Anyone who thinks all Microsoft 365 software-as-service (SaaS) backup products offer all the same features need to think again. Each one protects different components of Microsoft 365 (M365) and there are no two products that protect M365 in the same way. If anything, organizations can only make a few safe assumptions when choosing any of the available M365 SaaS backup solutions.
Category: Microsoft Exchange
As the last business day of 2012 it is time for DCIG to unveil its most read blog entries of 2012. While a few long time reader favorites remain in this year’s Top 5, a couple of newcomers also made first time appearances on this year’s list driven by what is likely growing user interest/concern in managing Big Data and doing eDiscovery across their unstructured data stores.
I have disclosed the blog entries that have earned an honorable mention on DCIG’s website for the number of page views they received in 2012. I have also already revealed the Top 5 blog entries written in 2012 that were the most frequently read in 2012. So it is time today to begin to reveal the Top 10 most frequently viewed blog entries on DCIG’s website in 2012 regardless of what year they were published, starting with numbers 6 – 10.
One of the unique aspects about running a blog site that primarily does analysis as opposed to commenting and covering today’s news is that the most read blog entries on DCIG’s site each year are rarely from the current year. This year was no exception as only one of the Top 5 blog entries written in 2012 made it into the Top 10 of DCIG’s most read blog entries of 2012 that I will start to reveal in tomorrow’s blog entry.
Facebook, SharePoint, Box and Outside In Top List of Supported Products by eDiscovery Software Providers
DCIG expects to unveil its DCIG 2012 Early Case Assessment (ECA) Buyer’s Guide in Q2CY12. As prior Buyer’s Guides have done, it puts at the fingertips of organizations a Buyer’s Guide that provides them with a comprehensive list of ECA software that can assist them in this all-important buying decision while removing much of the mystery around how ECA are configured and which ones are suitable for which purposes.
Anyone who has ever witnessed a disaster knows that one of two things can happen. Either the area affected by the disaster can be devastated, never to recover; or, new life can spring up in its place. In many respect, the economic disaster that hit the entire nation and world hit the data storage industry equally hard. However the data storage industry is picking itself back up and, based upon what I saw and heard this week at The BDEvent in Palo Alto, CA, it has brought an end to one era in data storage while the dawn of another is now upon us.
Last week’s blog took a look at the 10 most read blogs in 2009 that were written in 2009. This week I wanted to step even further back and reflect upon the top 10 most read blogs in 2009 regardless of when they were written as I find this insightful in two ways. It lets me know what information continues to hold the attention of readers on as well as what topics from the past might become new trends in 2010. So while there is definitely some overlap between the two, there are also some entries that appear on this list that knock some of the top 10 blogs from last week off the list.
This is one of my favorite blogs of the year to write. Even though this is only the second time since DCIG launched its blogging site two years ago that I have had the opportunity to write a blog in this format, I have been looking forward to looking back all year. In case you have not yet figured it out, today I take a look back at the top 10 most read blogs in 2009 on the DCIG site. However this year I am doing a two part series with today’s blog examining the 10 most read blogs in 2009 that were written in 2009.
Data protection is a ubiquitous need that cuts across all size organizations and has resulted in dozens of products with specific features to address these needs. In fact, one can easily wonder why any vendor even thinks it stands a chance to compete by coming to market with new backup software. But still they do and part of the reason is that backup problems still persist; so much so that backup redesign has topped the list among end-users for three (3) years running as they struggle to meet new backup requirements.
In the last week I had an extensive conversation with an investment individual about what the future holds for email archiving and management software. On one hand, he astutely and accurately observed that the market is already saturated with products and that consolidation should occur. But when one looks beyond the general classifications of “email archiving” or “email management”, one quickly detects that many of these products are designed to solve specific problems in a specific market segment. As a result, email consolidation is neither as simple nor as straightforward as one might imagine and that there is still plenty of room for growth and innovation in this space.