Big Book of Data Engineering Get how-tos, code snippets and real-world examples As data volume and complexity increase, engineers are left figuring out how to manage, monitor and maintain fragile pipelines while also...
Category Modules
The Data Lakehouse for Dummies
The Data Lakehouse for Dummies Data lakehouse architecture explained In just a few years, data lakehouses have quickly become the new paradigm for enterprise data architecture. Newly updated, The Data Lakehouse for...
Unify data and analytics workloads
Unify data and analytics workloads Build a winning data platform strategy Find out how to launch a digital transformation that helps you drive innovation, increase productivity and accelerate business results. An...
Databricks Fundamentals
Databricks Fundamentals Bring AI to your data In just one hour, learn about the latest data and AI techniques and how you can use the Databricks Data Intelligence Platform to build all kinds of data and AI solutions...
Recovering Data is Easy. Recovering Microsoft 365 Configurations Isn’t.
Recovering Data is Easy. Recovering Microsoft 365 Configurations Isn’t. Most backup tools protect your files, but not your Microsoft 365 configurations. If those settings are lost or changed, your business goes down...
Defend what matters: Your guide to Microsoft 365 identity security
Defend what matters: Your guide to Microsoft 365 identity security Developed by KuppingerCole analysts, this executive guide distills years of independent research into practical guidance for identity and security...
CoreView’s Cyber Resilience Maturity Model for Microsoft 365
CoreView’s Cyber Resilience Maturity Model for Microsoft 365 You already know cyber resilience is essential. This guide provides a clear path to get there. Developed by Microsoft security experts, the guide offers an...
CoreView’s Anatomy of a Microsoft 365 Attack
CoreView’s Anatomy of a Microsoft 365 Attack Microsoft 365 is under attack. 71% of tenants have experienced at least one account takeover—on average, 7 times in the last year. Cybercriminals don’t break in. They...
Attackers Know How to Take Your Tenant. Do You Know How to Take It Back?
Attackers Know How to Take Your Tenant. Do You Know How to Take It Back? Backups won’t restore your Microsoft 365 tenant. See what real recovery takes. Spotting threats is easy. Recovering your Microsoft 365 tenant...
Generative AI in Retail Lending: Strategies for Competitive Advantage
Request Your Free Report Now: “Generative AI in Retail Lending: Strategies for Competitive Advantage” Generative AI is no longer optional in retail lending; it’s a competitive necessity. This report...
