Главная
Study mode:
on
1
Intro
2
Bloomberg By the Numbers
3
Handling Material
4
Properties of Radioactive Materials
5
Properties of Data
6
Nuclear Material (non) Proliferation
7
Data Material Proliferation
8
Clean-Up Is Messy
9
Hadoop Cluster
10
Lock Everything Down
11
DropboxFilter for HDFS WebHDFS API
12
DropboxFilter for HDFS (Architecture)
13
DropboxFilter for HDFS (Examples)
14
Plutonium Enclave
15
Data Enclave
16
Isolation Glovebox
17
Glovebox Production Line
18
Data Glovebox (Leaded Pane of Glass)
19
Data Glovebox (Glove Ports & Robotics)
20
Data Glovebox (Pass-Through)
21
Firewalls (Workload and User Isolation)
22
Take out the Trash
23
Private Temporary Directories
24
Keeping the Pipes Flowing
25
YARN Network Isolation (Example)
26
Firewalls Are Important
Description:
Explore the intriguing parallels between Cold War era nuclear isolation techniques and modern data science security in this thought-provoking conference talk. Discover how the concept of nuclear gloveboxes can be applied to protect sensitive data in today's digital landscape. Learn about innovative approaches like Data Dropboxes and Data Gloveboxes, designed to limit data exfiltration and ensure secure, regularized data production. Delve into the philosophy and implementation of these security measures, including blind data input with checksum verification and controlled data manipulation processes. Gain insights into topics such as Hadoop cluster security, HDFS WebHDFS API filtering, isolation techniques, and the importance of firewalls in maintaining data integrity. Understand how these concepts can be applied to create secure environments for data scientists working with highly sensitive information, mirroring the precautions taken by nuclear engineers during the Cold War.

Of Data Dropboxes and Data Gloveboxes

Strange Loop Conference
Add to list
0:00 / 0:00