Upcoming Events

January 27, 2026start: 5:00:00 PM

Optimizing Apache Iceberg Performance

Join us for a practical, fast-paced session on improving query performance across your data lakehouse. While we focus on Apache Iceberg, the techniques apply broadly to Delta Lake and Apache Hive as well.

February 3, 2026start: 5:00:00 PM

From Trino to Starburst: The Architecture & Performance Advantages Explained

In this session, we’ll walk through the architectural differences that matter most when teams move from open-source Trino to Starburst. You will see how Starburst improves performance, strengthens security and governance, expands connectivity, and simplifies day-to-day operations. Additionally, you will understand how AI services and features can be configured and governed just like data sources.

February 4, 2026start: 5:00:00 PM

From AI Experiments to Enterprise Outcomes

In this session, Andrew Brust (Blue Badge Insights) and Matt Fuller (Starburst) outline what it takes to move from AI experimentation to production-grade, enterprise-ready AI systems. They examine the architectural, semantic, and governance foundations required to make AI trustworthy, observable, and aligned with business intent.

February 12, 2026start: 5:00:00 PM

Starburst Office Hours: Connect Once, Query Everywhere

Join Starburst expert Lester Martin for a fast, practical Office Hours session on how to create a single point of access to all your data, across clouds, regions, and on-prem systems, without moving or copying anything.

February 19, 2026start: 5:00:00 PM

Hands‑On with Apache Iceberg: Build, Evolve, Operate

Get hands-on with Apache Iceberg in this introductory workshop. We’ll cover the full table lifecycle, from creating your first Iceberg table to managing snapshots, performing rollbacks, and running compactions to improve performance.

March 5, 2026start: 5:00:00 PM

Office Hours: Lock It Down. Secure Data Access with ABAC, RBAC, and Fine‑Grained Controls

In a fast, 20‑minute demo, we’ll cover:

  • Access control models in practice: ABAC, RBAC, and tag‑based policies (when to use which)
  • Row‑level filtering (RLS) to restrict records by user or group attributes
  • Column masking and redaction for PII/PHI with dynamic conditions

We’ll wrap with an open Q&A. Bring your questions about securing data access end‑to‑end and operationalizing least‑privilege at scale.