Upcoming Events


Optimizing Apache Iceberg Performance
Join us for a practical, fast-paced session on improving query performance across your data lakehouse. While we focus on Apache Iceberg, the techniques apply broadly to Delta Lake and Apache Hive as well.
From Trino to Starburst: The Architecture & Performance Advantages Explained
In this session, we’ll walk through the architectural differences that matter most when teams move from open-source Trino to Starburst. You will see how Starburst improves performance, strengthens security and governance, expands connectivity, and simplifies day-to-day operations. Additionally, you will understand how AI services and features can be configured and governed just like data sources.
From AI Experiments to Enterprise Outcomes
In this session, Andrew Brust (Blue Badge Insights) and Matt Fuller (Starburst) outline what it takes to move from AI experimentation to production-grade, enterprise-ready AI systems. They examine the architectural, semantic, and governance foundations required to make AI trustworthy, observable, and aligned with business intent.
Starburst Office Hours: Connect Once, Query Everywhere
Join Starburst expert Lester Martin for a fast, practical Office Hours session on how to create a single point of access to all your data, across clouds, regions, and on-prem systems, without moving or copying anything.
Hands‑On with Apache Iceberg: Build, Evolve, Operate
Get hands-on with Apache Iceberg in this introductory workshop. We’ll cover the full table lifecycle, from creating your first Iceberg table to managing snapshots, performing rollbacks, and running compactions to improve performance.
Office Hours: Lock It Down. Secure Data Access with ABAC, RBAC, and Fine‑Grained Controls
In a fast, 20‑minute demo, we’ll cover:
- Access control models in practice: ABAC, RBAC, and tag‑based policies (when to use which)
- Row‑level filtering (RLS) to restrict records by user or group attributes
- Column masking and redaction for PII/PHI with dynamic conditions
We’ll wrap with an open Q&A. Bring your questions about securing data access end‑to‑end and operationalizing least‑privilege at scale.
