What Comes After Dedupe?
There has been a lot written about deduplication. It has become commonplace in backup and is quickly becoming a requirement in primary storage. Once every system has in some form and deduplication is broadly available, what do we do next to optimize storage? After all, storage growth isn't going to stop and while deduplication and compression will slow some of that growth we know that files will continue to get larger and the number of files that are created will increase.
Symantec Report Chronicles Sloppy Data Retention Practices
A study by Symantec shows that while most businesses believe in the value of a data retention plan, fewer than half follow one, resulting in increased expense and reduced efficiency as they basically follow a "save everything" policy in practice. The Symantec Information Management Health Check, the result of a global survey of 1,680 businesses in 26 countries, shows that while 87 percent of respondents believe in the value of a formal information retention plan, only 46 percent actually have on
Blood Center Draws On Flow Technology To Monitor IT Performance
It wasn't that long ago that Puget Sound Blood Center (PSBC) had to pore through various system logs to uncover problems and determine whether the trouble was with its network or its applications. But now, the Washington nonprofit blood center can check bandwidth, network performance, link utilization and more in real time--all in an effort to ensure its services such as transfusions and transplantation support are available to the more than 200 hospitals and clinics it serves across the Northwe
SonicWall Launches New SSL VPN Appliance
SonicWall has announced the Secure Remote Access (SRA) 1200 SSL VPN appliance, which fits between the SRA 200 and SRA 4200 models. The SRA 1200 is intended for use in SMBs, and at branch offices of larger companies, supporting between five and fifty concurrent remote users. The SRA creates SSL VPN connections for remote access to a corporate Web portal, allowing employees secure access while working remotely. It can also be used to provide controlled secure access by contractors, customers, supp
Cleversafe: Making Information Safe Inside And Outside The Cloud
Cloud computing attracts a lot of attention, but it is also being examined closely for whether it meets specific business requirements. Data security tops executive concerns, but other issues such as availability and scalability are often mentioned as well. Cleversafe has come up with a very interesting approach that addresses these and other issues. Founded in 2004, Cleversafe is a small (about 40 employees) company headquartered in Chicago. The focus of its hardware is on data protection with
Windows 7 Surpasses Vista, But XP Still Dominates
Windows 7 in July surpassed its predecessor Vista in global usage share, but the older XP continued to dominate by a wide margin, an analysis firm says. At the end of last month, Windows 7 had a 14.46% share, while Vista fell to 14.34 percent, according to NetApplications. When Microsoft released Windows 7 to retail in October 2009, Vista had an 18.83 percent share.
Wholesaler Builds A Private Cloud With Virtual I/O
Supplies Network, a privately-owned wholesaler of IT products, decided to roll out a virtual I/O product as part of its ongoing efforts to modernize its data center. The company has virtualized all its servers and is building out a private cloud infrastructure. The goal of this modernization is to boost scalability and performance while cutting costs and complexity, so the last thing the St. Louis-based company wanted was a complicated, expensive cabling infrastructure to connect its private clo
Check Point Announces New Software To Control Facebook, Other Web Apps
Employees have access to thousands of Web applications, from productive business tools to benign time-wasters to apps that represent serious security threats. Wildly popular Web 2.0 apps such as Facebook can fit into any one of those categories, which makes it difficult for enterprises to define and enforce policies that protect the business without stifling legitimate activity. Check Point Software Technologies aims to help with new software that provides policy-based application control. The C