Improving the Data Warehousing Toolkit through Low-Code/No-Code
DOI:
https://doi.org/10.63282/3050-9246.IJETCSIT-V2I4P107Keywords:
Low-code, No-code, Data Warehousing, Data Integration, Data Pipelines, Automation, Business Intelligence, Data Management, Data Transformation, Workflow Automation, Self-Service Analytics, Data Governance, Cloud-Based Data Solutions, Data Modeling, ETL Processes, Reporting Tools, Scalable Solutions, User-Friendly Interfaces, Real-Time Data Processing, Collaboration, Data Visualization, Digital Transformation, Business User Empowerment, Agile Data Solutions, Data ArchitectureAbstract
There have been many big changes in the data process management since there is an increasing requirement for quick data-driven decision-making and the capacity to adapt and quickly prototype. Low-code/no-code (LCNC) platforms have become a more powerful option. They provide the latest way to create, manage and improve these data pipelines and processes without needing a lot of coding knowledge or technical expertise. These solutions provide a simple, user-friendly interface that lets business users, data analysts, and many other stakeholders build complex data workflows, automate tasks and quickly get more insights without having to rely on their IT personnel for every change. Adding LCNC technologies to the data warehousing toolkit helps organizations speed up the process of putting data solutions into action, make it easier for technical and the non-technical teams to talk to one another, and give business users greater control over how they manage data resources. The ability to make things like data integration, reporting and the analytics easier is a big plus, especially when it comes to speeding up the time it takes to get high data projects to market and making them more efficient. Even while LCNC systems have many other advantages, they also have problems with governance, data security and their scalability. When companies use LCNC solutions in their data operations, they need to be very careful about these kinds of things. This paper looks at how LCNC systems change the way data is stored by making it easier and more efficient to handle the information. It focuses on actual world examples and case studies of businesses that have successfully employed LCNC technology to improve the data quality, streamline operations and achieve business intelligence goals. This research shows how important LCNC is becoming in modern data management and how it might change the way information is stored for a long time to come
Downloads
References
[1] Abouelyazid, M., and Xiang, C. (2019). Architectures for AI Integration in Next-Generation Cloud Infrastructure, Development, Security, and Management. International Journal of Information and Cybersecurity, 3(1), 1-19.
[2] Dunie, R., Schulte, W. R., Cantara, M., and Kerremans, M. (2015). Magic Quadrant for intelligent business process management suites. Gartner Inc.
[3] Allam, Hitesh. Exploring the Algorithms for Automatic Image Retrieval Using Sketches. Diss. Missouri Western State University, 2017.
[4] Deekshith, A. (2019). Integrating AI and Data Engineering: Building Robust Pipelines for Real-Time Data Analytics. International Journal of Sustainable Development in Computing Science, 1(3), 1-35.
[5] Manda, Jeevan Kumar. "Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms." Focusing on Data Protection and Secure Access Mechanisms (April 04, 2020) (2020).
[6] Palmer, T. (2020). Microsoft PowerApps as an Alternative Solution to Business Application Development.
[7] Jani, Parth, and Sangeeta Anand. “Apache Iceberg for Longitudinal Patient Record Versioning in Cloud Data Lakes”. Essex Journal of AI Ethics and Responsible Innovation, vol. 1, Sept. 2021, pp. 338-57
[8] Arugula, Balkishan. “Change Management in IT: Navigating Organizational Transformation across Continents”. International Journal of AI, BigData, Computational and Management Studies, vol. 2, no. 1, Mar. 2021, pp. 47-56
[9] Saadeldin, R. (2019). of Thesis: The fundamental analysis of the software industry in the USA. change, 2019, 29.
[10] Immaneni, J. (2021). Securing Fintech with DevSecOps: Scaling DevOps with Compliance in Mind. Journal of Big Data and Smart Systems, 2.
[11] Franzosa, R., and Hestermann, C. (2019). Magic quadrant for manufacturing execution systems. Gartner Inc., Stamford.
[12] Veluru, Sai Prasad. "Leveraging AI and ML for Automated Incident Resolution in Cloud Infrastructure." International Journal of Artificial Intelligence, Data Science, and Machine Learning 2.2 (2021): 51-61.
[13] Nookala, Guruprasad. "Internal and External Audit Preparation for Risk and Controls." International Journal of Digital Innovation 2.1 (2021).
[14] Mohammad, Abdul Jabbar. “Sentiment-Driven Scheduling Optimizer”. International Journal of Emerging Research in Engineering and Technology, vol. 1, no. 2, June 2020, pp. 50-59
[15] Petkova, M., Jekov, B., and Petkova, P. (2020, October). Administrative Automatic Solutions in Telecom Services. In 2020 28th National Conference with International Participation (TELECOM) (pp. 86-89). IEEE.
