By Sara Wessells / May 29, 2015 / datacenterdatacenter disaster recoverydisaster recovery assessment
A flood that damages mission-critical equipment is among the worst scenarios a data center can face, offering little hope for a quick fix. On April 13, 2015, the Zunesis team received a “first responders call” from a long-term public sector customer who had the misfortune to experience a broken water main that left their main […]
READ MOREBy Zunesis / May 22, 2015 / it solutionit solution partnermobility
I talked about the critical importance of turning the 70/30 rule on its head in my last post, that the winners in your competitive set are the ones who are able to spend less time, money, and human resources maintaining their current IT environment and more of their resources using IT to create a competitive […]
READ MOREBy Zunesis / May 19, 2015 / data storagedata storage solutionsflash storage
In my last post I wrote about the importance of understanding your current environment before setting out on a search for new data storage solutions. Understanding your Usable Capacity requirements, Data Characteristics, and Workload Profiles is essential when evaluating the many storage options available. Once you have assessed and documented your requirements, you should spend […]
READ MOREBy Zunesis / May 7, 2015 / emerging technologiesemerging technologyemerging technology trends
Strategic technology trends are defined as having potentially significant impact on organizations in the next three years. Here is a summary of a few trends according to Forbes; Gartner, Inc.; Computerworld; and other technology visionaries: Wearable Devices – Uses of wearable technology are influencing the fields of health and medicine, fitness, aging, education, gaming, […]
READ MOREBy Zunesis / May 1, 2015 / active directorydirectory servicesmicrosoft active directory
Anyone who has ever worked with Microsoft’s Active Directory, either as an end user or administrator, has undoubtedly come across strangeness and unexplained occurrences. Active Directory serves many purposes: identity management, resource policy deployment, and user security management to name a few. Active Directory handles its extremely complex inter-workings in a very robust and flexible way. […]
READ MORE