May 30, 2017 Comments Off on Speaking at Graph Day 2017 in SF
I’ve been a database technologist for more than 25 years. During that time, I’ve been fortunate to observe the rise (and longevity) of relational database platforms, along with the more recent advent of NoSQL solutions. I’m particularly excited about the potential for graph databases: I believe that they’re going to transform the way information is processed. In fact, WiseClouds will shortly be announcing a series of training courses dedicated to the highly capable OrientDB multi model database.
If you’re in the San Francisco Bay Area, and would like to learn more about what graph databases can do for you, be sure to attend Graph Day 2017. I’ll be joining many other speakers to help you explore the full range of fascinating applications built on graph databases. You can register here.
March 4, 2017 Comments Off on Helpful article on Apache Spark with use cases
I recently wrote Spark for Dummies in partnership with IBM. For those curious about this highly interesting and innovative technology – and the numerous scenarios where it can add value – there are increasing numbers of helpful online resources. A good example of what I mean is a recent article by Radek Ostrowski from Toptal. He provides a concise Spark overview, along with some sample use cases.
I’ll continue to cross reference online resources like this as I run across them. If you’d like to read more about all things Big Data, be sure to check out some of my other related postings.
January 1, 2017 Comments Off on Spark for Dummies is now available
A few years ago, I wrote Hadoop for Dummies, which presented an executive-level overview of Hadoop, its capabilities, and its amazing potential. Since then, the Big Data world has continued its relentless march forward, with Apache Spark serving as one of the most exciting and well-adopted new technologies. I’m happy to announce that I’ve just written a companion book dedicated to Spark. Here are the major topics that I cover in this book:
- Spark’s history
- How it works
- Why it’s such an important Big Data breakthrough
- Real world use cases
- How Spark, MapReduce, and Hadoop can work together
- How you can deploy it in your enterprise
- Best practices
You can download a copy here.
This book – which was sponsored by IBM – is a great example of the kinds of high quality technical marketing content developed at Think88. These include white papers, case studies, evaluation guides, technical presentations, and market research.
November 10, 2016 Comments Off on Helpful article on journalist protection is relevant for us all
In the aftermath of this week’s US election, it’s worthwhile to – once again – revisit techniques to protect private information from those that have no business seeing it. Here’s a link to a very useful article from The Atlantic that might give you some ideas about how to safeguard your data. If you’re curious about other security and privacy topics that I’ve written about, here’s a shortcut to them.
October 30, 2016 Comments Off on Why the recent Internet of Things (IoT) attack is just the beginning
A few days ago we witnessed a new type of distributed denial of service (DDoS) incident. Unlike previous botnet attacks that enlisted compromised computers, this one corralled assorted unprotected devices like Internet-ready webcams, DVRs, and baby monitors to flood Domain Name System (DNS) servers, and thereby seriously degrade the Internet for hours. I’ll leave the explanation of the mechanics of this incident to more qualified commentators, but I do want to weigh in on why I think these types of events are very hard to combat and why I’m very skeptical about the hype around the Internet of Things (IoT).
We all (well, many of us) know how important it is to keep our computers and software patched and up-to-date; most people also get why firewalls are essential. But consider these facts about IoT devices:
- They’re being created for just about every industry. This diversity means that it’s much harder for the entire universe of vendors to agree on common security standards: defining safeguards for a heart pump is a little different than for a Web-ready washing machine. I’ve served on my share of standards committees: to say that they move slowly is an understatement!
- They have really short development cycles. IoT is shaping up to be a brutally competitive landscape. The winners will be those vendors that deliver solutions to market quickly. Designing and building strong security safeguards takes time, and time is money. The end result is that device protection takes a back seat to market pressures.
- There’s limited space for security software. Margins are very thin on hardware devices: security-focused onboard storage space adds costs that aren’t directly related to functionality.
- They frequently rely on APIs for communication. I’ve blogged about API security in the past. Suffice it to say that it’s a rare API that’s locked down properly.
- New models are always coming on the market. Here’s the really scary part: even if vendors do start getting their security act together, it will be years before today’s highly insecure devices get retired. Meanwhile, they’ll be standing by for their next set of DDoS orders.
September 30, 2016 Comments Off on Nice article about serverless architectures
As cloud computing – and the infrastructure that underpins it – continues to advance, we’re seeing some very interesting new software development design patterns gaining traction. I’ve been working with Service Oriented Architecture (SOA) for years, and it’s been fascinating to watch it evolving into new approaches such as microservices and now serverless architectures. Unsurprisingly, leading cloud computing vendors like Amazon Web Services (AWS) are getting on board the train, with AWS Lambda an example of where things are heading.
If you’re curious about what serverless architecture is all about, Mike Roberts has written a comprehensive article on Martin Fowler’s website. I encourage you to check it out, because you’ll be hearing more about serverless architectures in the very near future.
July 18, 2016 Comments Off on Presenting a Webinar on Delivering Data Security with Hadoop and the IoT
On August 9, I’ll be teaming with Reiner Kappenberger from Hewlett Packard Enterprise to explore some of the most pressing security implications of Hadoop and the Internet of Things (IoT). Hosted by the IT GRC Forum, here’s what we’ll be covering:
The Internet of Things (IoT) is here to stay, and Gartner predicts there will be over 26 billion connected devices by 2020. This is driving an explosion of data which offers tremendous opportunity for organizations to gain business value, and Hadoop has emerged as the key component to make sense of the data and realize the maximum value. On the flip side the surge of new devices has increased potential for hackers to wreak havoc, and Hadoop has been described as the biggest cybercrime bait ever created.
Data security is a fundamental enabler of the IoT, and if it is not prioritized the business opportunity will be undermined, so protecting company data is more urgent than ever before. The risks are huge and Hadoop comes with few safeguards, leaving it to organizations to add an enterprise security layer. Securing multiple points of vulnerability is a major challenge, although when armed with good information and a few best practices, enterprise security leaders can ensure attackers will glean nothing from their attempts to breach Hadoop. In this webinar we will discuss some steps to identify what needs protecting and apply the right techniques to protect it before you put Hadoop into production.
If you’d like to join us, register here.