Quantcast
Channel: Data Protection Hub
Browsing all 437 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

My cup runneth over

How do you handle data protection storage capacity? How do you handle growth – regular or unexpected – in your data protection volumes? Is your business reactive or proactive to data protection...

View Article


Image may be NSFW.
Clik here to view.

NetWorker 2016 Usage Survey

Folks, it’s that time of the year again! Each year I run a survey to gauge NetWorker usage patterns – how many clients you’ve got, what plugins you’re using, whether you’re using deduplication, and a...

View Article


Image may be NSFW.
Clik here to view.

Summer Fresh NetWorker 9.1

I know, I know, it’s winter up there in the Northern Hemisphere, but NetWorker 9.1 is landing and given I’m in Australia, that makes NetWorker 9.1 a Summer Fresh release. (In fact, my local pub for the...

View Article

Image may be NSFW.
Clik here to view.

Why do I need eCDM?

Why do I need eCDM? Your first question to me might be what is eCDM? Well, that’s a fair point – it’s a relatively new term, and it’s also an eTLA – an extended Three Letter Acronym. eCDM refers to...

View Article

Image may be NSFW.
Clik here to view.

What can we learn from the MongoDB attacks?

There are currently a significant number of vulnerable MongoDB databases which are being attacked by ransomware attackers, and even though the attacks are ongoing, it’s worth taking a moment or two to...

View Article


Image may be NSFW.
Clik here to view.

Cloud Boost vs Cloud Tier

Introduction There’s something slightly deceptive about the title for my blog post. Did you spot it? It’s: vs. It’s a common mistake to think that Cloud Boost and Cloud Tier compete with one another....

View Article

Image may be NSFW.
Clik here to view.

Data Protection: Ensuring Data Availability

In 2013 I undertook the endeavour to revisit some of the topics from my first book, “Enterprise Systems Backup and Recovery: A Corporate Insurance Policy”, and expand it based on the changes that had...

View Article

Image may be NSFW.
Clik here to view.

Ransomware is a fact of life

The NetWorker usage survey for 2016 has just finished. One of the questions I asked in this most recent survey was as follows: Has your business been struck by ransomware or other data destructive...

View Article


Image may be NSFW.
Clik here to view.

GitLab’s RCA Misses Key Failures

On January 31, GitLab suffered a significant issue resulting in a data loss situation. In their own words, the replica of their production database was deleted, the production database was then...

View Article


Image may be NSFW.
Clik here to view.

Build vs Buy

Converged, and even more so, hyperconverged computing, is all premised around the notion of build vs buy. Are you better off having your IT staff build your infrastructure from the ground up, managing...

View Article

Image may be NSFW.
Clik here to view.

The Rise of the New Risk

In 2008 I published “Enterprise Systems Backup and Recovery: A corporate insurance policy”. It dealt pretty much exclusively, as you might imagine, with backup and recovery concepts. Other activities...

View Article

Image may be NSFW.
Clik here to view.

NetWorker Usage Report for 2016

The NetWorker usage report for 2016 is now complete and available here. Per previous years surveys, the survey ran from December 1, 2016 through to January 1, 2017. There were some interesting...

View Article

Image may be NSFW.
Clik here to view.

What Queen can teach us about long term retention

It’s fair to say I’m a big fan of Queen. They shaped my life – the only band to have even a remotely similar effect on me was ELO. (Yes, I’m an Electric Light Orchestra fan. Seriously, if you haven’t...

View Article


Image may be NSFW.
Clik here to view.

Data protection licensing

I’d like to take a little while to talk to you about licensing. I know it’s not normally considered an exciting subject (usually at best people think of it as a necessary-evil subject), but I think...

View Article

Image may be NSFW.
Clik here to view.

What to do on world backup day

World backup day is approaching. (A few years ago now, someone came up with the idea of designating one day of the year to recognise backups.) Funnily enough, I’m not a fan of world backup day, simply...

View Article


Image may be NSFW.
Clik here to view.

NetWorker 9.1 FLR Web Interface

Hey, don’t forget, my new book is available. Jam packed with information about protecting across all types of RPOs and RTOs, as well as helping out on the procedural and governance side of things....

View Article

Image may be NSFW.
Clik here to view.

Basics – Compatibility Guide

Regardless of whether you’re new to NetWorker or have been using it for a long time, if there’s any change happening within the overall computing environment of your business, there’s one thing you...

View Article


Image may be NSFW.
Clik here to view.

NetWorker 9.1.1 gets out the door

I had a fairly full-on weekend so I missed this one – NetWorker 9.1.1 is now available. Being a minor release, this one is focused on general improvements and currency, as opposed to introducing a...

View Article

Image may be NSFW.
Clik here to view.

Architecture Matters: When you dedupe

There was a time, comparatively not that long ago, when the biggest governing factor in LAN capacity for a datacentre was not the primary production workloads, but the mechanics of getting a full...

View Article

Image may be NSFW.
Clik here to view.

Dell EMC Integrated Data Protection Appliance

Dell EMC World is currently on in Las Vegas, and one of the most exciting announcements to come out of the show (in my opinion) is the Integrated Data Protection Appliance (IDPA). Hyperconverged is...

View Article
Browsing all 437 articles
Browse latest View live