5 questions for Drobo

I love my Drobo. I have a 4-drive FW800/USB-2 unit, purchased mid last year. It has pride of place sitting…

Continue Reading →

Privacy? You don’t need any of that!

[Update] False positives – that’s the update following the investigation by Samsung and others. I’m personally very glad to hear…

Continue Reading →

The 7 Challenges of Data Protection

It struck me recently while working on a report that there’s 7 distinct challenges in data protection, and that we…

Continue Reading →

Setting alarm bells ringing

As a consultant, you get attuned to (or as some would have it, “cynical”) certain key phrases and statements when…

Continue Reading →

37 Signals and the “end of the IT department”

The folks over at 37 Signals published a little piece of what I would have to describe as crazy fiction,…

Continue Reading →

Aside: In praise of pbzip2

A while ago I got rather frustrated with the performance of compression utilities on my Mac Pro. It’s a bit…

Continue Reading →

Deduplication and space management

Deduplication can create fantastic space saving opportunities within an environment, but it does also create the need for a much…

Continue Reading →

First impressions: Data Domain Boost

When IDATA was beta testing NetWorker 7.6 SP1, my colleagues in New Zealand were responsible for testing the DD/Boost functionality.…

Continue Reading →

Good enough, or perfect?

There was an interesting discussion being held on Twitter a day or so ago – the question of designing systems…

Continue Reading →

Deleting with Reckless Abaddon

This is the fifth and final part of our four part series “Data Lifecycle Management”. (By slipping in an aside…

Continue Reading →