Case Study: Cryptocurrency, connectivity and the cloud
BT presents findings from cryptocurrency firm Gemini on how they're providing customers with direct connectivity thanks to the Radianz network
Credit: Adobe Stock
Cryptocurrency firm, Gemini, offers customers a secure and regulated way to buy, sell and store cryptocurrency.
But, as most of its customers aren’t traditional financial service institutions, it needed a secure way to offer its services to people using the public cloud.
In this video, Drew Candres, Director of Institutional Support at Gemini, talks about how the partnership between Gemini and Radianz has transformed business - allowing customers to connect directly to Gemini’s infrastructure through the cloud.
Find out how we’re working together to enable Gemini to expand its connectivity footprint, make its infrastructure globally accessible and support vital trading applications like AWS and GCP in the video below:
Or here to read their white paper: SD-WAN is the cornerstone of network transformation.
Examining the language of each party’s manifesto reveals significant differences in the amount and focus of proposals related to technology and data policy – as well as in the wider themes of each...
Institution looks to tech to revamp the way it recruits students
Rounding up the Tories’ key pledges in the area of digital and data, including a new cybercrime force and tax incentives for investments in cloud computing
Post comes with remit to spearhead tech transformation and manage £55m planned investment
To have the best chance of an effective response and a full recovery, organisations should have a robust incident response strategy in place, says BT
We hear from BT about why delivering a great customer experience depends on your network visibility
Organisations are increasingly having to replace their legacy voice infrastructure as traditional analogue and ISDN lines are being phased out. BT talk about how they can help the transition...
BT outlines how a zero-trust approach is the best form of defence in a multi-attack vector environment