Monthly Archive: February 2018
Breaking down data silos: when SAP alone is not enough
Running a large company is impossible without having an ERP system in place, and SAP business software remains at the forefront in this category. But when companies are looking towards new technologies such as data lakes, machine learning or predictive…
Read more
2017 – Another Award-Winning Year for Cloudera!
In many ways, 2017 was a singular year for Cloudera, not least because we staged a successful IPO and joined the ranks of the world’s fastest-growing, publicly traded companies. We deeply appreciate the vote of confidence and trust our customers…
Read more
Cloudera on Cloudera: Our Journey to Becoming more Data-driven
I’ve spent the last four years here at Cloudera talking with our customers about how to run their businesses better using their data and Cloudera’s products and services. Now I get to put my money where my mouth is –…
Read more
Dave Shuman Talks IoT and Big Data on Federal News Radio
What exactly can we expect for IoT in 2018, and how can you improve your organization with connected devices? That was the question Dave Shuman set out to answer when he sat down last month with John Gilroy at the…
Read more
How Hadoop 3 Adds Value Over Hadoop 2
Thank you to Vinod Vavilapalli and Saumitra Buragohain for contributing to this blog. Everyone is asking – What is the difference between Hadoop 3 versus Hadoop 2. What’s all this commotion and ruckus mean? What is Hadoop 3 paving the…
Read more
Cybersecurity on Call: Nation-State Cyber Operations with Patrick Tucker
As cyber attacks continue to increase across the world, it has become more critical for countries to implement cyber operations from a defensive and offensive perspective to protect national secrets and their citizens. An Arizona State University research paper showed…
Read more
Account take overs, Advanced persistent threats, CISO, Cloudera, Cyber attacks, cyber security, Cybersecurity, Cybersecurity analytics, Data breach, Data privacy, Endpoint threat detection, Enterprise Data Hub, EU Incident responder, governance, Information Security, Infosec, Insider threat, Internet of Things, IoT, Network traffic analytics, Next-gen SIEM, Rogue users, security, Security information event management, Security operations center, SIEM, User behavior analytics, User entity behavior analytics