mirko.peters@datascience.show

818Articles

Podcasts4 months ago

What’s the one system in your environment that, if compromised, would let an attacker own everything—logins, files, even emails? Yep, it’s Active Directory. Before we roll initiative, hit Subscribe so

Podcasts4 months ago

100:00:00,000 –> 00:00:04,560The system did not fail you. It executed precisely what you allowed to exist. 200:00:04,560 –> 00:00:10,720You treated identity as a modeling choice, a design detail, something you

Podcasts4 months ago

In this episode, we dive headfirst into one of the most quietly painful problems in modern data platforms: identity chaos. As organizations scale their analytics environments, especially within lakehouse architectures,

Podcasts4 months ago

Ah, automation. You push a button, it runs a script, and you get your shiny output. But here’s the twist—agents aren’t scripts. They *watch* you, plan their own steps, and

Join Us
  • X Network2.1K
  • LinkedIn3.8k
  • Bluesky0.5K
Support The Site
Events
May 2026
MTWTFSS
     1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
« Apr   Jun »
Follow
Search
Loading

Signing-in 3 seconds...

Signing-up 3 seconds...