Feeds

Caringo greases up CAStor product, slips out VM versions

File access to objects

Reducing the cost and complexity of web vulnerability management

Object storage startup Caringo has introduced virtual machine editions of its CAStor object storage product along with standard file protocol access to CAStor, broaching the question whether object storage will just become file storage under another name.

Both CAStor and Caringo's Content File Server (CFS) come as virtual machines (VMs) that run on any Windows server under VMware ESX and VMware Player and on Macs via VMware Fusion. The CFS VM can also run on Oracle VirtualBox (Windows or Mac). The idea is that potential customers can try out the Caringo products as the VMs can be downloaded with a free 2TB licence.

The supported file protocols are CIFS, NFS, FTP, and WebDAV. Recently Scality has announced file access to its object storage Ring. It might become the case that object storage becomes another and different way of storing files, taking advantage of the technology's scalability. ®

Choosing a cloud hosting partner with confidence

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.