Blog Archives

How to Leverage the Cloud for Unstructured Data Protection

Unstructured data is growing at alarming rates. The growth is the result of not only increased user activity but also by machines and IoT devices. Re-creation of this data isn’t possible. It is a point time capture of sensory data.

Tagged with: , , , , ,
Posted in Blog

Simpler is Better – Solving Rack Scale Storage Problems – DriveScale Briefing Note

The storage infrastructure for multi-rack scale applications like Hadoop Spark, Cassandra, and CouchBase, are typically built using directly attached flash-based storage instead of a shared flash array. The motivation for using direct-attached storage (DAS) is simple. Media inside a server

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

The Importance of Consolidation for Secure Storage

The Security Problems with Multi-Vendor Data Storage One of the most common data center trends is storage system sprawl. In today’s data center, every environment or workload has a unique storage architecture. While dispersed storage does allow IT to target

Tagged with: , , , , , , ,
Posted in Blog

Dealing with the AI and Analytics Data Explosion – MapR Briefing Note

Accuracy and response time defines the success or failure of an AI or analytics project. The faster and more accurate the response the more trusted the system is. The more data provided to the project the more accurate it becomes.

Tagged with: , , , , , , , , ,
Posted in Briefing Note

Are You Ready for Ransomware’s Next Phase?

Ransomware has been a thorn in the side of IT professionals for over five years. What those professionals have seen so far though is just the tip of the iceberg. At the same time that IT is improving its response

Tagged with: , , , , , , ,
Posted in Blog

Making Multi-Cloud a Reality – SwiftStack Briefing Note

Once an organization migrates data to and reaps the benefits of using the cloud, they often want more. Multi-cloud is the number one request of organizations initiating or expanding their cloud presence. These organizations want to move applications between on-premises

Tagged with: , , , , ,
Posted in Briefing Note

Are Snapshots Enough to Protect Unstructured Data?

Unstructured data is hard to protect. It is growing at alarming rates. It is a crucial target of cyber-threats like ransomware. Even the makeup of the data is problematic. Unstructured data is often made up of millions, and in some

Tagged with: , , , , , ,
Posted in Blog

ChalkTalk Video: How to Make DR Testing So Easy You’ll Actually Do It!

Testing the organization’s ability to recover from a disaster is almost as bad as having to go through an actual disaster. As a result, most organization’s don’t have disaster recovery testing as part of its standard workflow. The lack of

Tagged with: , , , , , , , ,
Posted in Video

Webinar: Five Things to Look for in Your Next All-Flash Array

The first generation of all-flash arrays has come and gone. For many organizations, the time is now to consider the “next” all-flash array. In our on demand webinar, Storage Switzerland and X-IO Storage discuss five things to look for in

Tagged with: , , , , , , , , , ,
Posted in Webinar