SlideShare a Scribd company logo
1 of 47
Download to read offline
1
Big Data Computing Overview
2015.04.07
Youngsung Son
2
Agenda
§ What am I doing?
§ Big Data Computing History
– Supercomputer
– Parallel Computing
– Linux Cluster
– Big Data Computing
§ Google File System (GFS)
§ Hadoop Map and Reduce
§ Spark Stream Processing
§ References
3
What am I doing?
4
1.PersonalCloudRepositoryAccess
2.PersonalHealthRecordRetrieval
3.CasebasedReasoning(SimilarCaseSearch)
4.ComparisionamongSimilarPatients(forHealthPlanning,Prediction,Advise)
1
2 3
4
Healing Platform
5
Healing Platform
모바일 플랫폼
Open API
의료 데이터
프로바이더 1..N
5000만명x17건/365일
=~200만건/일;
라이프레코드
프로바이더 1..N
5000만명x5회
= ~3억/일
개인 힐링 레코드
저장소 1..N
5000만명/일
요청
전송
저장
서비스
분석 엔진
모바일 서비스 1..N
RESTfullAPI
3초 이내
로드요청
표준
변환
Targeted 데이터
/힐링지식베이스
(NoSQL DB)
TD TD
TD KB
변환/필터링
스트림컴퓨팅
(업데이트 관리)
고속계산용DB
DW구축
DC DC
DC DC
Big Data
Personal Data
Control
Service
분석플랫폼
데이터 중계기
요청
전송
공공 임상
사례 빅데이터
개인 힐링레코드
사례 빅데이터
원본 빅데이터 (HDFS)
유사사례
검색
트렌드
플래닝
TD구축
지식베이스 구축 엔진
Cluster, CBR, …
6
Big Data Computing History
7
Supercomputer
8
Supercomputer
9
Architecture of HyperCube
John P. Hayes, “Architecture of Supercomputer,” International Conference of Parallel Processing 1986.
http://web.eecs.umich.edu/~tnm/trev_test/papersPDF/1986.08.Architecture%20Of%20A%20Hypercube%20Supercomputer_Conf_Parallel_Processing.pdf
10
Architecture of HyperCube
11
Architecture of HyperCube
12
Architecture of HyperCube
http://web.eecs.umich.edu/~tnm/trev_test/papersPDF/1986.08.Architecture%20Of%20A%20Hypercube%20Supercomputer_Conf_Parallel_Processing.pdf
13
Parallel Computing
§ MPI
– Message Passing Interface
§ PVM
– Parallel Virtual Machine
14
Parallel Computing
§ MPI (Message Passing Interface)
15
Parallel Computing
§ PVM (Parallel Virtual Machine)
16
Architecture of HyperCube
Too much costy!!!!
Too much difficult!!!!
17
Linux Cluster
18
Berkeley NOW Project (1995)
19
Linux Cluster Project
CROWN System
Clustering Resources of Workstation’s
Network
(1997~1999)
20
21
22
Linux Cluster Specifications
§ 16 PCs
§ PC’s specification
– Pentium3
– 16MB
– 20GB
§ Myrinet (300Mbps)
23
Linux Cluster’s Goals
24
Linux Cluster’s Goals
Real-time	Rendering
25
Limitations of achieving this goal
§ Visible Human Project
– Data Size : 40GB (~100GB)
§ Linux File System (ext2)
– 16GB/1 file
– IDE bandwidth : 33Mbps (66Mbps)
– Ethernet bandwidth : 100Mbps (below 30Mbps)
– RAM : not enough
§ Myrinet network interface
– Too difficult to use
– Kernel hooking required!!!
§ Programming Model
– PVM or MPI – Too Slow & Difficult!!!
26
Google File System
27
Google File System (GFS, 2003)
Sanjay	Ghemawat,	“The	Google	File	System,”
http://static.googleusercontent.com/media/research.google.com/en//archive/gfs-sosp2003.pdf
28
Google File System (GFS)
Distributed,	Overlayed,	Scalable	File	System
29
Hadoop System
2005
30
Map & Reduce
§ User Logs Counting
31
Map & Reduce
Why	doing	as	this?
32
How about this example?
§ Count Phone Call Logs?
– Each user’s total time for phone call
– KT’s case : 40TB / month
– No exception available
§ Oracle Database
– HW cost : ?
– SW cost : Over 400,000,000 Korean Won
– Time cost : about 1 day.
33
Solution?
§ Simple is best
– Log Merge
for(int i=0;	i<max_log;i++)
user[log[i].id].usage_time +=	log[i].usage_time;
But,	Too	much	time	required!!!
34
Map & Reduce
§ User Logs Counting
35
Spark Stream Processing
2009
36
Hadoop’s Performance Problem
37
Hadoop’s Peformance Problem
38
Spark Stream Processing
39
Spark Stream Processing
40
41
42
Spark Code Example
43
Conclusion
§ Big Data Computing?
– Of course, it is needed!! But for us?
§ We did a lot.
– We need to enhance our aspect?
§ What’s the next?
– Trends are repeated!!!
– Your major might be come again?
44
45
아이고 의미없다.
46
References
§ John P. Hayes, “Architecture of Supercomputer,”
International Conference of Parallel Processing 1986.
§ MPI code example, http://mpitutorial.com/tutorials/mpi-
hello-world/
§ PVM code example,
http://www.netlib.org/pvm3/book/node17.html
§ Sanjay Ghemawat, “Google File System,” SOSP 2003
§ Hadoop Code Example, http://azure.microsoft.com/en-
us/documentation/articles/hdinsight-sample-
wordcount/
§ Madhukara Phatak, Introduction to Apache Spark,
http://blog.madhukaraphatak.com/introduction-to-
spark/
47
Thank you
Young-Sung Son
ysson@etri.re.kr

