U of Southern California Implements Private Cloud Collaboration Solution

The University of Southern California (USC) has plans to implement a private cloud collaboration solution with a unified data storage appliance. The solution is licensed to support up to 5,000 users at one of the university's professional schools.

The school wanted to enable its faculty and students to collaborate online in a bring-your-own-device (BYOD) environment, but public cloud services don't provide the level of security and auditing required by the university.

USC chose the IceBox private cloud collaboration solution from IceWeb with an IceWeb 2200 IceBox storage appliance.

According to information from the company, the IceBox 2200 provides:

  • 8 TB of storage capacity that is expandable to 48 TB;
  • 2U (rack units) form factor;
  • 256-bit data encryption;
  • Built-in backup utility and disaster recovery replication capability;
  • BYOD support for Apple iOS, Blackberry, Windows Mobile, and Android; and
  • Ability to present existing Windows network file shares through the IceBOX Cloud Platform.

Using the IceBox private cloud, faculty and students at USC will be able to access, share, and synchronize files — including very large files — securely from virtually any device, anywhere. Changes to files are assigned version numbers automatically, so people can retrieve older versions of documents as needed. The solution's auditing features let administrators monitor activity to ensure data security and compliance.

The University of Southern California is a private, not-for-profit research university based in Los Angeles, CA. It serves approximately 40,000 undergraduate and graduate students and employs more than 3,500 full-time faculty members.

Further information about IceWeb's IceBox private cloud collaboration solution can be found at iceweb.com.

About the Author

Leila Meyer is a technology writer based in British Columbia. She can be reached at [email protected].

Featured

  • person signing a bill at a desk with a faint glow around the document. A tablet and laptop are subtly visible in the background, with soft colors and minimal digital elements

    California Governor Signs AI Content Safeguards into Law

    California Governor Gavin Newsom has officially signed off on a series of landmark artificial intelligence bills, signaling the state’s latest efforts to regulate the burgeoning technology, particularly in response to the misuse of sexually explicit deepfakes. The legislation is aimed at mitigating the risks posed by AI-generated content, as concerns grow over the technology's potential to manipulate images, videos, and voices in ways that could cause significant harm.

  • close-up illustration of a hand signing a legislative document

    California Passes AI Safety Legislation, Awaits Governor's Signature

    California lawmakers have overwhelmingly approved a bill that would impose new restrictions on AI technologies, potentially setting a national precedent for regulating the rapidly evolving field. The legislation, known as S.B. 1047, now heads to Governor Gavin Newsom's desk. He has until the end of September to decide whether to sign it into law.

  • illustration of a VPN network with interconnected nodes and lines forming a minimalist network structure

    Report: Increasing Number of Vulnerabilities in OpenVPN

    OpenVPN, a popular open source virtual private network (VPN) system integrated into millions of routers, firmware, PCs, mobile devices and other smart devices, is leaving users open to a growing list of threats, according to a new report from Microsoft.

  • interconnected cubes and circles arranged in a grid-like structure

    Hugging Face Gradio 5 Offers AI-Powered App Creation and Enhanced Security

    Hugging Face has released version 5 of its Gradio open source platform for building machine learning (ML) applications. The update introduces a suite of features focused on expanding access to AI, including a novel AI-powered app creation tool, enhanced web development capabilities, and bolstered security measures.