addressalign-toparrow-leftarrow-rightbackbellblockcalendarcameraccwcheckchevron-downchevron-leftchevron-rightchevron-small-downchevron-small-leftchevron-small-rightchevron-small-upchevron-upcircle-with-checkcircle-with-crosscircle-with-pluscontroller-playcrossdots-three-verticaleditemptyheartexporteye-with-lineeyefacebookfolderfullheartglobegmailgooglegroupshelp-with-circleimageimagesinstagramFill 1light-bulblinklocation-pinm-swarmSearchmailmessagesminusmoremuplabelShape 3 + Rectangle 1ShapeoutlookpersonJoin Group on CardStartprice-ribbonprintShapeShapeShapeShapeImported LayersImported LayersImported Layersshieldstartickettrashtriangle-downtriangle-uptwitteruserwarningyahoo

Couchdoop and other consumer use cases from the Hadoop ecosystem

We're happy to announce our July meetup. This time, we'll be the guests of Avira. We're looking forward to two interesting talks involving Hadoop, Couchbase, Flume and authentication and hope to see you all on July 17th!

The talks: 

• Calin Burloiu, Couchdoop

• Corneliu Balaban, Soft Authentication


1.) Couchdoop by Calin Burloiu

Couchdoop is a Hadoop connector for Couchbase which is able import, export and update data. The connector can be used both as a command line tool, which works with CSV files from HDFS, and as a library for MapReduce jobs, for more  flexibility. The library provides a Hadoop InputFormat which is able to read data from Couchbase by querying a view and an OutputFormat which can store in Couchbase  key-value pairs read from any Hadoop source. The OutputFormat also allows other useful operations like deleting, counting or changing the expiry of some  documents. Couchdoop can be used to update some existing Couchbase documents by using data from other Hadoop sources. Imagine a recommendation system which stores item scores in Couchbase documents. After rerunning a machine learning algorithm over user events data from Hadoop the scores from Couchbase can be updated directly. Couchdoop aims to be a better alternative for the official Couchbase Sqoop connector which is only able to import a full bucket or to stream documents for a configurable amount of time. 

2.) Soft Authentication by Corneliu Balaban

Soft Authentication is a backend application that authenticates and manages a company’s users, the products and devices they are using while offering complete anonymity and privacy for them by using complete anonymous tokens and id's in relationship with any of the company’s products. Using Java, a NoSQL database, Flume and Hadoop for persisting the user data we are able not only to very quickly authenticate the users or create user profiles but in the same time to identify the devices that they are using our products on in order to deliver them maximum security. SAUTH supports thousands of operations per second and provides maximum flexibility for enriching and serving customer profiles (due to a schemaless database) directly from it’s in memory database to a company’s products. The same application is able to make user -2- device (any type of device) mapping at runtime using a probability pattern or determine whether an unregistered user is actually a registered one regardless of the device he is logging in. If a customer removes a certain product from a mobile device but reinstalls it several days or months after, SAUTH will be able to determine to what userid it should associate the device (what user to authenticate on that device) provided that it is not provided otherwise.

Avira is sponsoring the event with location, drinks & food.

Join or login to comment.

  • Jason R.

    Thanks to you and everyone for joining us at the event tonight. Really enjoyed the discussions.

    2 · July 17, 2014

  • Franz G.

    Hey guys thanks for the event. Catering was really really cool.
    But of course also thanks for the discussions

    5 · July 17, 2014

Our Sponsors

People in this
Meetup are also in:

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy