Remove Applications Remove Authentication Remove CTO Remove Open Source
article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

Working for the office of the CTO, Eddie also provides security thought leadership and vision to the Cloudera product roadmap. Authentication is addressed for the perimeter security requirements. Active Directory and Kerberos are the authentication staples within the enterprise, allowing all users to be authenticated.

Big Data 150
article thumbnail

Cloudera Strengthens Hadoop Security with Acquisition of Gazzang: Builds on additional community efforts to deliver end-to-end security offering

CTOvision

Later, more and more security related capabilities were added, including better access control, authentication, auditing, and data provenance. Another very positive development was the application of engineering and security talent by an amazing firm named Gazzang.

Security 272
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Crypto-currencies and their promise for enterprise technology professionals

CTOvision

As advanced applications are developed that leverage the capabilities that make Bitcoin possible, enterprise technologists will be able to tap into new capabilities for security and functionality. It was invented by Satoshi Nakamoto, who published the invention in 2008 and released it as open source software in 2009.

article thumbnail

Two Reasons Why Apache Cassandra Is the Database for Real-Time Applications

CIO Business Intelligence

There are many statistics that link business success to application speed and responsiveness. The time that it takes for a database to receive a request, process the transaction, and return a response to an app can be a real detriment to an application’s success. By Aaron Ploetz, Developer Advocate. Real-time data around the world.

article thumbnail

Everything You Know About eAuthentication is wrong!

CTOvision

On Labor Day, September 5 th 2016, NIST published their Digital Authentication Guideline: Public Preview. The base document SP 800-63-3 is the third iteration of this special publication, and has been renamed to: Digital Authentication Guideline. SP 800-63B – Authentication & Lifecycle Management. Nathaniel Crocker.

article thumbnail

HashiConf 2017 Day 1 Keynote

Scott Lowe

After a couple minutes, he brings out Mitchell Hashimoto, Founder and co-CTO of HashiCorp, onto the stage. Hashimoto also discusses HashiCorp’s commitment to open source software and the desire to properly balance commercial (paid) products versus free (open source) projects.

article thumbnail

DockerCon 2017 Day 1 Keynote

Scott Lowe

Shifting gears a bit, Golub talks a bit more about the changes over the last 3 years in regards to Docker (the open source project) itself. After a “sacrifice to the demo gods,” Golub brings Solomon Hykes , CTO and founder of Docker, Inc., Hykes re-takes the stage, and open sources LinuxKit live on the stage.

Linux 60