InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

The Future of Cloud Storage is Decentralized

Presented by

JT Olio, Storj CTO; John Gleeson, Storj COO

About this talk

The decentralized future of cloud storage starts with an internet architecture for Web3 performance, privacy, resilience, and sustainability - and at a lower cost than what you pay now. Just like the internet grew out of a necessity to have no single point of failure or ownership, the decentralized internet or Web3 is putting data ownership and privacy back in the hands of the users vs. a few large corporations. Join us for the 'Future of Storage is Decentralized' webinar where Storj CTO, JT Olio and Storj COO, John Gleeson, discuss how the globally decentralized and distributed architecture of Storj DCS aligns with all the concepts behind native Web3 and beyond. Attend the webinar to discover how decentralized cloud storage delivers: - Complete transparency and power to the users - A defense-in-depth strategy combining default encryption, a zero trust approach and a zero knowledge architecture - Built-in automation for encryption, multi-region, parallelism, redundancy, file repair and more - A pledge to be the greenest storage platform via PoW divesting, CO2 output offsets and tens of thousands of refurbished Storage Nodes
Storj

Storj

600 subscribers6 talks
Storj DCS is decentralized, secure cloud object storage for developers
Storj (pronounced storage) created the world’s first open source decentralized cloud object storage network, Storj DCS (Decentralized Cloud Storage). Storj DCS is private by design and secure by default, delivering unparalleled data protection and privacy versus centralized cloud object storage alternatives. Default encryption, user-assigned access controls, affordable and predictable pricing, a robust library of technical documentation, and a vibrant user community enable developers to confidently, easily, and economically leverage decentralized technology to take control of their data.
Related topics