Book Image

Data Democratization with Domo

By : Jeff Burtenshaw
Book Image

Data Democratization with Domo

By: Jeff Burtenshaw

Overview of this book

Domo is a power-packed business intelligence (BI) platform that empowers organizations to track, analyze, and activate data in record time at cloud scale and performance. Data Democratization with Domo begins with an overview of the Domo ecosystem. You’ll learn how to get data into the cloud with Domo data connectors and Workbench; profile datasets; use Magic ETL to transform data; work with in-memory data sculpting tools (Data Views and Beast Modes); create, edit, and link card visualizations; and create card drill paths using Domo Analyzer. Next, you’ll discover options to distribute content with real-time updates using Domo Embed and digital wallboards. As you advance, you’ll understand how to use alerts and webhooks to drive automated actions. You’ll also build and deploy a custom app to the Domo Appstore and find out how to code Python apps, use Jupyter Notebooks, and insert R custom models. Furthermore, you’ll learn how to use Auto ML to automatically evaluate dozens of models for the best fit using SageMaker and produce a predictive model as well as use Python and the Domo Command Line Interface tool to extend Domo. Finally, you’ll learn how to govern and secure the entire Domo platform. By the end of this book, you’ll have gained the skills you need to become a successful Domo master.
Table of Contents (26 chapters)
1
Section 1: Data Pipelines
7
Section 2: Presenting the Message
12
Section 3: Communicating to Win
17
Section 4: Extending
21
Section 5: Governing

Considering the dimensions of a security policy

The Domo platform has a robust set of tools for establishing security, as shown in Figure 17.1:

Figure 17.1 – The Domo platform's security tools

However, as good as this toolset is at implementing security, an effective security policy needs to be informed by additional dimensions, such as those shown in Figure 17.2:

Figure 17.2 – The dimensions of a security strategy

Figure 17.2 – The dimensions of a security strategy

If tasked with implementing a security policy, it is wise to understand these bigger-picture dimensional considerations. Implementing cultures with roles and structures that are not complementary will lead to a conflicted security policy.

Data access culture

Data access culture is the way an organization regards how broadly people can have access to direct source data. Some would say that having direct data access provides an unvarnished view of the business, or in other words, no spin just the...