Image Source

Digital Asset Management (DAM) systems are used by many organizations to manage the wealth of images, videos and animations. However, DAM systems are resource-intensive and require massive amounts of storage. Like many enterprise systems, it is increasingly compelling to move DAM to the cloud.

In this article I discuss the importance of DAM, the benefits of cloud-based and hybrid DAM deployments, and the challenges involved in cloud migration.

What Is Digital Asset Management?

DAM is a discipline that focuses on providing control, portability, accessibility and reporting of digital assets. …


When migrating your SQL databases to the cloud you need to make your choice carefully. Migration is time-consuming and can be costly, in terms of resources, support, and downtime. You don’t want to lose productivity or revenue when migrating to a service, only to find there was a better option available.

In this article, you’ll learn how AWS services compare to Azure and why migrating your databases to Azure can provide greater returns. In particular, you’ll learn how Azure’s migration solutions, flexible deployments, and licensing support can provide better value for organizations seeking an enterprise-grade solution.

Migrating SQL to AWS

When migrating to AWS…


SAP HANA is an in-memory relational database that provides real-time data processing and high-performance analytics. Amazon Web Service (AWS) services enable you to deploy SAP HANA in a highly available, fault-tolerant, and cost-effective way. When deploying SAP HANA on AWS, you get the performance benefits of SAP HANA along with the flexibility and scalability of the cloud.

Why Use SAP HANA in the Cloud?

You can deploy SAP HANA on the cloud for fast time-to-value or on-premise for maximum control. Both options have their pros and cons. The on-premise edition is an internal platform, located on your local servers. …


Image Source

Cloud computing clearly dominated the last decade. The explosive expansion of cloud computing services and tools shows that hosting workloads and data in the cloud is the new normal. Application development is a central part of this expansion, driving innovation.

More companies are choosing to move their application development to the cloud entirely, embracing cloud-native applications. However, this transition can be challenging, particularly if you’re unsure where to start. In this article, you’ll learn some considerations and tips that can help ease your migration of applications to the cloud.

The State of the Cloud Services Market

According to Gartner, the cloud services market is expected to reach…


Image source

Azure is a top cloud computing vendor. Oracle is a top database provider. It is only natural to link the two together. However, in today’s service-oriented computing landscape, there are many options to do any one task. If you are interested in setting up an Oracle database in Azure, you must first assess both vendors’ offerings, and then decide which configuration to implement.

In this article, you will learn about Oracle database types and features, and what the benefits of setting up an Oracle database in Azure. …


Image Source

Migration to a public cloud environment enables companies to avoid the overhead associated with on-premises infrastructure. In addition, cloud migration helps organizations to get visibility into application traffic, plan a solid disaster recovery strategy, and improve security.

Container orchestration platforms like Kubernetes can help developers migrate an application container to the cloud, since containers package application components in manageable block units. This article walks you through the process of migrating applications to Kubernetes.

What Is Kubernetes?

Kubernetes is an open-source container and microservices orchestration tool developed by Google. …


Image Source

There used to be times when the main question you would ask yourself was, “Should I keep my workloads and data on-premise or should I move to the cloud?” Today, this is still a viable question, but it is much more complicated. It is no longer a question of either/or.

You can adopt a hybrid approach, and leverage both the cloud and on-premise components. You can migrate everything to the cloud, but you can leverage multiple cloud vendors and create your own multicloud architecture.

The abundance of choices when it comes to infrastructure and architecture is incredible. It’s giving everyone…


Image Source

EBS is a popular cloud-based storage service offered by Amazon Web Services (AWS). This article will help you understand what EBS is, what you can do with EBS, and walk you through a quick process of creating your first EBS volume.

What Is EBS?

Elastic Block Store (EBS) is a block storage service based in the AWS cloud. EBS stores huge amounts of data in blocks, which work like hard drives (called volumes). You can use it to store any type of data, including file systems, transactional data, NoSQL and relational databases, backup instances, containers, and applications. EBS is usually used for

EBS…


More and more organizations provide access to APIs in order to enable a wider audience to use their information. This is why securing API access has become a critical concern. With the increasing adoption of mobile, cloud and hybrid environments, the security perimeter is expanding. Back-end systems have become more accessible to external developers through APIs, and as a result more cyber threats, such as DDoS attacks, target enterprise applications.

What Is an API Endpoint?

From a security perspective, an endpoint is any device or node located outside of the corporate firewall. An endpoint could be a tablet, laptop, mobile phone or server. When an…


Image Source: Pixabay

Today’s cyber attacks are sophisticated, strategic, versatile, and automated. An attack can be initiated by an individual who is looking for information to steal, and it can be organized by a criminal group or even a government agency. This article focuses on large-scale cyber attacks, the kind aimed at big enterprises or government entities.

What Is an APT Attack?

An advanced persistent threat (APT) attack is a high-scale attack deployed over a long period of time — for months and even years. The attackers plan in advance the target and the objects of the attack.

The targets of APT attack include large organizational networks that…

Eddie Segal

I’m an electronics engineer and also a technology writer. In my writing I’m covering subjects ranging from cloud storage and agile development to cybersecurity

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store