Upload

Loading...

Big Data Episode 1 -- The Challenge

20,113

Loading...

Loading...

Transcript

The interactive transcript could not be loaded.

Loading...

Loading...

Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Uploaded on Dec 5, 2011

A challenge to build a data-intensive "SmartMall" application stumps a development team -- how to handle huge amounts of data -- by next week? Seriously?

Loading...

Data Protection

  1. 1

    Aligning privacy accountability with your business strategy

  2. 2

    Neelie Kroes delivers 2011 Guglielmo Marconi Lecture at the Lisbon Council

  3. 3

    New EU data protection law wins support

  4. 4

    Cloud Data Protection

  5. 5

    Update on the revised EU Data Protection Directive

  6. 6

    Complex EU Directives vs Best Practice - Derek Clark MEP

  7. 7

    The Future of the EU/US Safe Harbor Privacy Framework

  8. 8

    Julia Angwin, Wall Street Journal Senior Technology Editor

  9. 9

    Building Community around People

  10. 10

    eDiscovery Video Series: Big Matters

  11. 11

    Data Protection Day 2012

  12. 12

    Claire's email archiving - What If?

  13. 13

    What is Hadoop? Other big data terms like MapReduce? Cloudera's CEO talks us through big data trends

  14. Big Data Episode 1 -- The Challenge

  15. 15

    Cloud Computing: An Overview

  16. 16

    Toilet bij Cap Gemini

  17. 17

    John Brennan, Homeland Security and Counterterrorism adviser to President Obama, speaks at HLS

  18. 18

    Mathias Dobbelaere Patner at MyLex UK

  19. 19

    Fault Lines - Cyberwar

  20. 20

    Introduction to Hacking

  21. 21

    IBM Smarter Analytics Signature Solution - Customer Next Best Action

  22. 22

    Safe surfing, a journey from domain name to web site

  23. 23

    Cloud Computing - How it all works

  24. 24

    The Three Ways to Cloud Compute

  25. 25

    Steve about cloud computing in 1997

  26. 26

    Cloud Computing Explained

  27. 27

    Introduction to Cloud Computing

  28. 28

    Cloud Computing Explained

  29. 29

    What is cloud computing, and what part does Intel play?

  30. 30

    [Private video]

  31. 31

    European Cyber Security Month

  32. 32

    Compliance Game

  33. 33

    Neelie Kroes over breedband, cybercrime en privacy

  34. 34

    Dos and Don'ts when using social networks

  35. 35

    Social Engineering (Lesson 1) The Art of Deception

  36. 36

    Social Engineering scene from Hackers

  37. 37

    Kate Middleton Prank Leads to Suicide? Part #2

  38. 38

    JWTIntelligence - Going Private in Public

  39. 39

    Davos 2013 - An Insight, An Idea with Marissa Mayer

  40. 40

    Deloitte Tech Trends 2013

  41. 41

    Marissa Mayer on growing up in Wisconsin, getting hired at Google, and the origins of Adsense

  42. 42

    What is Privacy?

  43. 43

    Balancing Privacy, Autonomy, and Scientific Progress - Part 2

  44. 44

    Introduction to Security with Group Policy Objects and Organizational Units in Windows Server 2012

  45. 45

    Mobile Gadgets Top The List of 2012 Corporate Security Threats

  46. 46

    Bring your own computer: a tale of two interpretations

  47. 47

    What is Enterprise Information Security Management?

  48. 48

    Big Data, Part 3 of Peter Hinssen animations -CA Technologies

  49. 49

    How do I create a strategy to leverage cloud across the entire organization?

  50. 50

    A Facebook Update In Real Life

  51. 51

    Good-bye Twitter

  52. 52

    What is Cloud Computing?

  53. 53

    Phishing

  54. 54

    Amazing mind reader reveals his 'gift'

  55. 55

    [Private video]

  56. 56

    [Deleted video]

  57. 57

    Real-Life Big Brother: Secret NSA Data Centres And Global Surveillance

  58. 58

    sex on the internet, the realities of porn, sexual privacy,

  59. 59

    Kevin Mitnick CNBC Interview - Part 2

  60. 60

    Kevin Mitnick Shares Hacker Secrets

  61. 61

    In the Realm of the Hackers (Complete)

  62. 62

    CO212 Principles of Information Security

  63. 63

    Information security training for new employees.

  64. 64

    Dilbert Cartoon - Faulty Data

  65. 65

    Mooiste Chick van het Web

  66. 66

    SIEM: 5 Best Practices for Implementation Success

  67. 67

    Information Security—Before & After Public-Key Cryptography

  68. 68

    Top hacker shows us how it's done | Pablos Holman | TEDxMidwest

  69. 69

    From On-Premise to Cloud: Hybrid Data Protection - CA World 2011

  70. 70

    Can you master the art of cloud contract negotiation?

