Blog Archives

Understanding the AFA Tax

Understanding the AFA tax requires factoring in inflated hardware costs, complex licensing, and layered infrastructure. This article breaks down the economics behind all-flash arrays and shows how integrated platforms eliminate the tax without sacrificing performance or availability.

Tagged with: , , , , , ,
Posted in Article, Blog

Leveraging Existing Hardware is Efficient

Repurposing existing hardware with the right infrastructure software improves IT operational efficiency by extending hardware life, reducing costs, and delivering near-bare-metal performance with high availability and resiliency.

Tagged with: , , , , , ,
Posted in Article, Blog

Data Protection Requires Infrastructure Software to Take the Lead

Many IT professionals overly rely on backup software for data protection, which should be a secondary measure. Infrastructure software is crucial for ensuring data resiliency, uptime, and handling hardware failures. It provides proactive solutions like real-time snapshots and high availability, minimizing reliance on backup systems and enabling quicker recovery.

Tagged with: , , , ,
Posted in Blog

Object Storage with High Performance and Security

If object storage and the S3 API interests you, but you are holding back because of concerns about performance or security, Scality would like to introduce RING 6.0. Scality is advertising it as the first object storage system with enterprise

Tagged with: , , , , , , , ,
Posted in Blog

MeetTheCEO: Avere Systems’ Ron Bianchini

Avere’s Ron Bianchini is the CEO on our MeetTheCEO podcast with Storage Swiss’ George Crump and Charlie Hodges. Ron discusses how Avere gives organizations the ability to put an end to the rising cost and complexity of data storage, the

Tagged with: , , , ,
Posted in Podcast

The CryptoLocker Legacy – Another Reason for Strong Data Protection

When IT professionals think of data protection, they think of protecting that data from accidental deletion or catastrophic loss from a disk array failure. The goal of the data protection process is to maintain access to data when these events

Tagged with: , , , ,
Posted in Blog

Webinar: Triple Play Storage Security for High-Value Data

Optimization, compliance, and security come together in a single stack Today’s data-intensive organizations are struggling to confront the rising costs and risks resulting from global growth in information assets, difficulty in complying with new regulations, and the increasing threat of

Tagged with: , , , ,
Posted in Webinar

How File Virtualization and Hybrid Cloud can solve the Copy Data dilemma

“The biggest risk to success is perpetuating the status quo.” So said VMworld CEO, Pat Gelsinger, during his keynote address at VMworld.  He went on to say that, “Today’s world is stuck in silos. Developers against IT, on-premise against off

Tagged with: , , , , , , , , , , , , , ,
Posted in Article

How to overcome the four obstacles to Cloud Storage

Business executive and IT professionals alike often share many of the same concerns when it comes to the use of cloud storage. But generally, there are four primary obstacles that businesses need to address before embracing the use of the

Tagged with: , , , , , , , , , ,
Posted in Product Analysis

Storage Q&A: Can File Sync and Share be made secure?

Data security has taken on a whole new level of importance in light of recent events like the Heartbleed bug and revelations that major cloud sites have had millions of user credentials compromised by hackers. Recently I sat down with

Tagged with: , , , , , ,
Posted in Storage Q&A