SlideShare a Scribd company logo
Tales from fire depot:
how to do BigData and survive
About me:
●
Denis Pyshev, Twitter: @gemelen
●
Senior Software Engineer, Sigma Software
●
Software development in general, FinTech, AdTech, 8+ years
●
Data Platform / Datawarehouse team, Verizon Media Group
(Oath/AoL+Yahoo), 3+ years
●
Lviv Scala User Group
Team challenges
●
Know (and trust) your team
●
Do not throw bus factor under the bus
●
Beware of your platform
●
Learn your product
●
Secure your stuff
Know (and trust) your team
●
Your team members are not code monkeys (I hope so)
●
They could know better
●
At least try to listen to them
●
Let your engineers make things they would like (it will save money too)
Know (and trust) your team: case of GDPR
Do not throw bus factor under the bus
●
People go to vacation from time to time (do they?)
●
Shit happens, no exceptions
●
Shit would probably happen when person in charge is out of town
Do not throw bus factor under the bus:
laptop stays home
Beware of your platform
●
Collect platform knowledge
●
Experiment and share results (at least within the team)
●
Check if default values are viable in your setup
Beware of your platform: case of compression
Learn your product
●
Domain knowledge does worth to get
●
Collected data is worthless without its consumption
●
Your product doesn’t fly in free space: monitor ins and outs
●
Create your own monitoring tools on top of monitoring services
●
We did so: check github.com/verizonAdPlatforms/bandar-log
Learn your product: case of [object Object]
Secure your stuff
●
Never ever store any credentials in repositories, no matter how private
they are – someday they would leak
●
“The response to the credentials leakage was absolutely overwhelming
for us. Within less than one-minute foreign parties tried to take advantage
of the leaked credentials. Within the 6 minutes in which the credentials
were valid we received connections from different Anonymizing Networks
and from China.” - ict.swisscom.ch
●
Use infosec/devops techniques to separate code, configuration and
credentials
●
Use 2FA
Secure your stuff
Q&A

More Related Content

PDF
Understanding and implementing website security
PDF
My Bug Hunting With Open Source
PDF
Fun & profit with bug bounties
PDF
What Goes In Must Come Out: Egress-Assess and Data Exfiltration
PPTX
Hogy néz ki egy pentest meló a gyakorlatban?
PDF
EMFcamp2022 - What if apps logged into you, instead of you logging into apps?
PDF
What is being exposed from IoT Devices
PDF
CodeMotion tel aviv 2015 - burning marshmallows
Understanding and implementing website security
My Bug Hunting With Open Source
Fun & profit with bug bounties
What Goes In Must Come Out: Egress-Assess and Data Exfiltration
Hogy néz ki egy pentest meló a gyakorlatban?
EMFcamp2022 - What if apps logged into you, instead of you logging into apps?
What is being exposed from IoT Devices
CodeMotion tel aviv 2015 - burning marshmallows

Similar to Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв, (20)

PDF
Make it Fixable (Security Divas 2017)
PPTX
Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...
PDF
Pentester++
PDF
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
PDF
Hacking for fun & profit - The Kubernetes Way - Demi Ben-Ari - Panorays
ODP
Wordpress Plugins Scanner
PPTX
GreyNoise - Lowering Signal To Noise
PDF
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)
PDF
Web Security: What's wrong, and how the bad guys can break your website
PDF
The Risks of YOLOing-2.pdf
PDF
IT security for all. Bootcamp slides
PDF
The Final Frontier, Automating Dynamic Security Testing
PDF
Dev Ops & Secops & Bears, oh my!
PPTX
Pen Testing Development
PDF
Omar Benbouazza | Bugbounty Programs | Codemotion Madrid 2018
PDF
Introducing IoT Crusher (Open Source Version)
PPTX
Keynote at the Cyber Security Summit Prague 2015
PPTX
Hacktoberfest'24 _ GDG on Campus BU.pptx
PDF
Monitoring Big Data Systems - "The Simple Way"
PPTX
"Introduction to Bug Hunting", Yasser Ali
Make it Fixable (Security Divas 2017)
Hacker vs company, Cloud Cyber Security Automated with Kubernetes - Demi Ben-...
Pentester++
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
Hacking for fun & profit - The Kubernetes Way - Demi Ben-Ari - Panorays
Wordpress Plugins Scanner
GreyNoise - Lowering Signal To Noise
BYOD Revisited: Build Your Own Device (Embedded Linux Conference 2014)
Web Security: What's wrong, and how the bad guys can break your website
The Risks of YOLOing-2.pdf
IT security for all. Bootcamp slides
The Final Frontier, Automating Dynamic Security Testing
Dev Ops & Secops & Bears, oh my!
Pen Testing Development
Omar Benbouazza | Bugbounty Programs | Codemotion Madrid 2018
Introducing IoT Crusher (Open Source Version)
Keynote at the Cyber Security Summit Prague 2015
Hacktoberfest'24 _ GDG on Campus BU.pptx
Monitoring Big Data Systems - "The Simple Way"
"Introduction to Bug Hunting", Yasser Ali
Ad

More from Sigma Software (20)

