8 ways to leverage AWS Lambda in your Big Data workloadsAdrian Hornsby
The document discusses 8 ways to leverage AWS Lambda for Big Data workloads. It provides examples of architectures using AWS Lambda for real-time processing of streaming data from sources like Kinesis, applying custom logic to data uploaded to services like S3, DynamoDB, and IoT, and simplifying resource management through automated tasks run by Lambda functions.
The document introduces Amazon Web Services and describes several core services including Amazon Simple Storage Service (S3) for storing and retrieving data, Amazon Elastic Compute Cloud (EC2) for running virtual servers in Amazon's data centers, and Amazon SimpleDB for storing and querying non-relational data. It explains how these services provide scalable computing and storage infrastructure as modular web services that developers can use to build sophisticated, robust applications.
My slides from the re:Invent Recap Conferences.
The AWS Well-Architected Framework enables customers to understand best practices around security, reliability, performance, and cost optimisation when building systems on AWS. This approach helps customers make informed decisions and weigh the pros and cons of application design patterns for the cloud. In this session, you'll learn how to follow AWS guidelines and best practices. By developing a strategy based on Amazon Web Services's Well-Architected Framework, you will be able to significantly increase the frequency of code deployments and reduce deployment times. As a result, you will be able to deliver more scalable, dynamic and resilient applications.
This document discusses building a data lake on AWS. It describes using Amazon S3 for storage of structured, semi-structured, and unstructured data at scale. Amazon Kinesis is used for streaming ingest of data. A metadata catalogue using Amazon DynamoDB and AWS Lambda allows for data discovery and governance. IAM policies control access and encryption using AWS KMS provides security. APIs built using Amazon API Gateway provide programmatic access to the data lake resources.
This document discusses big data analytics and architectural principles for building big data solutions. It covers collecting and storing data from various sources, processing and analyzing data using services like Amazon Kinesis, Redshift, EMR and Athena, and choosing the right tools based on factors like data structure, access patterns, and latency requirements. Key principles emphasized include building decoupled systems, leveraging managed services, using event-driven architectures, and focusing on cost efficiency.
AWS 2019 Taipei Summit - Building Serverless Analytics Platform on AWSSteven Hsieh
This document discusses building serverless analytics solutions on AWS. It describes how serverless analytics can provide on-demand analytics on data lakes with no infrastructure to manage. Key services mentioned include Amazon S3 for storage, AWS Glue for ETL and data cataloging, Amazon Athena for interactive queries, and Amazon QuickSight for visualization. The document provides examples of using these services together for automated reporting, query monitoring with workgroups, and embedding dashboards in applications.
Wild Rydes with Big Data/Kinesis focus: AWS Serverless WorkshopAWS Germany
This is a hands-on workshop where every participant will not only learn how to architect and implement a serverless application on Amazon Web Services using nothing but serverless resources for all layers in theory, but actually do it in practice, with all the necessary support from the speakers. Serverless computing allows you to build and run applications and services without thinking about servers. Serverless applications don't require you to provision, scale, and manage any servers. You can build them for nearly any type of application or backend service, and everything required to run and scale your application with high availability is handled for you. Building serverless applications means that developers can focus on their core product instead of worrying about managing and operating servers or runtimes. This reduced overhead lets developers reclaim time and energy that can be spent on developing great products which scale and that are reliable.
Big data journey to the cloud rohit pujari 5.30.18Cloudera, Inc.
We hope this session was valuable in teaching you more about Cloudera Enterprise on AWS, and how fast and easy it is to deploy a modern data management platform—in your cloud and on your terms.
AWS reinvent 2019 recap - Riyadh - Containers and Serverless - Paul MaddoxAWS Riyadh User Group
This document provides an overview and agenda for an AWS storage, compute, containers, serverless, and management tools presentation. It includes summaries of several upcoming AWS services and features related to EBS, S3, EC2, EKS, Fargate, Lambda, and AWS Cost Optimizer. The speaker is introduced as Paul Maddox, Principal Architect at AWS, with a background in development, SRE, and systems architecture.
