Welcome!

Hot Technology for the Agile Enterprise

Derek Kol

Subscribe to Derek Kol: eMailAlertsEmail Alerts
Get Derek Kol via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Derek Kol

ATTO Technology, Inc., a global leader of storage connectivity and infrastructure solutions for data-intensive computing environments, announced today that its 4Gb/s Celerity Fibre Channel Host Adapters have been qualified by EMC Corporation as E-Lab tested for use with the EMC® CLARiiON® and EMC Symmetrix® networked storage systems. ATTO's 4Gb/s Fibre Channel HBAs provide high performing SAN connectivity and robust multipathing and failover/failback functionality for EMC storage systems in Mac® OS X environments. With E-Lab qualification, Mac users can now use ATTO HBAs and EMC storage to deploy a scalable, high-availability enterprise storage solution for the Mac market. The ATTO Celerity Fibre Channel Mac OS X multipathing solution provides load balancing and path failover for uninterrupted access to storage media to deliver a solution that meets both high-avail... (more)

Zetta.net Hybrid Cloud Backup Outperforms Appliance-Based Solutions

Zetta.net has announced that a report by analyst firm Storage Strategies Now highlights Zetta.net's second generation hybrid cloud backup solution, acknowledging that it outperforms, and eliminates the disadvantages of, appliance-based data protection systems. According to the report, appliance-based systems add extra hardware costs, present a single choke and failure point, and induce complications for distributed offices, particularly for managed service providers supporting hundreds of customers. The report asserts that Zetta.net's recent addition of Lean Local Copy makes "an... (more)

What SSD Performance Specs Can You Believe?

by Jim Bahn, Astute Networks Leah Schoeb of The Evaluator Group, wrote a nice piece about storage benchmarking that we highly recommend. It appears in the January issue of Storage Magazine http://bit.ly/113klb2, and at http://bit.ly/YPgHQv. I won't reiterate her article here, but I would like to simply point out that the specs many vendors throw around don't come with the appropriate caveats.  They don't mention block size, or special caching, or what network protocols were used. And if you're like me and you grew up in the HDD world, be prepared for a different set of rules for ... (more)

NetApp Backup: Amazon Web Services vs. Zetta DataProtect

Author:  Nick Mueller, Zetta.net NetApp filers need backup - or rather, the critical data on them needs to be backed up. But traditional NetApp backups are expensive, complicated, and offer limited functionality. Expensive: A 2nd NetApp appliance, to use as a backup target, is a requirement. Complicated: The 2nd NetApp needs all the associated infrastructure and protection - offsite location, connectivity, and reliable power - as the filer it's protecting. Limited Functionality: The data is only readable by a NetApp filer, and can only be recovered to another NetApp. Even now th... (more)

Secure Cloud Backup and Data Transfer: How It’s Done

Author:  Nick Mueller, Zetta.net The Internet is a dangerous place. There's a new story on Ars Technica about a corporate or government hack almost everyday. So for those interested in how an enterprise-grade secure cloud backup solution handles data encryption, here is some background on a few of the security protocols used to protect customer data here at Zetta: Secure Sockets Layer (SSL) / Transport Layer Security (TLS) SSL is an Internet security protocol developed by Netscape in the late '90s that is incorporated in browsers and web servers. The protocol uses the RSA public-... (more)