Blog Archives

What’s missing from Converged Architectures?

The value of converged infrastructures is they save time. It’s not that IT can’t assemble the components themselves. But considering how busy most IT professionals are today, should they? The value of the data center is not the components within

Tagged with: , , , , , , , ,
Posted in Blog

ChalkTalk Video: Can you Get Total File Security in the Cloud?

Users create files. Over the years the size and number of files they create keeps increasing. Users also don’t work from a desktop at the office any more. They are mobile and have multiple devices. They want their files with

Tagged with: , , , ,
Posted in Video

Why Should You Not Use Your Backup as an Archive?

All of us at storage Switzerland preach that backup and archive are two different practices, and have been for probably more than 20 years. But to see the results of a survey during one of our recent webinars, you would

Tagged with: , , , , , ,
Posted in Blog

How to Backup a cPanel Website

cPanel is a web based hosting control panel used by many hosting providers. The program gives their customers a graphical interface from which they can control their portion of the Linux server. If you haven’t configured the backup of your

Tagged with: , , , , , , , ,
Posted in Blog

Can Your Server Survive a Fire or Flood? – ioSafe Briefing Note

My dad always said, “The best fight is one you don’t have.” In the same way, the best restore is one you never have to do. We all believe that, and we do our best to avoid every restore we

Tagged with: , , , , , , , , , ,
Posted in Blog

How IT can Leverage its Own Big Data for Operational Efficiency

OpsDataStore Briefing Note One of the most practical use cases of big data analytics is the analysis of data that the organization is already generating, typically in the form of log file examination, which yields impressive results (most notably in

Tagged with: , , , , , , ,
Posted in Blog

Can DRaaS Protect you from Ransomware?

Disaster recovery as a service (DRaaS) vendors suggest their offerings can cure a number of ails. They offer the power and recoverability of a hot site without the traditional costs that a hot site present. They offer a way to

Tagged with: , , , , , , ,
Posted in Blog

Can You “Future Proof” Data Protection?

The data protection process always seems like it is playing catch up to the recovery expectations of production data. Part of the problem is that data protection is often considered after an application has rolled-out in production. The other part

Tagged with: , , , , , , , , ,
Posted in Blog

Does Recovery and Performance Have to be a Compromise?

The ability to quickly resume operations after a severe disaster is critical for organizations of all sizes. Fortunately, disasters don’t occur every day, in fact they are actually pretty rare. It is their severity that makes organizations plan for them.

Tagged with: , , , , , , , ,
Posted in Blog

On Demand Webinar: How to “Future Proof” Data Protection for Organizational Resilience

Users expectations of IT’s ability to return mission critical applications to production are higher than ever. These expectations are leading IT to abandon many of their backup and recovery solutions to try new, unproven solutions that may or may not

Tagged with: , , , , , , , , ,
Posted in Webinar