Free Webinar
November 15 | 11am PT / 2pm ET
VMware & StarWind: Guarantee data safety and constant applications availability
Speaker: Alexey Khorolets, Pre-Sales Engineer, StarWind
Posted by Michael Rakitin on November 23, 2018
Complete an infrastructure project for your organization with iSCSI SAN

Nowadays, it is obvious, that most organizations require an IT system to operate effectively. Even companies which are not related to IT need data storage that is continuously available, highly performed, and cheap. Thus, IT staff is challenged to build innovative, fast, modern and reliable IT systems that fit budget constraints and save some resources for future growth.

Learn More

Posted by Ivan Ischenko on January 4, 2018
Improve your Cluster Shared Volume security with Microsoft BitLocker

Nowadays, every company is doing its best to protect its data, which is pretty much its most valuable asset. As you know, data is vulnerable to unauthorized access and that’s when Microsoft BitLocker saves the day. BitLocker is the encryption technology from Microsoft, which makes possible to encrypt the Logical Volume on the transparent blade-based level (not physical disk). In this article, we will see how to encrypt Cluster Shared Volume (CSV) using Microsoft BitLocker to protect your data against unauthorized access.

Learn More

Posted by Jon Toigo on May 11, 2017
Data Management Moves to the Fore. Part 4: Why Cognitive Data Management?

In previous installments of this blog, we have deconstructed the idea of cognitive data management (CDM) to identify its “moving parts” and to define what each part contributes to a holistic process for managing files and more structured content. First and foremost, CDM requires a Policy Management Framework that identifies classes of data and specifies their hosting, protection, preservation and privacy requirements of each data class over its useful life.  This component reflects the nature of data, whose access requirements and protection priorities tend to change over time.

Learn More

Posted by Jon Toigo on April 4, 2017
Data Management Moves to the Fore. Part 2: Data Management Has Many Moving Parts

In the previous blog, we established that there is a growing need to focus on Capacity Utilization Efficiency in order to “bend the cost curve” in storage.  Just balancing data placement across repositories (Capacity Allocation Efficiency) is insufficient to cope with the impact of data growth and generally poor management.  Only by placing data on infrastructure in a deliberative manner that optimizes data access and storage services and costs, can IT pros possibly cope with the coming data deluge anticipated by industry analysts.

Learn More

Posted by Andrea Mauro on February 24, 2017
Design a ROBO infrastructure (Part 2): Design areas and technologies

In the previous post, we have explained and described business requirements and constraints in order to support design and implementation decisions suited for mission-critical applications, considering also how risk can affect design decisions.

Learn More

Posted by Andrea Mauro on January 25, 2017
Design a ROBO (Part 1): Introduction and high-level design

A Remote Office / Branch Office (ROBO) is an office located in a different site or a remote geographical area from another office (usually the headquarter or the main office). Several organizations have one (or more) main office, as well as remote offices in another city, country or continent. Many organizations today have in each remote office some local IT infrastructure, usually for data locality, but also for service local services.

Learn More

Posted by Oksana Zybinskaya on January 9, 2017
Ransomware: 14 Key Methods of Protection

After 2016 everyone can come to a certain conclusion that ransomware is a persistent phenomenon to reckon with from now on, with more sophisticated and innovative techniques to come. That is why it is crucial for every user and administrator to learn how to improve and protect their computer from ransomware.

Learn More

Posted by Charbel Nemnom on October 10, 2016
How to Protect your Data on Nano Server using Storage Replica?

sim card

Introduction

With the release of Windows Server 2016, there’s a lot of new features that have been added to increase availability and security. One hot feature that will add a lot of benefits for small, medium and enterprise business environments is Storage Replica (SR). Be sure that’s going to help you in your Disaster Recovery Plan and protect your data against catastrophic losses.

Learn More

Posted by Jon Toigo on October 6, 2016
Are We Trending Toward Disaster?

Interestingly, in the enterprise data center trade shows I have attended recently, the focus was on systemic risk and systemic performance rather than on discrete products or technologies; exactly the opposite of what I’ve read about hypervisor and cloud shows, where the focus has been on faster processors, faster storage (NVMe, 3D NAND) and faster networks (100 GbE).  This may be a reflection of the two communities of practitioners that exist in contemporary IT:  the AppDev folks and the Ops folks.

Data managment

Learn More