Blog Archives

Webinar: How Snapshots CAN be Backups

Snapshots have been a key feature of primary storage infrastructures that IT professionals have relied on for years. In fact, many use snapshots as their first recovery option when their primary data copy is compromised. But storage systems have traditionally

Tagged with: , , , , , ,
Posted in Webinar

The role of Tape in Primary Storage Data Protection

Recently I discussed how primary storage, thanks to the use of replication and snapshots, can take a larger role in the data protection and application recovery process. We call this the “Primary Storage Data Protection Strategy”. But, to be effective,

Tagged with: , , , , , , ,
Posted in Blog

Understanding All-Flash Architectures – Assessing the right fit for your Data Center and Workloads

Today in the all-flash array market there are two architectures for data centers to choose from; scale out and scale up. Both have their unique strengths and weaknesses. Deciding on the right architecture for an organization’s data center first depends

Tagged with: , , , , , , , , , , , ,
Posted in Article

XtremIO update at Flash Memory Summit

One of the headlines at this years Flash Memory Summit was the much broader participation  of the traditional storage vendors. Dell, IBM, Hitachi and HP were all there. Not to be left out, EMC also had a presence and we

Tagged with: , , , , , , ,
Posted in Briefing Note

Webinar – Should Your Storage Be Virtualized, Software Defined or None of the Above?

Whether you are planning to upgrade your current storage system or getting ready for a complete storage refresh, today’s IT planner has more storage choices than ever. A key decision is how you will access critical storage services like volume

Tagged with: , , , , , ,
Posted in Webinar

What’s Holding Back the All-flash Data Center?

Flash has certainly become more affordable over the past several years and we continue to see more and more storage products introduced that include flash in one form or another. But most flash implementations are hybrid in nature, requiring that

Tagged with: , , , , , , , ,
Posted in Blog

Is Traditional Backup Obsolete?

As we will discuss in our upcoming webinar, creating a second copy in order to protect important data is becoming increasingly inefficient, a fact driven home by the relentless growth of ‘copy’ data in companies of all sizes. Setting up

Tagged with: , , , , , , , ,
Posted in Blog

A Tiered Approach To Data Protection

Think your data is protected? Think again. True data protection is more than just enterprise backup, snapshots and replication; it’s a combination of all of these technologies. Understanding how to leverage each type of data protection is key towards enabling the rapid recovery of mission critical business information while not overspending on data protection insurance. In this article, lead analyst George Crump, outlines the specific role each type of data protection technology serves in the data center and how organizations can tier their data protection strategy for the maximum cost/benefit. 

Tagged with: , , , , , , , ,
Posted in Article