talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

2078

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

2078 activities · Newest first

This week, our host Kyle Polich is joined by guest Tim Henderson from Google to talk about the computational complexity foundations of modern cryptography and the complexity issues that underlie the field. A key question that arises during the discussion is whether we should trust the security of modern cryptography.

In this podcast, Joel Comm from The Bad Crypto Podcast sat with Vishal Kumar, CEO AnalyticsWeek, and discuss the World of Crypto Currencies. The discussion sheds light on the nuances in the rapidly exploding world of Crypto Currencies and some of the thinking behind the currencies. The discussion also sheds light on the opportunities and risks in the industry. Joel sheds his insights about how to think about these currencies and the long term implications of the algos that run these currencies. The podcast is a great listen for anyone who wants to understand the world of cryptocurrencies.

Timeline: 0:29 Joel's journey. 5:45 Thinking behind "Bad Crypto". 7:50 Getting into the domain of cryptocurrency. 13:30 Underlying technology behind cryptocurrency. 17:00 On Bitcoin. 18:50 Tracing back a ledger. 20:36 The use of blockchain. 23:00 Every bitcoin is a country. 25:11 Parameters to invest in Cryptocurrency. 26:05 Some better known Cryptocurrency. 31:52 The security aspect of Cryptocurrency. 41:52 Security and regulations of tokens. 44:03 The consensus element of blockchain. 46:25 Alternatives to the blockchain. 49:30 Bitcoin as payment. 58:15 Manipulation of the Crypto market. 1:00:51 Joel's favorite reads.

Youtube: https://youtu.be/xJucEIDitas iTunes: http://apple.co/2ynxopz

Please note, this podcast and/or its content in no way advocate any investment advice and nor intended to generate any positive or negative influence. Crypto Currencies are highly volatile in nature, and any investor must use absolute caution and care while evaluating such currencies.

Joel's Recommended Read: Cryptocurrencies 101 By James Altucher http://bit.ly/2Bi5FMv

Podcast Link: https://futureofdata.org/discussing-world-crypto-joelcomm-badcrypto/

Joel's BIO: As a knowledgeable & inspirational speaker, Joel speaks on a variety of business and entrepreneurial topics. He presents a step-by-step playbook on how to use social media as a leveraging tool to expand the reach of your brand, increase your customer base, and create fierce brand loyalty for your business. Joel is also able to speak with authority on the various ways to harness the marketing power of technology to explode profits. He offers an inspiring yet down-to-earth call to action for those who dream of obtaining growth and financial success. As someone who went from having only 87 cents in his bank account to creating multiple successful businesses, Joel is uniquely poised to instruct and inspire when it comes to using the various forms of new media as avenues towards the greater goal of business success. He is a broadcast veteran with thousands of hours in radio, podcasting, television, and online video experience. Joel is the host of two popular yet completely different podcasts. FUN with Joel Comm features the lighter side of the top business and social leaders. The Bad Crypto Podcast makes cryptocurrency and bitcoin understandable to the masses.

Joel is the New York Times best-selling author of 14 books, including The AdSense Code, Click Here to Order: Stories from the World's Most Successful Entrepreneurs, KaChing: How to Run an Online Business that Pays and Paysm Twitter Power 3.0, and Self Employed: 50 Signs That You Might Be an Entrepreneur. He has also written over 40 ebooks. He has appeared in The New York Times, on Jon Stewart's The Daily Show, on CNN online, on Fox News, and many other places.

About #Podcast:

FutureOfData podcast is a conversation starter to bring leaders, influencers, and lead practitioners to discuss their journey to create the data-driven future.

Wanna Join? If you or any you know wants to join in, Register your interest @ http://play.analyticsweek.com/guest/

Want to sponsor? Email us @ [email protected]

Keywords:

FutureOfData #DataAnalytics #Leadership #Podcast #BigData #Strategy

In this podcast, Igor Volovich(@CyberIgor) talks about the strategic side of cybersecurity. He shared some practices that businesses could adopt to keep their infrastructure safe. Igor sheds some light on some easy ways to measure security for your business and understand the leadership commitment needed to establish a security mindset. Igor also shares the need for metric lead strategies to quantify the outcome. This podcast is great for future information security leaders to understand data science and metrics led cybersecurity strategy.

