Free tutorial on SoapUI JDBC TestStep

February 17, 2013 Comments Off on Free tutorial on SoapUI JDBC TestStep

I’ve been writing an ongoing series of blog posts on making the most of soapUI Pro. Here’s the next installment, which explores how to use the JDBC TestStep to evaluate the contents of your database. This is a very powerful capability, because it lets you use soapUI as a complete, all-encompassing quality assurance platform for testing services, Web sites, and databases.

Interested in SoapUI on-demand training and certification? Learn more here.

Teaching a workshop entitled “Foundations of Big Data from A to Z”

February 16, 2013 Comments Off on Teaching a workshop entitled “Foundations of Big Data from A to Z”

Recently, I blogged about a talk I’m giving in Boston at the Conference on Big Data Security. I’m happy to announce that I’ll also be teaching a comprehensive one-day workshop on Big Data. Here’s what I’ll be covering on Tuesday, July 16:

  • A realistic, vendor-agnostic overview of the current Big Data security landscape
  • Big Data information management categories including: in-memory databases, key/value stores, graph databases, and file/object repositories
  • Examination and explanation of the most widespread technologies such as Amazon Web Services, Big Table, and Hadoop
  • Understanding how all of these disparate solutions co-exist without security chaos
  • Pinpointing the intrinsic non-technical security risks present in a big data environment: regulatory, legal, industry, and Service Level Agreements
  • Creating a “defense-in-depth” approach to protecting Big Data for your shop
  • Real-world scenarios on what works and why

If you’re interested, you can register here.

Speaking about enhanced security capabilities for Hadoop

February 11, 2013 § 1 Comment

I’m looking forward to my speaking engagement at the Conference on Big Data Security this July in Boston. I’ll be talking about how to keep your Hadoop environment safe and secure. In particular, I’ll be discussing:

  • The key diverse technologies contained within a typical Hadoop environment
  • Current and trending security risks characteristic in Hadoop implementations
  • Setting and attaining realistic goals
  • Contrasting open-source vs. proprietary Hadoop security tools
  • Protecting your Hadoop landscape through controlled access
  • Inherent differences safeguarding data-at-rest vs. defending data while in motion

I hope you can join me there – it should be a very interesting conference.

Where Am I?

You are currently viewing the archives for February, 2013 at rdschneider.

%d bloggers like this: