SAS Users
Providing technical tips and support information, written for and by SAS users.
So, with the simple introduction in Understanding Hadoop security, configuring Kerberos with Hadoop alone looks relatively straightforward. Your Hadoop environment sits in isolation within a separate, independent Kerberos realm with its own Kerberos Key Distribution Center. End users can happily type commands as they log into a machine hosting the
Last year, after 15 years of benefiting from the SAS community, I thought it was time to give a little something back. So I decided to write a paper on two technologies I have a healthy interest in: SAS and Hadoop. My paper SASReduce: an implementation of MapReduce using BASE/SAS
If you live in an English speaking country you are used to a relatively unadorned alphabet. Take a look at the French and Spanish languages, where vowels are decorated with accents like “acción” in Spanish, and the circumflex, or the hat used in “pâte” in French. Look at the gorgeous
A challenge for you – do a Google search for “Hadoop Security” and see what types of results you get. You’ll find a number of vendor-specific pages talking about a range of projects and products attempting to address the issue of Hadoop security. What you’ll soon learn is that security
Let's get one thing straight: I'm no wuss. Well, at least *I* don't think so. But on September 3-5, 2014, I gladly joined ranks with over 400 WUSSes descending on the Fairmont Hotel in downtown San Jose for the Western Users of SAS Software (WUSS) Educational Forum and Conference. It
Scalability is the key objective of high-performance software solutions. “Scaling out” is a concept which is accomplished by throwing more server machines at a solution so that multiple processes can run in dedicated environments concurrently. This blog post will briefly touch on several scalability concepts that affect SAS.