We're happy to announce our July meetup. This time, we'll be the guests of Avira. We're looking forward to two interesting talks involving Hadoop, Couchbase, Flume and authentication and hope to see you all on July 17th!
• Calin Burloiu, Couchdoop
• Corneliu Balaban, Soft Authentication
1.) Couchdoop by Calin Burloiu
Couchdoop is a Hadoop connector for Couchbase which is able import, export and update data. The connector can be used both as a command line tool, which works with CSV files from HDFS, and as a library for MapReduce jobs, for more flexibility. The library provides a Hadoop InputFormat which is able to read data from Couchbase by querying a view and an OutputFormat which can store in Couchbase key-value pairs read from any Hadoop source. The OutputFormat also allows other useful operations like deleting, counting or changing the expiry of some documents. Couchdoop can be used to update some existing Couchbase documents by using data from other Hadoop sources. Imagine a recommendation system which stores item scores in Couchbase documents. After rerunning a machine learning algorithm over user events data from Hadoop the scores from Couchbase can be updated directly. Couchdoop aims to be a better alternative for the official Couchbase Sqoop connector which is only able to import a full bucket or to stream documents for a configurable amount of time.
2.) Soft Authentication by Corneliu Balaban
Soft Authentication is a backend application that authenticates and manages a company’s users, the products and devices they are using while offering complete anonymity and privacy for them by using complete anonymous tokens and id's in relationship with any of the company’s products. Using Java, a NoSQL database, Flume and Hadoop for persisting the user data we are able not only to very quickly authenticate the users or create user profiles but in the same time to identify the devices that they are using our products on in order to deliver them maximum security. SAUTH supports thousands of operations per second and provides maximum flexibility for enriching and serving customer profiles (due to a schemaless database) directly from it’s in memory database to a company’s products. The same application is able to make user -2- device (any type of device) mapping at runtime using a probability pattern or determine whether an unregistered user is actually a registered one regardless of the device he is logging in. If a customer removes a certain product from a mobile device but reinstalls it several days or months after, SAUTH will be able to determine to what userid it should associate the device (what user to authenticate on that device) provided that it is not provided otherwise.
Avira is sponsoring the event with location, drinks & food.