Blog Archives

Using Machine Learning to Eliminate Data Center War Rooms – Virtual Instruments Briefing Note

According to Dimensional Research, over 60% of enterprises experience two or more significant application performance issues per month. In the modern data center, most users equate poor performance the same as application downtime. Performance issues, though, are usually much harder

Tagged with: , , , , , , , ,
Posted in Briefing Note

Understanding the AWS Data Protection Market – Cloud Daddy Briefing Note

Organizations should keep a backup of applications running on Amazon Web Services (AWS). Unlike on-premises applications where the primary concern is disaster recovery, the primary motivation for protecting cloud-native applications is recovery from cyber-attacks, rogue users or application faults. Each

Tagged with: , , , , , , , ,
Posted in Briefing Note

Modernizing NAS Instead of Replacing It – Qumulo Briefing Note

Organizations are almost universally struggling with storing and managing their unstructured data. From a storage system perspective, vendors offer legacy NAS systems, object storage systems and cloud storage services, all trying to convince IT professionals that they are the best

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note

Webinar: Application Explosion – Rediscovering the Lost Art of Protection Service Levels

The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the

Tagged with: , , , , , , , , , ,
Posted in Webinar

SlideShare: How to Design a 92TB, 500K IOPS AFA for less than $95,000!

All-Flash Arrays are the model of inefficiency and as flash media increases in density and performance, the cost of this inefficiency becomes more obvious. Enterprise solid-state drives (SSD) deliver 70,000 IOPS per drive but most AFAs need 24 drives or

Tagged with: , , , , , , , , ,
Posted in Slideshare

Webinar – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Webinar

Backup Endpoints So You Can Wipe Them

One of the best reasons to backup endpoints like laptops, tablets and smartphones has nothing to do with restores, it has to do with deletion. Endpoints are the most vulnerable to theft. They are left in airport security lines, Starbucks

Tagged with: , , , , , , ,
Posted in Blog

HYCU for Google Cloud Platform

HYCU for Google Cloud Platform (GCP) is a native Google Cloud service designed to protect applications running in the Google Cloud. The software is available directly from the Google Marketplace. Instead of developing its own mechanisms for protecting data, HYCU

Tagged with: , , , , , , , , , ,
Posted in Blog