Join / Sign up
IBM Spectrum Scale requires SSH configuration across it’s cluster for its management and administration. Each administration node must be able to run administration commands without the use of a password and without producing any extraneous messages. Also, most of the administration commands...
This white paper describes the overall security posture of Cloud Pak for Data for private cloud and on-premises deployments. In June, we published the first white paper on Security for Cloud Pak for Data 3.0, which covered a range of security aspects including secure engineering practices,...
2 attachments
2 Comments - no search term matches found in comments.
Acknowledgement to co-creators: Sandeep Patil, Prayas Gupta, Chetan Kulkarni, Prashant Sodhiya, Carl Zetie and Wayne Sawdon. IBM Spectrum Scale is a high performance file and object storage with security features covering from authentication of data to authorization of data to secure data at...
As a user of IBM Spectrum Scale, we need to be aware of the security on our Spectrum Scale cluster. That’s where security posture steps in. It gives us a graphical representation of IBM Spectrum Scale cluster's security aspects in Kibana. This enables IBM Spectrum Scale administrators to quickly...
IBM Spectrum Scale HDFS Transparency implementation integrates both the NameNodes and the DataNodes services and responds to the request as if it were HDFS on IBM Spectrum Scale file system (GPFS). In HDFS, DataNodes contains the local disk for the file system and in order to scale the storage...
Acknowledgement: Thanks to Asmahan Ali , Kumaran Rajaram, & Carl Zetie for their inputs. In an organization there can be different workloads requiring different security posture. As an example, one of the workloads is a high performance computing workload dealing with non-sensitive data...
Today, Artificial Intelligence (AI) & Analytics are ubiquitous across industry verticals. Healthcare & Life Science is one such industry where AI and analytics are being used for everything from drug discovery and personalized precision medicine, to predicting hospital walk in patients...
Threats from cyber attacks are at an all time high. These threat agents can be external, as well as internal, to an organization. Since 'data' is the new oil, most of these attacks are to directed to the data. It is either to illegitimately gain access to the data or to maliciously corrupt the...