Hacktivists Explained

There are many types of cybercriminals today. While most cyber criminals are looking to steal data and information for a profit, hacktivists hack for politically or socially motivated purposes. Seen...

Hadoop Performance

Hadoop is most commonly used as a platform for Big Data Analytics, as its ability to split files and distribute them across nodes in random clusters makes it superior in storing and processing...

Hardware Security Module (HSM) Explained

Hardware Security Module (HSM) refers to a dedicated security device that acts as a virtual Fort Knox for your cryptographic keys. In cybersecurity, where safeguarding sensitive data is paramount,...

HCI Tax Explained

Hyperconverged Infrastructure of HCI refers to a software defined approach to managing the three major components of a Datacentre.   Compute, Network and Storage are tightly...

Hybrid Cloud Storage Explained

Hybrid cloud storage is a combination of on-site storage infrastructure as well as private and public cloud storage. This hybrid arrangement allows organisations to enhance their data storage...

Hybrid Workforce Explained

When the pandemic was at its peak, industries considered to be non-essential resorted to remote working. As regulations were loosened, some of these remote workers weren’t keen on returning to...

Hyper-Converged

Hyper-converged is a new approach to building IT infrastructure. Hyper-converged appliances take Compute, Storage and Networking and integrates them tightly by placing them in a single machine...

Hyperconverged

Hyperconverged is a new approach to building IT infrastructure. Hyper-converged appliances take Compute, Storage and Networking and integrates them tightly by placing them in a single machine...


© Asia Online Publishing Group Sdn Bhd 2022
Powered by