Blog Archives

What Storage Product Should You Use in the Cisco UCS Storage Server?

Customers of Cisco’s UCS 3260 Storage Server can run any software defined storage product that is available as a software-only product. The question is how does one pick amongst the many that are available? Understanding the performance and functionality needs

Tagged with: , , , , , , , , , , , ,
Posted in Article

How To Beat Ransomware But Not Your Budget

The solution to ransomware is real-time data protection. The moment data changes it needs to be copied to a secondary storage system and sequestered from primary storage. Then, if a ransomware virus attacks, the last known good copy can be

Tagged with: , , , , , , ,
Posted in Blog

Webinar: 5 Steps To The Perfect Storage Refresh

An Independent Process for Assessing & Refreshing Storage Every data center eventually needs to increase capacity, resiliency, performance or the cost efficiency of its storage architecture. It needs to refresh storage infrastructure. The problem is that most organizations don’t have

Tagged with: , , , , , , , ,
Posted in Webinar

Does All-Flash Eliminate the need for Database Tuning?

Database administrators (DBAs) spend a large portion of their day optimizing databases. Do all-flash arrays eliminate that need? While in most cases, the answer to any IT question is “it depends”, in this instance the answer is an emphatic NO!.

Tagged with: , , , , , , ,
Posted in Blog

Why Backups Can’t Protect Against Ransomware

Ransomware is a new type of threat. As a result it needs a new type of defense. The reason is simple: Backups are not enough to protect against ransomware. They are increasingly victims of the attack themselves, and they don’t

Tagged with: , , , , , , ,
Posted in Blog

How to Get More from All-Flash Using Software Defined Storage

Flash often makes the hardware selection less important, but makes the software selection very important. The right software can not only ensure optimal flash performance, but also extend flash implementation beyond the typical high-transaction database use cases and into modern

Tagged with: , , , , , , , , , ,
Posted in Blog

What is Ransomware?

Ransomware is one of the biggest threats facing IT. What exactly is ransomware? Ransomware is a program that once installed in a system encrypts an organization’s data and the only way to get it unencrypted is to pay a fee

Tagged with: , , , , , , , ,
Posted in Blog