Sat.May 13, 2023 - Fri.May 19, 2023

article thumbnail

Kora: The Cloud Native Engine for Apache Kafka

Confluent

Take a tour of the internals of Confluent’s Apache Kafka® service, powered by Kora: the next-generation, cloud-native streaming engine.Kora.

Cloud 145
article thumbnail

Announcing the General Availability of Databricks SQL Serverless !

databricks

Today, we are thrilled to announce that serverless compute for Databricks SQL is Generally Available on AWS and Azure! Databricks SQL (DB SQL).

121
121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Article: Rust Reviewed: The Current Trends and Pitfalls of the Ecosystem

InfoQ Articles

In this article, we share findings and insights about the Rust community and ecosystem and elaborate on the peculiarities and pitfalls of starting new projects with Rust or migrating to Rust from other languages.

112
112
article thumbnail

Why Data Privacy, Data Security, and Data Protection Go Hand in Hand

Dataversity

Here’s an important truth: There is no data privacy without data protection. Consumers and companies place their trust in the organizations they do business with and trust that their sensitive data will be kept private. These same organizations want to protect consumer and partner data, to preserve their brand as a trustworthy partner, grow revenues, […] The post Why Data Privacy, Data Security, and Data Protection Go Hand in Hand appeared first on DATAVERSITY.

Cloud 98
article thumbnail

Current State Analysis of Your Data – Part 4 – Data Outcomes

TDAN

This article is the fourth installment in a series taking a deep dive on how to do a Current State Analysis on your data. This article focuses on Data Outcomes: what they are, why they are important, and what questions to ask to determine the current state.

article thumbnail

Latency goes subsecond in Apache Spark Structured Streaming

databricks

Apache Spark Structured Streaming is the leading open source stream processing platform. It is also the core technology that powers streaming on the.

article thumbnail

Article: Magic Pocket: Dropbox’s Exabyte-Scale Blob Storage System

InfoQ Articles

A horizontally scalable exabyte-scale blob storage system which operates out of multiple regions, Magic Pocket is used to store all of Dropbox’s data. Adopting SMR technology and erasure codes, the system has extremely high durability guarantees but is cheaper than operating in the cloud.

Cloud 109

More Trending

article thumbnail

The Stranger Things of Data Governance

TDAN

Non-Invasive Data Governance (NIDG), like the popular Netflix series Stranger Things, offers a mysterious and complex reality for organizations to navigate. I am often asked how it is possible to navigate these realities and implement NIDG in the real world. NIDG involves unraveling the intricacies of management, quality, security, and compliance.

article thumbnail

Databricks on GCP - A practitioners guide on data exfiltration protection.

databricks

The Databricks Lakehouse Platform provides a unified set of tools for building, deploying, sharing, and maintaining enterprise-grade data solutions at scale. Databricks integrates.

96
article thumbnail

Article: Learning eBPF for Better Observability

InfoQ Articles

This article shares insights into learning eBPF as a new cloud-native technology which aims to improve Observability and Security workflows. Learn how to practice using the tools, and dive into your own development. Iterate on your knowledge step-by-step, and follow-up with more advanced use cases later.

Cloud 77
article thumbnail

Modeling Modern Knowledge Graphs

Dataversity

In the buzzing world of data architectures, one term seems to unite some previously contending buzzy paradigms. That term is “knowledge graphs.” In this post, we will dive into the scope of knowledge graphs, which is maturing as we speak. First, let us look back. “Knowledge graph” is not a new term; see for yourself […] The post Modeling Modern Knowledge Graphs appeared first on DATAVERSITY.

article thumbnail

Meta introduces its first-generation AI inference accelerator

Engineering at Meta

The post Meta introduces its first-generation AI inference accelerator appeared first on Engineering at Meta.

article thumbnail

New debugging features for Databricks Notebooks with Variable Explorer

databricks

Today, we are excited to announce the general availability of the Variable Explorer for Python in the Databricks Notebook. The Variable Explorer allows.

84
article thumbnail

Article: DevEx, a New Metrics Framework From the Authors of SPACE

InfoQ Articles

Researchers behind DORA and SPACE have published a new measurement framework for improving developer productivity. This article includes a summary of the paper’s key points along with commentary from the lead author.

