Blog Archives

What Is Storage Caching?

A cache in a manufacturing environment is an intermediate store of components or partially assembled products, often referred to as “in-process inventory”, that serves to make the overall production process more efficient. In a computer system, caches, also called “buffers”,

Tagged with: , , , , , , , , ,
Posted in Article

Application Defined Cache Acceleration

Maintaining consistent application performance has become increasingly challenging. While there are fewer physical servers to support in the data center, in many environments there are dozens, hundreds or even thousands of virtual machines (VMs) accessing the same shared storage resources.

Tagged with: , , , , , ,
Posted in Article

The Modern HPC Storage Architecture

High Performance Computing (HPC) is a unique environment that places special demands on the storage infrastructure. These environments typically have dozens, if not hundreds, of compute nodes, each generating a unique sequential workflow that randomizes when it hits the shared

Tagged with: , , , , , , ,
Posted in Article

Can The Enterprise Count on The Cloud For Data Protection?

Cloud storage has come under increased scrutiny as of late, thanks to several well publicized outages as well as an outright shutdown of one provider. Enterprises are starting to re-think their cloud strategy, even when it comes to data protection. In this report Storage Switzerland’s lead analyst examines the state of cloud backup to determine if it is ready to deliver enterprise class protection.

Tagged with: , , , , , , , , ,
Posted in Article

A Tiered Approach To Data Protection

Think your data is protected? Think again. True data protection is more than just enterprise backup, snapshots and replication; it’s a combination of all of these technologies. Understanding how to leverage each type of data protection is key towards enabling the rapid recovery of mission critical business information while not overspending on data protection insurance. In this article, lead analyst George Crump, outlines the specific role each type of data protection technology serves in the data center and how organizations can tier their data protection strategy for the maximum cost/benefit. 

Tagged with: , , , , , , , ,
Posted in Article

What To Look For In All-Flash Deduplication

Many All-Flash Storage Array vendors are counting on deduplication to bring the cost per GB of their systems more in line with traditional hard disk based storage systems. However IT planners need to be careful not to assume that all

Tagged with: , , ,
Posted in Article

BYOD’s Dark Side: Data Protection

Bring Your Own Device (BYOD) is now the norm at most large businesses and enterprises. Even those environments that don’t have a BYOD policy have seen the use of laptops proliferate. Users can now be productive anywhere, often on the

Tagged with: , , ,
Posted in Article

How to Reduce Server-side Cache Risk

Storage caching enables the use of a very fast storage area, typically flash, to intelligently store the most frequently accessed data objects and improve application performance. Server-side caching uses one of a variety of flash based SSDs internal to the

Tagged with: , , , ,
Posted in Article

Scale-Out NAS or Object Storage?

Unstructured data is becoming a big headache for many organizations. By some estimates, this type of data (user files, emails, PDFs, images, videos, etc.) now accounts for up to 90% of all new data growth. While most of this information quickly

Tagged with: , , , , , , , ,
Posted in Article, White Paper

Persistent or Non-Persistent VDI?

The fundamental objective when implementing virtual desktop infrastructure (VDI) is to ensure that the end user experience is at a minimum, equivalent to the same experience as a physical desktop. Poor performance and the lack of desktop customization is a

Tagged with: , , , ,
Posted in Article