All-flash arrays solve many performance problems. But the latency reduction they bring also exposes other weak links in the storage IO architecture. One of the most exposed areas is the network. For example, many times IT will install the flash…
All-flash arrays solve many performance problems. But the latency reduction they bring also exposes other weak links in the storage IO architecture. One of the most exposed areas is the network. For example, many times IT will install the flash…
Downtime, no matter what the cause, is becoming less acceptable to organizations of all sizes. Clearly, technology exists that can eliminate it. But with the reduction or elimination of downtime, the associated costs – when compared to once-per-night backups –…
The reason that file data is a prime target of ransomware attacks is that most file servers are full of juicy targets that organizations are willing to pay to get back. Payment is, after all, exactly what ransomware is all…
One of the challenges to designing a successful disaster recovery solution is where to keep copies of your data. A close copy allows for a rapid recovery in the event of a failure since it is seconds away. But in…
Hardware-based deduplication legitimized the concept of backing up to disk. But deduplication alone is no longer as important as it used to be. The problem with hardware-based duplication is the data must be transferred to the backup appliance prior to…