08:59 PM
Terry Sweeney
Terry Sweeney
Connect Directly

Worth Watching

Back when I covered storage networking a lot more closely, I learned to anticipate the industry's rhythms. If any one of EMC, HP, IBM, or NetApp introduced something, one of the other three would frequently contact me on the QT to let me know why their solution was still superior.

Back when I covered storage networking a lot more closely, I learned to anticipate the industry's rhythms. If any one of EMC, HP, IBM, or NetApp introduced something, one of the other three would frequently contact me on the QT to let me know why their solution was still superior.The other seasonal rite I could count on was all the Apple storage news during the National Association of Broadcasters' tradeshow -- all that video content had to be edited and stored somewhere. I used to shrug off video as a little too niche-y, but these days I'm giving it a lot closer look.

Part of the reason is YouTube -- have you heard of it? Maybe you watched one of more than 3 billion videos downloaded from the site in January. That was only one-third of 9.8 billion videos downloaded in January, according to ComScore.

YouTube wants to improve that experience -- especially since January's numbers for downloaded videos lagged December (10.1 billion). A YouTube founder promised back in November that the site was testing high-definition content. Now apparently they've started adding HD content, albeit slowly.

The other video trend I want to call attention to is the surveillance piece. A couple startups written about here are tackling the issue of how to archive video surveillance, which can only be on the upswing in our post-9/11, all-we-have-love-is-fear-itself world.

It's easy to imagine this continuing to grow on a nice, constant arc. Lots of doors, gates, road intersections, highway entry/exit ramps, and airport spaces (for starters) where IT or others might want to dial back to a specific minute of an important day. I don't want to dwell here too much longer.

What's good for storage vendors will prove challenging for storage managers. Video promises to be the double-edged sword, but it's not like we don't see it coming -- it's clear as can be at 1080p resolution.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.