THE DEMOCRATIZATION OF BIG DATA

April 1, 2018

Big Data Block (BDB™) combines Big Data solutions and blockchain technology utilizing Ethereum’s smart contract and token capabilities. BDB™ democratizes Big Data for everyone. Combining the best of Big Data and the best of blockchain we remove the deep technical skills and costs needed to leverage a Big Data environment and becoming the first BDaaS (Big Data as a Service) on a blockchain.

Spotlight

Lacework

Lacework is the data-driven security platform for the cloud. The Lacework Polygraph Data Platform automates cloud security at scale so our customers can innovate with speed and safety. Only Lacework can collect, analyze, and accurately correlate data across an organization’s AWS, Azure, GCP, and Kubernetes environments, and narrow it down to the handful of security events that matter. Customers all over the globe depend on Lacework to drive revenue, bring products to market faster and safer and consolidate point security solutions into a single platform.

OTHER WHITEPAPERS
news image

How to process data securely on third-party infrastructure

whitePaper | December 14, 2022

Confidential computing is a technology that shields computer workloads from their environments and keeps data encrypted even during processing. The vast and previously unsolved problem that confidential computing addresses is the following: How to process data on a computer that is potentially compromised? This computer could be operated by yourself, your company, or a third party like a cloud provider.

Read More
news image

Best Modern Practices for Cable Field Testing and Troubleshooting

whitePaper | September 30, 2022

To ensure both the cabling system and installation workmanship meet high-quality standards, cabling should be tested according to industry standards, such as international ISO/IEC, TIA (used in the Americas and some parts of Europe), or other regional standards. However, testing and configuration complexity, including testing parameters and new link models, can introduce challenges for field operators in obtaining warranty certification.

Read More
news image

Top 5 Things to Ask Your Data Center About Compliance

whitePaper | January 14, 2020

Choosing the right colocation partner is critical, especially when it comes to compliance. When you’re outsourcing your data center needs, understanding your colocation provider’s compliance, security, availability and integrity are of upmost importance. A colocation provider mitigates risk through physical and environmental controls from an operational and security standpoint. Ensuring proper maintenance and operation of critical infrastructure, along with upkeep and continual improvement of a physical security program, are part of a comprehensive compliance program. This new report from Iron Mountain provides details on what the company sees as five of the top things to ask your data center provider about compliance:

Read More
news image

Building a Scalable and Secure Multi-VPC AWS Network Infrastructure

whitePaper | June 6, 2022

Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon.

Read More
news image

Cisco ACI and F5 BIG-IP Design Guide

whitePaper | May 12, 2022

The document discusses load balancer design considerations and deployment options in Cisco ACI, specifically with F5 BIG-IP from three aspects: network design, F5 design, and multi-tenant design. This document covers features up to Cisco ACI Release 5.2. One of the key considerations of the network design with load balancer is to ensure incoming and return traffic go through the same load balancer (one exception is direct server return (DSR), which doesn't have this requirement). There are various options you can use to insert the load balancer. One way is to use the load balancer as a gateway for servers or as a routing next hop for routing instances. Another option is to use Source Network Address Translation (SNAT) on the load balancer or use ACI Policy-Based Redirect (PBR) to make the return traffic go back to the load balancer.

Read More
news image

Optimizing Performance with Frequent Server Replacements for Enterprises

whitePaper | November 8, 2022

Servers are the backbone of modern IT infrastructure. They support the computational requirements of the entire application portfolio of an enterprise organization. However, their life span is finite. A new generation of servers performs much better than its predecessors. Still, is this outperformance worth it?

Read More

Spotlight

Lacework

Lacework is the data-driven security platform for the cloud. The Lacework Polygraph Data Platform automates cloud security at scale so our customers can innovate with speed and safety. Only Lacework can collect, analyze, and accurately correlate data across an organization’s AWS, Azure, GCP, and Kubernetes environments, and narrow it down to the handful of security events that matter. Customers all over the globe depend on Lacework to drive revenue, bring products to market faster and safer and consolidate point security solutions into a single platform.

Events