Blog Archives

Webinar: How to Create a Great Disaster Recovery Plan

Many studies indicate that organizations have a shallow confidence level in their ability to recover from a disaster. The disaster recovery plan is often an ad-hoc plan that requires IT to scramble when disaster strikes. If the recovery effort succeeds,

Tagged with: , , , , , , , ,
Posted in Webinar

Why Multi-Vendor Storage Happens and How to Manage It

When core IT receives a new workload, application owners tell IT what storage resources the workload needs as it enters production and what the expected resources are when it matures. Core IT then has to look at its available storage

Tagged with: , , , , , , , ,
Posted in Blog

Can Data Management be Done Better in the Cloud?

Backup, archive and managing secondary storage capacities are a constant thorn in IT’s side. Backup is often a disaggregated mess, and IT doesn’t have time to implement archiving. Secondary storage capacities, thanks to initiatives like IoT and next-generation applications, threaten

Tagged with: , , , , , ,
Posted in Blog

AI Needs an NVMe-Optimized File System

Analytics is evolving from big data, machine learning to artificial intelligence. Machine learning is the analysis of data at rest, artificial intelligence (AI) is the analysis of data in real-time. Machine learning is predictive; AI is cognitive. The requirements of

Tagged with: , , , , , , , ,
Posted in Blog

How to Leverage the Cloud for Unstructured Data Protection

Unstructured data is growing at alarming rates. The growth is the result of not only increased user activity but also by machines and IoT devices. Re-creation of this data isn’t possible. It is a point time capture of sensory data.

Tagged with: , , , , ,
Posted in Blog

The Importance of Consolidation for Secure Storage

The Security Problems with Multi-Vendor Data Storage One of the most common data center trends is storage system sprawl. In today’s data center, every environment or workload has a unique storage architecture. While dispersed storage does allow IT to target

Tagged with: , , , , , , ,
Posted in Blog

Dealing with the AI and Analytics Data Explosion – MapR Briefing Note

Accuracy and response time defines the success or failure of an AI or analytics project. The faster and more accurate the response the more trusted the system is. The more data provided to the project the more accurate it becomes.

Tagged with: , , , , , , , , ,
Posted in Briefing Note

Are You Ready for Ransomware’s Next Phase?

Ransomware has been a thorn in the side of IT professionals for over five years. What those professionals have seen so far though is just the tip of the iceberg. At the same time that IT is improving its response

Tagged with: , , , , , , ,
Posted in Blog

Making Multi-Cloud a Reality – SwiftStack Briefing Note

Once an organization migrates data to and reaps the benefits of using the cloud, they often want more. Multi-cloud is the number one request of organizations initiating or expanding their cloud presence. These organizations want to move applications between on-premises

Tagged with: , , , , ,
Posted in Briefing Note

Are Snapshots Enough to Protect Unstructured Data?

Unstructured data is hard to protect. It is growing at alarming rates. It is a crucial target of cyber-threats like ransomware. Even the makeup of the data is problematic. Unstructured data is often made up of millions, and in some

Tagged with: , , , , , ,
Posted in Blog