There is no such thing as the cloud; there is only somebody else’s computer. Data stored in the cloud (i.e. on someone else’s computer) needs to be protected just like data stored on your own computer. No one would question…
There is no such thing as the cloud; there is only somebody else’s computer. Data stored in the cloud (i.e. on someone else’s computer) needs to be protected just like data stored on your own computer. No one would question…
An organization’s backup storage target options have changed from simple tape to an almost bewildering number of options such as fully integrated backup appliances, secondary storage systems, cloud storage, object storage and various other software defined storage (SDS) systems. An…
Join Storage Switzerland and CloudLanes for our on demand webinar as we compare Iron Mountain to the cloud and provide ways to solve the gaps in public cloud storage’s ability to be a viable data preservation service. Register today and…
Converged infrastructure (CI) and hyperconverged infrastructure (HCI) are common terms, but open converged infrastructure (OCI) is new. What is it and how is it different from the other architectures? This article will start with an examination of the similarities and…
For application owners, storage is an overly complicated ordeal that they must go through in order to get applications up and performing well. Ideally, application owners should be masked from the complexity of the infrastructure. They shouldn’t care which storage…
The core server component of most modern backup applications run on Windows. Unfortunately, Windows is also the primary target of ransomware attacks. While there are incidents of attacks on Linux or Macs, ransomware creators are going to go for the…
Despite the rising concerns over cyber-attacks like ransomware, humans are still the number one cause of disasters. We need to look no further than the Amazon “typo error” of 2017 that knocked out service on AWS for proof. According to…
Small to medium sized businesses (SMBs) often lack a good backup and recovery strategy, and often do not realize the difference between archive and disaster recovery. They find quality data protection (DP), data retention and disaster recovery difficult to obtain…
WannaCry was a wakeup call. New ransomware strains are now appearing every week because ransomware is a profitable “business.” There will be another attack and the chances of your organization being infected are high. The time is now to take…