article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

Working for the office of the CTO, Eddie also provides security thought leadership and vision to the Cloudera product roadmap. Authentication is addressed for the perimeter security requirements. Active Directory and Kerberos are the authentication staples within the enterprise, allowing all users to be authenticated.

Big Data 150
article thumbnail

Cloudera Strengthens Hadoop Security with Acquisition of Gazzang: Builds on additional community efforts to deliver end-to-end security offering

CTOvision

Later, more and more security related capabilities were added, including better access control, authentication, auditing, and data provenance. Cloudera is continuing to invest broadly in the open source community to support and accelerate security features into project Rhino—an open source effort founded by Intel in early 2013.

Security 272
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Crypto-currencies and their promise for enterprise technology professionals

CTOvision

It was invented by Satoshi Nakamoto, who published the invention in 2008 and released it as open source software in 2009. The authenticity of each transaction is protected by digital signatures corresponding to the sending addresses, allowing all users to have full control over sending bitcoins from their own bitcoin addresses.

article thumbnail

Authentic Digital Relationships

Phil Windley

I was the founder and CTO of iMall, an early, pioneering ecommerce tools vendor. The protocols and code that enable the metasystem are open source and available for review and improvement. Supporting Authentic Relationships. Administrative Identity Systems Create Anemic Relationships.

article thumbnail

Everything You Know About eAuthentication is wrong!

CTOvision

On Labor Day, September 5 th 2016, NIST published their Digital Authentication Guideline: Public Preview. The base document SP 800-63-3 is the third iteration of this special publication, and has been renamed to: Digital Authentication Guideline. SP 800-63B – Authentication & Lifecycle Management. Nathaniel Crocker.

article thumbnail

Two Reasons Why Apache Cassandra Is the Database for Real-Time Applications

CIO Business Intelligence

The open source NoSQL database Apache Cassandra ® has two defining characteristics that make it perfectly suited to meet these needs: it’s geographically distributed, and it can respond to spikes in traffic without adverse effects to its unmatched throughput and low latency.

article thumbnail

HashiConf 2017 Day 1 Keynote

Scott Lowe

After a couple minutes, he brings out Mitchell Hashimoto, Founder and co-CTO of HashiCorp, onto the stage. Hashimoto also discusses HashiCorp’s commitment to open source software and the desire to properly balance commercial (paid) products versus free (open source) projects.