Long ago in the time “Before the Internet” IT departments had developers that created applications and handed the code to QA testers that verified the functionality. Then the Operators put it into production and monitored it so that the help desk would not get calls from angry users. If you know what a 3270 terminal […]
Category: Uncategorized
DataTrust Solutions announces Hitachi Data Ingestor Exit Options
Longmont, CO April 4, 2023. DataTrust Solutions, a leading provider of file and object migration services, has announced three options for Hitachi Data Ingestor (HDI) customers who are facing End of Service Life (ESOL) on March 29, 2024. Introduced in 2010, HDI is a gateway typically sold as a hardware appliance to provide SMB and […]
ChatGPT no Skynet
A modern gold rush occurred with OpenAI releasing its ChatGPT in November. It has generative AI, which means it can generate content based upon inputs. It can write research reports, take standardized exams and can create photorealistic digital images. Since then, billions of dollars have been invested, including $10 billion by Microsoft. A lot of […]
Cyber Barbarians at the Gate
IT exists to provide data access to authorized users and applications. With the understanding that it must be saved, stored and protected in order for it to be accessed by users and applications. Ransomware is being elevated from the IT department to the boardroom due to concern about the direct costs and negative brand value […]
Hello 2023
The team at DTS is looking forward to the adventures that 2023 will bring. To start of the year we moved to Longmont Colorado, a mere 20 miles from our old offices. Everybody hates to move but the lure of 10Gb networking to the office was too much to resist. Not that anybody goes to […]
Why paying the ransom is a bad idea
Why paying the ransom is a bad idea: 1. There is no guarantee that you will be provided the decryption key or that all the data can be recovered. According to Sophos most victims are unable to recover some or all of their data: 92% of those who paid ransom lost some data, 50% lost […]
What is the gold standard for Ransomware protection?
Write Once Read Many (WORM) storage solutions are now back in fashion, thanks to ransomware. Historically, WORM storage has been used to meet regulatory compliance requirements for data immutability; which means the data cannot be modified or deleted. This was driven by SEC 17a-4, FINRA, and Sarbanes Oxley Act (SOX) regulations. There are over 10,000 […]
Why Organizations are Migrating off Windows File Servers
More and more organizations are migrating Windows file storage to the private and public clouds to eliminate the hassle and reduce the costs of managing and backing up user data. The top 7 reasons organizations are migrating Windows File Server workloads to private and public cloud are: 1. Windows Server 2008 End-of-Life The first and […]
Just Saying: What about bulk file rehydration?
Great job, you bought that software that inventories a file system and moves the old cold data to an object store. You actions saved money moving cold data from fast expensive disk to less expensive, but slower storage. Now that 5 TB research project that was finished a year ago and moved to object storage […]
What’s in a name?
Historically we have used very specific names for software applications. For instance “Migration Software for Centera” (MSC) is the name of our migration application that copies data off Centera to another storage system. Later we added Atmos and Hitachi HCP as source systems we kept the name the same and it did lead to some […]