Blog Archives

Making a Hybrid Array Work for the Enterprise

Hybrid storage systems create a performance concern for IT professionals. The system may respond too slowly to user or application requests for data. If the hybrid system places data on the wrong storage tier at the wrong time, it validates

Tagged with: , , , , , , , , ,
Posted in Blog

More than Migration: Developing a Holistic Cloud Strategy

Most organizations are considering how to take advantage of the tremendous resources made available by the cloud. The first step for many of these organizations is to create a cloud migration strategy. As part of this strategy, the organization decides

Tagged with: , , , , , , , , , ,
Posted in Blog

Creating a Real-time Storage Network

Traditionally, systems create data, process it, and then store it for a time before accessing it again in response to a user request. Essentially, data is processed in batches. In the modern data center, the move is toward real-time analysis

Tagged with: , , , , , , , , , ,
Posted in Blog

What Happens When You Push the DRaaS Button?

In case of a disaster, a traditional cloud backup application needs to transfer all data across limited internet bandwidth and back to the data center or the new location. The bandwidth restrictions make cloud recovery a time consuming process that

Tagged with: , , , , , , , , ,
Posted in Blog

The Architectures behind Cloud Storage

Each of the major cloud providers deliver at least three different types of cloud storage; high performance, archive and cold storage. Each of these storage types share the pay-as-you-go cloud expectation but each differ in terms of cost and performance.

Tagged with: , , , , , , , ,
Posted in Blog

The Top 5 Reasons VMware Backups Still Break

Lack of Auto-Discovery Lack of auto-discovery is an issue for most backup solutions. As virtual machines and physical hosts are constantly being added to a VMware environment, many backup applications can’t auto-discover them. This means a new VM can go

Tagged with: , , , , , , , , , ,
Posted in Blog

The Math Behind Storage Architecture Design

The speed at which the data center is evolving is forcing IT to sacrifice proper storage architecture design. IT is just trying to keep its head above water; it doesn’t have time to swim. This reality leads to a primary

Tagged with: , , , , , , , , , ,
Posted in Blog

Securing Backups from Ransomware

Ransomware “developers” know that organizations are likely to count on their backups as a primary point of recovery if they are infected. As a result, these malware programs attempt to encrypt or disrupt backup operations. Other cyber attacks may even

Tagged with: , , , , , , , , , ,
Posted in Blog