AWS reinvent 2019 recap - Riyadh - Database and Analytics - Assif AbbasiAWS Riyadh User Group
Amazon Web Services hosted a recap of their re:Invent conference focusing on databases and analytics. The presentation discussed how companies are increasingly data-driven and emphasized modernizing data infrastructure to extract more value from data. It promoted moving to managed database services, building data-driven applications, and transforming data into insights.
AWS reinvent 2019 recap - Riyadh - Network and Security - Anver VankerAWS Riyadh User Group
The document outlines an agenda for a two-day AWS conference taking place on March 9-10, 2020 in Riyadh. Day one will feature presentations on networking and security by Anver Vanker and storage, compute and serverless updates by Paul Maddox. Day two presentations will cover big data and analytics by Asif Abbasi and AI and ML by Ahmed Raafat.
Amazon Web Services provides several machine learning services and tools to help developers build, train, deploy, and manage machine learning models at scale. These include Amazon SageMaker for developing and hosting models, Amazon Rekognition for computer vision tasks, and Amazon Transcribe for speech-to-text. AWS aims to put machine learning in the hands of every developer through these fully managed services.
How we got to where we are?
What's Serverless
Serverless Principles
Pros and cons
Serverless architectures
Lambda Anatomy
Demos
AWS SAM
Demo
By : Ahmed Samir
AWS Technical Day Riyadh Nov 2019 - The art of mastering data protection on awsAWS Riyadh User Group
This document discusses various techniques for securing data stored in Amazon S3 buckets, including:
- Using IAM policies and S3 bucket policies to control access to buckets and objects
- The S3 Block Public Access setting to prevent public access
- Encryption using AWS KMS to encrypt data at rest
- Authorization processes where S3 checks IAM, bucket, and object policies to authorize requests
- Managing cross-account access using IAM roles
- Replication ownership override for business continuity between regions
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Riyadh User Group
The document discusses scaling threat detection and response on AWS. It provides an overview of AWS security services for threat detection such as GuardDuty, Macie, and Security Hub which analyze log data using machine learning. It also discusses tools for threat response including Lambda, Inspector, and Systems Manager. The document outlines an attacker lifecycle and how findings map to stages. It provides examples of automated detection and response playbooks and remediation actions.
The document discusses AWS migration tools and strategies. It provides an overview of AWS services like Application Discovery Service and Migration Hub that help with discovery, planning, and tracking migrations. It also summarizes common migration patterns and challenges, and highlights how tools like ADS can help with discovery of on-premises assets and costs to better plan a migration. Example customer migrations are provided that leveraged AWS to reduce costs while improving agility.
AWS Amplify is a JavaScript library and toolchain that makes it easy to build mobile and web applications that use cloud services. It supports frameworks like React, Vue, Angular and Ionic. It provides a CLI to create and configure AWS services like databases, APIs, authentication, analytics and hosting. Behind the scenes, it automates the creation of resources like Cognito for authentication, DynamoDB tables, Lambda functions, API Gateway, S3 and more. It also provides a JavaScript library to connect front-end apps to these cloud services. The demo shows how to create a React app, add Amplify, add features like authentication and hosting, connect the app to GitHub, deploy features to different environments
The document provides information about AWS services including EC2, S3, and CloudFront. It discusses EC2 instance types, pricing models, and storage options. It describes S3's 99.999999999% durability, storage tiers including standard, infrequent access, and glacier, and encryption options. CloudFront is introduced as a CDN that caches content at edge locations to improve distribution.
This document provides an overview of DevOps on AWS. It discusses DevOps culture and goals of speed, reliability, and improved collaboration. It then explains why AWS is suitable for DevOps with managed services, scale, automation, and security. The document outlines components of DevOps practices including continuous integration (CI), continuous delivery (CD), infrastructure as code, and continuous monitoring. It also reviews deployment strategies and AWS developer tools to support CI/CD workflows such as CodeCommit, CodeBuild, CodeDeploy, CodePipeline, Cloud9, and CodeStar.
