disk

Results 1 - 25 of 239Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: Jul 19, 2019
Requirements for secure, long-term data retention are common and increasingly stringent, with data volumes growing massively as a result. Tape storage offers a less costly long-term storage option than disk drives or flash. And, data stored on tape kept offline, or on write-once media, is nearly invulnerable to hacking. This white paper looks at the benefits that IBM TS4300 Tape Library can provide businesses.
Tags : 
    
IBM APAC
Published By: Infinidat EMEA     Published Date: May 14, 2019
Infinidat has developed a storage platform that provides unique simplicity, efficiency, reliability, and extensibility that enhances the business value of large-scale OpenStack environments. The InfiniBox® platform is a pre-integrated solution that scales to multiple petabytes of effective capacity in a single 42U rack. The platform’s innovative combination of DRAM, flash, and capacity-optimized disk, delivers tuning-free, high performance for consolidated mixed workloads, including object/Swift, file/Manila, and block/Cinder. These factors combine to cut direct and indirect costs associated with large-scale OpenStack infrastructures, even versus “build-it-yourself” solutions. InfiniBox delivers seven nines (99.99999%) of availability without resorting to expensive replicas or slow erasure codes for data protection. Operations teams appreciate our delivery model designed to easily drop into workflows at all levels of the stack, including native Cinder integration, Ansible automation pl
Tags : 
    
Infinidat EMEA
Published By: DataCore     Published Date: Apr 23, 2019
Innovations in data storage technology come with surprising frequency as competitors constantly leapfrog each other. That’s both good and bad. Good because they promise to solve pressing performance, reliability and cost problems. Bad because they often render perfectly good equipment prematurely obsolete.
Tags : 
storage virtualization, disk pooling, storage pooling, storage performance, storage refresh, storage consolidation, storage array
    
DataCore
Published By: Cisco EMEA     Published Date: Apr 12, 2019
Hyperkonvergenz ist derzeit ein heiß diskutiertes Thema. Dafür gibt es gute Gründe. Seit Langem sucht man in Unternehmen nach Möglichkeiten, die Bereitstellung neuer geschäftsorientierter ITServices zu beschleunigen und zu vereinfachen. Eine hyperkonvergente Infrastruktur (Hyper-Converged Infrastructure, HCI) liefert die in der heutigen Digital Economy erforderliche Geschwindigkeit, Einfachheit und Flexibilität. Nicht alle HCILösungen werden jedoch auf die gleiche Weise erstellt. Auch ist HCI nicht für jede Anwendung oder jeden Workload eine geeignete Lösung. Je mehr Technologie aber in aktuelle Server implementiert wird, desto mehr Workloads können effizient auf einer HCI-Plattform ausgeführt werden.
Tags : 
    
Cisco EMEA
Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
Most organizations use public cloud to reduce costs, but end up spending way more than they expected. Google Cloud Platform is growing at a staggering rate for the business benefits and its rich features around Machine Learning, Artificial Intelligence, Big Data and Containers. However, it’s important to keep a tab on your spend while maximizing your cloud benefits. Reducing spend in GCP doesn’t need to be a process of trial and error -- there are proven ways to save money in your GCP environment without negatively impacting desired outcomes. Read this eBook to learn the 8 different ways to reduce your spend, including: -Terminating Zombie Assets -Deleting Unattached Persistent Disk -Rightsizing Compute Engine VMs Download to learn and practice these techniques to reduce spend in GCP.
Tags : 
cloud management, google cloud platform, multicloud management
    
CloudHealth by VMware
Published By: Oracle     Published Date: Jan 28, 2019
Traditionally, the best practice for mission-critical Oracle Database backup and recovery was to use storage-led, purpose-built backup appliances (PBBAs) such as Data Domain, integrated with RMAN, Oracle’s automated backup and recovery utility. This disk-based backup approach solved two problems: 1) It enabled faster recovery (from disk versus tape) 2) It increased recovery flexibility by storing many more backups online, enabling restoration from that data to recover production databases; and provisioning copies for test/dev. At its core, however, this approach remains a batch process that involves many dozens of complicated steps for backups and even more steps for recovery. Oracle’s Zero Data Loss Recovery Appliance (RA) customers report that total cost of ownership (TCO) and downtime costs (e.g. lost revenue due to database or application downtime) are significantly reduced due to the simplification and, where possible, the automation of the backup and recovery process.
Tags : 
    
Oracle
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike
Published By: Pure Storage     Published Date: Oct 09, 2018
As flash storage has permeated mainstream computing, enterprises are coming to better understand not only its performance benefits but also the secondary economic benefits of flash deployment at scale. This combination of benefits — lower latencies, higher throughput and bandwidth, higher storage densities, much lower energy and floor space consumption, higher CPU utilization, the need for fewer servers and their associated lower software licensing costs, lower administration costs, and higher device-level reliability — has made the use of AFAs an economically compelling choice relative to legacy storage architectures initially developed for use with hard disk drives (HDDs). As growth rates for hybrid flash arrays (HFAs) and HDD-only arrays fall off precipitously, AFAs are experiencing one of the highest growth rates in external storage today — a compound annual growth rate (CAGR) of 26.2% through 2020.
Tags : 
    
Pure Storage
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
The Gartner Magic Quadrant for General-Purpose Disk Arrays is intended to help IT leaders better understand general-purpose disk array vendors' relative positioning in the market. In their 2017 report, Gartner places Hewlett Packard Enterprise (HPE) in the Leaders quadrant. HPE 3PAR StoreServ, HPE Nimble Storage and HPE XP7 represent HPE’s offerings in the general-purpose disk array market.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
The Gartner Magic Quadrant for General-Purpose Disk Arrays is intended to help IT leaders better understand general-purpose disk array vendors' relative positioning in the market. In their 2017 report, Gartner places Hewlett Packard Enterprise (HPE) in the Leaders quadrant. HPE 3PAR StoreServ, HPE Nimble Storage and HPE XP7 represent HPE’s offerings in the general-purpose disk array market.
Tags : 
    
Hewlett Packard Enterprise
Published By: CrowdStrike     Published Date: Jun 06, 2018
Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where noexecutable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware
Tags : 
    
CrowdStrike
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
The tipping point has arrived. Large enterprises are planning their next-generation datacenters around flash-based storage, and for good reason. Flash arrays provide read and write performance that is orders of magnitude faster than spinning media at a total cost of ownership that is on par with disk and will soon be lower. The benefits not only include improved application performance, but more consistent performance, lower latency, reduced storage footprint, streamlined storage administration, and lower operating costs. These advantages are too beneficial to your business to ignore. That’s why flash is becoming the standard for new storage investments.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
For the typical enterprise, the volume of data that needs to be managed and protected is growing at roughly 40% per year. Add to that the performance requirements of new applications and the demands for instant response time, always-on availability, and anytime-anywhere access. With such demands, data center managers face storage challenges that cannot be addressed using traditional, spinning-disk technology.
Tags : 
    
Hewlett Packard Enterprise
Published By: Trend Micro     Published Date: May 03, 2018
Since the early days of the Gartner Magic Quadrant for this category, there have been successive waves of innovation. Back in 2002, integrated firewalls captured the market’s (and Gartner’s) attention. Over the years, we’ve seen technologies, such as full disk encryption, data loss prevention (DLP), behavioral detection, application control, and more recently, machine learning, as effective new ways to protect endpoints, detect threats and give security teams peace of mind. Trend Micro has consistently been part of these innovation waves. It’s clear that the market is excited about Endpoint Detection & Response (EDR). There are two drivers for this, and we are committed to delivering effective solutions in both areas.
Tags : 
    
Trend Micro
Published By: Redstor UK     Published Date: Mar 12, 2018
Backup and recovery have been a constant for organisations over the years, often not seen as glamorous aspects of an IT environment but as solutions that are necessary all the same. Environments have changed over the years and the focal use for backups have changed with them, although your solutions may not have. Taking a simple off-site backup, whether this be to disk, tape or other removable media, would once have been the last line of defence for data protection. Solutions were reliable and ensured data could be recovered in a timely manner.
Tags : 
recovery, backup, infrastructure, security, data
    
Redstor UK
Published By: NetApp     Published Date: Mar 05, 2018
Are you building a business case for replacing disk systems with all-flash? Read this paper to find out what enterprise users are saying about their own experiences with all-flash storage. Findings are based on over a dozen different product reviews.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Emarsys     Published Date: Feb 15, 2018
Als Marketer am Puls der Zeit sind Sie stets auf der Suche nach Methoden zur Steigerung Ihrer Arbeitseffizienz. Besonders interessant ist dabei spezielle Software, die einen Teil Ihrer Arbeit übernehmen kann. Vermutlich haben Sie in letzter Zeit viel über Artificial Intelligence gelesen; bzw. darüber, was AI als Technologie erreichen kann. Und tatsächlich gibt es in der Marketingwelt kaum einen Ort, an dem AI nicht gegenwärtig thematisiert und diskutiert wird.
Tags : 
marketer, methoden, steigerung, arbeitseffizienz, besonders, emarsys
    
