Book Image

Data Democratization with Domo

By : Jeff Burtenshaw
Book Image

Data Democratization with Domo

By: Jeff Burtenshaw

Overview of this book

Domo is a power-packed business intelligence (BI) platform that empowers organizations to track, analyze, and activate data in record time at cloud scale and performance. Data Democratization with Domo begins with an overview of the Domo ecosystem. You’ll learn how to get data into the cloud with Domo data connectors and Workbench; profile datasets; use Magic ETL to transform data; work with in-memory data sculpting tools (Data Views and Beast Modes); create, edit, and link card visualizations; and create card drill paths using Domo Analyzer. Next, you’ll discover options to distribute content with real-time updates using Domo Embed and digital wallboards. As you advance, you’ll understand how to use alerts and webhooks to drive automated actions. You’ll also build and deploy a custom app to the Domo Appstore and find out how to code Python apps, use Jupyter Notebooks, and insert R custom models. Furthermore, you’ll learn how to use Auto ML to automatically evaluate dozens of models for the best fit using SageMaker and produce a predictive model as well as use Python and the Domo Command Line Interface tool to extend Domo. Finally, you’ll learn how to govern and secure the entire Domo platform. By the end of this book, you’ll have gained the skills you need to become a successful Domo master.
Table of Contents (26 chapters)
Section 1: Data Pipelines
Section 2: Presenting the Message
Section 3: Communicating to Win
Section 4: Extending
Section 5: Governing


In this chapter, we learned that there are a rich set of administrative features for securing the instance along with the cultural and organizational considerations that impact how to establish a security policy. Under governance, we discussed how to manage people, groups, roles, trusted attributes, activity logs, and licenses. For the content section, we reviewed the cards, pages, and scheduled reports administration features. Regarding authentication, we learned about Domo's authentication and how to use third-party authentication services for SSO. Additionally, we discussed multi-factor authentication and access tokens. The network security section covered domain and IP address whitelisting. And we went through many features around company settings, Domo Everywhere, tool downloads, and more. All of these features enable us to tailor our security policy implementation to fit our specific cultures and organizations. A number of options for safely and securely handling...