Backup, Cloud, and Security
Talking to IT people, it’s clear that there is tremendous interest in cloud-based backup and storage solutions. For example, a recent survey by a backup company noted that 52% of respondent’s were...
View ArticleBackup, Security, and Windows
Acronis recently announced a new software-only product that integrates backup and security and is targeted at home users. While not the most original strategy, it should resonate with home and even...
View ArticleGambling on Social Media
My wife and I enjoy the thrill of gambling, recreationally of course. We take the occassional trip to Vegas to experience the atmosphere. We love to win, and we budget how much we can lose. On the...
View ArticleGoogle Apps, the Cloud, Disaster Recovery, and Backup
Google announced synchronous replication for Google apps. Of course, Google has a multi-million dollar marketing budget – so they didn’t announce replication, they announced “backup and disaster...
View ArticleBackup and Deduplication Basics: Encryption and Physical Storage Density and...
Backup and Deduplication Concepts: Encryption and Physical Storage Density and Pricing The next post in a series on customer-focused issues associated with deduplication and backup. Encryption...
View ArticleBackup, Compression, Encryption, Deduplication, and Replication
In the past few days, I’ve posted some fairly introductory articles concerning this subject; namely Backup and Data Reduction (Compression and Deduplication) Basics Backup, Compression, Deduplication,...
View ArticleBackup, Compression, Encryption, Deduplication, and Replication: Solution
In the previous post on backup, compression, encryption, and deduplication I called out a great post by Stephen Foskett on this subject and promised I’d talk a little bit about what our company does...
View ArticleHow to Get Duped by Deduplication: Ignore the Impact of Encryption
How to Get Duped by Deduplication: Ignore the Impact of Encryption Encryption is the process of transforming data to make it unreadable to anyone except those who possess a key that will decrypt that...
View ArticleWhat Does Backup and Full Body Scanners Have in Common?
Backup and full body scanners would at first blush appear to have little in common – but both involve people being concerned about what other people can see. In the case of full body scanners, the Los...
View ArticleGoing Beyond the Insurance Metaphor for Data Protection
[This is the third excerpt from our How to Sell Backup to Your CFO whitepaper. Download the full version of the whitepaper for instant gratification.] Like all metaphors, the insurance metaphor for...
View ArticleKey Features to a Better Backup Appliance: Heterogeneity and Resistance to...
This is my sixth and final excerpt from my Deduplication Devices Are Backup Appliances, the Check Is in the Mail and Other Lies whitepaper. Download the full whitepaper for instant gratification. In my...
View ArticleUnitrends Recovery-Series Backup Appliances and Unitrends Enterprise Backup...
In part 1 of this article, I recounted the discussion between a reseller partner friend and me concerning differences between the physical and virtual backup appliances from Unitrends. In part 2, I...
View ArticleGoogle Apps, the Cloud, Disaster Recovery, and Backup
Google announced synchronous replication for Google apps. Of course, Google has a multi-million dollar marketing budget – so they didn’t announce replication, they announced “backup and disaster...
View ArticleBackup and Deduplication Basics: Encryption and Physical Storage Density and...
Backup and Deduplication Concepts: Encryption and Physical Storage Density and Pricing The next post in a series on customer-focused issues associated with deduplication and backup. Encryption...
View ArticleBackup, Compression, Encryption, Deduplication, and Replication
In the past few days, I’ve posted some fairly introductory articles concerning this subject; namely Backup and Data Reduction (Compression and Deduplication) Basics Backup, Compression, Deduplication,...
View ArticleBackup, Compression, Encryption, Deduplication, and Replication: Solution
In the previous post on backup, compression, encryption, and deduplication I called out a great post by Stephen Foskett on this subject and promised I’d talk a little bit about what our company does...
View ArticleHow to Get Duped by Deduplication: Ignore the Impact of Encryption
How to Get Duped by Deduplication: Ignore the Impact of Encryption Encryption is the process of transforming data to make it unreadable to anyone except those who possess a key that will decrypt that...
View ArticleWhat Does Backup and Full Body Scanners Have in Common?
Backup and full body scanners would at first blush appear to have little in common – but both involve people being concerned about what other people can see. In the case of full body scanners, the Los...
View ArticleGoing Beyond the Insurance Metaphor for Data Protection
[This is the third excerpt from our How to Sell Backup to Your CFO whitepaper. Download the full version of the whitepaper for instant gratification.] Like all metaphors, the insurance metaphor for...
View Article