Remove Architecture Remove Authentication Remove Intel Remove Open Source
article thumbnail

Cloudera Strengthens Hadoop Security with Acquisition of Gazzang: Builds on additional community efforts to deliver end-to-end security offering

CTOvision

Later, more and more security related capabilities were added, including better access control, authentication, auditing, and data provenance. The news below is the product of many of these factors plus the vision and leadership of very smart people at Gazzang, Intel and Cloudera. Then some very positive things started happening.

Security 272
article thumbnail

IDF 2013: Enhancing OpenStack with Intel Technologies

Scott Lowe

This is a liveblog of Intel Developer Forum (IDF) 2013 session EDCS003, titled “Enhancing OpenStack with Intel Technologies for Public, Private, and Hybrid Cloud.” ” The presenters are Girish Gopal and Malini Bhandaru, both with Intel. Bhandaru takes over to provide an overview of the OpenStack architecture.

Intel 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

Combined with Cloudera technology, it becomes a secure and powerful enterprise architecture. Authentication is addressed for the perimeter security requirements. Active Directory and Kerberos are the authentication staples within the enterprise, allowing all users to be authenticated. Learn More about Cloudera here.

Big Data 150
article thumbnail

Is Cloud Interoperability a Myth?

Cloud Musings

Knowing this, the Openstack Interop Challenge looks toward cultivating success by leveraging the open source cloud technology as a common integration layer. Participants include AT&T, Canonical, Cisco, DreamHost, Deutsche Telekom, Fujitsu, HPE, Huawei, IBM, Intel, Linaro, Mirantis, OSIC, OVH, Rackspace, Red Hat, SUSE and VMware.

Cloud 107
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.

article thumbnail

Exploring the most efficient blockchain technology

Dataconomy

Additionally, Ethereum has an active developer community, coordinated by the Enterprise Ethereum Alliance, which boasts over 250 members including Intel, JPMorgan, and Microsoft. The framework offers a robust ecosystem of components that can be seamlessly integrated into a modular architecture. How to become a blockchain maestro?

Network 59