Systems | Development | Analytics | API | Testing

BI

How to configure clients to connect to Apache Kafka Clusters securely - Part 4: TLS Client Authentication

In the previous posts in this series, we have discussed Kerberos, LDAP and PAM authentication for Kafka. In this post we will look into how to configure a Kafka cluster and client to use a TLS client authentication. The examples shown here will highlight the authentication-related properties in bold font to differentiate them from other required security properties, as in the example below. TLS is assumed to be enabled for the Apache Kafka cluster, as it should be for every secure cluster.

CDP Public Cloud: SSH Key Deployment

This video covers how to deploy SSH keys in CDP Public Cloud. It touches on how to generate a new SSH key pair and steps through the process of deploying it for a workload user through the Cloudera Management Console Web UI, as well as using the CDP command-line tool. It discusses the security implications of using the Cloudbreak user for login on data hub hosts, and explains why workload user credentials should be used instead in most cases. It also demonstrates using the deployed SSH keys for login to data hub hosts.

3 things we learned embedding Yellowfin software

One of the key pieces of work that we've done this past year is to actually build a completely bespoke application, so that we could properly look at the different ways that we could embed Yellowfin. This has helped us create a really unique customer experience within a third-party application. Like all great stories, our vision fundamentally changed on that journey, and we learned three valuable lessons as we built this application we want to share with you.

Bringing It All Together in 2021

As a result of overwhelming excitement (and pressure) from my fellow Qlikkies, I’m going to share with you the recent demo I did at our all-company annual kick-off which shows Active Intelligence in action. It was intended to be an “internal-only” demo because it mixes existing capabilities with near-term future ones, but, on reflection, I think you, too, will be just as excited.

Sunny Bedi And His Most Important IT Initiatives | Rise of The Data Cloud | Part 2 | Snowflake

Sunny Bedi, CIO and CDO of Snowflake, talks about how Snowflake is a data-driven company, data security in the cloud, how to use AI to minimize data threats, and much more. Rise of the Data Cloud is brought to you by Snowflake.

Industry X.0 - Made Real, Practical Insights Today enabling Profits Tomorrow

Manufacturing’s digital transformation growth is truly impressive considering it’s delivering value with explosive growth rates. Consider that Manufacturing’s Industry Internet of Things (IIOT) was valued at $161b with an impressive 25% growth rate, or that the Connected Car market will be valued at $225b by 2027 with a 17% growth rate. But then conflicting information arrives as VentureBeat reports that around 90 percent of machine learning models never make it into production?

Masking Semi-Structured Data with Snowflake

Snowflake recently launched dynamic data masking, an incredibly useful feature for companies and data-centric organizations that have strict security data governance requirements. This article demonstrates how we implemented data masking at Snowflake by introducing a data masking policy on a VARIANT data type field that holds data in JSON format. We implemented the policy on top of tables and views.

Sunny Bedi Explains His Many Roles At Snowflake | Rise of The Data Cloud | Part 1 | Snowflake

Sunny Bedi, CIO and CDO of Snowflake, talks about how Snowflake is a data-driven company, data security in the cloud, how to use AI to minimize data threats, and much more. Rise of the Data Cloud is brought to you by Snowflake.

Cloudera Flow Management Continuous Delivery Architecture

Having introduced the flow delivery challenges and corresponding resolutions in the first article ‘Cloudera Flow Management Continuous Delivery while Minimizing Downtime’, we will combine all the preceding solutions into an example of flow management continuous delivery architecture. DataFlow Continuous Delivery Architecture In the whole process, we can see the following steps.

Data and Customer Privacy: What Companies Need to Do

Today’s Data Privacy Day offers consumers an opportunity to learn about how companies use, collect, and share their personal information. At the same time, it gives companies a chance to focus on and highlight how they are protecting customer data. Although most businesses view data privacy practices as a way to mitigate their risk, good practices around data privacy can actually differentiate your organization from your competitors.