Shadow IT in the enterprise

Shadow IT (aka Stealth IT) describes IT systems and IT solutions built and used inside...

Tag: Nasuni

Archiving persistent data guide

The growth of enterprise data comes from structured data from enterprise databases, or...

Tag: HP

Defining next generation architecture with arcserve

The backup and recovery market is quickly morphing as end users weather a perfect...

RSA-Pivotal Security Big Data Reference Architecture

Despite significant investment in information security, attackers appear to have the...

Tag: Pivotal

NetPod promises high fidelity network visibility

The proliferation of data on enterprise networks continues to increase with the rising...

Tag: NetPod

Hybrid Columnar Compression on Exadata

Hybrid Columnar Compression on Exadata enables the highest levels of...

Tag: Oracle

Hybrid Cloud strategy roadmap

In BT’s view, the hybrid cloud is neither a point solution nor a transitionary...

Tag: BT

The case for Application Consistent Recovery

An untested Disaster Recovery (DR) plan is a speculative exercise in wishful thinking. A...

How to avoid being duped by dedupe marketing

The purpose of deduplication is to provide more storage, particularly backup storage, for...

Virtual data optimization for Linux

Rampant data growth is the IT industry’s single most important issue, affecting...

Pages