Remove .Net Remove Authentication Remove Big Data Remove Enterprise
article thumbnail

How the C-Suite Can Champion Sustainability Across the Enterprise

CIO Business Intelligence

Becoming a sustainable enterprise is no longer a “nice to have” priority – reducing a company’s carbon footprint and fighting climate change is now mainstream. Adopting a sustainable model mindset across the enterprise fosters an environment for collaboration, innovation, and entrepreneurship.

article thumbnail

Cloudera Strengthens Hadoop Security with Acquisition of Gazzang: Builds on additional community efforts to deliver end-to-end security offering

CTOvision

Later, more and more security related capabilities were added, including better access control, authentication, auditing, and data provenance. Many players delivered niche solutions for encrypting data, but not so long ago most solutions I saw introduced new weaknesses for each solution. Terms of the deal were not disclosed.

Security 272
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cloud Musings by Kevin L. Jackson: IBM Debate Series - What's.

Cloud Musings

Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. Next week I will be participating in the inaugural session of What’s Next in IT Debate Series , a new program of authentic debates and conversations on key technology topics. GovCloud Daily.

IBM 107
article thumbnail

You want me to do what?!? A mobile strategy challenge!

A Screw's Loose

I recently gave a presentation at the Consumerization of IT in the Enterprise conference in San Francisco. I spent the whole presentation on Securing the Mobile Enterprise building up to the the fact that most businesses were approaching mobile strategy using legacy thinking and now was the time to get out of the habit.

Mobile 78
article thumbnail

Fountainhead: The End of the Laptop-Centric World?

Fountainhead

All a user needs is a client device (laptop, iPad, smartphone) and a secure authentication mechanism. Each time the device is connected to the net, the sandboxed OS (and its apps) would synchronize with her clients IT department. Big Data. (6). Data Center efficiency. (1). Data Center Design. Syndications.