Blog Archives

Webinar: Holistic Disaster Recovery; from Data Center to Endpoint

Most disaster recovery strategies focus exclusively on the data center but most users use laptops and other endpoints to get their work done. And those endpoints often have unique, business critical data on them. Data center servers and storage as

Tagged with: , , , , , , , , , ,
Posted in Webinar

Defining SDN in the Open Networking Era

Software-defined networking (SDN) represents the future of networking. A “software-defined” network enables an organization to virtualize their network, automate operations to enable efficient network configuration, and integrate network functions across dozens of switches creating a unified network architecture that is

Tagged with: , , , , , ,
Posted in Blog

Creating a Data Privacy Protection Architecture

The General Data Protection Regulation (GDPR) forces organizations to evolve from a data protection mindset to a data management mindset. IT can no longer let backups store data on secondary storage as giant blobs of ones and zeros. The process

Tagged with: , , , , , ,
Posted in Blog

Object Storage or Cloud for Enterprise File Sync and Share

Enterprise File Sync and Share (EFSS) is a “must deliver” for IT since most users perceive the capability to be a “must have”. In our last blog we discussed what to look for in an EFSS and explained the advantages

Tagged with: , , , , , , , , , , ,
Posted in Blog

Making NoSQL Protection Operations Driven – Imanis Data Briefing Note

It seems like backup vendors forgot about protecting NoSQL environments. Environments like Cassandra, MongoDB, Hortonworks, Couchbase, and Hadoop all need point-in-time protection. One reason for the lack of data protection solutions for these environments is that there is an assumption

Tagged with: , , , , , , , , ,
Posted in Briefing Note

Does All-Flash Array Software Improve Performance?

The raw performance of a single enterprise flash drive is often higher than 70,000 IOPS. Most all-flash arrays, even though vendors fill them with 12 to 24 flash drives, deliver only a few hundred thousand IOPS. The cause of the

Tagged with: , , , , , , , , ,
Posted in Blog

Office 365 Delete Items Folder – Isn’t 24,855 days enough?

A question that came up on our on demand webinar “Next Question: How to protect Office 365” was “Can’t I just use the Deleted Items Folder?” The deleted items folder does help prevent some data loss. Microsoft Office 365 allows

Tagged with: , , , , , , , ,
Posted in Blog

Modern Data Protection Architectures Enable a Step-by-Step Cloud Journey

The cloud holds much promise for data protection, but support for the cloud varies depending on the solution. Traditional backup applications and appliances have, at best, rudimentary support for the cloud. They may only mirror the on-premises copy of data

Tagged with: , , , , , , , , , ,
Posted in Blog

Making Storage for AI and DL Turnkey – DDN – NVIDIA Briefing Note

When an organization moves Artificial Intelligence (AI) and Deep Learning (DL) projects from the test and design phase to production, the responsibility for maintaining that project often lands in IT’s lap. IT then has to put together an architecture that

Tagged with: , , , , , , , , ,
Posted in Briefing Note

SlideShare: Eliminate Backups and Simplify DR with Hybrid Cloud Storage

The cloud should be a valuable ally in helping organizations eliminate backup infrastructure and increase their disaster recovery (DR) confidence. The reality is that current cloud backup and DR solutions fall short because they don’t fully exploit cloud resources. Most

Tagged with: , , , , , ,
Posted in Slideshare