Remove Architecture Remove Authentication Remove Open Source Remove Storage
article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

Hadoop offers petabytes of data storage and can handle multiple workloads. Combined with Cloudera technology, it becomes a secure and powerful enterprise architecture. Authentication is addressed for the perimeter security requirements. Authentication is addressed for the perimeter security requirements.

Big Data 150
article thumbnail

Cloudera Strengthens Hadoop Security with Acquisition of Gazzang: Builds on additional community efforts to deliver end-to-end security offering

CTOvision

Later, more and more security related capabilities were added, including better access control, authentication, auditing, and data provenance. Cloudera is continuing to invest broadly in the open source community to support and accelerate security features into project Rhino—an open source effort founded by Intel in early 2013.

Security 272
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 155

Scott Lowe

Isovalent—the company behind the Cilium project—has been talking a lot about how the use of eBPF will transform things, including the architecture of a service mesh. Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. Kubernetes 1.24 Virtualization.

article thumbnail

Is Cloud Interoperability a Myth?

Cloud Musings

Knowing this, the Openstack Interop Challenge looks toward cultivating success by leveraging the open source cloud technology as a common integration layer. Participants include AT&T, Canonical, Cisco, DreamHost, Deutsche Telekom, Fujitsu, HPE, Huawei, IBM, Intel, Linaro, Mirantis, OSIC, OVH, Rackspace, Red Hat, SUSE and VMware.

Cloud 107
article thumbnail

15 must-try open source BI software for enhanced data insights

Dataconomy

Open source business intelligence software is a game-changer in the world of data analysis and decision-making. With open source BI software, businesses no longer need to rely on expensive proprietary software solutions that can be inflexible and difficult to integrate with existing systems.

article thumbnail

IDF 2013: Enhancing OpenStack with Intel Technologies

Scott Lowe

Bhandaru takes over to provide an overview of the OpenStack architecture. Gopal now takes over and moves the discussion into storage in OpenStack. By granting greater intelligence to how volumes are allocated, cloud service providers can offer differentiated (read: premium priced) services for block storage.

Intel 60
article thumbnail

Technology Short Take 124

Scott Lowe

Colleague and teammate Eric Shanks takes readers through what’s necessary to do Active Directory authentication for Kubernetes clusters. Side note: you’ll probably start seeing more Pure Storage-focused content from Jase moving forward.). Chip Zoller makes the argument in favor of running Kubernetes in/on virtual machines.

Linux 60