Author: jeromeandjames

The Third Generation BlueArc Titan Puts Oomph in Networked File Systems; Is There an “Oops” in its Support?

It isn’t enough for a vendor to make claims about their storage system; they should have to prove it. In a recent briefing with BlueArc it was quite clear that it was ready to back up its claims which really shouldn’t have surprised us since BlueArc has taken control of its destiny from the beginning. A quick look at various U.S. Patents shows BlueArc’s ingenuity, direction, and leadership.

Read More

Utility Storage Integral to Delivering on the Promise of the Oracle Unbreakable Linux Program

In an effort to provide the highest level of support and performance to end users, corporate IT has often acquired and deployed software and hardware solutions that, over time, are unable to meet the increasing demands for application performance and scalability. Issues such as vendor lock-in and high administrative overhead continue to increase costs and reduce ROI. For this reason IT departments have realized and embraced the advantages of commodity hardware and open source solutions.

Read More

3PAR’s New T-Class Storage Servers Make a Pop! in Storage

We hate to admit it but the deployment of enterprise storage often parallels all too closely to the familiar “Pop! Goes the weasel” nursery rhyme. Companies know how much capacity they need; they know which vendors are the cheapest; so that is where the money goes, until one day, Pop! Goes the storage! If you followed that little rhyme you surely picked up on the fact that previously the only criteria that mattered for prioritizing how you spent your money was on storage capacity. The truth of the matter is that many organizations toil over how to efficiently pack-in data into the smallest storage unit. Then when things go Pop!, go south, or grind to a halt storage administrators, architects, programmers, DBAs, and IT management are called into action to scramble and find out why, all of a sudden, the user experience or the application run time has degraded.

Read More

Email Archiving – It’s More than Moving Messages

To help eliminate these problems, many organizations turn to email archiving. But not all archiving solutions are created equal. For instance, stubbing is often a key component of the email archiving solution. With stubbing, a pointer is kept in the email server, such as Microsoft Exchange, while the original message and/or attachments is moved off to an archive area. When a user wants to look at an email, the stub is accessed, and then message is retrieved from archive with the expected benefit of a reduced mailbox size. Unfortunately eliminating the problem of mailbox size often opens the door to stubbing issues. Over time, stubs can actually cause performance problems as the number of items kept (messages, including stubs) increases. As a result, stubbing becomes a band-aid that does nothing to mitigate the growing email problem.

Read More

Securing the Internet Email Transport Mechanism

Email in the workforce has become more than a tool to distribute thoughts, ideas, and corporate plans; it has become a social medium for silently communicating with the world beyond corporate walls – real and virtual. More importantly, it is now a common method to steal, distribute and leak corporate information and secrets. It is far too easy for an employee to access secure corporate information, cut-and-paste the information into an email, and then send the email to an external email account. Even non-fraudulent activities, with best intentions, such as mailing a spreadsheet to a home email address to work from home can open a Pandora’s box for leaking sensitive information.

Read More

Click Here to Signup for the DCIG Newsletter!


DCIG Newsletter Signup

Thank you for your interest in DCIG research and analysis.

Please sign up for the free DCIG Newsletter to have new analysis delivered to your inbox each week.