The real changes in our lives will come from products that have the richness of data without calling attention to the data.
See on strata.oreilly.com
[W]hat if you want to schedule both memory and CPU, and you need them in possibly different and changing proportions? If you have 6GB and three cores, and I have 4GB and two cores, it’s pretty clear that I should get the next container. What if you have 6GB and three cores, but I have 4GB and four cores? Sure, you have a larger total number of units, but cores might be more valuable. To complicate things further, I might care about CPU more than you do.
See on blog.cloudera.com
Cloudera is excited to launch Sentry, a new open source project that addresses these concerns. Sentry is an authorization module for Hadoop that provides the granular, role-based authorization required to provide precise levels of access to the right users and applications. Its new support for role-based authorization, fine-grained authorization, and multi-tenant administration allows Hadoop operators to:
Store more sensitive data in Hadoop,Give more end-users access to that data in Hadoop,Create new use cases for Hadoop,Enable multi-user applications, andComply with regulations (e.g., SOX, PCI, HIPAA, EAL3)
See on blog.cloudera.com
For a decade now, many Network Forensics Analysts, Network Security Engineers, and Cyber security Professionals have pondered that most interesting of questions: What do “they” know about my network? From time to time over the years, discussions related to determining what external entities may know about determining the attack surface of a network occur and then fizzle out. Often, organizations collect and store a great deal of data to piece together a defensive view of a network but do not piece together what external entities know about or have shown interest in on the same network. Big Data offers the potential to evaluate this question in ways that were unimaginable just five years ago. New technologies and techniques enable organizations to evaluate the question of what is the known attack surface of my network. I addressed this question head-on using a variety of cyber security data sets, enrichment techniques, Cloudera CDH 4 (Hadoop distribution), and Platfora: a relative newcomer that is one of the most powerful tools I have worked with in some time.
June 10, 2013 By WayneWheeles
See on ctovision.com
See on Scoop.it – Corporate Challenge of Big Data
Cloudera Impala Support – using the Impala driver, Alteryx will support Cloudera Impala to provide real-time, ad hoc query capability to Apache Hadoop, complementing traditional batch processing and providing faster queries for more proficient analytic results. Hive 2 Support – Alteryx now will also provide support for Hive 2, fast becoming the industry standard platform, via a Simba ODBC driver, which will allow data analysts a more efficient way to access and retrieve data from Hadoop.
See on marketdocket.com
Cloudera‘s Lipcon explains that companies will use Hadoop to generate a complicated model of, say, movie preferences based on millions of users, then store the result in HBase. When a user gives a movie a good rating, the website using the tools can factor that small bit of data into the model to offer new, up-to-date recommendations. Later, when the latest data is fed back into Hadoop, these analyses run at a deeper level, analyzing more preferences and producing a more accurate model. “This gives you the sort of best of both worlds—the better results of a complex model and the fast results of an online model,”
See on cacm.acm.org