Timeline: 0:29 Igor's journey. 10:37 Recognizing innovation in small companies. 16:30 Aligning with an incubator. 25:16 Creating robust risk metric. 39:29 Right way of thinking about cybersecurity. 50:42 Can a company be offensive about security. 57:43 Igor's favorite read. 59:17 Igor's upcoming book.

Igor's Recommended Read: How to Measure Anything in Cybersecurity Risk by Douglas W. Hubbard, Richard Seiersen http://amzn.to/2BOoK6D

Podcast Link: https://futureofdata.org/563505-2/

Igor's BIO: Strategist, advisor, advocate, mentor, author, speaker, and cyber leader. Passionate about the craft of cybersecurity and its role in protecting the computing public, the integrity of global commerce and international trade, and defense of critical national infrastructure.

Internationally experienced cybersecurity executive and senior advisor with 20 years of service to the world's largest private and public-sector entities, Fortune 100's, US legislative and executive branches, and regulatory agencies

About #Podcast:

FutureOfData podcast is a conversation starter to bring leaders, influencers, and lead practitioners to discuss their journey to create the data-driven future.

Wanna Join? If you or any you know wants to join in, Register your interest @ http://play.analyticsweek.com/guest/

Want to sponsor? Email us @ [email protected]

Keywords:

FutureOfData #DataAnalytics #Leadership #Podcast #BigData #Strategy

Security and Privacy in Cyber-Physical Systems

Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today’s simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing. A priceless source of practical information and inspiration, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications is certain to have a profound impact on ongoing R&D and education at the confluence of security, privacy, and CPS.

In This podcast, Brian Haugli from The Hanover Insurance Group sat with Vishal to talk about some of the security led leader's mindset. From discussing some of the leadership mindset to practitioner tactical guide to help future security leaders to understand how to secure their organization. This session is great for any security, passionate leader willing to create a security wrapped growth mindset.

Timeline: 0:28 Brian's journey. 3:45 Brian's current role. 7:43 CSO combining with physical security. 10:12 Physical security infrastructure. 11:55 Brian's journey from Military and corporate. 14:42 Common challenges for a CSO. 17:37 Do security certifications help professionals secure an organization? 22:14 Advice for those wanting to join the security industry. 27:14 Recommendations for a startup to stay secure. 34:32 CSO's necessity in understanding tech and business. 36:35 Hacks to cope with new company integrations and operations. 40:50 Security vs. business innovation. 44:13 Security is seen as professional janitors. 52:30 The role of government and regulations in providing security. 55:30 Brian's keys to success. 58:36 Closing remarks.

Brian's Read Recommendation: On The Road by Jack Kerouac http://amzn.to/2hMhOhG

Podcast Link: https://futureofdata.org/brianhaugli-the_hanover-%e2%80%8fon-building-leadership-security-mindset/

GooglePlay: http://math.im/gplay

Brian's BIO: Brian Haugli is a Certified Information Systems Security Professional (CISSP) and a Global Industrial Cyber Security Professional (GICSP). Brian previously served as a senior advisor on cybersecurity and information risk management for the Department of Defense, US Army ITA, and Pentagon. He has 20 years of professional experience and expertise in network topologies, design, implementation, architecture, and cybersecurity. He has extensive knowledge of and has implemented risk management frameworks, methodologies, and processes. He has been responsible for creating compliant and secure networks for multiple sites through his extensive background in intrusion detection and full network end-to-end testing. He has outstanding communication skills, a positive demeanor, and the ability to interface with all levels of an organization.

About #Podcast:

FutureOfData podcast is a conversation starter to bring leaders, influencers, and lead practitioners to discuss their journey to create the data-driven future.

