Book Image

Data Democratization with Domo

By : Jeff Burtenshaw
Book Image

Data Democratization with Domo

By: Jeff Burtenshaw

Overview of this book

Domo is a power-packed business intelligence (BI) platform that empowers organizations to track, analyze, and activate data in record time at cloud scale and performance. Data Democratization with Domo begins with an overview of the Domo ecosystem. You’ll learn how to get data into the cloud with Domo data connectors and Workbench; profile datasets; use Magic ETL to transform data; work with in-memory data sculpting tools (Data Views and Beast Modes); create, edit, and link card visualizations; and create card drill paths using Domo Analyzer. Next, you’ll discover options to distribute content with real-time updates using Domo Embed and digital wallboards. As you advance, you’ll understand how to use alerts and webhooks to drive automated actions. You’ll also build and deploy a custom app to the Domo Appstore and find out how to code Python apps, use Jupyter Notebooks, and insert R custom models. Furthermore, you’ll learn how to use Auto ML to automatically evaluate dozens of models for the best fit using SageMaker and produce a predictive model as well as use Python and the Domo Command Line Interface tool to extend Domo. Finally, you’ll learn how to govern and secure the entire Domo platform. By the end of this book, you’ll have gained the skills you need to become a successful Domo master.
Table of Contents (26 chapters)
1
Section 1: Data Pipelines
7
Section 2: Presenting the Message
12
Section 3: Communicating to Win
17
Section 4: Extending
21
Section 5: Governing

Handling PII in Domo

The ability to properly identify and handle the storage of PII is a necessity for preserving privacy, especially when considering the HIPPA and GDPR types of regulations. Domo's policy for PII is buyer-be-aware. This means that they are neither for nor against PII, but strongly suggest that raw PII is not stored in Vault without first masking or redacting. Domo has provided methods for redacting or masking data. Additionally, there are specific HIPPA-compliant server configurations available upon request and regional server configurations where solutions for jurisdictional regulations requiring data to be physically stored in the jurisdiction are available. Data is always encrypted while at rest in Vault. The Bring Your Own Key (BYOK) option lets the customer control their encryption keys and includes a rolling generation of data keys and a built-in kill switch user interface. Under BYOK, not even people from Domo's internal operations can get at the...