Data Security

Tue, 09/13/2016 - 13:34

In order for Hadoop to work correctly, enterprises must input the considerable amounts of data that they collect in a consistent basis. This is where Data Realty's Data Gateway comes in.

Fri, 01/29/2016 - 13:59

It’s that time of year, when we all look forward to the fresh year and read surveys about “big data” trend reports for the new year. So we decided to ask one of our resident Hadoop experts, Rob Collins, Data Engineer, to give us his perspective on some 2016 Hadoop trends.

secure firewall
Mon, 07/06/2015 - 10:22

Gatekeeper (n.) -- one that tends or guards a gate; a person who controls access

The Merriam-Webster Dictionary definition seems relatively basic, but the term "gatekeeper" is something that we have heard in many contexts: a business sale, a fable or legend, and any other situation with a decision process involved. The computing world also includes a "gatekeeper" with a complex network security system. Firewall, a software or hardware-based system, controls the incoming and outgoing network traffic by analyzing data and determining whether or not it should pass the "gate."

Password Security
Fri, 12/19/2014 - 09:52

Each year we hear about personal exposure and risk due to poor choices in passwords. Strong passwords are the first line of defense in protecting personal and business information, so we thought we would share some of our best practices in creating strong passwords. Hint: "123456," "abc123," "password," and "iloveyou" (Sweet, we know.) are among the top 10 most commonly used passwords - Don’t use them, just saying!

Fri, 06/20/2014 - 11:04

Rewind back in time to your elementary school days. More specifically, think back to that super confidential top secret that you just had to tell your best friend − no, this couldn’t wait until recess! How would you reveal that you "have a crush on the new girl in school" or that your friend should "come over to play this afternoon" when said friend is sitting far across the room? How could you communicate with friends without a teacher, classmate, or your crush (gasp!) intercepting that secret message? Elementary school communications involved mirror writing, Pig Latin, and the occasional invisible ink; regardless of the complex method employed, the secret message was considered a success when it reached the friend safely.