{"id":22362,"date":"2016-05-06T18:02:00","date_gmt":"2016-05-06T18:02:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/3801751"},"modified":"2016-05-06T18:02:00","modified_gmt":"2016-05-06T18:02:00","slug":"session-regaining-control-of-storage-performance-by-securityfirstco-cloudexpo-cloud","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/session-regaining-control-of-storage-performance-by-securityfirstco-cloudexpo-cloud\/","title":{"rendered":"[session] Regaining Control of Storage Performance By @SecurityFirstCo | @CloudExpo #Cloud"},"content":{"rendered":"<p>Cloud Object Storage is effectively infinitely scalable and boasts the lowest total costs. But cloud SLAs and T&#038;Cs are traditionally optimized for huge customers like Netflix, so applications demanding better confidentiality or higher availability typically can\u2019t reap the benefits of public cloud storage.<br \/>\nIn his session at 18th Cloud Expo, Don Martin, CTO of Security First Corp, will provide an overview of innovative technologies available today \u2013 secret sharing and information dispersal algorithms \u2013 that enable multiple, redundant cloud storage locations to be efficiently harnessed for the most sensitive and most demanding storage applications.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3801751\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud Object Storage is effectively infinitely scalable and boasts the lowest total costs. But cloud SLAs and T&amp;Cs are traditionally optimized for huge customers like Netflix, so applications demanding better confidentiality or higher availability typically can&rsquo;t reap the benefits of public cloud storage.<br \/>\nIn his session at 18th Cloud Expo, Don Martin, CTO of Security First Corp, will provide an overview of innovative technologies available today &ndash; secret sharing and information dispersal algorithms &ndash; that enable multiple, redundant cloud storage locations to be efficiently harnessed for the most sensitive and most demanding storage applications.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3801751\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":143,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-22362","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/22362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=22362"}],"version-history":[{"count":2,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/22362\/revisions"}],"predecessor-version":[{"id":22758,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/22362\/revisions\/22758"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=22362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=22362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=22362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}