last post, I outlined considerations that need to be taken into
account when choosing between a centralized and federated security model. So, how do we implement the chosen model? Based on a real-world case study, I
will outline a Kerberos architecture that enables cutting-edge collaborative research through federated sharing of resources. This is an extract from the full article which can be downloaded here.
Continue reading "Scalable federated security with Kerberos" »
Enterprises want to
protect their data. As the appetite for
data volumes grows, storage technology becomes a critical business
asset on which business continuity relies. My recent survey in the medium-size enterprise segment shows the five dominant investment directions at the level of data management architecture: disaster recovery (DR), high availability (HA), backup, data processing performance and migration to more advanced databases.
This suggests that corporations generally have sufficiently structured data collections but are concerned with business continuity and continuous availability of data. What infrastructures can provide these assurances?
Continue reading "Business continuity with real-time data integration" »