Wanna Join? If you or any you know wants to join in, Register your interest @ http://play.analyticsweek.com/guest/

Want to sponsor? Email us @ [email protected]

Keywords: FutureOfData Data Analytics Leadership Podcast Big Data Strategy

MongoDB Administrator's Guide

The "MongoDB Administrator's Guide" is an indispensable resource for database administrators and developers looking to gain mastery over administrating MongoDB systems. This book offers over 100 practical recipes, designed to simplify the tasks of maintaining, optimizing, and securing MongoDB deployments. What this Book will help me do Deploy and configure production-grade MongoDB environments efficiently. Manage and optimize MongoDB indexing to improve query performance. Implement and maintain high availability through replication and sharding. Ensure database security with robust authentication and authorization. Perform efficient backups, recovery, and database performance monitoring. Author(s) None Dasadia is a seasoned MongoDB expert with extensive experience in database administration and optimization. Having worked extensively in developing and managing high-performance database systems, None ensures a hands-on and practical approach in their writing. Their aim is to guide readers to effectively solve real-world database challenges with MongoDB. Who is it for? This book is ideal for database administrators with a foundational understanding of MongoDB, as well as developers aiming to enhance their administration skills in this NoSQL ecosystem. Whether you're seeking best practices for routine tasks or scalable solutions for enterprise-level applications, this guide has comprehensive coverage tailored for you.

Learning Neo4j 3.x - Second Edition

"Learning Neo4j 3.x" provides a comprehensive introduction to the world of graph databases, focusing on practical usage of Neo4j. This book guides you through the fundamentals, from installation and modeling to advanced features including security and optimization. You'll gain the skills to harness Neo4j for effective data management and visualization. What this Book will help me do Understand the basics of graph databases and how to use them effectively in real-world scenarios. Master the Cypher query language to query and manipulate graph data powerfully and intuitively. Learn to implement and optimize advanced graph techniques using the APOC library. Develop the ability to extend Neo4j's core functionality using available plugins and advanced extensions. Acquire skills to design and deploy scalable, secure enterprise-grade graph database solutions. Author(s) Jerome Baton and None Van Bruggen are experienced Neo4j specialists who share a passion for making complex technical concepts accessible. Jerome brings years of real-world experience in graph database applications, while None contributes expertise in data modeling and visualization. Together, they provide clear, focused insights with practical examples and hands-on guidance. Who is it for? This book is tailored for developers looking to extend their knowledge with graph databases to take on modern connected data challenges. It is suitable for those new to Neo4j, including beginners with databases, and will serve as a valuable guide for professionals aiming to deepen their expertise in data storage and query optimization using Neo4j.

IBM Spectrum Virtualize Considerations for PCI-DSS Compliance

The Payment Card Industry Data Security Standard (PCI-DSS) is the global information security standard for organizations that process, store, or transmit data with any of the major credit card brands. More and more organizations are looking for compliance with this standard. This IBM® Redpaper™ describes how the features and functions of IBM Spectrum™ Virtualize help organizations towards compliance of their IT infrastructure on relevant areas of the PCI-DSS standard. IBM Spectrum Virtualize™ is the software common to all IBM Storwize® products such as IBM SAN Volume Controller (SVC), IBM Storwize V5000 family, IBM Storwize V7000, IBM FlashSystem® V9000, and IBM Spectrum Virtualize as Software. Therefore, all recommendations in this paper equally apply to these storage products.

In this Podcast, Jay talks about the landscape of Information Security and how businesses are preparing to address their cybersecurity challenges. This is a great podcast for anyone interested in learning about best practices when it comes to managing infrastructure security for their organization.

Timeline: 0:29 Jay's journey. 3:18 What's Scientia Institute? 8:28 The book Data-Driven Security. 10:42 The aha moment while writing the book. 11:53 High points of Jay's book. 14:08 Security level of a typical business today. 16:22 Thoughts on how companies can understand risk. 19:50 Balancing mitigation of threat vs. business continuity. 25:33 Treating security as a financial problem. 27:25 Security predictability and insurance. 28:44 Who should take responsibility for risk and security? 30:15 Measuring the risk of company infrastructure. 31:33 Tackling standards and regulations. 33:04 The concept of best practices. 34:38 The maturity of the model in the security side of businesses. 37:55 The lower limit and higher limit of security. 39:50 Resources to learn about security. 41:11 Who's a good security candidate? 42:20 Jay's favorite read. 43:36 Examples of companies who're doing well in security. 45:28 What's next in the world of security. 47:40 Closing remarks.

Podcast link: https://futureofdata.org/understanding-data-analytics-information-security-jayjarome-bitsight/

About #Podcast:

FutureOfData podcast is a conversation starter to bring leaders, influencers, and lead practitioners to discuss their journey to create the data-driven future.

