Sandeep Patil

,

All my blogs are mine viewpoints and they do not reflect that of my employer

Posts from this devCenter

How to have granular and selective secure data at rest and in motion for workloads

Acknowledgement: Thanks to Asmahan Ali , Kumaran Rajaram, & Carl Zetie for their inputs. In an organization there can be different workloads requiring different security...

Why Storage and HIPAA Compliance for AI & Analytics Workloads for Healthcare

Today, Artificial Intelligence (AI) & Analytics are ubiquitous across industry verticals. Healthcare & Life Science is one such industry where AI and analytics are being...

Innovation via Integration – Proactively Securing Your Unstructured Data from Cyber Threats & Attacks

Threats from cyber attacks are at an all time high. These threat agents can be external, as well as internal, to an organization. Since ‘data’...

How to ensure NFS uses strong encryption algorithms for secure data in motion ?

Ensuring data is secure over the wire as well as on the disk is now a days a common norm. IBM Spectrum Scale provides secure...

Spectrum Scale: Which Filesystem Encryption Algo to Consider ?

When using Filesystem Encryption for Spectrum Scale, “which encryption algorithm should I use?” is a question that often comes to mind. Spectrum Scale supports the...

Upgrading IBM Spectrum Scale sync replication / stretch cluster setup in PureApp

Use case : In a GPFS stretch cluster / GPFS synchronous mirroring setup (which consist of 2 sites with 3rd site as tie breaker)  with...

Posts from other devCenters
Articles from the developerWorks library

Develop mobile apps with IBM MobileFirst Object Store Adapter and backend IBM Spectrum Scale Object

Explore the need for easy integration of mobile applications with data stored on object stores.…

Fine-grain network quality of service on IBM AIX 7.1 and Linux in a multi-tenant cloud environment

In a multi-tenant environment, typically tenants share a single infrastructure on which resources are logically…

Technical tip: Secure DB2 communications using OpenSSH tunneling

Follow the steps outlined in this article to use SSH for secure communication between IBM…