Big Data is not just for big enterprises. Small to medium-sized enterprises (SME) can reap the same rewards. But SMEs can’t build a Big Data infrastructure like larger enterprises. The good news it they don’t have to, they can leverage…
Copy data is getting a lot of attention and solutions to manage it are flooding to market. But a question few of these solutions let you ask is, “WHERE should that copy data reside?” For the most part, they assume…
Flash storage is increasingly more affordable, so much so that many organizations are throwing storage infrastructure optimization out the window. Flash is making performance management and tuning a lost art form. The problem is performance management is still very necessary.…
The best way to protect an organization from a ransomware attack is at its source, primary storage. Ransomware works by compromising a user account and then encrypting all the files that the account can access. A compromised superuser account is…
The reason that file data is a prime target of ransomware attacks is that most file servers are full of juicy targets that organizations are willing to pay to get back. Payment is, after all, exactly what ransomware is all…