Remove Agile Remove Architecture Remove Firewall Remove Linux
article thumbnail

Technology Short Take #66

Scott Lowe

I recently spoke at Interop 2016 in Las Vegas, and while I was there I scribbled down some notes pertaining to how decomposing applications into microservices-based architectures was similar in some respects to decomposing networks into an overlay network and an underlay (physical) network. Networking. Servers/Hardware. Maybe next time?

Vmware 60
article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

Implementing an Enterprise Data Hub — Technical perspectives for implementing enterprise data hub architectures, converged analytics for workflow optimization, and the essential role of open standards and frameworks to ensure continuous innovation. He likes shiny objects. Webster Mudge. where he was their CSO. where he was their CSO.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Implementing an Enterprise Data Hub — Technical perspectives for implementing enterprise data hub architectures, converged analytics for workflow optimization, and the essential role of open standards and frameworks to ensure continuous innovation. He likes shiny objects. Webster Mudge. where he was their CSO. where he was their CSO.

article thumbnail

EP 49: LoL

ForAllSecure

I have all the abilities built into Windows or built into Linux or Mac to do this for me. The modular nature of Kasaya security architecture will prevent the attack from hindering any modules other than VSA, the rapid response team of Kasaya as well as the tremendous and immediate support of Homeland Security.