Data Center and Cloud

Remote Powering over communications cabling (part 3)

Remote feeding is a technology which enables operators to power several remote sites from a central location.  Remote powering implies that the power equipment is not local but some distance away. Remote means that the powering and powered equipment are in separate buildings or at different external locations inside same building.It can be used as

Computer trends 2018

IT seems to be growing again. Gartner forecasts worldwide IT spending will increase 4.5% this year to $3.68 trillion, driven by artificial intelligence, big data analytics, blockchain technology, and the IoT. Digital transformations are fashionable. You won’t find an enterprise that isn’t leveraging some combination of cloud, analytics, artificial intelligence and machine learning to better

Containers and microservices complicate cloud-native security

http://www.theserverside.com/feature/Containers-and-microservices-complicate-cloud-native-security?utm_campaign=Black%20Duck%20Press&utm_content=60709505&utm_medium=social&utm_source=facebook Developing applications with microservices and containers may be a modern approach to software design, but traditional software flaws still remain a problem when addressing cloud-native security. When you think about microservices-architected, there’s a wide range of, I guess you could say opinions, about what that means.  In this age of DevOps and cloud-native development, the software

4 website maintenance mistakes to avoid | Opensource.com

https://opensource.com/article/17/10/4-website-maintenance-mistakes-avoid?sc_cid=7016000000127ECAAY  Maintenance is a good idea for every website, but it’s a requirement for websites using open source code. The upside of open source is that everyone can participate. The downside is that means keeping up with everyone’s changes.  Maintenance is a simple process, but there are basic mistakes that many people make at least

Accidenture

Numerous companies have shamed themselves by posting their sensitive data and encryption keys to public cloud without any protection, where cyber criminals and security researches find them. What is the better way to get a bad dent to the “professional” cover of the data security consultanting company than doing exactly this? And yet those companies

What is edge computing? | Opensource.com

https://opensource.com/article/17/9/what-edge-computing?sc_cid=7016000000127ECAAY Edge computing is poised to boost the next generation of IoT technology into the mainstream. Here’s how it works with the cloud to benefit business operations in all industries There is much speculation about edge replacing cloud, and in some cases, it may do so. However, in many situations, the two have a symbiotic