Blog Archives

Office 365 Delete Items Folder – Isn’t 24,855 days enough?

A question that came up on our on demand webinar “Next Question: How to protect Office 365” was “Can’t I just use the Deleted Items Folder?” The deleted items folder does help prevent some data loss. Microsoft Office 365 allows

Tagged with: , , , , , , , ,
Posted in Blog

Modern Data Protection Architectures Enable a Step-by-Step Cloud Journey

The cloud holds much promise for data protection, but support for the cloud varies depending on the solution. Traditional backup applications and appliances have, at best, rudimentary support for the cloud. They may only mirror the on-premises copy of data

Tagged with: , , , , , , , , , ,
Posted in Blog

Public Clouds Provide Storage Tiers – Why Doesn’t Storage Software Support it?

Public cloud providers all have at least three tiers of storage to offer their customers. They often offer a high-performance tier for cloud native applications, a tier designed for active but not as performance sensitive, unstructured data sets and a

Tagged with: , , , , , , , , , , ,
Posted in Blog

Understanding White Box Networking and Open Network Operating Systems

For decades, an organization bought its network switching products from a single vendor such as Cisco. In most cases, that organization’s data center became 100% dedicated to that networking vendor and it was almost impossible for another vendor to gain

Tagged with: , , , , , , , , , , ,
Posted in Blog

Do You Need to Backup Cloud Native Applications?

A common question from organizations with cloud native applications is do they need to back those applications up? The cloud, after all provides plenty of redundancy and all major cloud providers have multiple data centers at their disposal. Most providers

Tagged with: , , , , , , , , , ,
Posted in Blog

How to Avoid the All-Flash Capacity Glut

Next generation all-flash arrays (AFA) face a serious problem; they will provide more capacity than most data centers need. While too much capacity doesn’t sound like a problem it will be because organizations are still going to pay for it.

Tagged with: , , , , , , , , ,
Posted in Blog

Achieving Cloud Efficiency Without Cloud Scale

Our last blog, “Are Cloud Providers Really Efficient“, discussed how cloud providers, from a resources perspective, aren’t really any more efficient than the typical data center. The provider’s use of automation and their scale is what separates them from the

Tagged with: , , , , , , , , ,
Posted in Blog

Designing Storage for the Software Defined Data Center

The goal of a Software Defined Data Center initiative is to enable the organization to increase an organization’s flexibility by programmatically configuring and reconfiguring their environment with a series of software commands instead of interacting with hardware. The SDDC leverages

Tagged with: , , , , , , , ,
Posted in Blog

Solving the Right to Be Forgotten Problem

An aspect of the European Union’s (EU) General Data Protection Regulation (GDPR) and similar regulations like California’s Consumer Privacy Act, is the “right to be forgotten.” Simply stated this means that a user or customer of an organization’s resources has

Tagged with: , , , , , ,
Posted in Blog

Virtualizing Mission Critical Applications Exposes New Storage Bottlenecks

IT administrators have reached a level of confidence with VMware and other hypervisors that make them more comfortable with virtualizing mission-critical workloads, like Oracle, SAS, and SAP. The goal is to gain the flexibility of a virtual compute infrastructure to

Tagged with: , , , , , , , , ,
Posted in Blog