Searched for: "security in public and private cloud infrastructures"
- Cloud (63)
- Security (10)
- Cxo (4)
- Servers (3)
- Windows (3)
- Data Centers (2)
- Hardware (2)
- Leadership (2)
- Networking (2)
- After Hours (1)
- Bring Your Own Device (1)
- Business Intelligence (1)
- Data Management (1)
- Disaster Recovery (1)
- Enterprise Software (1)
- Eu (1)
- Microsoft (1)
- Mobility (1)
- Open Source (1)
- Outsourcing (1)
- Pcs (1)
- Presentations (1)
- Software (1)
- Start-Ups (1)
About 107 results for "security in public and private cloud infrastructures"
Startup veterans Paula Long and John Joseph launched DataGravity, which aims to make storage an active partner in business through data awareness and visibility.
Technical, geographical, and legislative barriers to sufficiently modern internet connectivity are highlighted in Akamai's Q1 State of the Internet report.
The authors of Duplicati, an open-source file backup client, discuss the impetus for the creation of their project, keeping data secure in the cloud, and backup integrity with incr...
There have been multiple high profile worldwide data breaches so far in 2014. Do you wonder what's happening on the UK Threat Landscape? Join Rackspace and Alert Logic to hear more...
Hybrid cloud is gaining a foothold in corporate IT. TechRepublic and ZDNet's in-depth coverage of hybrid cloud explores its benefits, drawbacks, successes, and challenges.
Cloud computing data centre is an efficient service provider in terms of infrastructure, software and platform. There are two major types of cloud that is public and private cloud....
Now-a-days, organizations use the Cloud in a variety of different service models (SaaS, PaaS, and IaaS) and deployment models (Private, Public, and Hybrid). In this paper, the auth...
Cloud adoption continues to expand beyond the base of cutting-edge early adopters and is now reaching the "early mainstream" stage, increasingly being looked at by enterprises as a...
Cloud bursting is a way of using public cloud resources to deal with spikes in demand. When it comes to solutions, Nick Hardiman asks: Why trade capacity problems for complexity pr...
Indemnifying the Confidentiality Concern of Cloud Computing Through Implementation of a Cipher Cloud
The cloud computing technology has brought a new era of computing with abundant benefits and ease of operations hiding all the underlying complexities thus providing an efficient p...