This document provides an overview of blockchain technology and its applications. It begins with definitions of blockchain and how it works using cryptography to link transaction records in distributed blocks. It then discusses pillars like decentralization and immutability. Use cases for blockchain include smart contracts, voting, and banking. AWS services for blockchain include Amazon Quantum Ledger Database (QLDB) for managing an immutable transaction ledger, and Amazon Managed Blockchain for creating and managing blockchain networks. Pricing models are also summarized.
- The document discusses Infrastructure as Code (IaaC) and AWS CloudFormation (CFN). CFN allows users to model and provision AWS resources from templates to focus on applications rather than managing resources.
- Examples are provided demonstrating how to create a LAMP stack on EC2 using CFN templates in JSON and YAML formats. Issues with reusability and portability in templates are highlighted and solutions proposed using dynamic values, mappings, and intrinsic functions.
- Later examples show how to handle dependencies and output values using CFN. References are listed for further reading on CFN features.
The document provides an agenda for an AWS Security User Group meeting in Riyadh on May 1, 2019. The agenda includes discussions on cloud security, security terminology, cloud security threats, best practices for cloud security, AWS security services, identity and access management, and security of infrastructure. It also provides overviews and descriptions of AWS products and services related to security such as IAM, Inspector, Key Management Service, Macie, Organizations, Shield, Secrets Manager, SSO, WAF, and more.
The document summarizes messaging services on AWS. It provides overviews and details of Amazon MQ, Amazon SQS, Amazon Kinesis, Amazon SNS, Amazon PinPoint, and AWS IoT Message Broker. These services enable event-driven architectures and the exchange of information between distributed systems and microservices through queuing, streaming, and publishing of messages. Key features highlighted include scalability, reliability, encryption, and integration with other AWS services.
The document outlines the agenda for a user group meeting on AWS VPC topics. The agenda includes reviewing default and custom VPCs, NAT instances and gateways, VPC peering, flow logs, endpoints, VPN connections, Direct Connect, limits and pricing, and exam tips. It also lists past topics such as storage, compute, databases, and networking services, as well as upcoming topics such as Lambda, cost optimization, and machine learning.
The document discusses a presentation given to the AWS Riyadh User Group on networking concepts and Amazon VPC components. It provides an overview of VPCs and their usage, including how to create a VPC, subnets, route tables, internet gateways, NAT gateways, network access control lists, and security groups. It also describes common networking concepts like the OSI model, IPv4 vs IPv6, subnetting, and NAT. The presentation concludes with instructions for a hands-on lab to build a sample VPC configuration.
AI and Data Privacy in 2025: Global TrendsInData Labs
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the today’s world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
Technology Trends in 2025: AI and Big Data AnalyticsInData Labs
At InData Labs, we have been keeping an ear to the ground, looking out for AI-enabled digital transformation trends coming our way in 2025. Our report will provide a look into the technology landscape of the future, including:
-Artificial Intelligence Market Overview
-Strategies for AI Adoption in 2025
-Anticipated drivers of AI adoption and transformative technologies
-Benefits of AI and Big data for your business
-Tips on how to prepare your business for innovation
-AI and data privacy: Strategies for securing data privacy in AI models, etc.
Download your free copy nowand implement the key findings to improve your business.
AWS reinvent 2019 recap - Riyadh - Containers and Serverless - Paul MaddoxAWS Riyadh User Group
This document provides an overview and agenda for an AWS storage, compute, containers, serverless, and management tools presentation. It includes summaries of several upcoming AWS services and features related to EBS, S3, EC2, EKS, Fargate, Lambda, and AWS Cost Optimizer. The speaker is introduced as Paul Maddox, Principal Architect at AWS, with a background in development, SRE, and systems architecture.
AWS reinvent 2019 recap - Riyadh - Database and Analytics - Assif AbbasiAWS Riyadh User Group
Amazon Web Services hosted a recap of their re:Invent conference focusing on databases and analytics. The presentation discussed how companies are increasingly data-driven and emphasized modernizing data infrastructure to extract more value from data. It promoted moving to managed database services, building data-driven applications, and transforming data into insights.
AWS reinvent 2019 recap - Riyadh - Network and Security - Anver VankerAWS Riyadh User Group
The document outlines an agenda for a two-day AWS conference taking place on March 9-10, 2020 in Riyadh. Day one will feature presentations on networking and security by Anver Vanker and storage, compute and serverless updates by Paul Maddox. Day two presentations will cover big data and analytics by Asif Abbasi and AI and ML by Ahmed Raafat.
