As children we all enjoyed those puzzles where words had their letters scrambled and we had to figure out the secret to make the words or sentences legible. This simple example of encryption is deployed in vastly more complex forms across many of the serv ...
Creating the Mind Flayer in Stranger Things’ Season 2 Finale
We initially got a bid for just two episodes of "Stranger Things" Season 2. In the end, we worked on every single episode. The shot counts and the amount of work just grew and grew. It was exciting to have them come back to us – it went from being a fairl ...
OpenStack—The Next Generation Software-defined Infrastructure for Service Providers
Many service providers face the challenge of competing with the pace of innovation and investments made by hypercloud vendors. You constantly need to enable new services (e.g., containers, platform as a service, IoT, etc.) while remaining cost competitive ...
Three Key Best Practices for DevOps Teams to Ensure Compliance
Driving Compliance with Greater Visibility, Monitoring and Audits Ensuring Compliance in DevOps DevOps has fundamentally changed the way software developers, QA, and IT operations professionals work. Businesses are increasingly adopting a DevOps app ...
The Future of Data Protection
Enterprises to spend 56% more of their IT budgets on cloud technologies by 2019. The cloud momentum As I meet with customers, most of whom are large global enterprises, the topic of the cloud continues to come up. Getting cloud right means new ways to s ...
5 Steps to Getting Started with Open Source Software Defined Storage and Why you should take them
Executive Summary Back in 2013, analyst group IDC calculated that the total amount of data created and replicated in the world had edged beyond 4.4 zettabytes - a staggering number. The statement made the headlines and was widely repeated across media ...
Top Reasons to use Veritas NetBackup 8.1 data Protection for Nutanix Workloads.
The continual growth of data increases the use of virtualization and drives the need for highly scalable data protection and disaster recovery solutions. As a result, organizations are turning to hyperconverged solutions as way to keep deployment and mana ...
Cloud Security: How to Secure Your Sensitive Data in the Cloud
In today’s always-connected world, an increasing number of organisations are moving their data to the cloud for operational efficiency, cost management, agility, scalability, etc. As more data is produced, processed, and stored in the cloud – a prime t ...