the past few years. There are currently over 500,000 different types of smart, connected medical devices in use that have the ability to collect, share, or store private patient data and protected health information (PHI)(1).

Snowflake Helps Finnair Improve Customer Experience with Cloud Data Analytics

Coronavirus has impacted the travel industry, but as it adapts, there is one factor airlines have always worked hard to minimize: delayed flights. Arriving late or missing a connection can severely impact the customer experience, which is why airlines work hard to maintain high rates of on-time performance (OTP). To that end, pilots may have to use extra fuel to make up for a delayed departure or to reach a destination early, even if it means circling the airport before landing.

How to Properly Leverage Elasticsearch and User Behavior Analytics for API Security

Kibana and the rest of the ELK stack (Elasticsearch, Kibana, Logstash) is great for parsing and visualizing API logs for a variety of use cases. As an open-source project, it’s free to get started (you need to still factor in any compute and storage cost which is not cheap for analytics).

What is Serverless Computing?

The shift to cloud computing fundamentally changed the way software is built and consumed by developers. Multiple code snippets or functions are logically connected to form a complex application. Since the platform deals with one function at a time, and functions are the fundamental deployment units, this model is often called as Functions as a Service (FaaS).

How to Move from Basic to Advanced Marketing Analytics in Four Steps

Advanced marketing analytics can improve campaign relevance, increase customer lifetime value, accelerate insights, reduce acquisition costs, and drive ROI. But moving to advanced analytics requires a thoughtful investment in the right infrastructure for storing, tracking, and analyzing customer data, which can be daunting to companies that only have basic analytics capabilities.

How To Accelerate API Integration with Behavioral Emails and Developer Segmentation

Behavioral email is the keystone of user-centric platform integration — emails to developers are most effective when they’re based on how they used your platform. Not surprisingly, the concept of segmenting your customers into groups of similar behaviors or attitudes is a well established best practice in marketing. MarketSherpa’s survey found that one of the most effective marketing strategies is to send emails based on the behavior of your customers.

The State of Elixir HTTP Clients

In today’s post, we’ll look at two Elixir HTTP client libraries: Mint and Finch. Finch is built on top of Mint. We’ll see the benefits offered by this abstraction layer. We’ll also talk about some of the existing HTTP client libraries in the ecosystem and discuss some of the things that make Mint and Finch different. Finally, we’ll put together a quick project that makes use of Finch to put all of our learning into action. Let’s jump right in!

Protecting Your Apps From Link-based Vulnerabilities: Reverse Tabnabbing, Broken-Link Hijacking, and Open Redirects

Links are so fundamental to web development that they're almost invisible. When we link to a third-party page, we hardly ever consider how it could become an opportunity to exploit our users. In this article, Julien Cretel introduces us to three techniques that bad actors can use to target our users and discusses how to avoid them.