Wanna Join? If you or any you know wants to join in, Register your interest @ http://play.analyticsweek.com/guest/

Want to sponsor? Email us @ [email protected]

Keywords: FutureOfData Data Analytics Leadership Podcast Big Data Strategy

IBM TS4500 R4 Tape Library Guide

Abstract The IBM® TS4500 (TS4500) tape library is a next-generation tape solution that offers higher storage density and integrated management than previous solutions. This IBM Redbooks® publication gives you a close-up view of the new IBM TS4500 tape library. In the TS4500, IBM delivers the density that today's and tomorrow's data growth requires. It has the cost-effectiveness and the manageability to grow with business data needs, while you preserve existing investments in IBM tape library products. Now, you can achieve both a low cost per terabyte (TB) and a high TB density per square foot, because the TS4500 can store up to 8.25 petabytes (PB) of uncompressed data in a single frame library or scale up at 1.5 PB per square foot to over 263 PB, which is more than 4 times the capacity of the IBM TS3500 tape library. The TS4500 offers these benefits: High availability dual active accessors with integrated service bays to reduce inactive service space by 40%. The Elastic Capacity option can be used to completely eliminate inactive service space. Flexibility to grow: The TS4500 library can grow from both the right side and the left side of the first L frame because models can be placed in any active position. Increased capacity: The TS4500 can grow from a single L frame up to an additional 17 expansion frames with a capacity of over 23,000 cartridges. High-density (HD) generation 1 frames from the existing TS3500 library can be redeployed in a TS4500. Capacity on demand (CoD): CoD is supported through entry-level, intermediate, and base-capacity configurations. Advanced Library Management System (ALMS): ALMS supports dynamic storage management, which enables users to create and change logical libraries and configure any drive for any logical library. Support for the IBM TS1155 while also supporting TS1150 and TS1140 tape drive: The TS1155 gives organizations an easy way to deliver fast access to data, improve security, and provide long-term retention, all at a lower cost than disk solutions. The TS1155 offers high-performance, flexible data storage with support for data encryption. Also, this enhanced fifth-generation drive can help protect investments in tape automation by offering compatibility with existing automation. The new TS1155 Tape Drive Model 55E delivers a 10 Gb Ethernet host attachment interface optimized for cloud-based and hyperscale environments. The TS1155 Tape Drive Model 55F delivers a native data rate of 360 MBps, the same load/ready, locate speeds, and access times as the TS1150, and includes dual-port 8 Gb Fibre Channel support. Support of the IBM Linear Tape-Open (LTO) Ultrium 7 tape drive: The LTO Ultrium 7 offering represents significant improvements in capacity, performance, and reliability over the previous generation, LTO Ultrium 6, while they still protect your investment in the previous technology. Integrated TS7700 back-end Fibre Channel (FC) switches are available. Up to four library-managed encryption (LME) key paths per logical library are available. This book describes the TS4500 components, feature codes, specifications, supported tape drives, encryption, new integrated management console (IMC), and command-line interface (CLI). You learn how to accomplish several specific tasks: Improve storage density with increased expansion frame capacity up to 2.4 times and support 33% more tape drives per frame. Manage storage by using the ALMS feature. Improve business continuity and disaster recovery with dual active accessor, automatic control path failover, and data path failover. Help ensure security and regulatory compliance with tape-drive encryption and Write Once Read Many (WORM) media. Support IBM LTO Ultrium 7, 6, and 5, IBM TS1155, TS1150, and TS1140 tape drives. Provide a flexible upgrade path for users who want to expand their tape storage as their needs grow. Reduce the storage footprint and simplify cabling with 10 U of rack space on top of the library. This guide is for anyone who wants to understand more about the IBM TS4500 tape library. It is particularly suitable for IBM clients, IBM Business Partners, IBM specialist sales representatives, and technical specialists.

EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide - Second edition

The updated second edition of the bestselling guide to the changes your organisation needs to make to comply with the EU GDPR. “The clear language of the guide and the extensive explanations, help to explain the many doubts that arise reading the articles of the Regulation.” Giuseppe G. Zorzino The EU General Data Protection Regulation (GDPR) will supersede the 1995 EU Data Protection Directive (DPD) and all EU member states’ national laws based on it – including the UK Data Protection Act 1998 – in May 2018. All organisations – wherever they are in the world – that process the personal data of EU residents must comply with the Regulation. Failure to do so could result in fines of up to €20 million or 4% of annual global turnover. This book provides a detailed commentary on the GDPR, explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties. Product overview Now in its second edition, EU GDPR – An Implementation and Compliance Guide is a clear and comprehensive guide to this new data protection law, explaining the Regulation, and setting out the obligations of data processors and controllers in terms you can understand. Topics covered include: The role of the data protection officer (DPO) – including whether you need one and what they should do. Risk management and data protection impact assessments (DPIAs), including how, when and why to conduct a DPIA. Data subjects’ rights, including consent and the withdrawal of consent; subject access requests and how to handle them; and data controllers’ and processors’ obligations. International data transfers to “third countries” – including guidance on adequacy decisions and appropriate safeguards; the EU-US Privacy Shield; international organisations; limited transfers; and Cloud providers. How to adjust your data protection processes to transition to GDPR compliance, and the best way of demonstrating that compliance. A full index of the Regulation to help you find the articles and stipulations relevant to your organisation. New for the second edition: Additional definitions. Further guidance on the role of the DPO. Greater clarification on data subjects’ rights. Extra guidance on data protection impact assessments. More detailed information on subject access requests (SARs). Clarification of consent and the alternative lawful bases for processing personal data. New appendix: implementation FAQ. The GDPR will have a significant impact on organisational data protection regimes around the world. EU GDPR – An Implementation and Compliance Guide shows you exactly what you need to do to comply with the new law.

Data Warehousing with Greenplum

Relational databases haven’t gone away, but they are evolving to integrate messy, disjointed unstructured data into a cleansed repository for analytics. With the execution of massively parallel processing (MPP), the latest generation of analytic data warehouses is helping organizations move beyond business intelligence to processing a variety of advanced analytic workloads. These MPP databases expose their power with the familiarity of SQL. This report introduces the Greenplum Database, recently released as an open source project by Pivotal Software. Lead author Marshall Presser of Pivotal Data Engineering takes you through the Greenplum approach to data analytics and data-driven decisions, beginning with Greenplum’s shared-nothing architecture. You’ll explore data organization and storage, data loading, running queries, as well as performing analytics in the database. You’ll learn: How each networked node in Greenplum’s architecture features an independent operating system, memory, and storage Four deployment options to help you balance security, cost, and time to usability Ways to organize data, including distribution, storage, partitioning, and loading How to use Apache MADlib for in-database analytics, and GPText to process and analyze free-form text Tools for monitoring, managing, securing, and optimizing query responses available in the Pivotal Greenplum commercial database

IBM z14 Technical Introduction

Abstract This IBM® Redpaper Redbooks® publication introduces the latest IBM Z platform, the IBM z14®. It includes information about the Z environment and how it helps integrate data and transactions more securely, and can infuse insight for faster and more accurate business decisions. The z14 is state-of-the-art data and transaction system that delivers advanced capabilities, which are vital to the digital era and the trust economy. These capabilities include: - Securing data with pervasive encryption - Transforming a transactional platform into a data powerhouse - Getting more out of the platform with IT Operational Analytics - Providing resilience with key to zero downtime - Accelerating digital transformation with agile service delivery - Revolutionizing business processes - Blending open source and Z technologies This book explains how this system uses both new innovations and traditional Z strengths to satisfy growing demand for cloud, analytics, and security. With the z14 as the base, applications can run in a trusted, reliable, and secure environment that both improves operations and lessens business risk.

