- Home
- Tag: metadata
Posts tagged metadata
Information about other data or objects. In Amazon Simple Storage Service (Amazon S3) and Amazon EMR (Amazon EMR) metadata takes the form of name–value pairs that describe the object. These include default metadata such as the date last modified and standard HTTP metadata such as Content-Type. Users can also specify custom metadata at the time they store an object. In Amazon Elastic Compute Cloud (Amazon EC2) metadata includes data about an EC2 instance that the instance can retrieve to determine things about itself, such as the instance type, the IP address, and so on.
Tag: metadata
Announcing Google Cloud Video Intelligence API, and more Cloud Machine Learning updates | Google Cloud Big Data and Machine Learning Blog | Google Cloud Platform

Feed: Google Cloud Big Data and Machine Learning Blog. Author: Google Cloud Big Data and Machine Learning Blog Team. Innovation in data processing and machine learning technology Wednesday, March 8, 2017 By Fei-Fei Li, Chief Scientist, Google Cloud AI and Machine Learning Artificial intelligence is playing an increasingly essential role in the enterprise, however, more and more businesses find themselves struggling to keep up. One of our most important goals is to make machine learning a transformational tool for organizations of any size, industry or sophistication. We’re seeing customers making it part of their wider data analytics strategy, with early ... Read More
U-SQL Defined
Feed: James Serra's Blog. Author: James Serra. Azure Data Lake Analytics (ADLA) is a distributed analytics service built on Apache YARN that allows developers to be productive immediately on big data. This is accomplished by submitting a job to the service where the service will automatically run it in parallel in the cloud and scale to process data of any size. Scaling is achieved by simply moving a slider, being careful to make sure the data and job is large and complex enough to provide parallelism so you don’t overprovision and pay too much. When the job completes, it winds down ... Read More
Securely Analyze Data from Another AWS Account with EMRFS

Feed: AWS Big Data Blog. Sometimes, data to be analyzed is spread across buckets owned by different accounts. In order to ensure data security, appropriate credentials management needs to be in place. This is especially true for large enterprises storing data in different Amazon S3 buckets for different departments. For example, a customer service department may need access to data owned by the research department, but the research department needs to provide that access in a secure manner.This aspect of securing the data can become quite complicated. Amazon EMR uses an integrated mechanism to supply user credentials for access to ... Read More
The Evolving Open Source Database Landscape

Feed: Database Trends and Applications : All Articles. While not the most media-hyped technology, databases are certainly one of the most crucial when it comes to our always-online, always-connected society. Databases power not just the applications and websites we use every day, but the businesses that generate revenue and fuel the economy. The internet relies on functioning and well-performing databases to operate.The database landscape saw some interesting developments in 2016, and there are more to look forward to in 2017.We’ve already seen a definite and positive move to open source database solutions, even in enterprise markets. This makes sense. While ... Read More
DataOps – It’s a Secret
Feed: Featured Blog Posts - Data Science Central. Author: William Vorhies. Summary: DataOps is a series of principles and practices that promises to bring together the conflicting goals of the different data tribes in the organization, data science, BI, line of business, operations, and IT. What has been a growing body of best practices is now becoming the basis for a new category of data access, blending, and deployment platforms that may solve data conflicts in your organization. As data scientists we all potentially suffer from that old hammer and nail meme as we tend to view the world ... Read More
Securing Our Cars In A Connected World – Automotive Cyber Security Summit 2017 – Hortonworks

Feed: Hortonworks Blog – Hortonworks. Author: Michael Ger. This week I attended the 2017 Automotive Cyber Security Summit in Detroit with my colleague Mike Schiebel (General Manager, Cyber Security, Hortonworks). Together, we were speakers in a session entitled “Securing the Connected Car in a Connected World”. Here are highlights of what we presented: How Did We Get Here? A Historical Perspective As the prospect of autonomous vehicles rocks the automotive world, cyber security has become one of the most talked about topics in connected car circles. To understand why, it is worthwhile to ponder just how dramatically the security landscape has ... Read More
Basics of MySQL Administration and best practices

Feed: Planet MySQL. Author: Lalit. Following are the few best practices and basic commands for MySQL Administration. MySQL Access and credential security shell> mysql -u testuser -pMyP@ss0rd mysql: [Warning] Using a password on the command line interface can be insecure. By looking at OS cmd’s history using history cmd other os users can see/get MySQL user password easily. It always good to not use a password on the command line interface. Another option for securing password while automating MySQL scripts is a use of mysql_config_editor. For more info on this check out my blog post about credential security. Consider of having following implementation for Strong ... Read More
Combining Thomson Reuters data with Google BigQuery and Google Cloud Pub/Sub API | Google Cloud Big Data and Machine Learning Blog | Google Cloud Platform

Feed: Google Cloud Big Data and Machine Learning Blog. Author: Google Cloud Big Data and Machine Learning Blog Team. Innovation in data processing and machine learning technology Tuesday, February 28, 2017 By Reza Rokni, Google Solutions Architect, and guest contributors Sean Micklethwaite, Lead Developer, Citibank's Global Banking and Markets, and Sebastian Fuchs, Solution Specialist, Thomson Reuters We recently had the very exciting opportunity to work in partnership with Thomson Reuters to demonstrate to Citibank's Global Banking and Markets department the benefits of combining Google's core data technologies with Thomson Reuters financial market content. In a proof-of-concept experiment, our task was ... Read More
Disabling Intel Hyper-Threading Technology on Amazon Linux

Feed: AWS Compute Blog. Author: Bryan Liston. Brian Beach, Solutions ArchitectCustomers running high performance computing (HPC) workloads on Amazon Linux occasionally ask to disable the Intel Hyper-Threading Technology (HT Technology) that is enabled by default. In the pre-cloud world, this was usually performed by modifying the BIOS. That turned off HT Technology for all users, regardless of any possible benefits obtainable, for example, on I/O intensive workloads. With the cloud, HT Technology can be turned on or off, as is best for a particular application. This post discusses methods for disabling HT Technology. According to Intel: Hyper-Threading Technology makes a ... Read More
Detecting Hackers and Impersonators with Machine Learning – Hortonworks

Feed: Hortonworks Blog – Hortonworks. Author: James Sirota. The 2014 Yahoo email hack is a good illustration how a big data security analytics platform such as Apache Metron can make it easier to detect, investigate, assess, and remediate threats in your environment. In this article I will describe how to setup and configure Apache Metron to detect a recent cyber attack on Yahoo, as described in the United States vs Dokuchaev at all, as well as contrast how the Apache Metron approach, philosophy, and methodology stands apart from that of contemporary point tool solutions. What Did The Recent Cyber Attack ... Read More
Recent Comments