Aidan Finn commented recently on a Microsoft infographic about How to Kill Your Business in 5 Simple Steps—and they are very good steps to consider. (Thank you to @gilwood_cs for pointing this out to me.) However, regardless of those issues, there is one, just one, simple way to destroy your business these days. Five is a nice number of items to consider, but one item was missing from the list: one item that has already destroyed one business overnight and put countless others at serious risk. That one item can be addressed with one simple question: Continue reading One Step to Destroy Your Business
It’s that season again! For those who don’t know, I live in Florida, and yes, we do have seasons down here. We have Tourist Season, Lovebug Season, and of course the one we’re best known for: Hurricane Season. With Hurricane Season starting on June first, most companies should have finished their preseason disaster recovery test by now. Oh, how things have changed from the days of flying off to have loads of fun at the remote data center, restoring test objectives from tape to prove we had the capabilities to restore applications and services slated for that specific test.
In Virtual Thoughts episode 2, Rick Vanover (@rickvanover) and I sit down to talk about Veeam Endpoint, the latest free product from Veeam. Endpoint provides a method for backing up your Windows endpoints to and from a backup store. That store can be managed by Veeam Backup & Replication v8 as well. This implies that Endpoint can also run on any modern Windows Server (though that is not the initial intent) or desktop running within the cloud without having a direct Veeam presence within the cloud. Veeam Endpoint runs as an application (read this as agent) within the Windows Server or desktop. Continue reading Virtual Thoughts Ep 2: Veeam Endpoint
In our ongoing quest to determine how our readers use cloud technologies, our second poll is now available: Which Type of Data Protection Service(s) Do You Use? This poll’s goal is to determine how data protection fits into your organization’s use of the cloud, if it does at all. There are many cloud-based tools for data protection, as well as many integrations between data protection vendors and cloud service providers. We’d like to know if these tools are being used, and if they are, which ones. Continue reading How Do You Data Protect?
How do you measure your data-protection success? This is a question that has plagued many folks. Data-protection success could be measured by cost savings, peace of mind, recovery success, or the number of support tickets opened to achieve true data protection. Most likely it is a combination of all those items. Continue reading Measuring Data Protection Success
Veeam has successfully fended off a patent infringement suit brought by Symantec over how Veeam does its backups. Yet, Symantec did not bring a suit against VMware, which created the underlying technology that Veeam employs for pulling data from a vSphere environment. When you look at the court case, it is about older technology and older patents, not Veeam’s latest innovations. I found this rather interesting—that instead of going after VMware, Symantec tried to sue the little guy out of existence. We all know this is not the first time someone has tried to do that.