
One of the first announcements out of the chute at Dell EMC World 2017 is an updated version of Data Domain’s Virtual Edition (DD VE). The new version runs in both Amazon and Azure clouds and is designed to provide…
One of the first announcements out of the chute at Dell EMC World 2017 is an updated version of Data Domain’s Virtual Edition (DD VE). The new version runs in both Amazon and Azure clouds and is designed to provide…
While the basic backup process will probably always be the foundational component of data protection, IT professionals are demanding more from the data protection process, functions like replication, archive, snapshot management and application availability. Purpose Built Backup Appliances (PBBA) need…
What does the record turntable and a mainframe computer have in common? Plenty, according to Guy Churchward, President of EMC’s Data Protection and Availability Division. During EMC World 2014, Guy made an interesting comparison about how both the music industry…
Beyond Entry Level Protection Storage Today at EMC World, EMC’s Data Protection and Availability division announced the release of the new Data Domain DD2200 platform. This new system is designed to function as the new “entry-level” deduplication appliance in the…
Technologies like application virtualization have given end users increasingly more choice in today’s IT marketplace. New business services can be rapidly spun up on-demand, either in the four walls of the data-center or out into a cloud service provider’s (CSP)…
Data protection needs to move beyond just merely backing up business data to redundant storage infrastructure. Instead, it needs
to align with the specific service level objectives (SLOs) of the business application owner. There are tools which can help ensure that SLOs are being adhered to, however, this process will become increasingly automated as primary storage and protection storage architectures converge.
What is protection storage? Is this merely a way to re-package the role of purpose-built data deduplication appliances or are there some unique attributes to protection storage that warrants closer scrutiny from technology decision makers? In short, protection storage drives…
Think your data is protected? Think again. True data protection is more than just enterprise backup, snapshots and replication; it’s a combination of all of these technologies. Understanding how to leverage each type of data protection is key towards enabling the rapid recovery of mission critical business information while not overspending on data protection insurance. In this article, lead analyst George Crump, outlines the specific role each type of data protection technology serves in the data center and how organizations can tier their data protection strategy for the maximum cost/benefit.
While the applications that protect data have vastly improved over the last 20 years, they still often struggle to keep up with the technical challenges of data growth, shrinking backup and recovery windows and demands for greater disaster resilience. At…