BigData - FB Trino
FB - Trino (Presto) basic 背景及发展 特点 架构 Presto 服务进程 Presto 模型 Presto 查询执行模型 Presto/trino数据可视化查询 ...
FB - Trino (Presto) basic 背景及发展 特点 架构 Presto 服务进程 Presto 模型 Presto 查询执行模型 Presto/trino数据可视化查询 ...
Apache Spark basic 基本概念 Spark产生的背景:大数据问题 相关概念 计算模型 Hadoop与Spark的区别 RDD - Resilient Distributed Datasets basic ...
BigData - MongoDB Overview Compponent 数据库 Database 文档 Document 集合 collections capped collections 元数据 ...
BigData - MongoDB Projects Overview Beginners with Source Code for Practice Beginner Level: Develop a Football Statistics App Create a Project for P...
Apache Hadoop history basic Hadoop 核心 HDFS - Storage unit MapReduce YARN usages Apache Hadoop histo...
Batch basic Batch Processing vs Stream Processing user case Batch basic Batch Processing vs Stream Processing user ...
[toc] CVE Common Vulnerabilities and Exposures a program launched in 1999 by MITRE to identify and catalog vulnerabilities in software or firmware into a free “dictionary” for organization...
[toc] Vulnerability Management I. Foreword breaking down complex problems into more manageable repeatable parts: detection, reporting, and remediation. The guide solely focuses on b...
Secure Coding Review and Analysis benefits 5 Tips to a Better Secure Code Review Top 10 Secure Coding Practices Common Techniques Static Analysis ...
[toc] ref SaaS: Single Tenant vs Multi-Tenant - What’s the Difference? Saas Single Tenant A single instance of the software and supporting infrastructure serve...
[toc] SOA Patterns SOA, Service-Oriented Systems Business Services: core buniess operation Coarse-grained services that define core business operations. R...
[toc] CMM - Capability Maturity Model Integration Capability Maturity Model Integration (CMMI) a process level improvement training and appraisal program. Administered by the CMMI Institut...
[toc] Attack Surface Analysis ways of doing Attack Surface Analysis and managing an application’s Attack Surface Attack Surface Analysis: map out what parts of a system need to be reviewed ...
[toc] Security Orchestration Security Orchestration integrate a disparate ecosystem of SOC tools into a unified ecosystem dozens of cybersecurity security tools in place to preve...
[toc] Security Threat Models five aspects to security threat modeling: security assessment should broadly include two components: Security review: A collaborative process that includes i...