by George Crump, Storage Switzerland
VDI (Virtual Desktop Infrastructure) implementation projects are going to be
priorities for many IT Managers in 2013 and a key concern will be end-user
acceptance. If the users don't embrace their virtual desktops they won't use
them and the project is doomed to failure. The key to acceptance is to
provide users with an environment that feels the same, performs better and is
more reliable than their current stand-alone system. The storage system bears
most of the responsibility in delivering that experience.
IT managers who want to capitalize on the opportunity that the virtual
desktop environment can focus on two key capabilities when they evaluate
storage system vendors. The first is being able to deliver the raw
performance that the virtual desktop architecture needs and the second is
doing so in the most cost effective way po... (more)
Gridstore, a provider of software defined storage solutions, has announced
findings from a new study on the top IT pain points impacting today's
mid-market enterprises. The study revealed that managing the storage
lifecycle due to staggering data growth is a significant challenge for IT
administrators. Organizations are faced with the need to both overcome
storage limitations and the resulting complexity and expense of storage
upgrades and over-provisioning storage to accommodate for this growth.
According to IDC, over 1.8 zettabytes of data was created last year in the
form of ... (more)
This post is about how traditional database backup products work and how
Zetta's new SQL server backup feature, which is part of our DataProtect
solution, does the job in a distinctly different way. Both the solution and
this post were created because finding a database backup solution for a
medium-sized organization is painful.
Database Backup Using "Full, Differential, and Log" Modes
Most traditional database backup products use "full, differential, and log"
based backup modes. So, what do these terms mean?
A full backup is just what it implies - everything.
A log is essentially... (more)
Zetta.net, a provider of 3-in-1 online server backup solutions, has announced
that storage analyst firm Storage Strategies NOW reports that the company's
use of the WebDAV (Web Distributed Authoring and Versioning) protocol is a
distinct advantage for its Zetta.net DataProtect cloud infrastructure. The
recent Delta Report authored by Storage Strategies NOW outlines how WebDAV
delivers both the security and speed required by today’s customers of
cloud-based data protection, making Zetta.net unique in terms of throughput
and recovery availability.
“WebDAV is latency independent an... (more)
Cyber attacks on government systems are increasing at an exponential rate.
Over a three-year period, government agencies reported a 400-percent increase
in attempted incursions into federal systems. While there is no current data
on the number of attempts to compromise intelligence and defense computer
systems, they are no doubt under similar stress as foreign governments,
terrorists, and malicious hackers target classified data and government
documents, attempt to shut down networks and destroy valuable infrastructure,
and steal intellectual property.
One of the least understoo... (more)