• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us

iHash

News and How to's

  • Smart Home DIY Wireless Alarm Security System 5-Piece Kit for $74

    Smart Home DIY Wireless Alarm Security System 5-Piece Kit for $74
  • Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69

    Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69
  • Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24

    Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24
  • MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49

    MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49
  • Robolly Graphic Automation: Lifetime Subscription for $29

    Robolly Graphic Automation: Lifetime Subscription for $29
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Out of the Lab: How Low-Code Access to External Data Increases Speed to Production

Feb 18, 2022 by iHash Leave a Comment

Speed. Agility. Competitive advantage. We could be talking about the Winter Olympic games – but we’re not. These terms describe the current business landscape, where technological advances kicked into overdrive in 2020 and have yet to slow down. More than ever before, organizations are being pressured to innovate by launching new products powered by data (both internally for business intelligence and externally for customer acquisition and user experience) in order to retain their competitive advantage.

In the past, launching a new data-driven product was challenging for several reasons. First, allocating the necessary IT resources to scope and build such products can discourage teams from even starting. Second, the nuances of identifying data assets, testing them for value, then managing ETL workflows across siloed databases can take months to years. Finally, identifying the necessary budget for data product development can be difficult to justify among competing priorities.

The Rise of Low-Code Development Platforms (LCDPs)

A significant influence in today’s race to produce at the speed of ideation is the rise of low-code development platforms (LCDP); those often utilized by in-house professionals with varying levels of technical expertise. LCDPs allow entities to create and release applications in a fraction of the time the same process takes by traditional methods. LCDPs are also typically cloud-based, have pre-built and customizable applications, and – true to their name – require little-to-no coding to produce functional insights.

LCDPs enable shorter development life cycles at a time when speed to production and business agility are more important than ever. In fact, a recent report says that by 2025, 70% of new applications developed by enterprises will use low-code or no-code technologies – almost triple the percentage from 2020.

Demand for Data through LCDPs

Underpinning most low-code applications are a combination of internal and/or external datasets that provide decision-makers with valuable insights. For example, in the retail industry, the ability to launch low-code dashboards to monitor footfall traffic has enabled targeted decision-making around store placement and advertising. During the Covid-19 pandemic, these dashboards were used by governments to monitor social distancing metrics.

In the financial services sector, there are low-code applications for every use case from minimum question digital applications to customer profile dashboards to due diligence (KYC, AML, KYB) dashboards. Across all of these applications, the ability to enrich internal data with external data in real-time is critical.

Additionally, when the business landscape turned upside down in 2020 and 2021, financial service providers launched portfolio monitoring tools powered by external data. Relying solely on internal data couldn’t come close to gauging the dramatic economic changes that lay outside the bounds of existing statistical models. Financial institutions needed to integrate more rapidly refreshing alternative data to monitor portfolio behavior and the likelihood of delinquency.

As recently as 2019, one survey found that 92% of data analytics professionals were looking to increase their company’s use of external data sources. And that was pre-pandemic. By 2020, leveraging data and analytics ecosystems enabled by an augmented approach was listed as a top trend by leading analysts in the space.

From a strategic standpoint, LCDPs offer easier access to the myriad of external data sources available. Given that companies who incorporate analytics into decision-making are reportedly four times more likely to use multiple data sources – mobile, social and public to name a few – accessing actionable data becomes a business imperative. Low-code methods used to access external data can accelerate its return-on-investment, but that depends on several factors:

Data Curation

There is now a vast number of external data providers for any given insight or data type. As in any industry, not all data providers are equal and there can be substantial differences across datasets as straightforward as tax assessor data (a relatively commoditized dataset that aggregates property information from county offices) or business firmographics (try comparing business revenue data across three different datasets and you’re likely to get three different answers). LCDPs are in a unique position to help their users discover the right external data sources to meet their needs using graphical interfaces (filter sources by a type or search by an attribute), and in certain cases helping them to identify dataset coverage against populations that are relevant to their use case.

Data Compliance

In order to inform accurate analysis and the right business decisions, external data must be heavily vetted. An LCDP may organize a robust influx of data, but companies need to know the specifics around how that data was first gathered by the third-party sources providing it. Any concerns around privacy, ethical collection, biased methodologies or accuracy need to be addressed before the data is used for production use-cases (e.g., business intelligence decisions, customer decisioning, etc.). In this context, tagging and certifications (e.g., subject to GDPR, FCRA, GLBA, etc.) offer substantial value to business users as it enables them to quickly identify any internal compliance or due diligence they should conduct on their side before considering a data source.

