Make it big! Recovery solutions for large storage systems (Part2)
In the first part of this article we covered the storage systems architectures, now we want do give some insights on how to cope with system failures and data loss: Avoiding storage system failures...
Lost in the Cloud: Steps to Protect Your Cloud Data
On any given day, most of us rely on the cloud to store, upload, and retrieve various types of data – work files, songs, pictures, videos, apps, etc. It’s a proven, reliable service that we’ve grown...
Are your Android apps putting your phone at risk?
If you own an Android, you’re probably a regular visitor to the Google Play Store. Having the latest gaming app, or an app to tell you how many reps you’ve done at the gym is part and parcel of...
Writing a disaster recovery plan for your small business [free template]
The practice of preparing for downtime, and of taking steps to ensure a speedy return to normality, is called disaster recovery (DR) planning. Unfortunately, it’s not always a walk in the park to...
Hard Drive Data Analysis in Double Murder Investigation
The Crime Among the most amazing cases of data recovery that Ontrack has seen is about a double murder investigation. A woman died at her home and was found next to another dead body that she...
The move to hyper-converged infrastructure (Part 1)
Anyone who has ever been involved in a data center relocation and migration project knows how much time and effort is needed to accomplish this comprehensive and complex task. Getting it done...
What is Write Amplification (WA) and how does it effect SSDs?
In a recent blog, we described Garbage Collection and the Trim command. Both are methods to mark and set data that are no longer in use and can, therefore, be overwritten in a Flash NAND based SSD....