  71. 71

    CPDP 2012: eDiscovery Panel 1: Basic Principles of eDiscovery

  72. 72

    The Changing Role of the CISO: Interview with Bill Sieglein, CEO of CISO Executive Network at RSA

  73. 73

    Cloud Security Study Results: Larry Ponemon at the RSA Conference

  74. 74

    TEDxPSU - Bruce Schneier - Reconceptualizing Security

  75. 75

    What Islam says about Privacy - by Faraz Khan Part 1

  76. 76

    Bank Security

  77. 77

    Security Awareness 1 - Password Sharing

  78. 78

    Cyber Security Awareness Part 1 (2009 - 2010)

  79. 79

    Cyber Security Awareness Part 2 (2009 - 2010)

  80. 80

    Cyber Security

  81. 81

    SECURITY INFORMATION AND EVENT MANAGEMENT

  82. 82

    Third Party Vendor Risk Management

  83. 83

    Funny HIPAA Compliance Training!

  84. 84

    Information Security & HIPAA Compliance Services

  85. 85

    Juan Enriquez: Your online life, permanent as a tattoo

  86. 86

    Juan Enriquez: Your online life, permanent as a tattoo

  87. 87

    Matrix Compliance Video

  88. 88

    Phishing

  89. 89

    Privacy, Regulation, and the Internet (Exploring Liberty)

  90. 90

    Cyber Security and American Power

  91. 91

    The State of Cyber Security 2011 - Presented by Sophos and the National Cyber Security Alliance

  92. 92

    Prism event in Parliament

  93. 93

    Privacy & Security: The New HIPAA Rule

  94. 94

    How to gamify personal data (business) - Wolfie Christl at TEDxVienna

  95. 95

    The Raw and the Cooked: The Mythologies of Big Data - Kate Crawford - DataEDGE 2013

  96. 96

    Whose data is it anyway? Medical databases, privacy and trust

  97. 97

    A Conversation with FTC Commissioner Julie Brill

  98. 98

    EU-US: Enforcing the protection of personal data.mov

  99. 99

    Monitoring Internet activity at the office

  100. 100

    Onora O'Neill: What we don't understand about trust

  101. 101

    THEMIS: ICT- en Mediarecht

  102. 102

    The Battle for Power on the Internet: Bruce Schneier at TEDxCambridge 2013

  103. 103

    The Power of Metadata: Deepak Jagdish and Daniel Smilkov at TEDxCambridge 2013

  104. 104

    Alessandro Acquisti: Why privacy matters

  105. 105

    Inside NSA - The National Security Agency - Documentary

  106. 106

    The IT Companies Making Life Too Easy For Hackers

  107. 107

    Leahy Chairs Hearing on Use of Domestic Drones

  108. 108

    John McCain & Lindsey Graham Justifying The NDAA Bill

  109. 109

    2013: Dawning of the Drones | Think Tank

  110. 110

    Living in a surveillance state: Mikko Hypponen at TEDxBrussels

  111. 111

    Working in the Office of the Future

  112. 112

    Ogone Fraud Expert - Next generation fraudepreventie

  113. 113

    [Deleted video]

  114. 114

    [Deleted video]

  115. 115

    My vision for Europe: connected, open, secure.

  116. 116

    Van Peel overleeft 2013 - CANVAS HD - 1080i Part 1

  117. 117

    The Fourth Amendment Explained: US Government Review

  118. 118

    Dan Berkenstock: The world is one big dataset. Now, how to photograph it ...

  119. 119

    Handwriting offers clues to early Parkinson's detection

  120. 120

    Conclusions: What About Privacy and Progress in Whole Genome Sequencing

  121. 121

    Cyber Liability Insurance 101

  122. 122

    Insights: The Future of Cyber Security

  123. 123

    Amazon Wants To Ship You Packages Before You Order Them

  124. 124

    Accuracy Means Estimation: How to Mine Data Like a Pro

  125. 125

    L'identification biométrique a des progrès à faire - futuris

  126. 126

    CPDP2014: Timing The Right To Be Forgotten.

  127. 127

    CPDP2014: Data Protection Authorities: Their Role And Experience In EnForcement.

  128. 128

    De toekomststrategie van KBC. Commentaar van CEO Johan Thijs

  129. 129

    Last Week Tonight with John Oliver: Right To Be Forgotten (HBO)

  130. 130

    The Personal Data Economy - Simplicity on the Other Side of Complexity

  131. 131

    Glenn Greenwald: Why privacy matters

  132. 132

    Why Privacy Matters & Why You Should Care?!

  133. 133

    Why Privacy Matters

  134. 134

    [Deleted video]

  135. 135

    Data Protection... What you need to know

  136. 136

    [Private video]

  137. 137

    Google General Counsel Kent Walker Tells IAPP Crowd: "Protecting Privacy Is Tough"

  138. 138

    Commissioner Viviane Reding - Protecting privacy in the digital age

  139. 139

    Viviane Reding at Yale (1/3): "Friends do not spy on friends"

  140. 140

    EU Commissioner Vivian Reding on the new Data Protection Regulation

  141. 141

    DLDwomen13: Protection of Personal Data - A European Wake-up Call (Viviane Reding)

  142. 142

    Panorama - Privacy te koop

  143. 143

    Last Week Tonight with John Oliver: Government Surveillance (HBO)

  144. 144

    Last Week Tonight with John Oliver: Drones (HBO)

  145. 145

    Last Week Tonight With John Oliver - Edward Snowden Interview

  146. 146

    The creepy spying power buried in the Patriot Act

Sign in to add this to Watch Later

Add to