Cloudera began in 2008 with an idea to help manage large amounts of data – probably why part of their tagline is, “empower people to transform complex data into clear and actionable insights.”
His company is well known for its hybrid open-source Apache Hadoop distribution.
Today’s interview takes a Silicon Valley founder and has him examine the $89 billion federal information technology spend to give his observations on improvement. This is a discussion that covers everything from open source and cybersecurity to machine intelligence.
Mike shows how the federal government should take advantage of open source to improve services to citizens as well as to capture, store, and process unimaginable amounts of information.
Very few people really consider the importance of our national emergency notification system. Emergency Notifications in the Cloud is a topic that many organizations are considering. The United States has 3,007 counties. Very few are interconnected with emergency communication. Today we have Don Hall from Onsolve talking about solutions to this issue. He has decades of experience in life and death situations — working in fire departments.
He combines this with a high degree of technical knowledge when it comes to local, state, and federal emergency notification systems.
'We are dealing with a company in China that does 100 million events a second in a search cluster' George Young from Elastic Click To Tweet
Here is a fun fact: when the Mars Rover sends data back to NASA, it sends it to a system based on Elastic. That is because of the search capability Elastic can provide. Well, if those rocket scientists can trust that kind of data to Elastic, then you may want to consider it as well. Many federal information technology professionals need new ways to understand big data. Elastic provides an open source solution that you can test drive for free.
Duo Security has worked with a wide range of organizations to improve federal authentication and security and reduce costs for administering authentication. During the interview, Sean Frazier differentiates among authentication methods like two-step verification, multi-factor authentication, and strong authentication. Sean gives an overview of how to manage authentication in a world where traditional methods like PIV may be limited.
Show NotesEpisode #547
Federal TechTalk with John Gilroy
Date: February 12,2019
Moderator: John Gilroy
Guest: Sean Frazier, DuoSecurity
Length: 40 minutes
Audio link: Federal Tech Talk with John Gilroy: #547
Thales eSecurity Federal commissioned a survey of federal information technology professionals to study Protecting Data on a Network. The goal was to gain a better understanding of protecting data on a network. The study is called the 2018 Thales Data Threat Report Federal Government Edition. The responses show that 70% of federal agencies have been breached. As far as timeliness, 57% have been breached in the past year. Nick Jovanovich details the ways that data can be protected in today’s porous environment.