Hi everyone! About a week ago we held a bonus webinar on Tableau presented by Jonathan Drummey from DataBlick. It was a great session and we had tons of questions. Below are answers to many questions we did not get to in the presentation.
Welcome back to another episode of This Week In Data! If you missed our previous episodes, you can watch them here. In this week's episode, we'll tell you how to master a technical interview.
Back in March of this year I created an article and a webinar for the Pragmatic Works Blog.
The original concepts still hold, Power BI and Excel Power Query are very powerful tools for building data models and sharing data discovery and visualizations. As you move from initial prototyping to a more mature model you may find that performance can be bogged down if you don't manage the structure of your reporting information. This talk provides Tips and Techniques to manage this information (link to updated slides).
High Availability, just mentioning these words brings fear to some and delight to others. Gartner describes High Availability “As business operations' dependency on IT infrastructure continues to increase in response to the need for faster and leaner business processes, the need for these systems to be highly available also increases. Not only do high-availability designs focus on automatically detecting and reacting to failures, but, more importantly, they also focus on mitigating the downtime required for standard maintenance tasks. This Reference Architecture template outlines the approach and architecture to achieve high-availability of IT service infrastructure.”
Welcome back to another episode of This Week In Data! If you missed our previous episodes, you can watch them here. In this week's episode, guest host Tim Moolic discusses the importance of data testing with Adam and Devin.
Do you Yahoo? Well if you do, your personal information could now be in the hands of folks up to no good. Yahoo began releasing information to the media that at least 500 million user accounts have been compromised. According to reports, data gathered by the hackers was Personally Identifiable Information (PII), not financial data. Hackers are going to find ways to bypass our security measures put in place. Even knowing that our information could be compromised, it is in our best interest to do all we can to protect our data.