Remove Architecture Remove Case Study Remove Network
article thumbnail

Hadoop Security: New book by Ben Spivey and Joey Echeverria Is Exactly What The Community Needs

CTOvision

In this book, Cloudera professionals Ben Spivey and Joey Echeverria provide a thorough treatment of Hadoop security architecture and implementation to help architects navigate the common challenges of this phase. Example case studies demonstrate how the book’s material is immediately applicable to your use cases.

Security 150
article thumbnail

Axiata and Infosys adopt openness as a strategy

TM Forum

In order to achieve Axiata’s goals, the two partners are adopting “openness” as a strategy, including a collaboration on a commercial open radio access network (RAN) deployment that aligns with the TM Forum’s Open Digital Architecture (ODA) and Open APIs.

Infosys 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Register With 20% Discount Code for San Jose Strata Hadoop World

CTOvision

You'll dissect case studies, develop new skills through in-depth tutorials, share emerging best practices in data science, and imagine the future. You'll get three full days of inspiring keynotes, intensely practical and information-rich sessions, and plenty of fun networking events.

Big Data 152
article thumbnail

Register Here For 20% Discount Code for San Jose Strata Hadoop World

CTOvision

You''ll dissect case studies, develop new skills through in-depth tutorials, share emerging best practices in data science, and imagine the future. You''ll get three full days of inspiring keynotes, intensely practical and information-rich sessions, and plenty of fun networking events.

Big Data 150
article thumbnail

Lessons learned: 4 Zscaler deployments later

Network World

I was confident that a zero trust architecture with the right vendor would at least help address our security concerns. What to expect and advice for Zscaler deployments That’s not to say there isn’t a learning curve when transitioning to a zero trust architecture. You and your teams need to be aware of the effort it takes.

Policies 148
article thumbnail

Threats delivered over encrypted channels continue to rise

Network World

By blending in with legitimate cloud services traffic, APT groups can take advantage of the default use of TLS/SSL encryption enabled to help them evade network security controls. This approach stops encrypted threats from reaching critical applications and systems, providing proactive protection that doesnt rely on shared network access.

Malware 78
article thumbnail

DTWS: Telia's path to zero-touch automation

TM Forum

As Telia Company ramps up its digital transformation it is using automation to improve customer experience through faster service delivery and has zero-touch automation in its sights, notably for network slicing. ” Zero-touch automation comprises the idea that a network essentially sorts itself, its services, and its problems out.

B2C 130