Blog Archives

Scaling Unstructured Data in the Cloud Era

Unstructured data presents two scaling challenges to the data center. The first is capacity. It comes as no surprise to any IT professional that unstructured data is growing at an alarming rate. The second is performance, which may take some

Tagged with: , , , , , , , ,
Posted in Blog

NAS 2.0 Must Preserve Data

About 85% of the data most organizations store has not been accessed in 90 days and most of it hasn’t been accessed in years. The reality is data managers really don’t know what’s in that data or if it is

Tagged with: , , , , , , , , , , ,
Posted in Blog

Leveraging the Cloud For Data Distribution

For organizations with multiple offices where employees need access to the same data at the same time, leveraging the cloud for unstructured data storage make sense. Not only does it help with data distribution, it also helps ease data management

Tagged with: , , , , , , , , , ,
Posted in Blog

Storage Architecture 3 – Composable Storage

The data center needs a new storage architecture. The first architecture, dedicated scale-up storage, provides high performance and efficiency but is operationally complex at scale. The second architecture, scale-out shared everything architectures provides operational simplicity at scale but is less

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

Understanding The AWS Storage Portfolio – Amazon Briefing Note

Amazon Web Services (AWS) support a large number of use cases, ranging from high transactional applications to analytic processing applications, as well as backup and archiving solutions. As vendors and data centers decide on how they will use Amazon they

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

ChalkTalk Video: Using the 3-2-1 Rule To Protect Against Ransomware

Protection in the modern data center is changing. IT must provide backup to disk and an instant recover capability to meet the recovery expectations of application owners. But this rapid protection also puts data at risk to a ransomware attack.

Tagged with: , , , , , , , , , , ,
Posted in Video

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 21,661 other followers

Blog Stats
  • 962,418 views