database clones

Database Clones: 4 Ways They Mimic Zombie Hordes

Much to my wife’s consternation, I am a fan of The Walking Dead.  For some reason, I find a post apocalyptic world where zombies run rampant interesting.  Fortunately, this is a purely fictional yarn….or at least I tell myself that when I wake up at night hearing strange noises which typically emanate from local coyotes.  

Continue Reading
backup software

Four Ways that Backup Software is Not Cutting It

Data is more critical today than ever before.  Recent statistics suggest that 90% of the data in the world has been created in the last two years, and as we look forward, new technologies like Internet of Things will accelerate data growth.  As our dependency on data increases, our need for continuous data access and consistent data protection becomes more critical than ever.

Continue Reading
disaster recovery plan

4 Ways to Avoid a Disastrous Disaster Recovery Plan

A disaster can happen to any company at any time.  Murphy’s law would even suggest that they will occur at the most inconvenient times, but I digress. In order to ensure business continuity in the face of these potential risks, it is vital to have a comprehensive and consistent DR plan.  Sadly, many companies do not devote the time, resources or budget to adequately protect their environment from these extreme outages.

Continue Reading

Cybersecurity, Ransomware, and Data Protection; a Discussion with Dr. John Meyers

Cybersecurity is a concern for employees at all levels of organizations today.  Ransomware is a new type of malware that has exploded on the market.  The US Government estimates that 4,000 attacks occur every day while IBM estimates that the attacks increased 6,000% in 2016.  

Continue Reading

Accelerating Jury Trials with Instant Access to Videos

According to UT Austin’s website, Police officers with University of Texas at Austin will now be equipped with portable video cameras that will be worn in front of their uniforms. The cameras will record official interactions only such as responding to emergency calls or making an arrest. The digital recordings will be retained for 90 days for routine content and for one year or longer if related to a specific criminal investigation. The purpose of these videos is manyfold such as deterring somebody from taking an irrational action while dealing with officers or using the videos as proof when needed in a trial.

Continue Reading
diaster recovery

7 Inevitable Problems with Legacy Backup and Disaster Recovery Strategies

Businesses today are using data as a leverage point to increase revenue and profits.  Improvements in data analytics now allows companies to bring innovative products and services to current and new markets, improve operations or simply making better decisions based on better information. This data is literally the heartbeat of businesses today and companies go to great lengths (and expenses) to protect that data from loss and or corruption.

Continue Reading
What it takes for a solution to scale with Enterprise applications

What it Takes for a Solution to Scale with Enterprise Applications

The last 5 years of IT evolution has forced enterprises to re-think their corporate strategy to stay relevant and competitive.  These enterprises are looking to become lean so they can focus on their core business while outsourcing the rest. Applications and the associated data, the crown jewels of an enterprise are meanwhile anchored in legacy data-center environments.  

Continue Reading

The New Face of Backup Administrators

I have seen a new pattern emerge with Actifio customers. The Actifio Administrators may have the backup administrator job function, but they are seen as enterprise architects by their organization. Various teams such as DevOps, Analytics, Security and Support are increasingly relying on Actifio administrators to consume Enterprise Data-as-a-Service (EDaaS).

Continue Reading

Resistance To Leverage Cloud Is Futile!

Yesterday Amazon Web Services (AWS) had a service disruption in its S3 service in US-East-1 region. Approximately 148,213 websites got impacted. Good news - They were back up and running in around four hours! Bad News - They were down for around four hours!

Continue Reading

Security & the Internet of Things: Are Our Devices Safe?

After October's massive distributed denial of service (DDoS) attack in which several major web properties, including Twitter, Reddit, Spotify, Seamless were brought down by a botnet of hundreds of thousands of infected internet connected DVRs and cameras, there is a long list of questions to consider as the Internet of Things (IoT) takes hold. What about standards? What are the security and international protocols? How will we deal with data management structures? Where will we put all that new data? A lot of data. We’ll need to understand what’s possible and then decide if, just because it is possible, should it happen or not?

Continue Reading