Strive for IT Excellence

Get to Know Your Data to Meet New Privacy Regulations

Some studies show that companies don't know what half the data they store is. That means they can't use it to generate insights that support the business, potentially costing them growth […]

Choosing the Right Cloud Archiving Service

In some ways, archiving online data is easier than archiving paper records. The storage is more compact and the data is more easily searched. Yet online archival still presents challenges for […]

Gain Control Over Data Lakes With Data Governance

Companies are drowning in data today. Data lakes pull in all kinds of data to preserve it for later analysis, including unstructured data, like comments in user forums, which would have previously […]

Don't Let Copy Data Overwhelm Your Storage

Making copies of data has its benefits. Copies offer protection in case data is corrupted or lost, and copies let developers test new code on real data without putting the production database in […]

Nbpem Connection Errors in NetBackup 7.7.x and 8.0

Problem: Nbpem may crash after changing policy schedule type from Calendar to Frequency

3 Reasons You Still Need Data Protection Software in the Cloud

While many businesses turn to the cloud as a destination for their backups and to provide disaster recovery (DR) capability, using the cloud doesn't mean companies don't need their own data […]

Enterprise Vault Errors Flooding Your Event Logs??

With Enterprise Vault (EV) you can sometimes see strange behavior in the event logs. For example, reoccurring 29014 errors with an interesting host name or Vault ID:

Upgrade Your NetBackup Version to Stay Supported and Gain New Functionality

Upgrade projects can be disruptive and time consuming, but companies shouldn't neglect them. Keeping up with the latest software releases not only gives you access to the latest features, it keeps […]

Master Data Management Plans Need a Strategy for Sharing

Master data management projects are largely viewed as data consolidation projects. The efforts replace separate, scattered departmental databases of key business data such as customer information […]

Protect Data Against Tampering By Focusing on Data Integrity

The standard "CIA" model of computer security requires confidentiality, integrity, and availability. Data protection often focuses on preventing data theft and unauthorized access, viewing it as a […]

No More Posts

New Resource

IaaS Guide
Click here to download our Guide to Infrastructure as a Service (IaaS).