Portfolio

Steve Hoenisch

White Papers

Disclaimer: Although Criticism.Com contains links to white papers that I've written while employed by VMware or EMC, the views expressed in the pages published on Criticism.Com are strictly my own and are not the opinions or views of VMware or any company that I have worked for in the past, such as EMC. The white papers published by VMware or EMC are on their respective web sites; these are just links to those papers.

Securing Cloud Platforms with Project Lightwave. Published by VMware.

Running Containers at Scale with Photon Platform: A Secure, Multitenant Architecture for Cloud-Native Applications. Published by VMware.

Deploying Cloud-Native Applications with Photon OS. Published by VMware.

EMC Isilon Scale-Out NAS for In-Place Hadoop Data Analytics. Storing data in EMC Isilon scale-out network-attached storage optimizes data management for Hadoop analytics. Separating data from HDFS clients and storing it in an Isilon cluster provides scalability, efficiency, and workflow flexibility. Published by EMC.

OneFS Multiprotocol Security Untangled. This white paper describes the role that identity management, authentication, and access control play in the EMC Isilon OneFS security system. Published by EMC.

Data Lakes for Data Science: Integrating Analytics Tools with Shared Infrastructure for Big Data. This paper examines the relationship between three primary domains of an enterprise big data program: data science, analytics frameworks, and IT infrastructure. A decision about tools or infrastructure in one domain can affect, and potentially limit, what can be done in the other domains. Published by EMC.

EMC Isilon Multitenancy for Hadoop Big Data Analytics. The EMC Isilon scale-out storage platform provides multitenancy through access zones that segregate tenants and their data sets. An access zone presents a portion of an Isilon cluster as a secure virtual storage region with a unique HDFS root directory for the zone’s tenant. With NFS, SMB, and HDFS access to each zone, an Isilon cluster delivers a scalable multitenant storage solution for analytics tools. Published by EMC Isilon.

Compliance and Security for Hadoop Scale-Out Data Lakes. As credit card companies, medical researchers, and financial institutions analyze data with Hadoop to detect fraud, improve health care, and create innovative products, the stored data poses a compliance problem: The Hadoop File System lacks the enterprise security features that compliance regulations require. As a result, big data analysts are imperiling the integrity, confidentiality, and availability of their Hadoop data. This white paper explains how the EMC Isilon OneFS operating system securely stores data for Hadoop analytics to help meet such compliance regulations as PCI DSS, FISMA, and HIPAA. Published by EMC.

EMC Isilon Performance at Scale for Electronic Design Automation. This paper describes how EMC Isilon network-attached storage delivers performance, scalability, and efficiency to optimize data storage for electronic design automation. Published by EMC.

EMC Isilon Multiprotocol Data Access with a Unified Security Model. This white paper explains how the unified security model of OneFS resolves mismatches between the permissions of Windows and Unix systems while preserving the security of files and satisfying the expectations of users. Published by EMC Isilon.

Identities, Access Tokens, and the OneFS User Mapping Service. The OneFS user mapping service combines a user’s identities from different directory services into a single access token and then modifies it according to the rules that you set. This paper explains how to map identities across directory services to uniformly control access to the OneFS file system. Published by EMC.

EMC Isilon Scale-out NAS: An Architecture For Resiliency, High Availability, And Data Protection. This paper demonstrates that the EMC Isilon file system can remain online while a cluster sustains multiple failures of underlying components. The EMC Isilon OneFS architecture, data protection scheme, and high-availability features deliver resiliency, reliability, and data availability. Published by EMC Isilon.

EMC Isilon Scale-Out NAS for Video Surveillance Systems. This white paper demonstrates how an EMC Isilon scale-out NAS cluster provides the scalability, efficiency, simplicity, and agility to fulfill the storage requirements of a large, centralized video surveillance system while reducing capital expenditures and operating expenses. Published by EMC.

EMC Isilon Storage Best Practices for EDA. This paper describes the best practices for setting up and managing an EMC Isilon cluster to store data for electronic design automation (EDA). Published by EMC.

EMC Isilon Best Practices for Hadoop Data Storage. For OneFS 7.0. This paper describes the best practices for setting up and managing the HDFS service on an Isilon cluster to optimize data storage for Hadoop analytics. Published by EMC Isilon.

OpenStack Swift Object Storage on EMC Isilon Scale-Out NAS: The EMC Isilon scale-out storage platform provides object storage by exposing the OpenStack Object Storage API as a set of Representational State Transfer (REST) web services over HTTP. The objects that you store through the Swift API can be accessed as directories and files through NFS, SMB, and HDFS. The result is a standard method of securely integrating data-intensive applications with the Isilon storage platform and then sharing the data with other applications, such as Hadoop and Apache Spark.

