NVMe Over Fabrics Explained

In the modern data centre, SSDs are increasingly used by enterprises to deliver much better speeds and response times than spinning drives. NVMe is a standardised protocol which was developed to...

Object Storage

Object Storage or an Object Store is a method of storing and managing data on disk that overcomes the limitation of standard disk arrays and filesystems. Effectively every piece of data is stored as...

Passive Marker

Augmented Reality involves superimposing digital images into real-time images of the real world. This means being able to view the real world through an AR device and have the digital images move...

Phishing Explained

Phishing is a type of social engineering attack which attempts to lure you into divulging your personal or sensitive information using misleading and deceptive methods. Phishing can be carried out...

Private Email Server Explained

A private email server is an email system that’s offered via a private server for better functionality, privacy and security. Most public email providers like Google and Hotmail use their own...

Privilege Creep Explained

In an IT organisation, each employee has their own set of privileges which they need to perform their duty. One such privilege may be the right to access a particular system resource like file...

Quantum Computing Explained

Quantum computing is the process in which computers operate at the quantum level with atomic-level bits, called quantum bits or qubits. Quantum computers are much more powerful than classical...

Ransomware Explained

Ransome is a type of Malware. Essentially Malware is a form of cyber-attack that tricks an individual into installing software onto their computer. Once installed this software allows cyber...

Red Hat Gluster Storage Explained

Red Hat Gluster Storage? Red Hat Gluster Storage is an open, software defined scale-out storage platform to easily manage unstructured data for physical, virtual, and cloud environments. Red Hat...

Red Teaming Explained

Red teaming is the organising of cybersecurity experts who simulate real-world attacks on the assets of enterprises. They utilise techniques and procedures disinterested parties or even adversaries...

© Asia Online Publishing Group Sdn Bhd 2017
Powered by