API

Scality Ring XP to offer object storage at scale with rapid access

Object storage specialist Scality has launched Ring XP, a tuned-up version of its existing Ring platform aimed at artificial intelligence (AI) data lake use cases that promises microsecond (µs) storage access times. That tune-up centres on the use of a stripped-down version of S3 object storage application programming interfaces (APIs) – that lack performance-sapping functionality…

Scality Ring XP to offer object storage at scale with rapid access Read More »

Data classification: What, why and who provides it

When it comes to managing data, we need to know where it is – but we also need to know what it is. With the rise in regulatory controls, enterprises now pay more attention to data sovereignty, especially when it comes to data in the cloud, but to know exactly what information they hold is…

Data classification: What, why and who provides it Read More »

Kubernetes at 10: CRDs at core of extensible, modular storage in K8s

Kubernetes is 10! Mid-2024 sees the 10th birthday of the market-leading container orchestration platform. Xing Yang, cloud-native storage tech lead at VMware by Broadcom, started working on storage in Kubernetes in 2017 on projects based around custom resource definitions (CRDs), which allow the orchestration platform to work around an extensible core. Later, she went on to see container…

Kubernetes at 10: CRDs at core of extensible, modular storage in K8s Read More »

Forrester: Rethink your software asset management practices

Software asset management (SAM) has evolved from simple back-office record-keeping to more complex licence and contract management that integrates innovative technologies such as artificial intelligence (AI), machine learning (ML) and generative AI (GenAI). Successful SAM implementations save on licence costs, improve compliance and reduce true-ups. They also improve software utilisation, enabling firms to derive more…

Forrester: Rethink your software asset management practices Read More »

Kubernetes at 10: The long road to mastery of persistent storage

Kubernetes is 10! Mid-2024 sees the 10th birthday of the market-leading container orchestration platform. Jan Safranek, principal software engineer at Red Hat, was there during the flurry of activity that saw Docker and then Kubernetes explode onto the scene and businesses and developers grapple with how to provide it with persistent storage. Safranek was there when…

Kubernetes at 10: The long road to mastery of persistent storage Read More »

Why is CrowdStrike allowed to run in the Windows kernel?

A 2009 EU anti-competition ruling has been used as a line of defence by Microsoft as questions are being asked over why a third-party product was able to take down Windows. On Friday 19 July, 8.5 million PCs experienced the so-called Blue Screen of Death, which occurs when the Windows operating system (OS) experiences a…

Why is CrowdStrike allowed to run in the Windows kernel? Read More »

Cloud security challenges not just technological

In the evolving IT landscape, cloud deployments have become deeply entrenched in business operations, presenting both unprecedented opportunities and significant challenges. The widespread adoption of cloud technologies has created a complex and dynamic environment, often spanning multiple providers and geographical regions, each with its own laws, regulations, and standards. From fragmented environments to access control…

Cloud security challenges not just technological Read More »

Mimecast to buy insider threat specialist Code42

Human-centred risk management experts Mimecast and Code42 are to come together as a single business in an acquisition that builds on a previously established tech partnership, with Mimecast set to add Code42’s product suite into its platform to enhance its insider threat detection and response capabilities. Mimecast, which bills itself as a provider of “AI-powered,…

Mimecast to buy insider threat specialist Code42 Read More »

Enhancing mobile app security with behaviour-based biometrics

It’s estimated that 75% of security vulnerabilities go undiscovered. Much of this has to do simply with ease of access – for a long time, mobile security has relied on biometric authentication, such as fingerprint scans and facial recognition.  However, as cyber threats evolve, these methods are no longer sufficient to counter the sophisticated tactics…

Enhancing mobile app security with behaviour-based biometrics Read More »

Shopping Cart
Scroll to Top