Change layout
Don’t miss new articles!
Thank you for subscribing!
Google Cloud Storage Classes Explained

Google Cloud Storage Classes Overview: Standard vs Nearline vs Coldline

Google Cloud Storage Classes Overview: Standard vs Nearline vs Coldline

Google Cloud Storage has a number of classes to choose from. All of them guarantee 99.999999999% durability, have universal API, unlimited capacity, and almost zero latency—the download starts within milliseconds. Still, they vary in price and usage terms. In this post, we will explain Google Cloud Storage classes and find the best one that suits your needs. Continue reading

Don’t miss new articles!
Thank you for subscribing!
default featured image

How to Improve Amazon S3 Data Protection Using Cross-Region Replication

How to Improve Amazon S3 Data Protection Using Cross-Region Replication

By default, Amazon S3 stores multiple copies of your data inside different facilities within one AWS Region. In case of region-level disaster like tornado, flood or earthquake all these facilities will experience outage and despite all precautions your crucial data may be lost. Consequences are catastrophic, especially in case of user-generated content that can’t be easily reproduced.

This article explains how to Configure Cross-Region Replication between buckets in different AWS Regions to achieve region-level data protection. Continue reading

AWS vs Azure vs Google Cloud

Compare AWS, Microsoft Azure and Google Cloud for Backup

Compare AWS, Microsoft Azure and Google Cloud for Backup

Cloud users typically choose a multi-vendor approach for their data backup and storage tasks. Using different solutions leads to more flexibility and often allows to cut overall expenditures. Azure, AWS, and Google are among the world's top providers of cloud storage services, so it is important to know about their differences in order to choose the right vendor for each particular need.
Continue reading

OpenStack Keystone Verification Explained

OpenStack Keystone Verification Explained

To continue our conversation about authentication and authorization, we took a decision to consider OpenStack Keystone. This technology allows to make sure of the user’s identity and enhance the security of requests sent to OpenStack Services API without making outside access more complicated.

This article will be of use to everybody who wants to get an idea about OpenStack authentication and take a close look at its basic principles and logic. Continue reading

Load more