Hot Technology for the Agile Enterprise

Derek Kol

Subscribe to Derek Kol: eMailAlertsEmail Alerts
Get Derek Kol via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Derek Kol

by George Crump, Storage Switzerland VDI (Virtual Desktop Infrastructure) implementation projects are going to be priorities for many IT Managers in 2013 and a key concern will be end-user acceptance. If the users don't embrace their virtual desktops they won't use them and the project is doomed to failure. The key to acceptance is to provide users with an environment that feels the same, performs better and is more reliable than their current stand-alone system. The storage system bears most of the responsibility in delivering that experience. IT managers who want to capitalize on the opportunity that the virtual desktop environment can focus on two key capabilities when they evaluate storage system vendors. The first is being able to deliver the raw performance that the virtual desktop architecture needs and the second is doing so in the most cost effective way po... (more)

Gridstore Survey Reveals Top IT Pain Points for the Mid-Market Customer

Gridstore, a provider of software defined storage solutions, has announced findings from a new study on the top IT pain points impacting today's mid-market enterprises. The study revealed that managing the storage lifecycle due to staggering data growth is a significant challenge for IT administrators. Organizations are faced with the need to both overcome storage limitations and the resulting complexity and expense of storage upgrades and over-provisioning storage to accommodate for this growth. According to IDC, over 1.8 zettabytes of data was created last year in the form of ... (more)

Two Totally Different Ways to Do SQL Server Backup and Recovery

This post is about how traditional database backup products work and how Zetta's new SQL server backup feature, which is part of our DataProtect solution, does the job in a distinctly different way. Both the solution and this post were created because finding a database backup solution for a medium-sized organization is painful. Database Backup Using "Full, Differential, and Log" Modes Most traditional database backup products use "full, differential, and log" based backup modes. So, what do these terms mean? A full backup is just what it implies - everything. A log is essentially... (more)

Zetta.net Achieves Distinct Cloud Storage Advantages Through Use of WebDAV

Zetta.net, a provider of 3-in-1 online server backup solutions, has announced that storage analyst firm Storage Strategies NOW reports that the company's use of the WebDAV (Web Distributed Authoring and Versioning) protocol is a distinct advantage for its Zetta.net DataProtect cloud infrastructure. The recent Delta Report authored by Storage Strategies NOW outlines how WebDAV delivers both the security and speed required by today’s customers of cloud-based data protection, making Zetta.net unique in terms of throughput and recovery availability. “WebDAV is latency independent an... (more)

Securing Government Desktops from Cyber Threats

Cyber attacks on government systems are increasing at an exponential rate. Over a three-year period, government agencies reported a 400-percent increase in attempted incursions into federal systems. While there is no current data on the number of attempts to compromise intelligence and defense computer systems, they are no doubt under similar stress as foreign governments, terrorists, and malicious hackers target classified data and government documents, attempt to shut down networks and destroy valuable infrastructure, and steal intellectual property. One of the least understoo... (more)