Remove Architecture Remove Authentication Remove Industry Remove Systems Administration
article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

As the VP of InfoSec and Engineering for Gazzang prior to its acquisition by Cloudera, Eddie architected and implemented secure and compliant Big Data infrastructures for customers in the financial services, healthcare and public sector industries to meet PCI, HIPAA, FERPA, FISMA and EU data security requirements.

Big Data 150
article thumbnail

Can you trust your computer?

Dataconomy

This key is typically generated during chip manufacturing and plays a central role in ensuring the authenticity of the system Secure input/output (InO) : Secure Input/Output mechanisms, also known as InO, ensure that data interactions between the computer and external sources are secure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

But they constrain architectural choices to ensure that the universal identity metasystem is not just usable, but also safe and secure. Messaging —the architecture must support messaging between the parties to those relationships. Relationships are created using a system of peer-to-peer agents in Layer 2.

Internet 102
article thumbnail

Can the Digital Future Be Our Home?

Phil Windley

And yet those systems are not ours, but rather belong to the companies that provide them. I call these systems "administrative" because they are built to administer our experience in a particular domain for the administrator's specific purposes. Not altogether unpleasant, but a far cry from authentic.