Whether it is to detect if any corruption has occurred, through to establishing the security of a file transfer or ensuring that a file is fully formed, the Enterprise File Fabric is equipped to easily deal with media asset validation integrity.by
The File Fabric for Media is a specialised version of the File Fabric specifically for companies who deal with large media assets. This case study focused on the use of the File Fabric for Media at an established UK Premier League Football Club.by
Object storage platforms, such as Amazon S3 are evolving at a rapid pace. The Amazon S3 API has become a de facto standard alongside other platform like OpenStack Swift and Ceph, and with that progression, it brings us many new features and integrations.by
Sometimes, editing documents can be a pain. Your colleague might ask you to add something to a document, but to edit it, you need to download it, open it, edit the document, save it, re-upload it. You then might have the email exchange of why it won’t open on their machine but it does open fine on yours. It’s a hassle. But there is an easier way. Continue reading “New – Edit your documents with Microsoft Office Online and the File Fabric”by
Providing remote users with access to on-premises file systems, such as Microsoft DFS or Windows CIFS shares, can be a hard task, especially as multiple security layers often exist, like firewalls and VPNs.
Some companies have opted to solve this challenge by deploying the Microsoft Forefront Unified Access Gateway (UAG) as a bridge to provide users who are remote with access to these on premise systems. The UAG was a software solution, facilitating access to file shares, intranets and corporate systems.
The Microsoft Forefront Unified Access Gateway is now officially deprecated.by
Lately we’ve been working very closely with RedHat’s Ceph Rados storage and it’s librados API, where we’re seeking an ever closer integration with the backend storage to utilise many of Ceph’s benefits.
However lately, we hit a issue where one of our customers had configured their Pool to be erasure coded. Erasure coding is a form of data protection and data redundancy whereby the original file or object is split up into a number of parts, and distributed across a number of storage nodes, either within the same data-centres or across multiple multiple data-centres and regions.by