From Data Engineering on Azure by Vlad Riscutia
This article talks about building identity keyrings
This is an excerpt from a draft of chapter 10 of my book, Azure Data Engineering, which deals with compliance. In this article we’ll look at a few techniques to transform sensitive user data into less sensitive data. In the book, this includes code samples for implementation on Azure Data Explorer, which are omitted from this article. Let’s start with a couple of definitions.
From Azure Storage, Streaming, and Batch Analytics by Richard Nuckolls
This article discusses using Azure Data Lake Analytics (ADLA) for batch queries.
Six Questions for Cornelia Davis, author of Cloud Native Patterns
Cornelia Davis is Vice President of Technology at Pivotal Software. A teacher at heart, she’s spent the last 25 years making good software and great software developers.
From Azure Storage, Streaming, and Batch Analytics by Richard Nuckolls
This article delves into Azure’s tools for data engineering and why you should consider using them.
From Production-Ready Serverless by Yan Cui
From Amazon Web Services in Action, Second Edition by Michael Wittig and Andreas Wittig
In this article, we will compare various vile systems and how you can share data across EC2 instances.