Remove Authentication Remove CTO Remove Hardware Remove Open Source
article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

Working for the office of the CTO, Eddie also provides security thought leadership and vision to the Cloudera product roadmap. Authentication is addressed for the perimeter security requirements. Active Directory and Kerberos are the authentication staples within the enterprise, allowing all users to be authenticated.

Big Data 150
article thumbnail

Crypto-currencies and their promise for enterprise technology professionals

CTOvision

It was invented by Satoshi Nakamoto, who published the invention in 2008 and released it as open source software in 2009. The authenticity of each transaction is protected by digital signatures corresponding to the sending addresses, allowing all users to have full control over sending bitcoins from their own bitcoin addresses.

article thumbnail

DockerCon 2017 Day 1 Keynote

Scott Lowe

Shifting gears a bit, Golub talks a bit more about the changes over the last 3 years in regards to Docker (the open source project) itself. After a “sacrifice to the demo gods,” Golub brings Solomon Hykes , CTO and founder of Docker, Inc., Hykes re-takes the stage, and open sources LinuxKit live on the stage.

Linux 60