Amazon Web Services provides several machine learning services and tools to help developers build, train, deploy, and manage machine learning models at scale. These include Amazon SageMaker for developing and hosting models, Amazon Rekognition for computer vision tasks, and Amazon Transcribe for speech-to-text. AWS aims to put machine learning in the hands of every developer through these fully managed services.
How we got to where we are?
What's Serverless
Serverless Principles
Pros and cons
Serverless architectures
Lambda Anatomy
Demos
AWS SAM
Demo
By : Ahmed Samir
AWS Technical Day Riyadh Nov 2019 - The art of mastering data protection on awsAWS Riyadh User Group
This document discusses various techniques for securing data stored in Amazon S3 buckets, including:
- Using IAM policies and S3 bucket policies to control access to buckets and objects
- The S3 Block Public Access setting to prevent public access
- Encryption using AWS KMS to encrypt data at rest
- Authorization processes where S3 checks IAM, bucket, and object policies to authorize requests
- Managing cross-account access using IAM roles
- Replication ownership override for business continuity between regions
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Riyadh User Group
The document discusses scaling threat detection and response on AWS. It provides an overview of AWS security services for threat detection such as GuardDuty, Macie, and Security Hub which analyze log data using machine learning. It also discusses tools for threat response including Lambda, Inspector, and Systems Manager. The document outlines an attacker lifecycle and how findings map to stages. It provides examples of automated detection and response playbooks and remediation actions.
The document discusses AWS migration tools and strategies. It provides an overview of AWS services like Application Discovery Service and Migration Hub that help with discovery, planning, and tracking migrations. It also summarizes common migration patterns and challenges, and highlights how tools like ADS can help with discovery of on-premises assets and costs to better plan a migration. Example customer migrations are provided that leveraged AWS to reduce costs while improving agility.
AWS Amplify is a JavaScript library and toolchain that makes it easy to build mobile and web applications that use cloud services. It supports frameworks like React, Vue, Angular and Ionic. It provides a CLI to create and configure AWS services like databases, APIs, authentication, analytics and hosting. Behind the scenes, it automates the creation of resources like Cognito for authentication, DynamoDB tables, Lambda functions, API Gateway, S3 and more. It also provides a JavaScript library to connect front-end apps to these cloud services. The demo shows how to create a React app, add Amplify, add features like authentication and hosting, connect the app to GitHub, deploy features to different environments
The document provides information about AWS services including EC2, S3, and CloudFront. It discusses EC2 instance types, pricing models, and storage options. It describes S3's 99.999999999% durability, storage tiers including standard, infrequent access, and glacier, and encryption options. CloudFront is introduced as a CDN that caches content at edge locations to improve distribution.
This document provides an overview of DevOps on AWS. It discusses DevOps culture and goals of speed, reliability, and improved collaboration. It then explains why AWS is suitable for DevOps with managed services, scale, automation, and security. The document outlines components of DevOps practices including continuous integration (CI), continuous delivery (CD), infrastructure as code, and continuous monitoring. It also reviews deployment strategies and AWS developer tools to support CI/CD workflows such as CodeCommit, CodeBuild, CodeDeploy, CodePipeline, Cloud9, and CodeStar.
This document provides an overview of blockchain technology and its applications. It begins with definitions of blockchain and how it works using cryptography to link transaction records in distributed blocks. It then discusses pillars like decentralization and immutability. Use cases for blockchain include smart contracts, voting, and banking. AWS services for blockchain include Amazon Quantum Ledger Database (QLDB) for managing an immutable transaction ledger, and Amazon Managed Blockchain for creating and managing blockchain networks. Pricing models are also summarized.
- The document discusses Infrastructure as Code (IaaC) and AWS CloudFormation (CFN). CFN allows users to model and provision AWS resources from templates to focus on applications rather than managing resources.
- Examples are provided demonstrating how to create a LAMP stack on EC2 using CFN templates in JSON and YAML formats. Issues with reusability and portability in templates are highlighted and solutions proposed using dynamic values, mappings, and intrinsic functions.
