A typo report on twitter has lead me to a set of thoughts with respect to data. Where are your Datasores? What is a datasore? Unlike a Data Store which holds data, a datasore is a place where data becomes either painful to manage or protect. Or where the data exceeds your capability to handle it. A data sore should never happen, but with the explosion of data being moved, protected, managed, and mined we have exceeded certain limits of our existing set of tools. How do we find data sores and alleviate them? Does alleviating them require us to re-architect our entire data usage and storage mechanisms? Continue reading Datasores: Where are yours?
It is possible to get data protection for your virtual and cloud environments for free today, but there are are often limits. Trialware as it is called provides just enough of a taste for the data protection tool to convince you to buy the versions with more capabilities. However, for the SMB, the free versions may be good enough. The concept of ‘good enough’ is one that travels through the virtualization and cloud environment architectures with respect to security, data protection, and hypervisor feature sets as often as higher licensing levels are mentioned, why, because cost matters. But from a data protection perspective what do you get for free? Here is a short comparison of the free products and features. Continue reading Data Protection for Free: What are the Limits
The east coast is experiencing the tail end of a very large storm named ‘Sandy’. We all had plenty of time to prepare for the storm, but did we? Individually, we probably did, but what about our data? Those 24/7 critical processes to allow our customers to view and respond to the data our organizations provide? We were lucky—we had no issues during the storm, but now we await issues during storm clean up. So how do you prepare for such disasters? Do you move to the cloud? Continue reading Move to the Cloud: Wait Out the Storm
There is an ever-increasing number of data protection providers creating replication receiver clouds as they team up with cloud service providers. This could herald the end of on-premise tape use for some enterprises, leaving tape to be used primarily by cloud providers. There are major benefits for Quantum, Zerto, Veeam, and others to form replication receiver clouds, but these clouds are not just for storage anymore. They could be purely for storage, but this is not a big win for the cloud service providers. So why would cloud service providers be interested in being a storage endpoint for data protection? Why are they concerned with backup and offering it as a service? Continue reading New Breed of Replication Receiver Clouds
The OpenStack conference 2012 is full of OpenStack fans, aficionados, developers, and companies making a business using the ecosystem. However, I kept hearing that OpenStack was a replacement for VMware. So why is this even a possibility, and why did Rackspace and now HP build public clouds using this technology? The easy answer is to save money. But is that the only answer? What is OpenStack and why is it becoming important? Continue reading OpenStack: What it is not….
While at InfoSec World 2012’s summit on Cloud and Virtualization Security, the first talk was on Securing your data. The second was on penetration testing to ensure that data was secure. In essence it has always been about the data but there is a huge difference between what a tenant can do and what the cloud or virtual environment provider can do with respect to data protection and security. This gap is apparently becoming wider instead of smaller as we try to understand tenant vs cloud provider security scopes. There is a lack of transparency with respect to security, but at the same time there are movements to gain that transparency. But secret sauces, scopes, legislation, and lack of knowledge seem to be getting in the way. Continue reading Tenant and Multi-Tenant Security: It’s All About Scope