
Self-Service – Business Intelligence
Self-Service The responsibility for delivery has been shifting from the IT area to the business area. Driven by business’ desire for more control and ownership, business teams responsible for digital delivery often have little or no link to the IT department. While this is a positive trend, there is a risk that organizations will become

Designing secure VPCs – Infrastructure Security – Keeping Your VPC secure
Designing secure VPCs Our first stop in this chapter is designing secure VPCs. A VPC is a virtual network dedicated to your AWS account, and its design plays a crucial role in the overall security of your AWS resources. In this section, we will walk you through key security considerations and best practices to ensure

Key components of a VPC – Infrastructure Security – Keeping Your VPC secure
Key components of a VPC Before we explore security strategies, let’s briefly revisit the building blocks of a VPC to understand their role in enhancing your AWS environment’s security. Subnets A subnet, also known as a subnetwork, is a logical partition of a larger network – in this case, your VPC. Each subnet is associated

Best practices for designing secure VPCs – Infrastructure Security – Keeping Your VPC secure
Best practices for designing secure VPCs This section will guide you through a series of best practices that can guide you in designing a skeleton for your VPCs that is not only functional but also secure. These practices are not exhaustive, but they provide a solid foundation for building secure VPCs. Use subnet segregation heavily

Data Literacy – Business Intelligence
Data Literacy As self-service analytics is getting traction, it is essential to have the ability to write, read, interpret, and understand data across the enterprise. Individual knowledge workers should have the ability to understand the analytics regarding business value or outcome. Data and analytics are pervasive in all domains of business. Data literacy is fundamental

Data and Analytics Approach and Strategy – Business Intelligence
Data and Analytics Approach and Strategy The strategy of an organization flows from business strategy to information strategy, which includes application and data strategy. It is essential that information strategy matches with business strategy. Information strategy consists of application strategy, data strategy, business intelligence strategy, and analytics strategy; all of these must align with the

Mappings – Business Intelligence
Mappings The purpose of this matrix is to align the focus of business strategy with data analytics strategy. Like all the programs, questions to be answered include, What is the value or value proposition for our customers in terms of providing data insights? What business process and response changes give these new insights? Figure 7-11

Step to Create Data Strategy 3 – Business Intelligence
7. Develop a roadmap: Create a roadmap based on any recommendations. This roadmap could range from three to five years. For example, you were advised to start and increase the maturity of analytics. This is done in two major steps. The first step is to enable access to historical data, tools, and skills for individuals

Cloud security overview – its importance and challenges – Introduction to AWS Security Concepts and the Shared Responsibility Model
Cloud security overview – its importance and challenges As we embark on our journey into AWS security, it is essential to understand the broader landscape of cloud security. This section will set the stage by highlighting the importance of cloud security in our increasingly digital world and the unique challenges it presents. The significance of

Cloud security challenges – Introduction to AWS Security Concepts and the Shared Responsibility Model
Cloud security challenges Despite the numerous benefits of cloud computing, it also introduces a unique set of security challenges that organizations must address. These challenges stem from the inherent characteristics of the cloud, such as its shared, on-demand nature, and the fact that it often involves storing and processing sensitive data in third-party data centers.
Archives
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- October 2023
- September 2023
- August 2023
- July 2023
- May 2023
- March 2023
- January 2023
- December 2022
- November 2022
- August 2022
- June 2022
- April 2022
- March 2022
- January 2022
- December 2021
- October 2021
- August 2021
- June 2021
- April 2021
- March 2021
- January 2021