DevOps 76
article thumbnail

What Will the Future of the AI and Machine Learning Industry Look Like?

Dataversity

AI applications catering to the mass public are moving towards larger-scale use for enterprises, as big tech companies try to get into this new technology. As the use of AI proliferates in the future, tremendous amounts of computing power from cloud service providers are needed to operate these AI applications and unleash more of their […] The post What Will the Future of the AI and Machine Learning Industry Look Like?

article thumbnail

MSVP is Meta’s first video processing ASIC

Engineering at Meta

The post MSVP is Meta’s first video processing ASIC appeared first on Engineering at Meta.

article thumbnail

Accelerating Grid-Edge Analytics using COMTRADE Files with Apache Spark

databricks

This solution accelerator and blog were created in collaboration with Schneider Electric. We'd like to thank Dan Sabin, a Schneider Electric Distinguished Technical.

77
article thumbnail

Ready to Relive the Excitement of Kafka Summit 2023? Here’s What Went Down!

Confluent

You won’t want to miss this recap of the most exciting keynotes and sessions about all things Kafka, real-time data, and data streaming at Kafka Summit 2023!

64
article thumbnail

Data Explainability: The Counterpart to Model Explainability

Dataversity

Today, AI and ML are everywhere. Whether it’s everyone playing with ChatGPT (the fastest adopted app in history) or a recent proposal to add a fourth color to traffic lights to make the transition to self-driving cars safer, AI has thoroughly saturated our lives. While AI may seem more accessible than ever, the complexity of AI models has increased exponentially.

article thumbnail

Article: [R]Evolutionize Your Retrospectives with Active Sensemaking

InfoQ Articles

High-quality retrospecting involves embracing unique individual experiences, acknowledging human limitations and biases, and sharing context-rich anecdotes through storytelling within and beyond team boundaries. This article explores how Active Sensemaking can prevent tension or apathy and foster a more productive and harmonious team environment.

63
article thumbnail

How Habu Integrates With Databricks to Protect Sensitive Data

databricks

We recently announced our partnership with Databricks to bring multi-cloud data clean room collaboration capabilities to every Lakehouse. Our integration with Databricks combines.

Cloud 76
article thumbnail

Eyes on Data: An Approach to Measure Data ROI

TDAN

Justifying any significant business investment is challenging. For data managers, the struggle is especially familiar. The difficulty is convincing decision makers to invest in data when measures of data’s value either do not exist or feel too ambiguous to estimate. As digital transformation accelerates, interest in frameworks for linking data to monetary measures grows.

article thumbnail

New Report: The ROI of Data Streaming and Its Biggest Challenges

Confluent

The results are in from our 2023 Data Streaming Report! Read the blog post to learn of key takeaways, including why data streaming has become a business priority.

59
article thumbnail

Heavy Networking 680: Speed Up Mean Time To WAN Innocence With Broadcom NetOps (Sponsored)

Packet Pushers

It's common for SD-WAN vendors to offer monitoring as part of the solution, but leaves the question how do I monitor the rest of the network? Todays sponsor Broadcom offers digital experience monitoring that is independent of the underlying WAN infrastructure. We explore how it works with guest is Jeremy Rossbach, Chief Technical Evangelist, NetOps by Broadcom.

WAN 52
article thumbnail

Track health and fitness goals with Apple Healthkit and Databricks

databricks

Data is a powerful tool that can be used to improve many aspects of our lives, including our health. With the proliferation of.

70
article thumbnail

In-House vs Outsourced IT Support

Akins IT

Modern businesses rely heavily on IT assistance because of the ever-changing nature of the digital landscape. Everything is online now. A reliable, consistent, and strong IT infrastructure is crucial for every organization, as it helps with everything from maintaining operational systems, safeguarding sensitive data, and navigating the cybersecurity.

article thumbnail

Achieving Zero Trust Maturity with Cato SSE 360

CATO Networks

Trust is a serious issue facing enterprise architectures today. Legacy architectures are designed on implicit trust, which makes them vulnerable to modern-day attacks. A Zero Trust approach to security can remedy this risk, but transitioning isnt always easy or inexpensive. CISA, the US governments Cybersecurity and Infrastructure Security Agency, suggests a five-pillar model to help guide organizations to zero trust maturity.

article thumbnail

IPv6 Buzz 126: What Employers Are Looking For With IPv6 Job Postings

Packet Pushers

In this episode of IPv6 Buzz, Ed, Scott, and Tom talk about what employers are looking for when IPv6 shows up in a job posting or as an interview question. In this episode of IPv6 Buzz, Ed, Scott, and Tom talk about what employers are looking for when IPv6 shows up in a job posting or as an interview question.

