Blog Archives

Understanding the Oracle Data Protection Gap

For many, snapshots are the go to data protection method for protecting Oracle databases. They can provide efficient, rapid protection from database corruption with high data integrity. But snapshot data protection has its limitations. First, snapshot copies can become corrupted

Tagged with: , , , , , , , ,
Posted in Article

Enterprise Backup or VM Specific Backup Software?

Most vendors seem to think that selecting which backup solution to use in the data center should be a choice of either an enterprise backup or virtual machine-specific backup solution. Enterprise backup provides legacy, multi-platform protection, but often only spotty

Tagged with: , , , , , , ,
Posted in Article

Adding Deduplication and Compression without impacting performance

IT professionals expect a lot from their storage systems; they want volume management, thin provisioning, snapshot, clones, automated tiering, replication etc. Increasingly today, they want deduplication and compression as well, so they can squeeze every ounce of capacity out of

Tagged with: , , , , , , , , , ,
Posted in Article

Will the All-Flash Array Market go away?

Recently HDS’s Hu Yoshida wrote in his blog that he thinks the all-flash array market will go away. I very often find myself agreeing with Hu, he’s a sharp guy and I respect his point of view. As an example,

Tagged with: , , , , , , , , , , ,
Posted in Article

Archiving to Amazon from your Private Cloud Storage

The only predictable aspect of unstructured data is that it will continue to grow almost unabated. Meeting today’s capacity requirements of unstructured data can largely be handled when organizations deploy private cloud storage, also known as object storage. The more

Tagged with: , , , , ,
Posted in Article

Flash Arrays need high performance compression

Startups like Nimble, Pure Storage, SolidFire and Tegile are starting to take business away from the traditional tier 1 storage vendors. Their key differentiator, and often the winning point, has been their ability to efficiently use flash storage. Making flash

Tagged with: , , , , , ,
Posted in Article

Three keys to cost effective Hyper-V Storage

Microsoft Hyper-V is quickly becoming the preferred choice of small to medium sized businesses (SMBs) looking to tap into the power and flexibility of server virtualization. In addition, many enterprises are looking at Hyper-V as a parallel architecture to VMware.

Tagged with: , , , , , ,
Posted in Article

Overcoming the Recovery-In-Place challenge

The advanced capabilities of virtualization-specific backup applications, such as Veeam, have brought new flexibility to the protection and recovery of virtual servers. In fact, these improvements, plus better availability, may be justification enough to virtualize a workload. Two of the

Tagged with: , , , , , , , ,
Posted in Article

The IRS’ lost emails – bad procedure or bad lie?

The recent news that the IRS “lost” Lois Lerner’s e-mails has been making headlines in the news media, but not so much in data protection circles. That may be because any data protection expert knows that this claim simply makes

Tagged with: , , , ,
Posted in Article