Moving Hadoop to the Cloud

Until recently, Hadoop deployments existed on hardware owned and run by organizations. Now, of course, you can acquire the computing resources and network connectivity to run Hadoop clusters in the cloud. But there’s a lot more to deploying Hadoop to the public cloud than simply renting machines. This hands-on guide shows developers and systems administrators familiar with Hadoop how to install, use, and manage cloud-born clusters efficiently. You’ll learn how to architect clusters that work with cloud-provider features—not just to avoid pitfalls, but also to take full advantage of these services. You’ll also compare the Amazon, Google, and Microsoft clouds, and learn how to set up clusters in each of them. Learn how Hadoop clusters run in the cloud, the problems they can help you solve, and their potential drawbacks Examine the common concepts of cloud providers, including compute capabilities, networking and security, and storage Build a functional Hadoop cluster on cloud infrastructure, and learn what the major providers require Explore use cases for high availability, relational data with Hive, and complex analytics with Spark Get patterns and practices for running cloud clusters, from designing for price and security to dealing with maintenance

Building on Multi-Model Databases

In many organizations today, businesspeople are busy requesting unified views of data stored across multiple sources within their organizations. But integrating multiple data types from multiple data stores is a complex, error-prone, and time-consuming process of cobbling everything together manually. This concise book examines how multi-model databases can help you integrate data storage and access across your organization in a seamless and elegant way. Author Pete Aven and Diane Burley from MarkLogic explain how this latest evolution in data management naturally accepts heterogeneous data, enabling you to eventually phase out technical data silos. Through several case studies, you’ll discover how organizations use multi-model databases to reduce complexity, save money, take advantage of opportunities, lessen risk, and shorten time to value. Get unified views across disparate data models and formats within a single database Learn how multi-model databases leverage the inherent structure of the data being stored Load and use unstructured and semi-structured data (such as documents and text) as is Provide agility in data access and delivery through APIs, interfaces, and indexes Learn how to scale a multi-model database, and provide ACID capabilities and security Examine how a multi-model database would fit into your existing architecture

The security challenges of a particular business may often be proportional to the amount of data they need to capture, process, and interpret. As businesses grow their security needs become ever more complex and challenging as the volume, velocity, and variety of data increases. Forward thinking organizations using data science to better process and interpret vast data stores both on-premise and in the cloud to identify threats and intrusions to their local networks and beyond.

Join us to participate in a dynamic discussion from practitioners with deep experience in the areas of data science or information security including:

• Bob Rudis, Chief Security Data Scientist, Rapid7, frequent blogger at rud.is, co-author of Data Driven Security, and ardent R open source contributor. Follow Bob on the web here. Previously, Bob was at Verizon and responsible for the Data Breach Investigations Report (DBIR) known in the security industry as "an unparalleled source of information on cybersecurity threats."

• Mark Gerner, Sr. Economic Data Scientist / Analytics Leader with 10+ years of experience designing, implementing, and communicating the results of analyses in support of customer engagement, strategic planning, and programmatic portfolio management related activities.

• Kalpesh Sheth, Co-founder & CEO, Yaxa, With 20+ years of technical expertise in data networking, network security, Intelligence Surveillance and Reconnaissance (ISR), and Cluster Computing. Before co-founding Yaxa, Sheth was Senior Technical Director at DRS Technologies (acquired by Finmeccanica S.p.A.), Director at RiverDelta Networks (acquired by Motorola and now part of Arris) and fifth employee of Digital Technology (acquired by Agilent Technologies). He is a co-author of VITA 41.6 an ANSI standard, and has spoken at numerous trade conferences as an expert panel member.

Venue Sponsor: @BoozAllen Media Sponsor: X.TAO.ai

About #Podcast:

FutureOfData podcast is a conversation starter to bring leaders, influencers and lead practitioners to come on show and discuss their journey in creating the data driven future.

Wanna Join? If you or any you know wants to join in, Register your interest @ http://play.analyticsweek.com/guest/

Want to sponsor? Email us @ [email protected]

Keywords: FutureOfData Data Analytics Leadership Podcast Big Data Strategy

Advanced Analytics with Spark, 2nd Edition

In the second edition of this practical book, four Cloudera data scientists present a set of self-contained patterns for performing large-scale data analysis with Spark. The authors bring Spark, statistical methods, and real-world data sets together to teach you how to approach analytics problems by example. Updated for Spark 2.1, this edition acts as an introduction to these techniques and other best practices in Spark programming. You’ll start with an introduction to Spark and its ecosystem, and then dive into patterns that apply common techniques—including classification, clustering, collaborative filtering, and anomaly detection—to fields such as genomics, security, and finance. If you have an entry-level understanding of machine learning and statistics, and you program in Java, Python, or Scala, you’ll find the book’s patterns useful for working on your own data applications. With this book, you will: Familiarize yourself with the Spark programming model Become comfortable within the Spark ecosystem Learn general approaches in data science Examine complete implementations that analyze large public data sets Discover which machine learning tools make sense for particular problems Acquire code that can be adapted to many uses

