Blog Archives

Does All-Flash Eliminate the need for Database Tuning?

Database administrators (DBAs) spend a large portion of their day optimizing databases. Do all-flash arrays eliminate that need? While in most cases, the answer to any IT question is “it depends”, in this instance the answer is an emphatic NO!.

Tagged with: , , , , , , ,
Posted in Blog

Enterprise File Sync and Share Panel Discussion

The mobile ”work from anywhere” workforce creates new challenges for IT. Users not only need to sync and share data, they need to have data protected and need efficient storage in remote offices. IT can no longer let users establish

Tagged with: , , , , , ,
Posted in Blog

Why Backups Can’t Protect Against Ransomware

Ransomware is a new type of threat. As a result it needs a new type of defense. The reason is simple: Backups are not enough to protect against ransomware. They are increasingly victims of the attack themselves, and they don’t

Tagged with: , , , , , , ,
Posted in Blog

ChalkTalk Video: WannaCry, Snowden, Wikileaks… Is Your Data Next?

When IT defenses are compromised, the organization faces one of two challenges. Either the data is encrypted by a ransomware attack or it is copied to the attacker’s servers. In the first case, assuming data protection is in place and

Tagged with: , , , , , , , , ,
Posted in Video

How to Get More from All-Flash Using Software Defined Storage

Flash often makes the hardware selection less important, but makes the software selection very important. The right software can not only ensure optimal flash performance, but also extend flash implementation beyond the typical high-transaction database use cases and into modern

Tagged with: , , , , , , , , , ,
Posted in Blog

What if Archive Storage Cost More Than Primary?

Even if archive storage was the same price as primary storage, you’d still want to archive. While most in IT look at archiving as a way to reduce the cost of primary storage there is a lot more to it

Tagged with: , , , , , , ,
Posted in Blog

How Do You End Ransomware?

Here we go again. Friday, a ransomware attack hit the England’s National Health Care System. And according to sources they are paying! Once again we are rewarding bad behavior. The only way to end ransomware is to dry up its

Tagged with: , , , ,
Posted in Blog

How To Solve The Three Biggest HCI Adoption Challenges

Guaranteeing application performance, creating a cloud like consumption model and timing the simultaneous replacement of three data center architectures are the biggest hindrances to HCI adoption. Hyperconverged infrastructures (HCI) promise to simplify a data center, making it more cloud like.

Tagged with: , , , , , , , , ,
Posted in Blog

What is Ransomware?

Ransomware is one of the biggest threats facing IT. What exactly is ransomware? Ransomware is a program that once installed in a system encrypts an organization’s data and the only way to get it unencrypted is to pay a fee

Tagged with: , , , , , , , ,
Posted in Blog