Blog Archives

How to Improve your Recovery Confidence

Most organizations have very low confidence in their ability to consistently recover data, whether from a minor outage or a major disaster. They’ve been through too many instances where data could not be recovered, took too long to be recovered,

Tagged with: , , , , , , , ,
Posted in Blog

Webinar: 3 Steps to Stop Data Protection Sprawl

Most enterprises have little confidence in their ability to recover data in the event of a data center failure, storage failure, ransomware attack, or natural disaster. There is too much data to protect and user expectations of rapid recovery are

Tagged with: , , , , , , , ,
Posted in Webinar

Optimized Performance for Oracle and MS-SQL – Vexata Briefing Note

In most cases CPU utilization is a direct result of how quickly can the storage architecture respond to the IO request. Generally speaking, the lower the CPU utilization, the more time the CPU is waiting for the storage architecture to

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note

Refining The Virtualized Backup Process – NAKIVO Briefing Note

The backup software market is very mature. Even virtualization specific backup software solutions have been available for over 10 years. But there is still work to do. In some cases, new releases are taking advantage of new technologies elsewhere in

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

How to Make DR Testing Less Painful

While every IT professional will admit that it is important, disaster recovery testing generally falls to the bottom of the IT to do list, right after root canal. But if testing is not a key component, the process of creating

Tagged with: , , , , , , , , ,
Posted in Blog

Why Do All-Flash Arrays Need QoS?

If all-flash arrays provide instant, unlimited performance, why manage how much of that performance they deliver through techniques like quality of service (QoS)? For most organizations one of the attractions to all-flash arrays is the set and forget answer to

Tagged with: , , , , , , , , , , ,
Posted in Blog

Protecting From Ransomware without a Data Protection Overhaul

Ransomware is at the top of every IT professional’s project list, but the problem is most solutions to the problem require the replacement of the current data protection product. What if the current data protection solution is servicing the organization

Tagged with: , , , , , , , , ,
Posted in Briefing Note

How to Get More from All-Flash Using Software Defined Storage

Flash often makes the hardware selection less important, but makes the software selection very important. The right software can not only ensure optimal flash performance, but also extend flash implementation beyond the typical high-transaction database use cases and into modern

Tagged with: , , , , , , , , , ,
Posted in Blog

Does Your Copy Data Solution Play Checkers or Chess? – Catalogic Briefing Note

A copy data management solution should save organization’s money in two areas. First, and most obvious, physical capacity consumption by creating virtual copies instead of actual copies, but any storage system with snapshot capabilities can at some level claim that

Tagged with: , , , , , , , ,
Posted in Blog

Enterprise Backup vs Point Backup

For two decades IT has had two choices when selecting a data protection solution. They can choose a holistic solution that covers the majority of the applications, operating systems and data protection goals or they can select a point data

Tagged with: , , , , , , , , , ,
Posted in Blog