[16] Arugula, Balkishan, and Sudhkar Gade. “Cross-Border Banking Technology Integration: Overcoming Regulatory and Technical Challenges”. International Journal of Emerging Research in Engineering and Technology, vol. 1, no. 1, Mar. 2020, pp. 40-48
[17] Jim, H. S., Hoogland, A. I., Brownstein, N. C., Barata, A., Dicker, A. P., Knoop, H., ... and Johnstone, P. A. (2020). Innovations in research and clinical care using patient‐generated health data. CA: a cancer journal for clinicians, 70(3), 182-199.
[18] Patel, Piyushkumar. "Remote Auditing During the Pandemic: The Challenges of Conducting Effective Assurance Practices." Distributed Learning and Broad Applications in Scientific Research 6 (2020): 806-23.
[19] Immaneni, J. (2020). Building MLOps Pipelines in Fintech: Keeping Up with Continuous Machine Learning. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 1(2), 22-32.
[20] Soh, J., Singh, P., Soh, J., and Singh, P. (2020). Introduction to Azure machine learning. Data Science Solutions on Azure: Tools and Techniques Using Databricks and MLOps, 117-148.
[21] Veluru, Sai Prasad, and Swetha Talakola. “Edge-Optimized Data Pipelines: Engineering for Low-Latency AI Processing”. Newark Journal of Human-Centric AI and Robotics Interaction, vol. 1, Apr. 2021, pp. 132-5
[22] Jani, Parth, and Sarbaree Mishra. "Data Mesh in Federally Funded Healthcare Networks." The Distributed Learning and Broad Applications in Scientific Research 6 (2020): 1146-1176.
[23] Nookala, Guruprasad. "End-to-End Encryption in Data Lakes: Ensuring Security and Compliance." Journal of Computing and Information Technology 1.1 (2021).
[24] Bernaschina, C. (2019). Tools, semantics and work-flows for web and mobile model driven development.
[25] Manda, J. K. "Blockchain Applications in Telecom Supply Chain Management: Utilizing Blockchain Technology to Enhance Transparency and Security in Telecom Supply Chain Operations." MZ Computing Journal 2.2 (2021).
[26] Shaik, Babulal, and Jayaram Immaneni. "Enhanced Logging and Monitoring With Custom Metrics in Kubernetes." African Journal of Artificial Intelligence and Sustainable Development 1 (2021): 307-30.
[27] Khan, O. M. A., and Habib, K. (2020). Developing Multi-Platform Apps with Visual Studio Code: Get up and running with VS Code by building multi-platform, cloud-native, and microservices-based apps. Packt Publishing Ltd.
[28] Immaneni, J. (2021). Using swarm intelligence and graph databases for real-time fraud detection. Journal of Computational Innovation, 1(1).
[29] Mohammad, Abdul Jabbar, and Waheed Mohammad A. Hadi. “Time-Bounded Knowledge Drift Tracker”. International Journal of Artificial Intelligence, Data Science, and Machine Learning, vol. 2, no. 2, June 2021, pp. 62-71
[30] Sarsa, H. (2017). Critical Requirements of Internal Enterprise Mobile Applications (Master's thesis).
[31] Shaik, Babulal. "Developing Predictive Autoscaling Algorithms for Variable Traffic Patterns." Journal of Bioinformatics and Artificial Intelligence 1.2 (2021): 71-90.
[32] Patel, Piyushkumar, and Hetal Patel. "Lease Modifications and Rent Concessions under ASC 842: COVID-19’s Lasting Impact on Lease Accounting." Distributed Learning and Broad Applications in Scientific Research 6 (2020): 824-41.
[33] Fluri, B., Würsch, M., Giger, E., and Gall, H. C. (2009). Analyzing the co-evolution of comments and source code. Software Quality Journal, 17, 367-394.
[34] Talakola, Swetha. “Challenges in Implementing Scan and Go Technology in Point of Sale (POS) Systems”. Essex Journal of AI Ethics and Responsible Innovation, vol. 1, Aug. 2021, pp. 266-87
[35] Manda, Jeevan Kumar. "AI And Machine Learning In Network Automation: Harnessing AI and Machine Learning Technologies to Automate Network Management Tasks and Enhance Operational Efficiency in Telecom, Based On Your Proficiency in AI-Driven Automation Initiatives." Educational Research (IJMCER) 1.4 (2019): 48-58.
[36] Baldassarre, M. T., Barletta, V. S., Caivano, D., and Scalera, M. (2020). Integrating security and privacy in software development. Software Quality Journal, 28(3), 987-1018.
[37] Holland, C. T. J., Tanenbaum, J., and CMUSEIPU States. (2020). Emerging technologies 2020: Six areas of opportunity. Software Engineering Institute.
[38] Sreejith Sreekandan Nair, Govindarajan Lakshmikanthan (2020). Beyond VPNs: Advanced Security Strategies for the Remote Work Revolution. International Journal of Multidisciplinary Research in Science, Engineering and Technology 3 (5):1283-1294.