PPTX
Fast is Best. Using .NET MinimalAPIs
PPTX
"Are you developing or declining? Don't become an IT-dinosaur"
PPTX
Michael Smolin, "Decrypting customer's cultural code"
PPTX
Max Kunytsia, “Why is continuous product discovery better than continuous del...
PPTX
Marcelino Moreno, "Product Management Mindset"
PDF
Andrii Pastushok, "Product Discovery in Outsourcing - What, When, and How"
PPTX
Elena Turkenych “BA vs PM: Who' the right person, for the right job, with the...
PPTX
Eleonora Budanova “BA+PM+DEV team: how to build the synergy”
PPTX
Stoyan Atanasov “How crucial is the BA role in an IT Project"
PPTX
Olexandra Kovalyova, "Equivalence Partitioning, Boundary Values ​​Analysis, C...
PPTX
Yana Lysa — "Decision Tables, State-Transition testing, Pairwase Testing"
PPTX
VOLVO x HACK SPRINT
PPTX
Business digitalization trends and challenges
PPTX
Дмитро Терещенко, "How to secure your application with Secure SDLC"
PPTX
Яна Лиса, “Ефективні методи написання хороших мануальних тестових сценаріїв”
PDF
Тетяна Осетрова, “Модель зрілості розподіленної проектної команди”
PDF
Training solutions and content creation
PDF
False news - false truth: tips & tricks how to avoid them
PPTX
Анна Бойко, "Хороший контракт vs очікування клієнтів. Що вбереже вас, якщо вд...
PPTX
Дмитрий Лапшин, "The importance of TEX and Internal Quality. How explain and ...
Fast is Best. Using .NET MinimalAPIs
"Are you developing or declining? Don't become an IT-dinosaur"
Michael Smolin, "Decrypting customer's cultural code"
Max Kunytsia, “Why is continuous product discovery better than continuous del...
Marcelino Moreno, "Product Management Mindset"
Andrii Pastushok, "Product Discovery in Outsourcing - What, When, and How"
Elena Turkenych “BA vs PM: Who' the right person, for the right job, with the...
Eleonora Budanova “BA+PM+DEV team: how to build the synergy”
Stoyan Atanasov “How crucial is the BA role in an IT Project"
Olexandra Kovalyova, "Equivalence Partitioning, Boundary Values ​​Analysis, C...
Yana Lysa — "Decision Tables, State-Transition testing, Pairwase Testing"
VOLVO x HACK SPRINT
Business digitalization trends and challenges
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Яна Лиса, “Ефективні методи написання хороших мануальних тестових сценаріїв”
Тетяна Осетрова, “Модель зрілості розподіленної проектної команди”
Training solutions and content creation
False news - false truth: tips & tricks how to avoid them
Анна Бойко, "Хороший контракт vs очікування клієнтів. Що вбереже вас, якщо вд...
Дмитрий Лапшин, "The importance of TEX and Internal Quality. How explain and ...
Ad

Recently uploaded (20)

PPTX
Modernising the Digital Integration Hub
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
August Patch Tuesday
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
Hybrid model detection and classification of lung cancer
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Architecture types and enterprise applications.pdf
PDF
project resource management chapter-09.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPT
What is a Computer? Input Devices /output devices
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
Modernising the Digital Integration Hub
Enhancing emotion recognition model for a student engagement use case through...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
August Patch Tuesday
O2C Customer Invoices to Receipt V15A.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Web App vs Mobile App What Should You Build First.pdf
STKI Israel Market Study 2025 version august
Hybrid model detection and classification of lung cancer
Module 1.ppt Iot fundamentals and Architecture
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Getting started with AI Agents and Multi-Agent Systems
Architecture types and enterprise applications.pdf
project resource management chapter-09.pdf
A comparative study of natural language inference in Swahili using monolingua...
What is a Computer? Input Devices /output devices
TLE Review Electricity (Electricity).pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf

Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,

  • 1. Tales from fire depot: how to do BigData and survive
  • 2. About me: ● Denis Pyshev, Twitter: @gemelen ● Senior Software Engineer, Sigma Software ● Software development in general, FinTech, AdTech, 8+ years ● Data Platform / Datawarehouse team, Verizon Media Group (Oath/AoL+Yahoo), 3+ years ● Lviv Scala User Group
  • 3. Team challenges ● Know (and trust) your team ● Do not throw bus factor under the bus ● Beware of your platform ● Learn your product ● Secure your stuff
  • 4. Know (and trust) your team ● Your team members are not code monkeys (I hope so) ● They could know better ● At least try to listen to them ● Let your engineers make things they would like (it will save money too)
  • 5. Know (and trust) your team: case of GDPR
  • 6. Do not throw bus factor under the bus ● People go to vacation from time to time (do they?) ● Shit happens, no exceptions ● Shit would probably happen when person in charge is out of town
  • 7. Do not throw bus factor under the bus: laptop stays home
  • 8. Beware of your platform ● Collect platform knowledge ● Experiment and share results (at least within the team) ● Check if default values are viable in your setup
  • 9. Beware of your platform: case of compression
  • 10. Learn your product ● Domain knowledge does worth to get ● Collected data is worthless without its consumption ● Your product doesn’t fly in free space: monitor ins and outs ● Create your own monitoring tools on top of monitoring services ● We did so: check github.com/verizonAdPlatforms/bandar-log
  • 11. Learn your product: case of [object Object]
  • 12. Secure your stuff ● Never ever store any credentials in repositories, no matter how private they are – someday they would leak ● “The response to the credentials leakage was absolutely overwhelming for us. Within less than one-minute foreign parties tried to take advantage of the leaked credentials. Within the 6 minutes in which the credentials were valid we received connections from different Anonymizing Networks and from China.” - ict.swisscom.ch ● Use infosec/devops techniques to separate code, configuration and credentials ● Use 2FA
  • 14. Q&A