- Later examples show how to handle dependencies and output values using CFN. References are listed for further reading on CFN features.
The document provides an agenda for an AWS Security User Group meeting in Riyadh on May 1, 2019. The agenda includes discussions on cloud security, security terminology, cloud security threats, best practices for cloud security, AWS security services, identity and access management, and security of infrastructure. It also provides overviews and descriptions of AWS products and services related to security such as IAM, Inspector, Key Management Service, Macie, Organizations, Shield, Secrets Manager, SSO, WAF, and more.
The document summarizes messaging services on AWS. It provides overviews and details of Amazon MQ, Amazon SQS, Amazon Kinesis, Amazon SNS, Amazon PinPoint, and AWS IoT Message Broker. These services enable event-driven architectures and the exchange of information between distributed systems and microservices through queuing, streaming, and publishing of messages. Key features highlighted include scalability, reliability, encryption, and integration with other AWS services.
The document outlines the agenda for a user group meeting on AWS VPC topics. The agenda includes reviewing default and custom VPCs, NAT instances and gateways, VPC peering, flow logs, endpoints, VPN connections, Direct Connect, limits and pricing, and exam tips. It also lists past topics such as storage, compute, databases, and networking services, as well as upcoming topics such as Lambda, cost optimization, and machine learning.
The document discusses a presentation given to the AWS Riyadh User Group on networking concepts and Amazon VPC components. It provides an overview of VPCs and their usage, including how to create a VPC, subnets, route tables, internet gateways, NAT gateways, network access control lists, and security groups. It also describes common networking concepts like the OSI model, IPv4 vs IPv6, subnetting, and NAT. The presentation concludes with instructions for a hands-on lab to build a sample VPC configuration.
AI and Data Privacy in 2025: Global TrendsInData Labs
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the today’s world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
Technology Trends in 2025: AI and Big Data AnalyticsInData Labs
At InData Labs, we have been keeping an ear to the ground, looking out for AI-enabled digital transformation trends coming our way in 2025. Our report will provide a look into the technology landscape of the future, including:
-Artificial Intelligence Market Overview
-Strategies for AI Adoption in 2025
-Anticipated drivers of AI adoption and transformative technologies
-Benefits of AI and Big data for your business
-Tips on how to prepare your business for innovation
-AI and data privacy: Strategies for securing data privacy in AI models, etc.
Download your free copy nowand implement the key findings to improve your business.
Mobile App Development Company in Saudi ArabiaSteve Jonas
EmizenTech is a globally recognized software development company, proudly serving businesses since 2013. With over 11+ years of industry experience and a team of 200+ skilled professionals, we have successfully delivered 1200+ projects across various sectors. As a leading Mobile App Development Company In Saudi Arabia we offer end-to-end solutions for iOS, Android, and cross-platform applications. Our apps are known for their user-friendly interfaces, scalability, high performance, and strong security features. We tailor each mobile application to meet the unique needs of different industries, ensuring a seamless user experience. EmizenTech is committed to turning your vision into a powerful digital product that drives growth, innovation, and long-term success in the competitive mobile landscape of Saudi Arabia.
Role of Data Annotation Services in AI-Powered ManufacturingAndrew Leo
From predictive maintenance to robotic automation, AI is driving the future of manufacturing. But without high-quality annotated data, even the smartest models fall short.
Discover how data annotation services are powering accuracy, safety, and efficiency in AI-driven manufacturing systems.
Precision in data labeling = Precision on the production floor.
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...SOFTTECHHUB
I started my online journey with several hosting services before stumbling upon Ai EngineHost. At first, the idea of paying one fee and getting lifetime access seemed too good to pass up. The platform is built on reliable US-based servers, ensuring your projects run at high speeds and remain safe. Let me take you step by step through its benefits and features as I explain why this hosting solution is a perfect fit for digital entrepreneurs.
Automation Hour 1/28/2022: Capture User Feedback from AnywhereLynda Kane
Slide Deck from Automation Hour 1/28/2022 presentation Capture User Feedback from Anywhere presenting setting up a Custom Object and Flow to collection User Feedback in Dynamic Pages and schedule a report to act on that feedback regularly.
