Data Protection Software

Latest Discussions

  • Hi, I hit a bump. Got some errors and decided to redo from the beginning. However, I can not remove the object client. From OC, it is no longer there, but in CLI, I can still see the object client. Any suggestion on how to go about this? Thanks in ...

  • TSM/SP is beholden to the latency of the individual sequence of IOs. While you can get 100,000 IOPS, that is in a highly parallel process. An individual IO on NVMe is still going to have a latency somewhere in the 80us range, plus whatever I/O latency ...

  • I have a couple of customers using the same setup except they have LTO7 and LTO8 drives. They are getting the about the same performance as you. It's pretty slow for what it could be. Must be they way it's coded. ------------------------------ paul elson ...

Latest Blogs

  • This week Tricia, Sean, Randy and Steve talk about the 5th of 6 core capabilities that are required to build out a data resilient environment. We dive into the different types of air gapping as well as the difference between air gaps and immutability. ...

  • Development and operations teams are moving to containers because they are nimble and agile, enabling great portability, application availability, and require few system resources. According to an IDC survey, worldwide more than 50% of companies surveyed ...

  • This week the team and I talked about one of the topics we know most about, data recovery and the need to have multiple layers of recover for your environment. The first question is why? The reality is two fold. First, no company, I don't care who ...

  • Data resilience is one of the most talked about topics in IT this year. Customers are starting to understand the value of their data better and are also understanding how any attack on their data can cause their business serious harm. Over the last ...

  • This week we talk about the second most important capability when developing a robust data resilience environment, the ability to Identify and Monitor your storage for malicious activity. This week, as we take a spin on the wheel of misfortune, we ...

    1 person recommends this.

Latest Files