Blog Archives

What is Open Converged Infrastructure?

Converged infrastructure (CI) and hyperconverged infrastructure (HCI) are common terms, but open converged infrastructure (OCI) is new. What is it and how is it different from the other architectures? This article will start with an examination of the similarities and

Tagged with: , , , , , , , , , , ,
Posted in Article

Is There Value in Converged Data Protection?

The idea of a single platform offering computing, network, and storage services with integrated data protection sounds almost utopian. What could be better than all aspects of computing already built into the system that you buy? Systems integrating functions like

Tagged with: , , , , , , , , , ,
Posted in Article

Product Analysis – How Rubrik Handles Ransomware Recovery

A ransomware attack puts IT in a battle against the malware author. To the victor goes the data. Every organization needs a prevention strategy. It also must realize that at some point the virus will get through, and at that

Tagged with: , , , , , , , ,
Posted in Article

The Art of Eliminating Downtime to Achieve High Availability

Downtime, no matter what the cause, is becoming less acceptable to organizations of all sizes. Clearly, technology exists that can eliminate it. But with the reduction or elimination of downtime, the associated costs – when compared to once-per-night backups –

Tagged with: , , , , , , , ,
Posted in Article

Should Backup Software Companies Build an Appliance?

A little over 15 years ago we started to see the creation of the backup appliance market with the creation of the deduplication backup target appliance. Since that time, we’ve gone from having no backup appliances to having so many

Tagged with: , , , , , , , , ,
Posted in Article

Ransomware – How To Create a Proactive Protection File Strategy

IT needs a proactive way to stop ransomware. It’s here to stay. Most ransomware countermeasures are reactive. The damage is done before IT can deploy their reactive countermeasures. When ransomware gets through an organization’s defenses, it starts to encrypt data,

Tagged with: , , , , , , ,
Posted in Article

Is it Time to De-Tape Your Archive?

Enterprises want more value from their archived data assets but tape doesn’t really enable the real-time archive that organizations need. The challenges is that any enterprise in existence for 10 years or longer more than likely has terabytes, even petabytes,

Tagged with: , , , , , , , , ,
Posted in Article

What Storage Product Should You Use in the Cisco UCS Storage Server?

Customers of Cisco’s UCS 3260 Storage Server can run any software defined storage product that is available as a software-only product. The question is how does one pick amongst the many that are available? Understanding the performance and functionality needs

Tagged with: , , , , , , , , , , , ,
Posted in Article