Skip to main content

David CallaghanSenior Solutions Architect

Databricks Champion | Center of Excellence Lead | Data Privacy & Governance Expert | Speaker & Trainer | 30+ Yrs in Enterprise Data Architecture

Connect with David

Blogs from this Author

A group of coworkers meeting together.

Delta Sharing for Modern Secure Data Sharing

Delta Lake is an open-source framework under the Linux Foundation used to build Lakehouse architectures. A new project is Delta Sharing, which is an open protocol for secure real-time exchange of large datasets. Databricks provides production-grade implementations of the projects under delta-io, including Databricks Delta Sharing. Understanding the open-source foundation of the enterprise offering can […]

African Computer Programmer Writing Code

Beyond Encryption: Implementing anonymity algorithms

Businesses and organizations now hold more personal information than ever before. Storing a lot of data may be useful in a variety of ways, such as reporting and analytics, which might expose PII that is linked to the data being analyzed. When data is being transmitted or stored, encryption is useful for protecting it, whereas […]

The Secret To Software Tool Integration

Beyond Encryption: Protect sensitive data using t-closeness

Businesses and organizations now hold more personal information than ever before. Storing a lot of data may be useful in a variety of ways, such as reporting and analytics, which might expose PII that is linked to the data being analyzed. When data is being transmitted or stored, encryption is useful for protecting it, whereas […]

Beyond Encryption: Protect sensitive data using l-diversity

Businesses and organizations now hold more personal information than ever before. Storing a lot of data may be useful in a variety of ways, such as reporting and analytics, which might expose PII that is linked to the data being analyzed. When data is being transmitted or stored, encryption is useful for protecting it, whereas […]

How will the sale of Watson affect healthcare?

IBM is selling their AI for healthcare, known as Watson Health, to Francisco Partners for an estimated $1 billion. Watson Health is an artificial intelligence system created by IBM. The system is designed to work with healthcare providers and pharmaceutical companies to help improve the efficacy of treatments and reduce healthcare costs. Francisco Partners has […]

Command line output

cURL to get a JSON makeover

cURL is frequently used by developers working with REST API’s to send and receive data using JSON notation. This has been a common pattern for years, but it has never been seamless. There have been a number of times when I’ve been trying to get a JSON payload to work against an endpoint for a […]

Understanding Searchable Encryption in the Cloud

Many companies struggle with storing PII in the cloud. When you store sensitive data in the cloud, it’s critical to guarantee that it remains private. Encrypting the data before sending it to the cloud storage server is one approach to do this. This will protect your information and ensure that no one can access it. […]

The Secret To Software Tool Integration

Protect PII with anonymized datasets for Data Scientists with differential privacy

Businesses and organizations now hold more personal information than ever before. Storing large amounts of structured and unstructured data may be useful in a variety of ways, such as reporting and analytics, but it might expose PII that is linked to the data being analyzed.As organizations are increasingly under pressure to comply with data privacy […]

Kid Playing Hide Seek Smiling Concept

Beyond Encryption: Protect sensitive data using k-anonymity

Businesses and organizations now hold more personal information than ever before. Storing a lot of data may be useful in a variety of ways, such as reporting and analytics, which might expose PII that is linked to the data being analyzed. When data is being transmitted or stored, encryption is useful for protecting it, whereas […]

Real-time Retail with Databrick’s Lakehouse Accelerators

Databricks has announced Lakehouse for Retail, a collection of more than twenty free, open-source Retail Solution Accelerators. Solution accelerators are tools that help companies in constructing a solution for their data and AI problem. They can be used to show the feasibility of a prototype and then the business can use that as support for […]

Istock 1325306866

Best practices for securing Snowflake

Understanding best practices for securing Snowflake and having a concrete implementation plan is a critical Day Zero deliverable. Snowflake is a secure, cloud-based data warehouse. There are no hardware or software components to select, install, configure, or maintain. There is virtually no software to install, configure, or manage. Snowflake takes care of ongoing maintenance and […]

Medicine Doctor Touching Electronic Medical Record On Tablet. Dna. Digital Healthcare And Network Connection On Hologram Modern Virtual Screen Interface, Medical Technology And Futuristic Concept.

HIPAA compliance with Redshift

At Perficient, our Data Solutions team has worked closely with our Healthcare division to implement Redshift for HIPAA and HITECH compliance. Snowflake offers healthcare organizations a secure data warehouse environment with many HIPAA compliance features. Perficient’s implementation team includes Snowflake and health industry subject matter experts. We’ll take a look at Snowflake’s benefits for healthcare providers […]

Load More