Why You Should Blend Instead of Join in Tableau

Why You Should Blend Instead of Join in Tableau

Data blending in Tableau is the operation of combining multiple data sources into the same view by finding common fields between them to join on. Unlike an ordinary join, which combines data sources at the lowest granularity before any aggregation is done, a data blend can join data sources after aggregation is performed on the individual sources; ultimately limiting the number of records that...

Read More
How to Prepare for the Tableau Desktop Qualified Associate Exam for Free

How to Prepare for the Tableau Desktop Qualified Associate Exam for Free

I recently took the Tableau Desktop Qualified Associate Exam and passed it without spending anything on preparation materials. Having taken other certification exams before, I knew that study guides issued by exam providers don’t always provide the most thorough methods of preparation. In preparing for this exam, I was unsure about the best approach for studying, and ended up exhausting the...

Read More
Is Data Warehousing really dead?

Is Data Warehousing really dead?

Traditional data warehousing was pioneered by Ralph Kimball and Bill Inmon in 1970s to address growing problem of accessing data for reporting and analytics from multiple disparate data sources. Key drivers and goals of data warehousing are: Collect data from multiple sources into a single repository Expose data for reporting and analytics in a performant way Keep full history of data...

Read More
Importance of Cybersecurity: Understanding Preventive “Medicine” to Maintain Cyber Health

Importance of Cybersecurity: Understanding Preventive “Medicine” to Maintain Cyber Health

Believe it or not, information security professionals could learn some lessons from the health and wellness industry. The practice of preventative care can and should be transferred to the information security profession. According to the American College of Preventive Medicine, preventive medicine is defined as “a practice by all physicians to keep their patients healthy“.…

Read More
Isolating the Cardholder Data Environment with Network Segmentation

Isolating the Cardholder Data Environment with Network Segmentation

In a recent post, we discussed many of the challenges with attesting to PCI DSS compliance, including a description of some of the factors that are often overlooked when defining the cardholder data environment (CDE). See “Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)” from our recent series of blogs on PCI DSS-related topics for more information. …

Read More

What You Need to Know about Identity Access Management

Identity and access management – the process of ensuring the right people have the right access to information – should be a key component of any organization’s security infrastructure. A sound IAM approach will not only help protect your sensitive data, it will also save you time and money. However, implementation challenges such as business system complexities, lack of defined user roles and...

Read More

Data for Good: Tackling the Open Data Movement

Last month, I had the opportunity to attend O’Reilly’s Strata Conference as a representative of West Monroe’s Advanced Analytics team. Strata focuses on trends in Big Data and Analytics, two of the hottest topics in the technology world today. At Strata, I was exposed to emerging Big Data architectures and design patterns, and had the chance to meet passionate and influential technologists in...

Read More

Adopting DataGuard? Things to consider

As utilities continue to leverage innovative Smart Grid technologies to transform operations and provide customers with new and improved services, they also collect an increasing amount of customer data. This data is useful for many operational purposes and the utilities are just discovering ways to leverage this information. In January 2015, the White House and the Department of Energy...

Read More

Quirky Queries: How to Avoid a De-Duplication Nightmare

I came across this query the other day, and it led to quite a bit of head scratching. The goal of the query was to de-duplicate data using a row ranking algorithm, however, every time I ran it it returned random and unpredictable results! Needless to say, I couldn’t keep running a faulty query, so I had to get to the bottom of it.…

Read More

Identity and Access Management – The Cart or The Horse?

In my experiences with identity and access management (IAM) projects, there is always a moment when you begin having a “Are we putting the cart before the horse?” conversation.  This is particularly the case when you are, in parallel, having a conversation about how to “enable” IAM in the environment by either redesigning your current implementation of Windows Server Active Directory, creating...

Read More

Tips on supercharging your ETL

We live in the era of big data explosion with data volumes growing at exponential pace.  At the same time data driven organizations increasingly demand more real time data availability. Given these trends, ETL performance is quickly gaining business importance. Let’s look at a few approaches that could be considered to maximize performance of data processing.…

Read More

Next Generation: Voice of the Customer

Firms have an unprecedented ability to listen to and understand changing customer needs. Advanced technologies turn unstructured social media posts or contact center transcripts into meaningful and actionable insights. Predictive analytics hone the noise of billions of interactions into signals that can help firms avoid scaling costly mistakes and tap into emerging opportunities.…

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons