<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Approach</title> <atom:link href="https://www.iphere.com/tag/approach/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>In Defense Of VMware NSX And The Overlay Approach</title><link>https://www.iphere.com/in-defense-of-vmware-nsx-and-the-overlay-approach</link> <comments>https://www.iphere.com/in-defense-of-vmware-nsx-and-the-overlay-approach#comments</comments> <pubDate>Sun, 15 Sep 2013 08:16:44 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Approach]]></category> <category><![CDATA[Defense]]></category> <category><![CDATA[Overlay]]></category> <category><![CDATA[VMware]]></category> <guid
isPermaLink="false">http://www.iphere.com/in-defense-of-vmware-nsx-and-the-overlay-approach</guid> <description><![CDATA[By using a network overlay architecture, NSX cleanly segments SDN approaches into two realms: the physical and virtual. The overlay strategy has been criticized, but it makes the most sense. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/in-defense-of-vmware-nsx-and-the-overlay-approach/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>CloudSigma IaaS Avoids Amazon Approach</title><link>https://www.iphere.com/cloudsigma-iaas-avoids-amazon-approach</link> <comments>https://www.iphere.com/cloudsigma-iaas-avoids-amazon-approach#comments</comments> <pubDate>Mon, 01 Jul 2013 14:20:50 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Amazon]]></category> <category><![CDATA[Approach]]></category> <category><![CDATA[Avoids]]></category> <category><![CDATA[CloudSigma]]></category> <category><![CDATA[IaaS]]></category> <guid
isPermaLink="false">http://www.iphere.com/cloudsigma-iaas-avoids-amazon-approach</guid> <description><![CDATA[CloudSigma launched Version 2.0 of its signature infrastructure-as-a-service (IaaS) on June 20, offering features that are decidedly non-Amazon-like. For one thing, you provision the server you want, setting your desired memory, CPU and networking, rather than being given a pre-bundled server. For another, you&#8217;re billed for five-minute cycles, not by the hour, saving you money [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/cloudsigma-iaas-avoids-amazon-approach/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Encryption, Data-Centric Approach Needed To Secure Cloud, Mobile Users</title><link>https://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users</link> <comments>https://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users#comments</comments> <pubDate>Wed, 08 Feb 2012 20:13:59 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Approach]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[DataCentric]]></category> <category><![CDATA[Encryption]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Needed]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[users]]></category> <guid
isPermaLink="false">http://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users</guid> <description><![CDATA[The ever-growing mobile workforce with its head in the cloud has created what seems like an endless list of IT challenges to overcome, and with anywhere, anytime access to information a necessity for many enterprises, the new IT world is having an impact on the kind of encryption enterprises need to protect their sensitive and [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>The Cloud, Day 8: A Different Approach to Email</title><link>https://www.iphere.com/the-cloud-day-8-a-different-approach-to-email</link> <comments>https://www.iphere.com/the-cloud-day-8-a-different-approach-to-email#comments</comments> <pubDate>Sun, 20 Nov 2011 20:14:55 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Approach]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Different]]></category> <category><![CDATA[Email]]></category> <guid
isPermaLink="false">http://www.iphere.com/the-cloud-day-8-a-different-approach-to-email</guid> <description><![CDATA[30 Days With the Cloud: Day 8 For yesterday’s 30 Days With the Cloud post, I spent time choosing a cloud-based email service, and getting it all set up. In the comments, there were some issues raised about how or why I set things up the way I did, so today I am taking another [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/the-cloud-day-8-a-different-approach-to-email/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>A Business-Centric Approach to Searching the Web</title><link>https://www.iphere.com/a-business-centric-approach-to-searching-the-web</link> <comments>https://www.iphere.com/a-business-centric-approach-to-searching-the-web#comments</comments> <pubDate>Fri, 22 Apr 2011 08:13:44 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Approach]]></category> <category><![CDATA[BusinessCentric]]></category> <category><![CDATA[Searching]]></category> <guid
isPermaLink="false">http://www.iphere.com/a-business-centric-approach-to-searching-the-web</guid> <description><![CDATA[With millions upon millions upon millions of sites to choose from, it can sometimes be difficult to find relevant results when searching the Web. Factiva, a search engine from Dow Jones focuses on business, and attempts to make business search more productive by weeding out irrelevant consumer sites. Web search is engrained in the social [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/a-business-centric-approach-to-searching-the-web/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>ZL Technologies: A Unified Approach To Active Archiving</title><link>https://www.iphere.com/zl-technologies-a-unified-approach-to-active-archiving</link> <comments>https://www.iphere.com/zl-technologies-a-unified-approach-to-active-archiving#comments</comments> <pubDate>Sat, 26 Feb 2011 17:10:35 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Active]]></category> <category><![CDATA[Approach]]></category> <category><![CDATA[Archiving]]></category> <category><![CDATA[Technologies]]></category> <category><![CDATA[Unified]]></category> <guid
isPermaLink="false">http://www.iphere.com/zl-technologies-a-unified-approach-to-active-archiving</guid> <description><![CDATA[Even though the &#8220;cloud&#8221; occupies much of the dialogue about transformative processes in IT, the place of archiving in that transformation is still poorly understood by many IT organizations and needs to attract more attention. Therefore, we should welcome any light that can be shed on the subject, and ZL Technologies&#8217; unified archiving approach is [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/zl-technologies-a-unified-approach-to-active-archiving/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>IBM Applies Evolutionary Approach To Revolutionary Chip</title><link>https://www.iphere.com/ibm-applies-evolutionary-approach-to-revolutionary-chip</link> <comments>https://www.iphere.com/ibm-applies-evolutionary-approach-to-revolutionary-chip#comments</comments> <pubDate>Fri, 03 Dec 2010 09:06:14 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Applies]]></category> <category><![CDATA[Approach]]></category> <category><![CDATA[Chip]]></category> <category><![CDATA[Evolutionary]]></category> <category><![CDATA[Revolutionary]]></category> <guid
isPermaLink="false">http://www.iphere.com/ibm-applies-evolutionary-approach-to-revolutionary-chip</guid> <description><![CDATA[IIBM has said that it will deliver an exascale chip within the next five years. The company made the annoucement less than two weeks after the U.S. Department of Energy&#8217;s Argonne National Laboratory announced the creation of the Exascale Technology and Computing Institute (ETCi). Big Blue has also stated that the chip, based on new [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/ibm-applies-evolutionary-approach-to-revolutionary-chip/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>