When ransomware hits an organization, it is very tempting simply to pay the ransom instead of going through the time and effort to replace the encrypted data by recovering from a backup. After paying the ransom, the hackers give a…
When ransomware hits an organization, it is very tempting simply to pay the ransom instead of going through the time and effort to replace the encrypted data by recovering from a backup. After paying the ransom, the hackers give a…
When it comes to mission critical applications, most organizations count on high availability products to protect their mission critical applications. It looks like this; the mission critical application is mirrored or clustered. It is then backed up and in some…
Hyperconverged Infrastructures claim to be a simpler alternative to a traditional architecture with a dedicated compute and a dedicated storage tier. The primary source of the simplification is the elimination of a dedicated storage tier. Instead, HCI integrates storage into…
When flash storage first came to market it exposed the weakness in storage designs, hidden by the latency of hard disk media. Now, NVMe promises to expose weaknesses in the designs of the first generation of all-flash arrays. One of…
Small to medium-sized businesses face unique challenges when it comes to disaster recovery. They have to deal with a much tighter budget than a larger business, while at the same time having to meet very similar recovery expectations for users.…