EMC Isilon Best Practices for Hadoop Data Storage. This paper describes the best practices for setting up and managing the HDFS service on an EMC Isilon cluster to optimize data storage for Hadoop analytics. For OneFS 7.2 or later. Published by EMC.

Monitoring Unstructured Data: Uniting Multi-Protocol Storage and Cross-Platform Access Control for File Activity Monitoring and Context-Aware Security. This white paper maintains that a multi-protocol file server or NAS system with an integrated cross-platform access control system is a blueprint to efficiently and effectively monitor unstructured data.

Securing Unstructured Data: Protecting Sensitive Files by Uniting Identity, Security, and Storage. This white paper describes a number of problems that make it difficult to secure unstructured data and then highlights technologies to overcome them.

Auditing Unstructured Data: Identity-Aware Storage, File Activity Monitoring, and Compliance Reporting Across Platforms. This white paper argues that a multiprotocol file server with an integrated cross-platform access control system is the architectural basis for solving many problems in auditing unstructured data.

Fact Sheets and Data Sheets

FISMA Fact Sheet: This fact sheet outlines Likewise's technical security controls for electronic assets stored on file servers and NAS systems. The fact sheet also discusses how Likewise performs continuous monitoring of stored assets.

HIPAA Fact Sheet: This fact sheet describes Likewise's security controls for electronic protected health information stored on file servers and NAS systems. Specifically, the fact sheet details how Likewise addresses the Administrative Safeguards and the Technical Safeguards sections of the HIPAA Security Rule.

The fact sheet also discusses how Likewise's architecture provides the foundation and the functionality to perform continuous monitoring of unstructured health data to address emerging information security guidelines from the National Institute of Standards and Technology.

SEO Writing and Marcom

Tune Your Management Strategy for Unstructured Data: The explosion of unstructured data in the face of shrinking IT budgets demands efficient storage management. Virtualization, deduplication, tiering, charge-back models, and service-level agreements are all essential, but to truly excel you need to manage your unstructured data in the context of its life cycle and your business strategy.

Exception Monitoring and Reporting: Unmanaged piles of unstructured data can be unnerving. When file servers overflow with documents that might contain sensitive, proprietary, or confidential content, you get that sinking feeling: There might be information in there that violates one or more compliance regulations. And if exposed, whether through an internal or external threat, it could damage the reputation of your company, undermine your competitive advantage, and lead to legal problems and fines. Identity-aware exception monitoring and reporting is an effective way to get visibility into anomalies around access to unstructured data.

File Activity Monitoring: As unstructured data rapidly accumulates on file servers and NAS systems, a new security requirement is becoming paramount: file activity monitoring. It stems from the pressing need to track and protect sensitive unstructured data.

Likewise Data Analytics and Governance: Unstructured data is growing faster than all other types of data and will increase by 800 percent during the next five years. Analysts are referring to it as the big-data explosion. But big data brings new challenges. Because 40 percent of it typically contains sensitive information, compliance regulations or internal policies mandate security. At the same time, workers depend on easy, rapid access to do their job. Security, then, must be balanced with availability. Easier said than done: Data silos, access barriers, different protocols, security gaps, and a lack of control stand firmly in the way, increasing risks and costs. Likewise Data Analytics and Governance unites identity, security, and storage to overcome the challenges of managing unstructured data.

Storage Access Control: As heterogeneous networks increasingly spawn data silos -- file servers segmented by storage protocol -- the files of Unix users are typically stored on separate servers from the files of Windows users, making it hard to secure unstructured data with a centralized access control system. By providing a cross-platform file server with an integrated access control system, Likewise Storage Services secures access to unstructured data regardless of whether a user is accessing it from a Unix or a Windows computer.

Reporting Features for IT Auditing and Compliance: By integrating storage, identity, and security, Likewise gives you a panoramic vista from which you can look out across your files servers and see your unstructured data. Patterns of storing data and subsequently accessing it become visible. Security vulnerabilities are exposed so you can fix them. Complinace reports are linked to the identity management system to show who accessed which files.

Multiprotocol Data Access with CIFS and NFS: Likewise Storage Services delivers secure, multiprotocol data access with a CIFS/SMB and NFS file server accessible by Microsoft Windows clients and Unix clients simultaneously.

Data Storage Compliance for HIPAA, PCI, SOX, and FISMA: Likewise Data Analytics and Governance delivers compliance solutions for unstructured data stored on file servers and NAS systems.

FISMA Compliance for File Servers and Storage Systems: FISMA mandates that you protect information and information systems to provide confidentiality, integrity, and availability. To do so, you must implement security controls. Technical security controls for unstructured data stored on file servers and NAS systems take the form of authentication, access control, auditing, monitoring, and reporting.

