Published inFactSetDecoding Clients: What Usage Data & Visualization RevealsA common challenge companies face is understanding their clients. This is especially true for companies offering subscription services for…Mar 20, 2024Mar 20, 2024
Published inFactSetAn Analysis of the Security of Generated CodeGitHub Copilot aids developers with basic programming tasks. Useful examples are finishing code, eliminating syntax errors, linting…Feb 12, 2024Feb 12, 2024
Published inFactSetUtilizing Clustering Techniques to Classify Customer Usage of Tech PlatformsA key aspect to any successful business is understanding your customers. Who are they? What products do they use? Is their engagement…Feb 5, 20241Feb 5, 20241
Published inFactSetRearchitecting the Symbology technology stack towards a new GraphQL APIThe investment industry trust Symbology as the glue binding various applications together to provide a seamless experience. Symbology…Feb 1, 2024Feb 1, 2024
Architecting Amazon EKS for high availability and resilience for running medium-sized workloadsKubernetes is a powerful container orchestration platform that handles complexities of deploying, scaling, and workload distribution of…Jan 4, 20241Jan 4, 20241
Published inFactSetSecuring GenAI at FactSetProtecting financial assets and sensitive information is a critical need for modern organizations, especially in today’s rapidly evolving…Oct 18, 2023Oct 18, 2023
Published inFactSetWhy You Need a Practical Security Champions ProgramA Security Champions Program is an effective way to scale and distribute security across development teams. By embedding dedicated Security…Oct 11, 2023Oct 11, 2023
Published inFactSetAPI Security Common MistakesAs per Rapid’s 4th annual State of APIs Report, 70% of developers indicate they will increase API usage this year, while 63% note that they…Oct 4, 2023Oct 4, 2023
Published inFactSetMulti-layered Caching StrategiesUsing Redis to Supercharge Your Data DeliveryJul 19, 2023Jul 19, 2023