52
article thumbnail

Why Good Data Management Matters Now More Than Ever

Dataversity

In the early days of business analysis and underwriting, data was managed with simply a pen and paper and, of course, Excel spreadsheets. As technology has advanced, databases, warehouses, and data lakes have enabled information to be collected, stored, and managed electronically. But as businesses have rapidly increased the volume, velocity, and variety of data […] The post Why Good Data Management Matters Now More Than Ever appeared first on DATAVERSITY.

article thumbnail

Machines like us? – Part I

Software Architecture Zen

From The Secret of the Machines , Artist unknown Our ambitions run high and low for a creation myth made real, for a monstrous act of self love. As soon as it was feasible, we had no choice, but to follow our desires and hang the consequences. Ian McEwan, Machines Like Me I know what you’re thinking – not yet another post on ChatGPT! Haven’t enough words been written (or machine-generated) on this topic in the last few months to make the addition of any more completely unneces

article thumbnail

Network Connection Monitoring 101: Your Path to Network Nirvana

Obkio

Discover the power of network connection monitoring for businesses. Unleash smoother operations, proactive issue resolution, and Obkio's monitoring prowess.

article thumbnail

Day Two Cloud 195: Planning For Post-Quantum Cryptography

Packet Pushers

Today's Day Two Cloud explores post-quantum cryptography and how to make your cryptographic secrets safe from quantum computers. We're looking at a time horizon of at least five or ten years, so this isn't an immediate threat, but it doesn't hurt to start thinking about it now. We dive into how quantum computing and quantum encryption work, their impact on cryptographic secrets, what it means for technologies such as IPSec VPNs, and more.

Cloud 52
article thumbnail

Updated Cato DLP Engine Brings Customization, Sensitivity Labels, and More

CATO Networks

Last year, we launched Cato DLP to great success. It was the first DLP engine that could protect data across all enterprise applications without the need for complex, cumbersome DLP rules. Since then, we have been improving the DLP engine and adding key capabilities, including user-defined data types for increased control and integration with Microsoft Information Protection (MIP) to immediately apply sensitivity labels to your DLP policy.

article thumbnail

Mind Your MANRS: A Safer Internet Through Secure Global Routing

Kentik

MANRS, or the Mutually Agreed Norms for Routing Security, is an initiative of the Internet Society to help secure internet peering relationships and ultimately help secure global routing. It’s not a technology, it’s not a formal regulatory body, and it’s not a new encryption method. Instead, MANRS is a culture, a philosophy, and a community. Mind your MANRS In a recent episode of Telemetry Now, Aftab Siddiqui from the Internet Society joined us to talk about how the MANRS initiative is the cente

article thumbnail

What is Decentralized Network Monitoring for Modern Network Infrastructures

Obkio

Discover the power of decentralized network monitoring! Learn how Obkio revolutionizes monitoring in distributed environments. Get started now!

article thumbnail

Heavy Wireless 002: Making The Transition To WPA3 With Jennifer Minella

Packet Pushers

On today's Heavy Wireless we discuss transitioning from WPA2 to WPA3, including pros and cons, managing the project, supporting WPA2 and WPA3 simultaneously, and more. My guest is Jennifer Minella, founder and Principal Advisor at Viszen Security. She's also an author, instructor, and blogger. On today's Heavy Wireless we discuss transitioning from WPA2 to WPA3, including pros and cons, managing the project, supporting WPA2 and WPA3 simultaneously, and more.

article thumbnail

Boost E-Commerce with Customer Verification

TDAN

Data breaches have been rampant these days, and many companies realize they need to enhance their customer verification process. Proper customer verifications help prevent young children from accessing products and services that are age sensitive. It also prevents fraudulent transactions from happening online.