Remove Network Remove Operating Systems Remove Security Remove Storage
article thumbnail

The Ascent of Object Storage

Cloud Musings

Over the past few years, the data storage market has changed radically. The traditional hierarchy of directories, sub-directories, and files referred to as file storage has given way to object storage , individual storage objects. User expectation of data usage drives file storage repository design.

Storage 94
article thumbnail

Cloud Storage 2.0 Set To Dominate Market

Cloud Musings

The enterprise data storage marketplace is poised to become a battlefield. No longer the quiet backwater of cloud computing services, the focus of this global transition is now going from compute to storage. An overview of recent storage market history is needed to understand why this transition is important.

Storage 79
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 176

Scott Lowe

This Tech Short Take is a bit heavy on security-related links, but there’s still some additional content in a number of other areas, so you should be able to find something useful—or at least interesting—in here. I also enjoyed Ivan’s realistic take on rollbacks in a network automation environment. (TL;DR:

Linux 112
article thumbnail

The cosmic dance of security in the cloud

Dataconomy

However, much like the vast expanse of space, the cloud can be a dangerous place without proper security measures in place. To navigate this cosmic challenge, the shared responsibility model has emerged as a guiding light in the world of cloud computing security. Customer responsibilities: Securing their own applications and data.

Cloud 51
article thumbnail

What is Virtual Network Computing (VNC)?

Dataconomy

Virtual Network Computing (VNC) is a technology that has revolutionized the way we access and control remote computers. In this article, we will delve deeper into the world of Virtual Network Computing, exploring its history, technology, and various applications. What is Virtual Network Computing (VNC)?

article thumbnail

How to manage cloud exploitation at the edge

CIO Business Intelligence

However, this shift requires a thorough understanding of the security implications and how a business can protect its data and applications. As with all technology introductions, it’s important to have clear security policies, tools, processes, and training. Watch on-demand here. How is the cloud being attacked and why?

Cloud 98
article thumbnail

Technology Short Take 146

Scott Lowe

There’s some networking stuff, a few security links, and even a hardware-related article. Networking. Russ White shares Russ' rules for network design. Jimmy Mankowitz talks in some detail about using NSX-T in vSphere with Tanzu to secure applications. Operating Systems/Applications.

IPv6 97