D2D2T
Backup

D2D2T: a disk-to-disk-to-tape backup strategy

A look at the modern data storage industry can make your head spin. From a variety of hard drives, efficient disk arrays, magnetic tapes, conventional or emulated tape libraries to ...

Read More
Data Protection

Is your Heartbleeding?

The Heartbleed bug, officially referenced as CVE-2014-0160, is already being coined as one of the biggest security threats since the mass adoption of the Internet – affecting millions of websites ...

Read More
Backup

Criteria for selecting files when performing full, incremental and differential backup

A fundamental function of backup and restore software is the ability to copy data from one place to another. No matter if the backup data are stored on volumes, files, ...

Read More
CeBIT logo
Data Protection, Events

CeBIT 2014: Datability with Open-E storage management software

Open-E just spent a fantastic week at CeBIT and here’s a review of what has happened during those five days in Hanover. Open-E and Datability One of the keynote topics ...

Read More
CeBIT logo
Events

What can we expect from CeBIT 2014?

Once again, Open-E is heading over to Hannover, Germany in March. But for a few reasons this CeBIT is special and we just can’t miss the No. 1 event for ...

Read More
RAID

RAID Solutions made easy!

An essential element of the data availability architecture is RAID. With a RAID configuration, you can achieve redundancy, lower latency, higher bandwidth for reading or writing, and recoverability from hard-disk ...

Read More
iSCSI storage
Citrix, iSCSI

iSCSI storage: a beginner’s guide

Storage management for ever-growing capacity of data is a crucial subject for businesses of all sizes. Simple and reliable storage based on iSCSI can be a good alternative for companies ...

Read More
data storage, server
Backup, Data Protection

Diary of an admin: Backup and Data Replication

Among many technologies that increase data storage protection, the term ‘replication’ is used very frequently. Replication, as a way of creating an exact data copy between the source storage location ...

Read More