AWS | Cloud | Technology Securing S3 Downloads with ALB and Cognito Authentication Joris Conijn 25 Feb, 2025
Security How to store your Docker registry credentials in 1Password using a credential helper Mark van Holsteijn 24 Feb, 2025
Data | Data & AI | Data and AI Strategy Data trends in 2025 Koen Graat , Steven van Duin , rubenvandedonk 23 Feb, 2025
Cloud | Data | Data & AI | Data Engineering | Technology | Terraform Automating Azure Databricks SCIM Provisioning with Terraform Alexander Bij 21 Feb, 2025
Data & AI | Data | Data and AI Strategy 7 Powerful Questions to Define and Execute Your Data Strategy Steven Nooijen 10 Feb, 2025
AWS | Cloud | Technology ECS Fargate Persistent Storage: EFS Access Points vs. Lambda Workarounds Joris Conijn 04 Feb, 2025
Data | Data Governance | Data Science and AI | dbt Automate Sensitive Data Protection with Metadata-Driven Masking Marta Radziszewska , Tim Steinkühler 30 Jan, 2025
Cloud | Data | Data & AI | Data Engineering | FinOps | Technology Databricks Lakehouse Optimization: A deep dive into Delta Lake's VACUUM Frank Mbonu 28 Jan, 2025
AWS | Cloud | Technology Streamlining Workflows with Feature Branches and Logical Stacks Joris Conijn 26 Jan, 2025
Data | Data & AI | Data Engineering Resolving Re-Used Business Keys in Data Vault 2.0 with the Business Vault Camila Birocchi 24 Jan, 2025
Cloud | Google Cloud Platform | Technology VPC Service Controls - A step by step guide Ruben Kruiver 24 Jan, 2025
Data | Data & AI | Data Engineering | Open Source | Technology Comparing the impact of file formats Alexander Bij 23 Jan, 2025
AWS | Cloud | Technology Stop organizing scavenger hunts in your cloud infrastructure Joris Conijn 18 Jan, 2025