Blog Archives

Do NAS Systems Need More Than NFS & SMB?

Many years ago when the NAS market was born, it was very simple to distinguish between NAS systems and SAN systems. SAN systems ran on Fibre Channel and NAS systems ran on Ethernet. SAN systems used block protocols like SCSI

Tagged with: , , , , , , , ,
Posted in Blog

Data Preservation vs. Data Archive

Eighty percent of an organization’s data is active and 15% of it really matters. Archiving is the management of the 80%. Data preservation is the management 15%. While organizations often need help identifying the 80% of data that is not

Tagged with: , , , , , , , , , ,
Posted in Blog

How SMBs Can Have Enterprise Class DP without Breaking the Bank? – BackupAssist 10 Briefing Note

Small to medium sized businesses (SMBs) often lack a good backup and recovery strategy, and often do not realize the difference between archive and disaster recovery. They find quality data protection (DP), data retention and disaster recovery difficult to obtain

Tagged with: , , , , , , , , , , , , , , ,
Posted in Briefing Note

Scale out NAS Needs a New Kind of Performance

Scale out NAS has proven the old adage that in IT we never solve any problems; we just move them around. Scale out systems were built for a lot of reasons, and one of the chief reasons was performance; a

Tagged with: , , , , , ,
Posted in Blog

What is the Data Protection Problem?

Users demand a seamless digital experience. When something goes wrong they expect their data and applications to quickly return, preferably without them ever knowing something went wrong in the first place. For IT this seamless expectation means data has to

Tagged with: , , , , , , , ,
Posted in Blog

How Do You Improve Your RTO?

Recovery Time Objective (RTO) is the time it takes to recover an application or server so users can login and get back to work. IT is under constant pressure to reduce this time. There are two broad methods you can

Tagged with: , , , , , , ,
Posted in Blog

How Do You Stop WannaCry?

Preventing the WannaCry attack is simple. Update Windows. Stopping the next ransomware attack may take more prevention steps. WannaCry leverages exploits that were made public when hackers revealed on April 14 a list of exploits that were allegedly developed by

Tagged with: , , , , ,
Posted in Blog

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 21,600 other followers

Blog Stats
  • 920,937 views