Managing Storage Systems and Unstructured Health Information for Regulatory Compliance: The Health Insurance Portability and Accountability Act and the Health Information Technology for Economic and Clinical Health Act establish rules and regulations for the health care industry. Likewise delivers software solutions that help the health care industry comply with HIPAA, HITECH, and other regulations. The software secures, monitors, and audits protected heath information stored on file servers and NAS systems to guarantee the data's confidentiality, integrity, and availability.

Managing File Servers and NAS Systems for PCI DSS Compliance: The Payment Card Industry Data Security Standard is a set of requirements for businesses that process payment card information. Likewise helps you fulfill these requirements by securing, monitoring, and auditing customer account information stored on file servers and NAS systems.

Solutions for Monitoring the Utilization and Performance of File Servers and NAS Systems: Likewise Data Analytics and Governance delivers storage management solutions that monitor the utilization, performance, data, and users of file servers and network attached storage. The Likewise console displays the information on a dashboard and in reports.

Gain Visibility into Unstructured Data on File Servers and Network Attached Storage: Likewise Data Analytics and Governance monitors the utilization of file servers and network attached storage in near real-time to gain visibility into unstructured data and to optimize storage resources.

Analyze Metadata to Optimize File Servers and NAS Systems: As unstructured data grows in volume, velocity, and variety, gaining visibility into the usage of storage resources gives you the insight to balance storage costs with performance. Likewise Data Analytics and Governance monitors the metadata on network attached storage systems to show patterns of data access and utilization -- information you can use to improve the performance of storage systems.

Manage Unstructured Data on Virtual File Servers and NAS Systems: Although virtualization saves money, it can result in VM sprawl: Virtual machines multiplying into file servers faster than you can figure out what's on them and who is using them. As unstructured data expands and virtual file servers proliferate, visibility into the data-usage patterns that take place on virtual filers improves capacity planning, utilization, compliance, and security.

Monitoring Unstructured Data on File Servers: This page describes how Likewise monitors the metadata of unstructured data to solve such storage problems as information lifecycle management and tiering.

Join Sun Solaris Systems to Active Directory: Likewise Enterprise integrates computers running the Solaris operating system with Microsoft Active Directory, yielding a range of benefits for users, system administrators, and managers. Solaris users get single sign-on. System administrators rest easy with the knowledge that users are securely authenticated with the Kerberos protocol. Managers see their operational costs drop as Solaris computers are centrally managed with Active Directory. Security managers find help in their quest for regulatory compliance.

Managing Unstructured Data for Sarbanes-Oxley: The requirements for SOX compliance represent something of a shifting goal. Instead of specific IT compliance requirements, Sarbanes-Oxley relies on general principles. Problem is, they are subject to interpretation by auditors. Different auditors might ask different questions; expectations might change from year to year; controls deemed adequate one year might be insufficient the next.

So the key question becomes: How can you put in place internal controls that address different auditors, shifting objectives, and various risks? A powerful approach is to implement internal controls that establish a strong foundation for Sarbanes-Oxley compliance.

Case Study

Energy Company Achieves Red Hat Windows Integration: This case study describes how a company deployed Likewise Enterprise to integrate IBM AIX and Red Hat Linux machines with Windows computers and Active Directory.

Guides and Technical Articles on Open-Source Software

Photon Platform Quick Start Guide for 1.2.

Photon Platform User Guide.

Photon Platform Quick Start Guide for 1.1.

Photon Setup Guide for NSX.

Article on Setting Up a Kubernetes Cluster with Photon Platform.

Article on Setting Up a Kubernetes Cluster with NSX Networking.

Photon Platform Command-Line Cheat Sheet.

Article on Setting Up and Using Lightwave Authentication.

Photon OS Linux Troubleshooting Guide.

Photon OS Administration Guide.

TDNF Guide.

Likewise Open User Guide.

Likewise Enterprise User Guide.

Running Photon OS on Amazon Elastic Cloud Compute. An in-depth how-to article.

Technical Magazine Articles

Articles at Sys-Con Media and in XML Journal

Getting Up To Speed With XML

Structuring Documents With XML

DTD Development Driving You Delirious?

Declaring Attributes And Entities In DTDs

An Introduction to XSLT

Transforming XML Documents into HTML

Switching Document Views

Newspaper Articles

Bargain Trips: See The Country By Car And Save In A Drive-away, in the Chicago Tribune.

For SEO, Set Your First Heading in the H1 Tag

Include a Unique, Accurate Title in Your HTML Document's Header

Structuring Documents with XML

Tagging DocBook XML Documents for Search Engine Optimization

Search Engine Optimization (SEO) Techniques

Resume: Writer, Editor, Analyst

First Published: Jan. 27, 2012. Last Updated: June 17, 2017.


Bookmark and Share