Data Erasure – The End of the Data Lifecycle
In last week’s blog we discussed data encryption and data security. Encryption is just one area of data security and data security rolls up into the larger category of data management. What do you...
Human Error: The Root Cause of SQL Server Restore Requests
There are lots of ways to lose data – That’s why we have things like World Backup Day, but what’s the one sure-fire data loss technique that is continually at the top of the list? Human error, of...
Is the Cloud Becoming One of the Standards for SQL Server?
The cloud. Most of us use its powers personally on a daily basis and never really give it much thought. You know, all of those status updates and pictures of your breakfast you share with your...
Encryption - Secret Codes for Data Security
There is so much in the news lately about data security, but what does that exactly mean? According to Wikipedia, “Data security means protecting data, such as a database, from destructive forces,...
Will You Be An Early Adopter of the Apple Watch?
Apple announced Monday that the new Apple Watch will be available on April 24th (preorders begin April 10th). A recent poll by Adobe of 1,000 Americans who owns either a smartphone or tablet found...
NetApp: The Importance of Trust and Security
Author: Mike Scanlin, Information Assurance Program Manager, NetApp, Inc. NetApp understands the importance of security. “Trust but verify” is the foundation for NetApp’s position as the #1 provider...
An Inside Look at the Hybrid Drive
For the past decade or so, solid state drives (SSDs) have been building popularity in the IT world. First, they infiltrated laptops and mobile devices with their small form factor and the void of...