Completed
The end of cheap hardware
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Big Data in Cyber Security - Simon Arnell
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 The security operations challenge
- 3 Security operations research
- 4 Abuse case Botnet command and control
- 5 The scale of DNS data
- 6 Solution architecture: Overview
- 7 Screenshots of Big Data for Security - pre DMA
- 8 Service architecture
- 9 The end of cheap hardware
- 10 Making memory hierarchy obsolete
- 11 Customize the hardware to the workload
- 12 The Machine architecture
- 13 Concept: The Security Machine Scalable, reliable timely detection and remediation