Systems | Development | Analytics | API | Testing

Kubernetes Logs Collection with MiNiFi C++

The MiNiFi C++ agent provides many features for collecting and processing data at the edge. All the strengths of MiNiFi C++ make it a perfect candidate for collecting logs of cloud native applications running on Kubernetes. This video explains how to use the MiNiFi C++ agent as a side-car pod or as a DaemonSet to collect logs from Kubernetes applications. It goes through many examples and demonstrations to get you started with your own deployments. Don’t hesitate to reach out to Cloudera to get more details and discuss further options and integrations with Edge Flow Manager.

Large Scale Industrialization Key to Open Source Innovation

We are now well into 2022 and the megatrends that drove the last decade in data—The Apache Software Foundation as a primary innovation vehicle for big data, the arrival of cloud computing, and the debut of cheap distributed storage—have now converged and offer clear patterns for competitive advantage for vendors and value for customers.

Three Must-Read Data and Analytics Books with Tim Harford, Zhamak Dehghani, and Brent Dykes

It is once again that time of year when our host, Cindi Howson shares her favorite data and analytics book recommendations. In this special annual episode, we feature three of the industry’s top data writers, thinkers, and fellow podcasters. Tim Harford comes to the conversation with his new book, The Data Detective, and big-picture ideas about how traits like curiosity serve data scientists so well. Zhamak Dehghani shares her concept of The Data Mesh, especially as it relates to sharing data across business verticals. Finally, in his book, Effective Data Storytelling,

Rolling NIST's Cybersecurity Framework into Action

Data backup is the last line of defense when a cyberattack occurs, especially when the attack is ransomware. With robust data backup technologies and procedures, an organization can return to a point-in-time prior to the attack and return to operations relatively quickly. But as data volumes continue to explode, ransomware attacks are growing more sophisticated and beginning to target that precious backup data and administrator functions.