-
Iceberg best practices – security and compliance
In this video, Apache Iceberg co-creator Daniel Weeks covers best practices for implementing security, data privacy and regulatory compliance when…
-
Make Spark secure (RBAC)
This step-by-step demo will show you how to set up role-based access controls in Tabular to secure Spark access to…
-
Members and roles (RBAC)
This interactive demo will show you how to use members and roles in Tabular to secure data cross multiple compute…
-
Cascading privileges (RBAC)
This stepwise walkthrough shows you how to use cascading privileges to set up multiple tiers of roles for RBAC in…
-
Securing the Data Lake – Part III
Categories: OpinionThe growing need for a secure data lake We’re experiencing two powerful business trends that seem at odds with each…
-
Securing the Data Lake – Part II
Categories: OpinionMotivation Seemingly every day, more people across the business are using more data in more ways to deliver value. At…
-
Securing the Data Lake – Part I
Categories: OpinionMotivation Seemingly every day, more people across the business are using more data in more ways to deliver value. At…