Two months ago I didn’t give much thought to controlling a program’s access to the Internet. Then Log4Shell happened. This post looks at three ways that you can control what an in-VPC application is allowed to talk to.
Scale Your Data Pipeline Efficiently
It can be a struggle to extract business value from your data. Disparate data sources and data quality are just a few of the complex issues you face.
Ensure that the entire pipeline of your data collection yields accurate, consistent results. When you partner with Chariot’s experienced data engineers, you develop highly optimized data pipelines that yield valuable business insights. From collection to analytics to preparation, your pipeline’s plumbing should withstand the digital flood.
AWS Practice Lead Keith Gregory interviews Andrew Ganim about how he helped a multinational company better analyze their data by building a more robust data pipeline.
Chariot Has Expertise In:
Structuring data and designing queries to a single place, for use by multiple consumers.
Near-real-time data populates analytics databases and drives customer interactions.
Big Data Databases
Data and queries are designed to yield efficient, cost-effective business intelligence.
Chariot combines multiple tools and services to acquire, cleanse, transform, and present business data.
The answer is in the architecture. Chariot’s team of experienced data engineers help simplify the process and guide you through the many choices in building the best data pipelines to serve your business needs. We partner with you to build secure, reliable, and highly scalable data pipelines rooted in data integrity.
Articles, Tutorials, and Writing
Continuous learning is one of our core values here at Chariot, and we believe it’s important to share what we learn. Our data engineers are always writing tutorials, delivering talks, and reviewing the latest new tech. Browse a few pieces of our latest data-focused content here.
Building a holiday light display for his own home spurred Al Iacovella’s interest in microcontrollers, data, and the internet of things.
It’s been a week since CVE-2021-44228, a remote code execution vulnerability in Log4J 2.x, hit the world. Hopefully by now everybody reading this has updated their Java deployments with the latest Log4J libraries. But no doubt there’s another vulnerability, in some popular framework or library, just waiting to make its presence known. This post is about Cloud features that act to minimize the blast radius of such vulnerabilities.
Amazon Redshift’s launch in 2012 was one of the “wow!” moments in my experience with AWS. Here was a massively parallel database system that could be rented for 25 cents per node-hour. Here we are in 2021, and AWS has just announced Redshift Serverless, in which you pay for the compute and storage that you use, rather than a fixed monthly cost for a fixed number of nodes with a fixed amount of storage. And for a lot of use cases, I think that’s a great idea. So I spent some time kicking the tires, and this is what I learned.
We’re proud to be a Certified AWS Partner.
AWS offers so many products for cloud computing that it takes an expert to understand which tools are best for your business process. Let our team of expert AWS consultants guide you through selection, implementation, maintenance and security.
Get More Information