More Related Content

What's hot

130418 makan pourzandi - esf -- an elastic security framework for cloud inf...
130418   makan pourzandi - esf -- an elastic security framework for cloud inf...130418   makan pourzandi - esf -- an elastic security framework for cloud inf...
130418 makan pourzandi - esf -- an elastic security framework for cloud inf...
Ptidej Team
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
Shah Sheikh
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Jim Gilsinn
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Codiax
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
Positive Hack Days
 

What's hot (20)

Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 
130418 makan pourzandi - esf -- an elastic security framework for cloud inf...
130418   makan pourzandi - esf -- an elastic security framework for cloud inf...130418   makan pourzandi - esf -- an elastic security framework for cloud inf...
130418 makan pourzandi - esf -- an elastic security framework for cloud inf...
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
 
z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code Scanner
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
 
Scada security
Scada securityScada security
Scada security
 
Ics presentation
Ics presentationIcs presentation
Ics presentation
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
 
Ccna sec
Ccna secCcna sec
Ccna sec
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
 
The Future of ICS Security Products
The Future of ICS Security ProductsThe Future of ICS Security Products
The Future of ICS Security Products
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
 
What is NAC
What is NACWhat is NAC
What is NAC
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 

Viewers also liked

Biodiversity games day manuka dc
Biodiversity games day manuka dcBiodiversity games day manuka dc
Biodiversity games day manuka dc
Angie Simmons
 
Avondale int term 2 - Student voice about e-learning
Avondale int term 2 - Student voice about e-learningAvondale int term 2 - Student voice about e-learning
Avondale int term 2 - Student voice about e-learning
Angie Simmons
 
Bullying 1
Bullying 1Bullying 1
Bullying 1
jls13
 
2011 06 08 hpm tweetchat transcript
2011 06 08 hpm tweetchat transcript2011 06 08 hpm tweetchat transcript
2011 06 08 hpm tweetchat transcript
Christian Sinclair
 
YouthBuild's 30th Anniversary
YouthBuild's 30th AnniversaryYouthBuild's 30th Anniversary
YouthBuild's 30th Anniversary
youthbuildusa
 
12. Sheta 40 Years Anna Lee Fuhr
12.  Sheta 40 Years Anna Lee Fuhr12.  Sheta 40 Years Anna Lee Fuhr
12. Sheta 40 Years Anna Lee Fuhr
LGRIS
 
會計報告89711010 黃嘉惠
會計報告89711010  黃嘉惠會計報告89711010  黃嘉惠
會計報告89711010 黃嘉惠
jim77771988
 

Viewers also liked (20)

Biodiversity games day manuka dc
Biodiversity games day manuka dcBiodiversity games day manuka dc
Biodiversity games day manuka dc
 
strategi belajara mengajar
strategi belajara mengajarstrategi belajara mengajar
strategi belajara mengajar
 
Avondale int term 2 - Student voice about e-learning
Avondale int term 2 - Student voice about e-learningAvondale int term 2 - Student voice about e-learning
Avondale int term 2 - Student voice about e-learning
 
Bullying 1
Bullying 1Bullying 1
Bullying 1
 
Sos
SosSos
Sos
 
Migration feast
Migration feastMigration feast
Migration feast
 
Come Funziona Fedele Premium e SMS
Come Funziona Fedele Premium e SMSCome Funziona Fedele Premium e SMS
Come Funziona Fedele Premium e SMS
 
Real Estate Solutions Services
Real Estate Solutions ServicesReal Estate Solutions Services
Real Estate Solutions Services
 
Enhancing PowerPoint in the Classroom: Managing Attention
Enhancing PowerPoint in the Classroom: Managing Attention Enhancing PowerPoint in the Classroom: Managing Attention
Enhancing PowerPoint in the Classroom: Managing Attention
 
Sales Dummy report
Sales Dummy reportSales Dummy report
Sales Dummy report
 
罗马尼亚八日游
罗马尼亚八日游罗马尼亚八日游
罗马尼亚八日游
 
2011 06 08 hpm tweetchat transcript
2011 06 08 hpm tweetchat transcript2011 06 08 hpm tweetchat transcript
2011 06 08 hpm tweetchat transcript
 
