Remove Architecture Remove Authentication Remove Load Balancer Remove Operating Systems
article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

CCA prerequisites Large organizations usually govern their IT portfolio via global architectural patterns, which can be thought of as building blocks, and include IT security patterns. In practice, IT architectural patterns give architects the building blocks to design any IT solution.

Financial 106
article thumbnail

Technology Short Take 102

Scott Lowe

Bernd Malmqvist talks about Avi Networks’ software-defined load balancing solution, including providing an overview of how to use Vagrant to test it yourself. Chris Hein shows how to use the Heptio Authenticator with kops to link Kubernetes cluster authentication to AWS IAM. Operating Systems/Applications.

article thumbnail

Technology Short Take #25

Scott Lowe

I came across this post on CloudFoundry’s User Account and Authentication Service (the UAA). This is an awesome overview of the OpenStack Folsom architecture , courtesy of Ken Pepple. Operating Systems/Applications. If you’re seeking more information on UAA, this looks like a good place to start.

Storage 92