Blog Archives

MeetTheCEO: The CEO of Copy Data, Ash Ashutosh

Ash Ashutosh with Actifio is our guest on this LIVE MeetTheCEO with Storage Switzerland’s George Crump and Charlie Hodges. The team discusses Mr. Ashutosh’s background, introduces listeners to Copy Data Management as the next stage in data protection and what

Tagged with: , , , ,
Posted in Podcast

EMC Enterprise Copy Data Management Solution

Data centers are drowning in data. The unprecedented growth comes from a variety of new sources like data generated by Internet of Things (IoT) devices, as well as from traditional sources like user data. But the biggest area of data

Tagged with: , , , , , , , ,
Posted in Briefing Note

The Bi-Modal IT Challenge

IBM and Catalogic Team Up To Help Transform IT The modern data center has two modes; Reliable IT and Agile IT. Reliable IT represents core mission critical applications that drive the internal operations of the company. As its name suggests,

Tagged with: , , , , , , , ,
Posted in Briefing Note

ChalkTalk Video: Customer Case Study Using ECX to Manage Copy Data

File data can amount to 80% or more of the data that needs to be protected and managed. For Fairfax County Public Schools in Virginia, it was a big problem. Stepphon Gayle, their Data Storage Manager, handles protecting more than

Tagged with: , , , ,
Posted in Video

Copy Data Management: In-Place vs. Rip and Replace

Copy Data are the copies of production data made for various business functions. It is growing at an alarming rate as IT and business processes beyond data protection demand access to versions of production data. Copy Data Management (CDM) has emerged to manage this data, creating two sub-categories reflective of their approach; “in-place CDM” and “replace CDM”. In this article StorageSwiss explains the differences in these approaches and how to select the one that is best for your data center.

Tagged with: , , , , , ,
Posted in Article

What is Shadow IT? – and why you should care

“Shadow IT” is a name for the process that occurs when users self-select IT services, signing up for cloud-based services without the knowledge or approval of the IT organization. IT could take the attitude that Shadow IT is a good

Tagged with: , , , , , , , , ,
Posted in Article

SlideShare – Why 2015 is the Year of Copy Data – What are the requirements

Data is the new currency of business. To fully protect and exploit this data requires that it be copied to various backend processes like data protection, compliance and data analytics. The problem is that primary data is growing by 35

Tagged with: , , , , ,
Posted in Slideshare

Analyst Blog: Why Design a Forever Retention Strategy?

In 2015 Storage Switzerland is again partnering with Storage Decision / TechTarget to deliver a 13 city road tour on data protection, entitled “Backup 2.0”. As I discussed in a previous column, in these sessions we are going to break

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Overcoming the Challenges of Snapshot Data Protection

In February Storage Switzerland held two webinars that used similar techniques to address an age old problem: data protection. Both of these webinars asked primary storage to take a larger role in its own protection. One webinar discussed using snapshots

Tagged with: , , , , , , , , , ,
Posted in Blog

StorageShort: Copy Data Methods

2015 is going to be a big year for Copy Data. We expect every major data protection vendor to release some form of copy data management solution to the market this year. But vendors will take different approaches to deliver

Tagged with: , , , , , , , ,
Posted in StorageShort