A good general rule for marketing is to always keep it focused on the customer—don’t talk about yourself. This blog breaks that rule, and you’ll find out why.
It used to be Mick Jagger and the Stones singing “Satisfaction” — now it’s Adam Levine and Maroon 5 singing “Moves Like Jagger.” This is an example of how things change but always come back around.
Self-driving cars. Self-filling pantries and refrigerators. Been there, done that. Commercial flights to the moon. Coming soon. Cure for Zika virus. That would be awesome. Computers with personalities. Finding life on other planets. Scary. Global monetary system. Accurate weather prediction. Novel concepts. Pokémon GO. Yawn.
On March 23rd, Storage Newsletter published an article that referenced the amount of LTO storage capacity shipped in 2015, and that the LTO capacity shipped actually increased by about 18% versus the prior year. These figures are based on a report that was published by the LTO consortium, and the report also indicated that more than 385,000 PB of total data capacity has been shipped since the introduction of LTO Ultrium cartridges in 2000.
Las Vegas is the home for what’s going to be one of the biggest hotspot for determining the future of IT and data protection. VeeamOn 2015 is almost here. Quantum and Veeam recently cemented our Premier Partnership and we’re excited to talk about how we’re helping customers break free from old school, traditional ways of protecting data. That’s what Kicking The Cartel is all about. Storage companies will be all over VeeamOn, competing for your attention, showing off their latest and greatest in an attempt to be one step ahead of the rapid change in the way companies store data. And we all know the way people access data is changing – with access patterns and virtual workloads becoming less and less predictable. Customers need to have greater access to their data, and they don’t want to pay thousands of dollars per TB for a ‘one size fits all’ to protect it.
The apparatus of security is something that can be easily taken for granted. We may grumble about taking our shoes off at an airport security line, or having our bag searched on the way into a concert, but we largely accept these inconveniences as the price of security. The infrastructure that is necessary to make us all feel secure in order to conduct business, travel, and live our lives freely is vastly more complex than many of us typically think about. At the ASIS International 61st Annual Seminar and Exhibits last week in Anaheim the world’s experts in security management gathered to share insights on what it takes to mitigate risk and maintain security. These are the guys who think about security every day and never take it for granted. Experts presented on topics such as “The Future Effects of Rapidly Changing Security Technology” and “Living the New Normal of Sophisticated and Determined Attackers.” I listened to the head of security at The Mall of America describe behavior detection and assessment, and how they have responded when the mall was specifically mentioned in a terrorist threat video. He recounted some specific successes you probably haven’t heard about because security successes don’t make the news – security failures do.
Cybersecurity is in the news and for good reason. Many of us have experienced firsthand what cybercriminals can do with our credit card numbers and our personally identifiable information being sold on the black market. In government, though, the stakes are higher. So it shouldn’t be a surprise that cybersecurity is on GAO’s High Risk List. Vulnerabilities abound in today’s technology-dependent world, and cybercriminals excel at exploiting weakness. Fortunately there are weapons organizations can deploy to fight back, and they fall into three main categories: people, tools, and data.
Storing data is easy (well, not that easy). But turning it into meaningful business value requires technology partners that know how to integrate well and create something bigger. Customers want products that can create a real solution to a real problem. That’s the Quantum approach and that’s why we’re so excited for this year’s VMworld. We’re “Kicking the Cartel” and helping companies break free from traditional, old school ways of storing and protecting data. If it’s time for your organization to break free from paying $2,500 per TB for backup software, stop by the Quantum booth at VMworld. We’ll show you how to create a different approach to storage that centers on the highest performance and the lowest TCO. We’ll be showcasing all of our technology at VMworld too, including our QXS hybrid storage for VM primary storage and our Artico NAS appliance for archiving. Sign up to meet with the Quantum Storage Experts at the show and you could win an Apple Watch too.
Today, everyone seems to understand the ever-growing importance of data protection, often viewing it as a superset of backup combined with snapshots and replication. Typically, a conversation about data protection includes the assumption of a “gold standard” centered on using secondary disk for rapid recovery and tertiary tape for long term retention. Of course, “the cloud” also is always a consideration as part of the next generation of the solution. It’s still all under the banner of “data protection” (DP), the collection of activities, methods, and media used to help recover or restore business information after a crisis or other IT disruption. According to research, primary storage is growing around 40% annually, with secondary storage used for data protection growing at similar rates. Budgets aren’t growing nearly that much. Meanwhile, IT organizations are being asked to do more (i.e., inject more agility, functionality, and resiliency into their operations) while spending as little budget money as possible. In actuality, data protection budgets are growing around 4.6% annually according to ESG research, but that level of increase won’t even let you keep doing what you have been doing at a larger scale.Therefore, you have to do something different. What you should do: ARCHIVE!