Systems | Development | Analytics | API | Testing

Latest Videos

Fast Forward Live: Representation Learning & Image Analysis

Good representations of data (e.g., text, images) are critical for solving many tasks (e.g., search or recommendations). But what exactly are representations, how can they be built and why are deep learning models useful? In this livestream, we will discuss these questions from a software engineering perspective and walk through a live example!

Exploring Data & Dashboard Creation on CDP Public Cloud

In this video, we'll walk through an example on how you can use Cloudera Data Warehouse to both easily run ad hoc queries against data as well as turn the results of those queries into beautiful, interactive, data visualizations and dashboards that show off the results of your data exploration.

ClouderaNow 21 - Automate Data Enrichment Pipelines

See this demo of Cloudera Data Engineering which builds upon Apache Spark and allows us to load, transform, and enrich our datasets and has built-in workload orchestration to automate these pipelines at scale. The demo will also illustrate how easy it is to go from streaming to enrichment and data pipeline automation all in an end-to-end data platform.

Data Enrichment Using Cloudera Data Engineering

In this video, we'll walk through an example on how you can use Cloudera Data Engineering to pull in multiple datasets from a Hive data warehouse and go through the process of enriching the data through the use of Apache Spark. We'll then run this Spark job from within Cloudera Data Engineering so that we can follow the progress and see details about the job's execution.

CDP Public Cloud: SSH Key Deployment

This video covers how to deploy SSH keys in CDP Public Cloud. It touches on how to generate a new SSH key pair and steps through the process of deploying it for a workload user through the Cloudera Management Console Web UI, as well as using the CDP command-line tool. It discusses the security implications of using the Cloudbreak user for login on data hub hosts, and explains why workload user credentials should be used instead in most cases. It also demonstrates using the deployed SSH keys for login to data hub hosts.