Unavoidable Risks When Maintaining an ERP System

Published April 2, 2018

DEATH, TAXES, AND SOFTWARE UPGRADES There are some things you can only put off for so long… paying taxes, dental appointments, oil changes, and for IT people… upgrading their ERP or CRM system. For a long time, you have fought the good fight, but now the software vendor is threatening to drop support for this version of the […]

Continue Reading

Sharing Large Amounts of Data Across the Miles

Published March 15, 2018

The Problem with “Big Data” If your business has geographically diverse offices -- whether they span a state, a country, or the globe -- then you inevitably have a need to share data across those locations. Since the Internet went mainstream, it has been the de facto way of exchanging information with each other, but it has […]

Continue Reading

Is it Time to Nix the NAS?

Published March 8, 2018

A Brief History of Data Management Since the birth of the PC revolution, data management has been an intrinsic part of the computing experience. I doubt there is any one of us who hasn’t lost an important file at home for lack of a responsible backup strategy. But in the workplace, things moved in a different direction. Our PCs […]

Continue Reading

Why Your Backup Redundancy Process Needs Both

Published March 1, 2018

Redundancy vs Backup In the quest for true data security, it is important to compare the system you have in place against the possible threats you are likely to experience. We hear the terms “redundancy” and “backup” tossed around a lot and used almost interchangeably, and granted, the line between them can be difficult to […]

Continue Reading

Bringing Focused Storage Solutions to an Aging Enterprise System

Published February 22, 2018

Big Storage is Not Immune to Technology A major challenge you likely face in this technological age is being able to take advantage of the latest advancements without upsetting the apple cart on which your business is currently running. The more integrated that technology is to your daily operations, the more challenging that […]

Continue Reading

Your Business Grew Up -- So Should Your Storage Solution

Published February 20, 2018

Remember Simple? When you began your business, things were simpler. There were only a handful of computers to maintain, a single pot of coffee lasted most of the morning, and success was being able to keep the lights on for another month. Back then, your idea of data security may have been a combination of personal […]

Continue Reading

Coping with a Failing Storage System

Published February 13, 2018

Your company’s central storage array is vital to normal business operations, and priceless in terms of the information it contains. Perhaps it has been in place for many years and has mostly served you well. What you haven’t noticed is that over time, as the amount of stored data increases, the performance began to degrade. […]

Continue Reading

In Memory of Snapshots

Published February 5, 2018

Core Evolution Group recently made it known that a beloved friend of the storage industry recently passed away. Known to most as simply “Snapshots”, he quietly passed into irrelevance at his birthplace in Sunnyvale, CA. His actual time of death was purportedly between 3:00 - 6:00 PM on a weekday, but no more specific data could […]

Continue Reading

Data Storage 101

Published February 1, 2018

What is Storage? I know if I were to ask my wife, it would immediately become a discussion about insufficient closet space, too much clutter, and eventually it would turn personal (“Why do you still have those old hiking boots when you haven’t even seen a trail in 8 years?!”) But as I ponder that, I think those basic concepts […]

Continue Reading

How to Avoid Ransomware - Permanently

Published January 25, 2018

Ransomware is a type of malware that prevents users from accessing their system (or critical files) until a ransom is paid per the provided instructions … usually frozen on the screen. One particularly effective class, known as Crypto-Ransomware, targets certain file types on your system, encrypts them, and then presents you […]

Continue Reading