Recent Articles

Cloud Computing: BridgeSTOR

Cloud Computing: BridgeSTOR

| June 12, 2016

BridgeSTOR provides its own object data store if customers wish to use that facility to store data. The data store can be located anywhere (local, remote site, cloud site) and is intended for unstructured data. For a BridgeSTOR data store, the products provide automatic replication, distribution, compression, dedupe, and security based on user-defined rules or […]

Continue Reading

Hyperscale Data Access: Peaxy

Hyperscale Data Access: Peaxy

| May 2, 2016

It doesn’t matter how much data you have if you can’t work with it. More data is more valuable–it enables better solutions derived from advanced analytics–but only if you have full access to it. To integrate the business you must have frictionless control over the dataset. However, traditional data systems in use today often isolate […]

Continue Reading

Security: Ionu

Security: Ionu

| April 2, 2016

IONU protects data. Data is encrypted in the devices and endpoints where it is produced, examined, used and stored. Authentication, device registration, distributed key generation and transparent key management are controlled by a highly scalable cloud application. IONU’s Data-centric SecurityTM platform allows data to flow anywhere it needs to be without the need for plug-ins, […]

Continue Reading

6 Ways Startups Hyper-Bootstrap with Cloud

6 Ways Startups Hyper-Bootstrap with Cloud

| April 22, 2014

Cloud computing is creating a new wave of startups. Why? By Ed Lucente @edlucente Thanks to the cloud, startups have more affordable access to IT resources. This allows new businesses to “hyper-bootstrap.” An entrepreneur, for instance, can connect quickly and more economically to customers and suppliers around the globe through the cloud and thereby realize […]

Continue Reading