Upcoming Events


Starburst 101 Workshop - January 21
Join us for a 90-minute, hands-on Starburst 101 workshop led by Starburst experts. You’ll learn the fundamentals of how Starburst and Trino work together to enable modern data architectures. After a brief overview, you’ll dive into a live, instructor-led lab where you’ll build a federated data pipeline within a data lakehouse environment.
Optimizing Apache Iceberg Performance
Join us for a practical, fast-paced session on improving query performance across your data lakehouse. While we focus on Apache Iceberg, the techniques apply broadly to Delta Lake and Apache Hive as well.
From Trino to Starburst: The Architecture & Performance Advantages Explained
In this session, we’ll walk through the architectural differences that matter most when teams move from open-source Trino to Starburst. You will see how Starburst improves performance, strengthens security and governance, expands connectivity, and simplifies day-to-day operations. Additionally, you will understand how AI services and features can be configured and governed just like data sources.
Starburst Office Hours: Connect Once, Query Everywhere
Join Starburst expert Lester Martin for a fast, practical Office Hours session on how to create a single point of access to all your data, across clouds, regions, and on-prem systems, without moving or copying anything.
Hands‑On with Apache Iceberg: Build, Evolve, Operate
Get hands-on with Apache Iceberg in this introductory workshop. We’ll cover the full table lifecycle, from creating your first Iceberg table to managing snapshots, performing rollbacks, and running compactions to improve performance.
Office Hours: Lock It Down. Secure Data Access with ABAC, RBAC, and Fine‑Grained Controls
In a fast, 20‑minute demo, we’ll cover:
- Access control models in practice: ABAC, RBAC, and tag‑based policies (when to use which)
- Row‑level filtering (RLS) to restrict records by user or group attributes
- Column masking and redaction for PII/PHI with dynamic conditions
We’ll wrap with an open Q&A. Bring your questions about securing data access end‑to‑end and operationalizing least‑privilege at scale.
