I’m a multi-OS person. I use Windows and macOS as desktops, and have a plethora of Linux systems in my…
I’ve been on a bit of a blogging hiatus over the past month. 2021 was a pretty busy year for…
It’s a wrap for posts from the Data Protection blog for 2021, but if you’ll indulge me for a moment,…
Where we’re at A few weeks ago I posted a (lengthy) Perl script (and explanation) for running deduplication analysis against…
I’ve seen a lot of talk lately of data hoarding. Data can bring us new insights, new business opportunities, and…
If you use NetWorker with Data Domain, you’ve probably sometimes wanted to know which of your clients have the best…
The nsrpolicy tool is remarkably powerful, allowing you to create edit and view policy details rapidly from the command line…
Introduction Here’s a question I get asked quite frequently: “If we have a vault, how will the vault team know…
The NIST Cloud Computing framework defines the following essential characteristics of cloud computing: On-demand self-service Broad network access Resource pooling…
Introduction In Casino Royale, Vesper Lynd says to James Bond, “There are dinner jackets and dinner jackets; this is the…