Blog Archives

Predicting WAN Performance – Disaster Recovery’s Missing Link – Apposite Briefing Note

Most storage systems today have the ability to replicate data to another storage system at another site. If the storage system doesn’t have that capability, then there are plenty of third-party software solutions that perform the function. Even if the

Tagged with: , , , , , , , , ,
Posted in Briefing Note

ChalkTalk Video: How To Develop a Cloud Storage Strategy That Works

As IT professionals begin to implement a cloud storage strategy they immediately face two challenges; the first is the actual transition itself. How to learn the new architectures available to them and how to deal with application incompatibilities as they

Tagged with: , , , , , , , , ,
Posted in Video

How to Enable the Cloud to Master Physics – SwiftStack Briefing Note

The problem with the public cloud has always been physics. We like the idea of being able to access our data anytime anywhere, but the reality often falls short. It takes a lot of horsepower to get data from point

Tagged with: , , , , , , ,
Posted in Briefing Note

Recovering from a Hurricane

Disaster Recovery Plans (DRPs) should be relatively generic with a design that allows it to survive a data center outage of any type. But each type of disaster requires a unique response. At the Storage Decision’s “Modernizing Your Disaster Recovery

Tagged with: , , , , , ,
Posted in Blog

Briefing Note: CipherCloud provides Shadow IT Insight

An organization’s users can now, with the swipe of a credit card, create their own IT infrastructure. The term for this is “Shadow IT” and it’s growing rapidly in organizations of all sizes. There are two steps to dealing with

Tagged with: , , , , , , ,
Posted in Briefing Note

Briefing Note: Coho Data announces Site-To-Site Replication

A big challenge for a startup in the storage space is catching up to the legacy vendors in terms of features, with one of the most critical and apparently most difficult to complete being site-to-site replication. This feature allows the

Tagged with: , , , , , , , , ,
Posted in Briefing Note

File Sync and Share As An Endpoint Protection Service

How To Backup And Protect Data In A Mobile World According to MarketWatch, approximately every 3.5 seconds someone in America loses a cell phone. Similarly, other end-user edge devices like laptops and tablets are also prone to loss or theft

Tagged with: , , , , ,
Posted in Article

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 21,718 other followers

Blog Stats
  • 1,038,380 views