YouthBuild's 30th Anniversary
YouthBuild's 30th AnniversaryYouthBuild's 30th Anniversary
YouthBuild's 30th Anniversary
 
Jeanette meyer class
Jeanette meyer classJeanette meyer class
Jeanette meyer class
 
12. Sheta 40 Years Anna Lee Fuhr
12.  Sheta 40 Years Anna Lee Fuhr12.  Sheta 40 Years Anna Lee Fuhr
12. Sheta 40 Years Anna Lee Fuhr
 
ICRI Intro for NTU CCC
ICRI Intro for NTU CCCICRI Intro for NTU CCC
ICRI Intro for NTU CCC
 
Testpresentatie
TestpresentatieTestpresentatie
Testpresentatie
 
會計報告89711010 黃嘉惠
會計報告89711010  黃嘉惠會計報告89711010  黃嘉惠
會計報告89711010 黃嘉惠
 
Cricket On Everest - leading an expedition for the first time
Cricket On Everest - leading an expedition for the first timeCricket On Everest - leading an expedition for the first time
Cricket On Everest - leading an expedition for the first time
 
Stik Man
Stik ManStik Man
Stik Man
 

Similar to Big data computing overview

Google Cloud Computing on Google Developer 2008 Day
Google Cloud Computing on Google Developer 2008 DayGoogle Cloud Computing on Google Developer 2008 Day
Google Cloud Computing on Google Developer 2008 Day
programmermag
 
Gp Introduction 200811
Gp Introduction 200811Gp Introduction 200811
Gp Introduction 200811
iswaha
 

Similar to Big data computing overview (20)

Big Data and OSS at IBM
Big Data and OSS at IBMBig Data and OSS at IBM
Big Data and OSS at IBM
 
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...
 
Google Cloud Computing on Google Developer 2008 Day
Google Cloud Computing on Google Developer 2008 DayGoogle Cloud Computing on Google Developer 2008 Day
Google Cloud Computing on Google Developer 2008 Day
 
Handout3o
Handout3oHandout3o
Handout3o
 
Get Your Head in the Cloud - Lessons in GPU Computing with Schlumberger
Get Your Head in the Cloud - Lessons in GPU Computing with SchlumbergerGet Your Head in the Cloud - Lessons in GPU Computing with Schlumberger
Get Your Head in the Cloud - Lessons in GPU Computing with Schlumberger
 
Hadoop for Scientific Workloads__HadoopSummit2010
Hadoop for Scientific Workloads__HadoopSummit2010Hadoop for Scientific Workloads__HadoopSummit2010
Hadoop for Scientific Workloads__HadoopSummit2010
 
MSR 2009
MSR 2009MSR 2009
MSR 2009
 
Computing Outside The Box September 2009
Computing Outside The Box September 2009Computing Outside The Box September 2009
Computing Outside The Box September 2009
 
PostgreSQL as a Strategic Tool
PostgreSQL as a Strategic ToolPostgreSQL as a Strategic Tool
PostgreSQL as a Strategic Tool
 
mongodb tutorial
mongodb tutorialmongodb tutorial
mongodb tutorial
 
Managing 100s of PetaBytes of data in Cloud
Managing 100s of PetaBytes of data in CloudManaging 100s of PetaBytes of data in Cloud
Managing 100s of PetaBytes of data in Cloud
 
Implementing data and databases on K8s within the Dutch government
Implementing data and databases on K8s within the Dutch governmentImplementing data and databases on K8s within the Dutch government
Implementing data and databases on K8s within the Dutch government
 
MongoDB Sharding Webinar 2014
MongoDB Sharding Webinar 2014MongoDB Sharding Webinar 2014
MongoDB Sharding Webinar 2014
 
GPU cloud with Job scheduler and Container
GPU cloud with Job scheduler and ContainerGPU cloud with Job scheduler and Container
GPU cloud with Job scheduler and Container
 
Taboola's experience with Apache Spark (presentation @ Reversim 2014)
Taboola's experience with Apache Spark (presentation @ Reversim 2014)Taboola's experience with Apache Spark (presentation @ Reversim 2014)
Taboola's experience with Apache Spark (presentation @ Reversim 2014)
 
Sql server tips from the field
Sql server tips from the fieldSql server tips from the field
Sql server tips from the field
 
Gp Introduction 200811
Gp Introduction 200811Gp Introduction 200811
Gp Introduction 200811
 
Dataiku - hadoop ecosystem - @Epitech Paris - janvier 2014
Dataiku  - hadoop ecosystem - @Epitech Paris - janvier 2014Dataiku  - hadoop ecosystem - @Epitech Paris - janvier 2014
Dataiku - hadoop ecosystem - @Epitech Paris - janvier 2014
 
Greenplum Architecture
Greenplum ArchitectureGreenplum Architecture
Greenplum Architecture
 
Spark Streaming and IoT by Mike Freedman
Spark Streaming and IoT by Mike FreedmanSpark Streaming and IoT by Mike Freedman
Spark Streaming and IoT by Mike Freedman
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Big data computing overview