NetApp All Flash Guarantee Explained

Already a leader in Gartner Magic Quadrant for Solid-State Arrays, NetApp all-flash systems are well known to be able to deliver optimal efficiency using state-of-the-art data reduction, including...

Next Generation Firewall Explained

What is A Next Generation Firewall? Next Generation Firewall Explained. A Next Generation Firewall serves the purpose of existing traditional firewalls and (as you might expect) also...

Next Generation Endpoint Protection Explained

Endpoint protection or endpoint security is a policy-based approach to network security that addresses risks presented by devices connecting to an enterprise network. As BYOD (Bring Your Own Device)...

Next Generation Firewall

What is A Next Generation Firewall? Next Generation Firewall Explained. A Next Generation Firewall serves the purpose of existing traditional firewalls and (as you might expect) also...

NoSQL Performance Explained

In this era of the ‘Third Platform’, modern applications now operate in myriad IT environments across social media, mobile computing, big data analytics, and cloud, which makes complex...

NVMe Explained

NVMe, or Non-Volatile Memory Express, is the standardised interface protocol that has been optimised for solid-state drives (SSDs). In the early days, SSDs used to leverage legacy SAS (Serial...

Object Storage

Object Storage or an Object Store is a method of storing and managing data on disk that overcomes the limitation of standard disk arrays and filesystems. Effectively every piece of data is stored as...

Passive Marker

Augmented Reality involves superimposing digital images into real-time images of the real world. This means being able to view the real world through an AR device and have the digital images move...

Private Email Server Explained

A private email server is an email system that’s offered via a private server for better functionality, privacy and security. Most public email providers like Google and Hotmail use their own...

Privilege Creep Explained

In an IT organisation, each employee has their own set of privileges which they need to perform their duty. One such privilege may be the right to access a particular system resource like file...

© Asia Online Publishing Group Sdn Bhd 2017
Powered by