Posts by author

Andy Mayhew

SRM Service Operations Manager- SafeNet

As SafeNet’s SRM Service Operations Manager, Andy is responsible for ensuring the uninterrupted delivery of our cloud services to customers around the globe. Andy brings over fifteen years of experience with large scale Internet operations to SafeNet.  He has worked in the trenches of Netscape, Yahoo!, LogicTier and achieved notoriety by working for the first incarnation of Napster.  He has extensive experience with ISPs, telcos, and managing a diverse set of people and tasks.  His work includes deploying, maintaining, and updating high traffic web properties while running with five 9′s of availability.

At VeriSign, Andy was responsible for full-cycle development and reimplementation for core PKI infrastructure services which support billions of daily transactions.  Andy’s professional focus on systems automation and monitoring of world class operations has led to his participation as a technical adviser for a number of software start-ups.  When he isn’t basking in the glow of a computer monitor Andy enjoys playing guitar, racing Porsches, and international travel.

3 Posts

Oct 24

Authorization vs. Authentication – What’s the Difference?

It’s easy to confuse authentication with authorization.  The two are frequently used interchangably in conversation and are often tightly associated as key pieces of web service infrastructure.  But the two are really two different concepts which often are completely divorced from each other.  Authentication is the process where by an individual’s identity is confirmed.  Whereas authorization is the association of that identity with rights and permissions.

Sep 24

From Generation to Generation, The Dilemma of Build vs. Buy Endures

The build versus buy licensing dilemma is the oldest debate in the industry.  After all, managing the licensing of your software is an important aspect of any commercial application, but it is not the core product you are selling.

The build vs. buy debate centers around the balance between providing the features and functionality your customers want in your software, with your need to protect access to your software through licensing systems.  Developers approach this strategically and smartly, and prefer to not reinvent the wheel, utilizing libraries, previously written code, and third party services to provide the license scaffolding around the software solution.

Aug 24

Moving to the Cloud: Unshackling from the Desktop without Losing Track of Users

As an ISV, moving your application into the Cloud and offering it as a service is no trivial task.  How software is supplied and managed for the desktop is very different than as a service.  The usage and requirements of network connectivity, scaling, authentication and authorization, as examples, are all subtly different from the Enterprise model.

Once you get past the foundation of how to supply your application as a service, you need to solve the additional problems of authorization and utilization; or “Who has access to what?” and “How much are they using?”