Six things to consider when choosing a hypervisor
Virtualization, for the uninitiated, describes the use of software to provide a complete, functional simulation of a hardware environment. Data can be stored, programs can be run, and memory can be...
Device Backup Behavior Statistics
The annual World Backup Day on March 31st always provides good reason to consider one’s own approach to creating backups, as well detecting any possible weak points. For many people, making a backup...
How to recover data from a virtual environment
As discussed in our previous blog: ‘What are the causes of virtual system data loss? ’, the main causes of data loss from a virtual environment are hardware issues, formatting, metadata corruption,...
Beware: Loud Noise Can Cause Data Loss on Hard Drives
Almost everybody has heard about the noise that hard drives can make when they are about to fail. This is a likely indication that time for the drive has come to an end and you will experience a data...
What is degaussing and how does it work?
There are some reliable and inexpensive ways to sanitize data securely, and above all, irrevocably. There are two possible methods that you can use for sanitizing devices that you don’t plan on using...
CHKDSK: Using Thor’s Hammer to Hang a Picture
The power of CHKDSK may be mighty, but could it be too much for a mere human to handle? Many of you know Loki and Thor from recent comic book and movie references, but their history runs much deeper...
Mission-Critical Servers: Protecting the Nest
We’ve discussed in previous posts how the growth of cloud computing, mobile transactions, and social networking is changing the computing landscape and how organizations will meet the demands of this...