dcsimg

How a VPN Can Help with HIPAA Compliance

Reading Time: 3 minutesHIPAA compliance affects healthcare organizations, insurance agents and more. In this recent podcast, we’ve outlined the easiest way to secure your data so that you can meet HIPAA compliance obligations easily and cost-effectively.  Public Wi-Fi is dangerous for both people and businesses, especially for those dealing with confidential and sensitive data. Due to a … [Read more...]

Meet your risk assessment requirements with vsRisk Cloud

Risk assessments play an essential role in information security, as they are the primary way organisations identify vulnerabilities and the ways data breaches can occur. The results of the risk assessment dictate defence strategies and are used by senior staff to allocate information security and business continuity budgets. This shouldn’t be a surprise for organisations that follow the … [Read more...]

Fix SQL Server Storage Bottlenecks

No SQL code changes.No Disruption.No Reboots.Simple!   Condusiv V-locity Introduction     Whether running SQL in a physical or virtualized environment, most SQL DBAs would welcome faster storage at a reasonable price. The V-locity® software from Condusiv® Technologies is designed to provide exactly that, but using the storage hardware that you already own. It doesn't … [Read more...]

How to make NVMe storage even faster

This is a blog to complement a vlog that I posted a few weeks ago, in which I demonstrated how to use the intelligent RAM caching technology found in the V-locity® software from Condusiv® Technologies to improve the performance that a computer can get from NVMe flash storage. You can view this video here:    A question arose from a couple of long-term customers about whether the … [Read more...]

Kerio Connect serves up to the competition

Information travels at a mile a minute, or so they say. If your business is not using email, you might as well admit that you are working in the Stone Age and realize you are missing out on opportunities. News sources predict there will be 19 billion email users by 2019 worldwide. While your business […] … [Read more...]

Financial Sector Battered by Rising Compliance Costs

Finance is already an outlier in terms of IT costs. The industry devotes 10.5% of total revenue to IT—and on average, each financial industry IT staffer supports only 15.7 users, the fewest of any industry. All over the world, financial services companies are facing skyrocketing compliance costs. Almost half the respondents to a recent Accenture survey of compliance officers in 13 countries … [Read more...]

Doing it All: The Internet of Things and the Data Tsunami

“If you’re a CIO today, basically you have no choice. You have to do edge computing and cloud computing, and you have to do them within budgets that don’t allow for wholesale hardware replacement…” For a while there, it looked like corporate IT resource planning was going to be easy. Organizations would move practically everything to the cloud, lean on their cloud … [Read more...]

A Deep Dive Into The I/O Performance Dashboard

While most users are familiar with the main Diskeeper®/V-locity®/SSDkeeper™ Dashboard view which focuses on the number of I/Os eliminated and Storage I/O Time Saved, the I/O Performance Dashboard tab takes a deeper look into the performance characteristics of I/O activity.  The data shown here is similar in nature to other Windows performance monitoring utilities and provides a … [Read more...]

Can we trust our online project management tools?

How would you feel about sharing confidential information about your company on Twitter or Facebook? That doesn’t sound right, does it? So, in a corporate life where we keep our work calendars online, and where we work together on projects using online flow-planners and online project management software, it might pay off to wonder whether the shared content is safe from prying eyes. What are we … [Read more...]

Solving the IO Blender Effect with Software-Based Caching

First, let me explain exactly what the IO Blender Effect is, and why it causes a problem in virtualized environments such as those from VMware or Microsoft’s Hyper-V. This is typically what storage IO traffic would look like when everything is working well. You have the least number of storage IO packets, each carrying a large payload of data down to the storage. Because the data is … [Read more...]