Kategorie: inter-cloud
-
Novel ways of providing identity to automated cross-cloud processes – Workload Identity Federation and SPIFFE
Growing cybercriminal activities let to a boom of access rights solutions for user access to data and systems. Recently they have been even more augmented by provisioning of hardware FIDO2 based tokens (available also as open source, such as Nitrokey) to ensure the identity of a user and then being able to provide the right…
-
Modern Cloud Application Delivery: WASM and WASI
I described in a previous blog post that modularity will play a key role in future enterprise applications. This is demonstrated in the current trends of serverless functions or containerized architectures. However, those solutions are not perfect: Given the trend of many different computing architectures, such as ARM on servers, Internet of Things (IoT) Edge…
-
Big Data: Bring Computation to Data
Big Data is the topic of the coming years. Even today large Internet companies store exabytes of data and their revenue model is based on selling products as well as services around this data. Consequently, they need to process data using advanced statistical methods, such as machine learning. Hence, they need to think about how…
-
Scenarios for Inter-Cloud Enterprise Architecture
The unstoppable cloud trend has arrived at the end users and companies. Particularly the first ones openly embrace the cloud, for instance, they use services provided by Google or Facebook. The latter one is more cautious fearing vendor lock-in or exposure of secret business data, such as customer records. Nevertheless, for many scenarios the risk…