Systems | Development | Analytics | API | Testing

Analytics

Amazon OpenSearch Ingestion Adds Support for Confluent Cloud as Source

Until recently, customers didn't have an easy way to send data from Confluent’s data streaming platform to Amazon OpenSearch. They had to either write custom code using AWS Lambda as an intermediary, refactor the HTTP Sink connector, or self-manage an old Elasticsearch connector version. Earlier this year, we announced the fully managed OpenSearch Sink connector, providing a seamless way to sink data from Confluent to Amazon OpenSearch.

Confluent Is Named Microsoft's 2024 OSS on Azure Global Partner of the Year

Confluent is thrilled to be named Microsoft’s 2024 OSS on Azure Global Partner of the Year. As a three-time Partner of the Year award winner, this recognition reflects our commitment to delivering outstanding open source-based applications and infrastructure solutions on Microsoft Azure.

What is API Documentation and Why is it Important?

Application Programming Interfaces (APIs) integrate diverse software systems and enable seamless communication. 98% of enterprise leaders agree that APIs are essential to an organization’s digital transformation. But just having APIs isn’t enough; it’s equally important to provide clear instructions on how to use them. Think of API documentation as the user manual that comes with a product—except, in this case, the product is code.

SQL Server API: What It Is and How to Create One

SQL Server is a modern relational database management system. It helps data teams store and manage vast amounts of data. However, organizations need efficient methods to access and manipulate this data to leverage it fully. This is where SQL Server APIs come into play. APIs, or Application Programming Interfaces, act as intermediaries enabling different software applications to communicate.

Microservice Pitfalls: Solving the Dual-Write Problem | Designing Event-Driven Microservices

When building a distributed system, developers are often faced with something known as the dual-write problem. It occurs whenever the system needs to perform individual writes to separate systems that can't be transactionally linked. This situation creates the potential for data loss if the developer isn't careful. However, techniques such as the Transactional Outbox Pattern and Event Sourcing can be used to guard against the potential for data loss while also providing added resilience to the system.

Empowering Data Agility: Equifax's Journey to Operational Excellence

In the data-driven world where real-time decision-making and innovation are not just goals but necessities, global data analytics and technology companies like Equifax must navigate a complex environment to achieve success. Equifax sets the standard for operational excellence by enabling real-time decision-making, accelerating innovation, scaling efficiently, consistently achieving service level agreements (SLAs), and building reliable data pipelines.

On Demand Tabular Reports - SaaS in 60

Last year we released Tabular Reporting, a new Excel and Office 365 add-in that addresses operational report and distribution requirements by creating formatted reports using existing Qlik Cloud Analytics apps and data. Now you can make those same reports available to download, on demand, directly to users while they analyze data within a Qlik Cloud Analytics app, complete with their preferred data selections.

5 Ways Healthcare and Life Sciences Organizations Are Using Gen AI

Much has been said about how generative AI will impact the healthcare and life sciences industries. While generative AI will never replace a human healthcare provider, it is going a long way toward addressing key challenges and bottlenecks in the industry. And the effects are expected to be far-reaching across the sector.

Enhanced Cybersecurity with Real-Time Log Aggregation and Analysis

In today’s hyper-connected world, systems are more intertwined and complex than ever. Myriad data sources including applications, databases, network and IoT devices continuously generate vast amounts of data, capturing every event and interaction. Imagine harnessing this data–login logs, firewall logs, IPS logs, web logins–aggregating it, and analyzing it to create a holistic view of your entire infrastructure.