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc
Most consumers believe they’re making informed decisions about their personal data—adjusting privacy settings, blocking trackers, and opting out where they can. However, our new research reveals that while awareness is high, taking meaningful action is still lacking. On the corporate side, many organizations report strong policies for managing third-party data and consumer consent yet fall short when it comes to consistency, accountability and transparency.
This session will explore the research findings from TrustArc’s Privacy Pulse Survey, examining consumer attitudes toward personal data collection and practical suggestions for corporate practices around purchasing third-party data.
Attendees will learn:
- Consumer awareness around data brokers and what consumers are doing to limit data collection
- How businesses assess third-party vendors and their consent management operations
- Where business preparedness needs improvement
- What these trends mean for the future of privacy governance and public trust
This discussion is essential for privacy, risk, and compliance professionals who want to ground their strategies in current data and prepare for what’s next in the privacy landscape.
How Can I use the AI Hype in my Business Context?Daniel Lehner
𝙄𝙨 𝘼𝙄 𝙟𝙪𝙨𝙩 𝙝𝙮𝙥𝙚? 𝙊𝙧 𝙞𝙨 𝙞𝙩 𝙩𝙝𝙚 𝙜𝙖𝙢𝙚 𝙘𝙝𝙖𝙣𝙜𝙚𝙧 𝙮𝙤𝙪𝙧 𝙗𝙪𝙨𝙞𝙣𝙚𝙨𝙨 𝙣𝙚𝙚𝙙𝙨?
Everyone’s talking about AI but is anyone really using it to create real value?
Most companies want to leverage AI. Few know 𝗵𝗼𝘄.
✅ What exactly should you ask to find real AI opportunities?
✅ Which AI techniques actually fit your business?
✅ Is your data even ready for AI?
If you’re not sure, you’re not alone. This is a condensed version of the slides I presented at a Linkedin webinar for Tecnovy on 28.04.2025.
Leading AI Innovation As A Product Manager - Michael JidaelMichael Jidael
Unlike traditional product management, AI product leadership requires new mental models, collaborative approaches, and new measurement frameworks. This presentation breaks down how Product Managers can successfully lead AI Innovation in today's rapidly evolving technology landscape. Drawing from practical experience and industry best practices, I shared frameworks, approaches, and mindset shifts essential for product leaders navigating the unique challenges of AI product development.
In this deck, you'll discover:
- What AI leadership means for product managers
- The fundamental paradigm shift required for AI product development.
- A framework for identifying high-value AI opportunities for your products.
- How to transition from user stories to AI learning loops and hypothesis-driven development.
- The essential AI product management framework for defining, developing, and deploying intelligence.
- Technical and business metrics that matter in AI product development.
- Strategies for effective collaboration with data science and engineering teams.
- Framework for handling AI's probabilistic nature and setting stakeholder expectations.
- A real-world case study demonstrating these principles in action.
- Practical next steps to begin your AI product leadership journey.
This presentation is essential for Product Managers, aspiring PMs, product leaders, innovators, and anyone interested in understanding how to successfully build and manage AI-powered products from idea to impact. The key takeaway is that leading AI products is about creating capabilities (intelligence) that continuously improve and deliver increasing value over time.
Spark is a powerhouse for large datasets, but when it comes to smaller data workloads, its overhead can sometimes slow things down. What if you could achieve high performance and efficiency without the need for Spark?
At S&P Global Commodity Insights, having a complete view of global energy and commodities markets enables customers to make data-driven decisions with confidence and create long-term, sustainable value. 🌍
Explore delta-rs + CDC and how these open-source innovations power lightweight, high-performance data applications beyond Spark! 🚀
Buckeye Dreamin 2024: Assessing and Resolving Technical DebtLynda Kane
Slide Deck from Buckeye Dreamin' 2024 presentation Assessing and Resolving Technical Debt. Focused on identifying technical debt in Salesforce and working towards resolving it.
This is the keynote of the Into the Box conference, highlighting the release of the BoxLang JVM language, its key enhancements, and its vision for the future.