5,993 Results for:Protocol
- Sort by:
Lenovo storage expands NVMe with midrange DM ThinkSystem
04 Dec 2020Server vendor Lenovo wants to grow its ThinkSystem storage business. The DM5100F NVMe Lenovo storage array integrates S3 protocol for unified data management. Read More
Ensuring IoT security during a pandemic
11 May 2020Maintaining secure networks and IoT usage may seem secondary but following proven protocols to stay digitally protected is one way to come out on top, especially during a pandemic. Read More
Wi-Fi Alliance advances support for Wi-Fi 6E ecosystem
29 Jan 2021Specification published defining architecture, protocols and functionality for the automated frequency coordination system-to-AFC device interface to maximise the 6 GHz spectrum opportunity and expand Wi-Fi 6E ... Read More
Considerations for SIEM logging software and storage
19 May 2020SIEM systems aggregate a lot of data across all types of infrastructure. For regular audits, admins should address notification settings, analysis protocols and storage locations. Read More
Use these 6 user authentication types to secure networks
18 Oct 2023One layer of security that all networks and applications need is authentication. Read up on six authentication types, from 2FA to biometrics to certificates. Read More
Key components for negotiating an HPC colocation contract
10 Feb 2020When it comes to HPC colocation, there are specialized areas to cover in a service-level agreement. Review provider protocols for power, security and network connectivity. Read More
Governance best practices for citizen developers
14 Dec 2023The rise of citizen developers is revolutionising the way organisations approach software development. Here is a guide to supporting them Read More
Building for ESG now will help with future regulations
09 Feb 2024To keep pace with evolving ESG regulations, companies will need to coordinate with and gather data from all parts of the business. And laying the groundwork now will pay off. Read More
Compare block vs. file vs. object storage differences, uses
31 Oct 2023Object storage has surged in popularity, but file and block still have clearly defined uses. Access, metadata and performance are among admins' key considerations. Read More
5G security: Everything you should know for a secure network
05 Jan 20245G touts better security controls than 4G, including stronger encryption, privacy and authentication. But enterprises need to consider the challenges, too. Read More