Blog categories

My blog posts and tweets are my own, and do not necessarily represent the views of my current employer, my previous employers or any other party.

Many of these blogs were originally posted elsewhere on public sites, but have been re-posted here with attributions to the original location -- strictly as a means of a centralized archive of my perspectives.

I do not do paid endorsements, so if I am appear to be a fan of something, it is based on my personal experience with it. If I am not talking about your stuff, it is either because I haven't worked with it enough or because my mom taught me "if you can't say something nice ... "

VIDEO: What to plan for in a Data Protection Spectrum

Continuing on the theme that we started last year that “Data Protection” is the umbrella theme that encompasses a broad range (spectrum) of IT behaviors, including “Backup, Snapshots, Replication, etc.”:

    

Here is a video that gives some color to those ideas (pun intended):

    

1. Start with a fresh understanding of your […]

vBlog: You Too Can be a Data Protection Super Hero

The awesome folks in the ESG Video team recently let me sit down and record a few podcasts that I will be releasing over the next few weeks. In this one, I started thinking about the challenges of midsized organizations and ensuring adequate data protection and recovery.

While enterprises often have experts that are ready […]

Mobile Device Backup may be Impossible

Doing a selective mobile device backup that separates work data and personal data can’t be done, says analyst Jason Buffington, but perhaps not for the reasons you think.

Before I get started, let me define the two basic types of endpoint devices: consumption devices and creation devices.

Consumption devices are like e-readers that fetch data […]

@JBuff on Twitter