Blog categories

My blog posts and tweets are my own, and do not necessarily represent the views of my current employer (ESG), my previous employers or any other party.

I do not do paid endorsements, so if I am appear to be a fan of something, it is based on my personal experience with it.

If I am not talking about your stuff, it is either because I haven't worked with it enough or because my mom taught me "if you can't say something nice ... "

Do we still need VM-specific backup tools? [video]

This is one of the big questions in 2016 (and each of the past few years as well).

Have the “traditional” unified data protection solutions caught up in reliability and agility to the degree that the need for “point products” that only protect VMs are no longer necessary? To help answer the question, I’ve recorded […]

Cloud-Powered Data Protection — Definitions and Clarifications

We continue to see a great amount of interest in combining “data protection” and “the cloud” – but also a great deal of confusion, in that there isn’t such thing as “the cloud.”

It is a misnomer to discuss data protection media as having three choices (tape, disk or cloud) because cloud services are not […]

The first thing to agree on in data protection modernization

There are many fundamental debates in data protection:

Disk vs. tape vs. cloud Backups vs. snapshots vs. replication Centralized backup of ROBO’s vs. autonomous backups vs. cloud-BaaS solutions Unified data protection vs. workload-specific (e.g. VM/database) methods

On any given day, I could argue on either side of any one of them (for fun) in which […]

Data Protection Predictions for 2016

‘Tis the time of year to re-think how you did things before and what you might want to do differently in the future — in life, in IT and in Data Protection. To help you with those considerations, I’d like to share a short video on what we expect the more interesting trends will be […]

Plan for Hybrid Data Protection Media in 2016

More and more folks are first protecting their data (backups, archives, etc.) to disk — for several good reasons, including SLAs for data retrieval/restoration/recovery, deduplication efficiencies, etc. But as definitively as disk is the preferred “protection storage” as a second tier, the third tier is far less defined.

For some, the deterministic factors are BC/DR […]

New Year’s Resolution – Talk to More People about Data Protection

For 2016, one of my hopes for IT professionals is that you’ll talk with a wider variety of stakeholders within your organizations about data protection and the myriad methods for data retention and recovery that should be part ofone holistic strategy in ensuring the protection and preservation of corporate data, regardless of where the data […]

The Decentralization of Data Protection Continues

For the past few years, we’ve continued to watch workload-administrators and IT Operations folks raise their influence in regard to which data protection product(s) are in use today. It’s actually quite reasonable: those IT professionals are responsible for the usability of their platforms and have unique understandings of how and which data should be protected […]

Wrap-up on Backup from VeeamON 2015 (Video)

Wrap-up on Backup from VeeamON 2015

If your Director of IT came and told you that you needed to “Look for a backup/replication product that was built-for VMs,” you’d obviously look at Veeam.

But what if your Director of IT asked you for ‘more,’ like:

Recovery from hardware snapshots Basic protection for physical Windows endpoints […]

More data protection thoughts on Dell and EMC [video]

Last week, I blogged on the combined Data Protection portfolios of Dell and EMC.

It was certainly what many folks wanted to talk about last week, so here is a short video summarizing the data protection considerations of the announced acquisition:

As always, thanks for watching.

[Originally blogged via ESG’s Technical Optimist.com]

[…]

Your Data Is a Strategic Asset – Treat It That Way!

Improving data backup and recovery was the second most commonly cited IT priority for 2015 among respondents surveyed by ESG for its 2015 IT spending intentions report (see Figure 1).

But as important as backup and recovery are, the survey tells another story, too. The most frequently mentioned priority was information security. What that […]

@JBuff on Twitter