Data Access Method

LCDPs offer multiple methods of accessing external data through their interfaces. In the context of large datasets, LCDPs can offer cloud-hosting of full datasets that can be accessed and analyzed on-demand. The example of mobility data for retail analytics refreshed on a regular basis is such an example, where having the full dataset to analyze across a region may be more powerful than only examining a certain area. In other cases, LCDPs also do the heavy-duty work of helping users enrich internal data (or customer data) with relevant insights using a simple API call. For the user, the experience is seamless, but the back-end infrastructure required to process hundreds of thousands to millions of API transactions with just a few lines of code is quite sophisticated.

Ultimately, LCDPs help organizations deploy applications faster by lowering barriers to technology and data access. Having the ability to spin up data-driven applications and shut them down at rapid speed is a powerful tool in the race to be competitive. That being said, it is important for LCDPs to keep up with changes in external data to ensure that organizations align the right data with the right use cases.

About the Author

Prashant P. Reddy, Head of Data Advisory for Demyst. Prashant has 8+ years of experience working with tier-1 and tier-2 clients, leading data-driven workflow transformations. He has also led the due diligence and onboarding of 100s of data products into the Demyst Platform. Prior to joining Demyst, Prashant worked as investment banker at Morgan Stanley where he structured and executed debt transactions for public sector clients. Prashant holds a Master of Public Administration with an emphasis in International Finance and Economic Policy from Columbia University and a Bachelor of Arts in Economics and Political Science from the University of California, Berkeley.

Sign up for the free insideBIGDATA newsletter.

Join us on Twitter: @InsideBigData1 – https://twitter.com/InsideBigData1

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: BigData

Special Offers

  • Smart Home DIY Wireless Alarm Security System 5-Piece Kit for $74

    Smart Home DIY Wireless Alarm Security System 5-Piece Kit for $74
  • Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69

    Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69
  • Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24

    Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24
  • MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49

    MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49
  • Robolly Graphic Automation: Lifetime Subscription for $29

    Robolly Graphic Automation: Lifetime Subscription for $29

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69

Jun 25, 2022 By iHash

More Than You Know: The Enterprise Worth of Natural Language Generation 

Jun 24, 2022 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news Cyber Security cybersecurity cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS iOS 7 iOS 8 iPhone iPhone 6 Malware microsoft network security Privacy ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

Smart Home DIY Wireless Alarm Security System 5-Piece Kit for $74

Expires June 25, 2122 23:59 PST Buy now and get 31% off KEY FEATURES Create a smart home with the Eco4life Wireless Alarm Security System 5 Pieces Kit. With this system, you can monitor your home and alert you of any activity through cell phones, smart devices, and home automation systems. Use the eco4life app […]

Elastic Contributors: Announcing New Features and Ways to Earn Points

Elastic Contributors: Announcing New Features and Ways to Earn Points

Table of Contents What’s new?1. Additional opportunities to earn bonus points2. We accept code contributions made to non-Elastic repositories3. Extra points for referring a contributor4. Dispute declined contributions5. View other participants’ contributions What’s new? 1. Additional opportunities to earn bonus points Contributors can now earn bonus points for submitting content in different solutions and contribution […]

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

A suspected ransomware intrusion against an unnamed target leveraged a Mitel VoIP appliance as an entry point to achieve remote code execution and gain initial access to the environment. The findings come from cybersecurity firm CrowdStrike, which traced the source of the attack to a Linux-based Mitel VoIP device sitting on the network perimeter, while […]

Animation Desk Windows Pro Lite: Lifetime Subscription for $59

Expires June 23, 2122 23:59 PST Buy now and get 59% off KEY FEATURES Your tablet is your animation desk. Animation Desk Windows is a user-friendly animation software for drawing frame-to-frame 2D animation. You can start from scratch or create animations on top of a video and photos with many tools. FEATURES FOR CREATING ANIMATION […]

“Above the Trend Line” – Your Industry Rumor Central for 6/23/2022

Above the Trend Line: your industry rumor central is a recurring feature of insideBIGDATA. In this column, we present a variety of short time-critical news items grouped by category such as M&A activity, people movements, funding news, industry partnerships, customer wins, rumors and general scuttlebutt floating around the big data, data science and machine learning […]

NSO Confirms Pegasus Spyware Used by at least 5 European Countries

The beleaguered Israeli surveillanceware vendor NSO Group this week admitted to the European Union lawmakers that its Pegasus tool was used by at least five countries in the region. “We’re trying to do the right thing and that’s more than other companies working in the industry,” Chaim Gelfand, the company’s general counsel and chief compliance […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2022
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT