<
>

File Data Virtualization with UniFS

IT rapidly adopted system virtualization because it enabled scalability, flexibility,...

Tag: Nasuni

Shadow IT in the enterprise

Shadow IT (aka Stealth IT) describes IT systems and IT solutions built and used inside...

Tag: Nasuni

Archiving persistent data guide

The growth of enterprise data comes from structured data from enterprise databases, or...

Tag: HP

Defining next generation architecture with arcserve

The backup and recovery market is quickly morphing as end users weather a perfect...

RSA-Pivotal Security Big Data Reference Architecture

Despite significant investment in information security, attackers appear to have the...

Tag: Pivotal

NetPod promises high fidelity network visibility

The proliferation of data on enterprise networks continues to increase with the rising...

Tag: NetPod

Hybrid Columnar Compression on Exadata

Hybrid Columnar Compression on Exadata enables the highest levels of...

Tag: Oracle

Hybrid Cloud strategy roadmap

In BT’s view, the hybrid cloud is neither a point solution nor a transitionary...

Tag: BT

The case for Application Consistent Recovery

An untested Disaster Recovery (DR) plan is a speculative exercise in wishful thinking. A...

How to avoid being duped by dedupe marketing

The purpose of deduplication is to provide more storage, particularly backup storage, for...

Pages