For some people, sharing data means lending out their USB key to someone with the data on it. However, the internet has increased the range of possibilities for data sharing. So, what data are you sharing, with whom and why?
In principle, sharing data over a network means that we really want to share it, but under certain conditions and with particular people. In addition to this, there is also the issue of where the information is stored to ensure that quality flow can be guaranteed (you need a fast rate when sharing videos) as well as the level of security with storage and access. Therefore, you need to find out if you are sharing simple files, in which case you need a file server mode. Alternatively, if access concerns software that is used to evaluate the data, in which case you need data server mode. For example, when using a video, we can download it or stream it, which is not the same function or service. When you download it, you cannot see the video until the file is fully downloaded. When you stream it, it is read as if it were on a DVD: you can pause, rewind or fast forward, etc.
So, who are you sharing it with? We can differentiate between sharing familial content and professional content. In the familial context, this is the content that appears in social networks, such as Facebook, but obviously you don’t publish your entire life story on the Internet for the whole world to see. Your life is your own, and it is often that of your loved ones. For those who want to share large volumes of data easily and confidentially both at home and with a few loved ones, a solution based on NAS (Network Access Storage or file server network) allows them to do this without requiring a special subscription, except for the Internet of course, which we will look at in another blog post.
For professionals, sharing content is not so simple. They need to clearly assess their needs which do not just consider the data and the software which manages it. The issue for professionals relates to access rights as well as the location and the type of terminal. In addition to this, the type of security used for transferring data, along with the bandwidth used according to the type of data, the number of users and their location. Basically, they need to consider which global IT, network and telecoms infrastructures they are going to access.
In reality, everyone can have a need to share their data, but everyone really needs to think about the conditions under which they share it.