Blog Archives

Webinar: The Art of Storage Management

Any organization that takes a moment to study the data on their primary storage system will quickly realize that the majority (as much as 90 percent) of data that is stored on it has not been accessed for months if

Tagged with: , , , ,
Posted in Webinar

Maintaining Data Monetization Value over Time

It’s a fact that data stored on magnetic media degrades over time. It cannot be stopped; it can only be managed. It’s a problem that you must address if you plan to create a data monetization system that stores data

Tagged with: , , , , , ,
Posted in Blog

Podcast: Do you know what High-Value Data is?

High-Value Data is different from mission critical data. Mission critical data ensures the operation of the data center hour by hour. High-value data is critical data that organization has created but is not actively using but still needs to retain

Tagged with: , , , , , , , ,
Posted in Podcast

Securing High-Value Data in Mid-Tier IT

Despite its name, high-value data is often mishandled in many organizations. Often the backup process is counted on to secure and retain this information, but while some of the software has basic archive functionality it was neither intended nor designed

Tagged with: , , , , , , , ,
Posted in Article

What is Shadow IT? – and why you should care

“Shadow IT” is a name for the process that occurs when users self-select IT services, signing up for cloud-based services without the knowledge or approval of the IT organization. IT could take the attitude that Shadow IT is a good

Tagged with: , , , , , , , , ,
Posted in Article

IT Can’t Ignore the Video Surveillance Data Explosion

IT professionals are simultaneously being pulled in multiple directions. For most, data center management is more like triage than a well-engineered series of processes. As a result, IT managers and CIOs are very careful about which projects they “own”, which

Tagged with: , , , , ,
Posted in Article

Copy Data vs. Snapshots

As I discussed in an earlier column “Not All Snapshots are the Same”, storage systems that use a re-directed snapshot technique can typically maintain thousands of snapshots without impacting storage performance. But just because you can maintain thousands of snapshots,

Tagged with: , , , , , , , ,
Posted in Blog

Designing Data Protection for the 100% Availability Perception

Thanks primarily to cloud based services users have been exposed to data centers that are able to offer at least the perception of applications that never go down and data that is never deleted. A simple Google search will reveal

Tagged with: , , , , , , , ,
Posted in Blog

Analyst Opinion: Two Backup Trends for 2015

Users are demanding more their backup applications than ever before. Faster backups, longer retention and rapid recovery are now an expectation instead of a request. 2015 promises more of the same demands but worse, even faster backups, maybe continuous backup,

Tagged with: , , , , , , , , , ,
Posted in Blog

Real-Time Video Data – Competitive Advantage or Budget Sinkhole?

One of the fastest growing data types is video data and organizations of all kinds and sizes are having to deal with it. These organizations are not the traditional media and entertainment companies; now sports teams, public entities, mega-churches and

Tagged with: , , , , , ,
Posted in Article