Emarsys
Published By: Cloudian     Published Date: Feb 15, 2018
Not so long ago, if you asked a business executive, “what is the most irreplaceable part of your business?” they might have pointed at their building or their employees. The really forward-thinking execs may have chosen their customers. But the reality is that businesses have insurance to deal with the loss of a building; they can hire new employees; and they can acquire new customers. The one thing that is truly irreplaceable is their data. Lose that and you really are out of business. The potential risks to your data can be as subtle as the malfunction of tiny areas on a disk drive or as enormous as the failure of an entire data center. That means it’s not enough just to protect your data — you must also select the best way to protect it. To deliver that protection in an economical and rapidly recoverable way requires a system that gives you complete control to determine levels of data protection based on the type of data. In this paper, we’ll talk about the science of data protect
Tags : 
    
Cloudian
Published By: Commvault ABM Oct     Published Date: Nov 13, 2017
Don't let the risk or cost of ransomware storm your organization's castle. it will wreak havoc on your valuable data and impact business continuity. Instead, employ a multi-layer security strategy that not only includes anti-malware, firewall, and hard disk and file encryption, but also data loss prevention technology and standards- based data protection. Each are critical to mitigate cyber security risks and protect vital information so you can avoid business disruption without ever paying a king's ransom.
Tags : 
ransomeware, organization, data, business optimization technology, it protection, commvault
    
Commvault ABM Oct
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
Imagine the benefits that a VDI environment could realize during a boot storm. All the VMs are based on the same template, and therefore they all have the same set of files during initial boot. Normally, 100 VMs all booting at the same time would require a significant number of HDDs, but with this hyperconverged infrastructure platform, the first VM to boot reads the block off the HDD, which promotes that block into cache. Now the next 99 VMs can all access that same block from cache. That’s a 100:1 IOPS reduction on the IOPS-bound disks.
Tags : 
hardware, policy, scaling challenges, technical, employees, business, hyperconverged
    
Hewlett Packard Enterprise
Published By: Oracle     Published Date: Oct 20, 2017
Databases have long served as the lifeline of the business. Therefore, it is no surprise that performance has always been top of mind. Whether it be a traditional row-formatted database to handle millions of transactions a day or a columnar database for advanced analytics to help uncover deep insights about the business, the goal is to service all requests as quickly as possible. This is especially true as organizations look to gain an edge on their competition by analyzing data from their transactional (OLTP) database to make more informed business decisions. The traditional model (see Figure 1) for doing this leverages two separate sets of resources, with an ETL being required to transfer the data from the OLTP database to a data warehouse for analysis. Two obvious problems exist with this implementation. First, I/O bottlenecks can quickly arise because the databases reside on disk and second, analysis is constantly being done on stale data. In-memory databases have helped address p
Tags : 
    
Oracle
Published By: Oracle CX     Published Date: Oct 20, 2017
Databases have long served as the lifeline of the business. Therefore, it is no surprise that performance has always been top of mind. Whether it be a traditional row-formatted database to handle millions of transactions a day or a columnar database for advanced analytics to help uncover deep insights about the business, the goal is to service all requests as quickly as possible. This is especially true as organizations look to gain an edge on their competition by analyzing data from their transactional (OLTP) database to make more informed business decisions. The traditional model (see Figure 1) for doing this leverages two separate sets of resources, with an ETL being required to transfer the data from the OLTP database to a data warehouse for analysis. Two obvious problems exist with this implementation. First, I/O bottlenecks can quickly arise because the databases reside on disk and second, analysis is constantly being done on stale data. In-memory databases have helped address p
Tags : 
    
Oracle CX
Published By: Carbonite     Published Date: Oct 12, 2017
Today it is possible, even for smaller organizations, to establish both backup and full-fledged hybrid data protection under one robust onsite/offsite underpinning. ESG has four recommendations to assist such organizations as they try to pursue a disk-to-disk-to-cloud data protection strategy in the right way, with particular consideration for EVault by Carbonite.
Tags : 
evault, midsized businesses, data protection strategy, hybrid data protection, backup, recovery
    
Carbonite
Published By: NetApp     Published Date: Sep 22, 2017
Native all-flash arrays offer a number of benefits over flash appliances or legacy array retrofits. These software-centric solutions help eliminate the bottlenecks created by traditional disk architectures that have only been adapted for flash. This video presents six key architectural design decisions and tradeoffs to help you choose the right native all-flash array for your business.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, all-flash
    
NetApp
Published By: Cisco     Published Date: Sep 20, 2017
Våra två säkerhetsexperter Chung-wai Lee och Håkan Nohre diskuterar aktuella hot som Ransomware och mer avancerade attacker, och vad man bör tänka på för att skydda sig. Vi berättar om en kund från fastighetsbranschen som blev attackerad och hur de hanterade IT-incidenten.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.