5,991 Results for:Protocol

  • Sort by: 

Splunk-Cribl lawsuit yields mixed result for both companies

By Beth Pariseau 23 Apr 2024

Cribl did infringe on Splunk's copyright, a California jury found, but awarded damages of only $1. Both sides declared victory, and Splunk vowed to seek injunctive relief. Read More

Datadobi adds Azure Blob as unstructured data storage target

By Johnny Yu 16 Mar 2021

Datadobi DobiProtect has gained support for Azure Blob, extending its cross-protocol replication capabilities between NAS and cloud object storage beyond S3-compatible targets. Read More

Government gives update on post-Brexit customs systems

By Lis Evenstad 12 Oct 2020

Cabinet Office’s Border and Protocol Delivery Group provides further clarity on the readiness of the UK’s post-Brexit border IT systems Read More

Is hyperscale NAS the future of storage in the AI era?

By Simon Robinson 04 Mar 2024

Storage for AI workloads will require high capacity and performance. Some vendors have started to tackle this issue, for example with global file system technology. Read More

Ski firm dumps ‘motley’ storage for DataCore software-defined

By Yann Serra, Antony Adshead 12 Mar 2021

Eurogroup cuts power usage by 70% and rackspace from 84U to 7U as it consolidates multiple physical servers and storage protocols onto SANsymphony software-defined storage Read More

Lightweight Machine-to-Machine technology emerges in IoT networks

By William Yan 19 Aug 2019

The LwM2M protocol is beginning to gain serious traction among IoT experts. AVSystem's William Yan explores LwM2M and covers major advantages and who can benefit from the protocol the most. Read More

What is the difference between H.248 and H.323 protocols?

By Jon Arnold 19 Dec 2013

H.248 and H.323 are protocols associated with VoIP. IP telephony expert Jon Arnold explains the difference between the two in this expert response. Read More

3 Keycloak authorization strategies to secure app access

By Kyle Johnson, Packt Publishing 18 Apr 2024

Keycloak, an open source IAM tool, offers authorization methods, including RBAC, GBAC and OAuth 2.0, that limit what users can access. Read More

Load DynamiX adds OpenStack protocols to storage testing product

By Antony Adshead 22 Apr 2015

Storage testing and validation provider adds OpenStack Swift and Cinder support to existing protocols in its Enterprise version 2.6 hardware Read More

'CallStranger' vulnerability affects billions of UPNP devices

By Rob Wright 09 Jun 2020

A new vulnerability in the Universal Plug and Play protocol could be used to exfiltrate enterprise data and launch DDoS attacks, and patches may not arrive for a long time. Read More