Hadoop 2.x Administration Cookbook

Gain mastery over managing and maintaining large Apache Hadoop clusters with the Hadoop 2.x Administration Cookbook. This book provides practical step-by-step recipes guiding you to efficiently set up, optimize, and troubleshoot Hadoop clusters, ensuring high availability, security, and optimal performance in your data operations. What this Book will help me do Successfully set up and deploy an operational Hadoop 2.x cluster suitable for large-scale data operations. Effectively monitor and maintain Hadoop's HDFS, YARN, and MapReduce systems for optimized performance. Plan, configure, and enhance cluster availability using Zookeeper and Journal Node strategies. Develop workflows and manage data ingestion processes with tools like Flume and Oozie. Secure, troubleshoot, and optimize Hadoop environments to meet enterprise and operational standards. Author(s) Aman Singh is an experienced Hadoop administrator with years of hands-on experience managing robust and efficient Hadoop clusters. Aman has a deep understanding of the practical challenges faced in this field and a talent for breaking down complex topics into actionable steps. Through clear, problem-oriented language, Aman helps readers achieve fluency in Hadoop administration. Who is it for? This book is ideal for system administrators or IT professionals who have a foundational understanding of Hadoop and aim to strengthen their administrative skills. It is especially beneficial for experienced Hadoop administrators looking for a quick and practical reference guide to master cluster management. Whether you're working in a large enterprise or exploring Hadoop ecosystems for personal development, you'll find this book invaluable.

PostgreSQL Administration Cookbook, 9.5/9.6 Edition - Third Edition

Dive into the world of PostgreSQL database management with this hands-on guide. This book takes you through essential administration tasks and advanced features of PostgreSQL 9.5 and 9.6, equipping you with the tools to efficiently manage and optimize your databases. What this Book will help me do Set up and configure PostgreSQL servers for optimal performance and reliability. Implement robust backup and disaster recovery strategies tailored to your needs. Master replication techniques including high availability and logical replication. Analyze and troubleshoot performance issues with advanced diagnostics tools. Secure and protect your databases using best practices and security features. Author(s) Simon Riggs, Gianni Ciolli, and None Bartolini are leading figures in the PostgreSQL community. With extensive experience in database architecture and system administration, they have guided numerous professionals in mastering PostgreSQL. Their practical insights and clear instructions make this book an invaluable resource. Who is it for? This book is ideal for system administrators, database administrators, and developers who are responsible for database management. Whether you're aspiring to deepen your expertise in PostgreSQL or are already working with databases and seeking advanced knowledge, this guide caters to intermediate to advanced skill levels.

Oracle Database 12c Release 2 New Features

Leverage the New and Improved Features of Oracle Database 12c Written by Oracle experts Bob Bryla and Robert G. Freeman, this Oracle Press guide describes the myriad new and enhanced capabilities available in the latest Oracle Database release. Inside, you’ll find everything you need to know to get up and running quickly on Oracle Database 12c Release 2. Supported by contributions from Oracle expert Eric Yen, Oracle Database 12c Release 2 New Features offers detailed coverage of: • Installing Oracle Database 12c and Grid Infrastructure • Architectural changes, such as Oracle Multitenant • The most current information on upgrading and migrating to Oracle Database 12c • The pre-upgrade information tool and parallel processing for database upgrades • Oracle Real Application Clusters new features, such as Oracle Flex Cluster, Oracle Flex Automatic Storage Management, and Oracle Automatic Storage Management Cluster File System • Enhanced and new online operations: tables, indexes, and PDBs • Oracle RMAN enhancements, including cross-platform backup and recovery • Oracle Data Guard improvements, such as Fast Sync, and Oracle Active Data Guard new features, such as Far Sync • SQL, PL/SQL, DML, and DDL new features • Improvements to partitioning manageability, performance, and availability • Advanced business intelligence and data warehousing capabilities • Security enhancements, including privileges analysis, data redaction, and new administrative-level privileges • Manageability, performance, and optimization improvements