Testing and Validating distributed systems with Apache Spark and Apache Beam

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=V7UStME-39o



Duration: 42:27
2 views
0


FOSDEM 2018 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-18Status of the Apache ODF Toolkit incubating
2022-06-18The emPeerTube strikes back Let's decentralize YouTube
2022-06-18Static Infrastructure Status with Jekyll and GitHub Pages
2022-06-18The MDN Browser Compat Data Project
2022-06-18Snabb A toolkit for user space networking
2022-06-18Slurm in Action Batch Processing for the 21st Century
2022-06-18The UoC Radio Station Project Technical overview of an FM radio station based on open source and DIY
2022-06-18Tying software deployment to scientific workflows Using Guix to make software deployment a first cl…
2022-06-18State of the rkt container runtime and its Kubernetes integration A look at the progress of rkt and…
2022-06-18The many ways of using Guix packagesA guide to which ways might suit you
2022-06-18Testing and Validating distributed systems with Apache Spark and Apache Beam
2022-06-18The Magnificent Modular Mahout An extensible library for distributed math and HPC
2022-06-18SIP based group chat with Linphone A discussion on how Linphone implements SIP RFCs to achieve te…
2022-06-18Starviewer FOSS DICOM Medical Imaging Software Over 10 years fulfilling the daily needs of clinici
2022-06-18The Dynamo After Diffie Extending Disco Era Crypto For Ubiquitous Secure Frameworking With Integral…
2022-06-18Tutorial my first FPGA design Basic course to create a simple FPGA design using OSS tools
2022-06-18Testing and Automation in the Era of Containers with Go
2022-06-18SSSD From an LDAP client to the System Security Services Daemon
2022-06-18Turning physical systems into containers Migrating to system containers
2022-06-18The story of UPSat Building the first open source software and hardware satellite
2022-06-18The LTTng approaches to solving complex problems



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering