Start Now Login

intermix Blog

Best practices and lessons learned for cloud ETL and data engineering.

How we see United Airlines as Data-Led

0 min READ
June 6th 2019
The 5 Type of Data Sources that Every Enterprise Should Think AboutIn broad terms, we see five major categories of data sources:Production data: Data coming from core web and mobile apps and / or the line of business apps, and their underlying production databases that contain user data and pr […]
Lars Kamp Lars Kamp

How Dow Jones Uses Amazon Redshift to Build a Cloud-based Data Platform

6 min READ
June 5th 2019
Dow Jones & Company is a publishing and financial information firm with products and services that help businesses participate in the market better. Examples are Barron’s, Factiva and also the Wall Street Journal. They serve enterprises and consumers alike.Colleen Camuccio is a VP of Program Man […]
Lars Kamp Lars Kamp

How-To Configure Amazon Redshift for Performance - "The Second Set-up"

13 min READ
May 27th 2019
When customers start using intermix.io for the first time, they can see the set-up and configuration of their Amazon Redshift cluster in the context of their queries and workflows. At that point, customers experience one common reaction:“Knowing what we know now, how would we set up our Redshift clu […]
Lars Kamp Lars Kamp

Amazon Redshift Concurrency Scaling - A Guide and Our Test Results

4 min READ
April 3rd 2019
SummaryThe Amazon Redshift architecture allows to scale up by adding more nodes to a cluster. That can cause over-provisioning of nodes to address peak query volume. Unlike adding nodes, Concurrency Scaling adds more query processing power on an as-needed basis. The typical Concurrency Scal […]
Stefan Gromoll Stefan Gromoll

How We Use AWS IAM to Generate Temporary Amazon Redshift Passwords

5 min READ
February 27th 2019
At intermix.io, we run a fleet of over ten Amazon Redshift clusters. In this post, I'll describe how we use IAM authentication for our database users. By using IAM credentials, we can enforce security policies on users and passwords. It's a scalable and secure way to manage access to your cluster(s).[…]
Christopher MacGown Christopher MacGown
1 2 3 4 5 8