by Christine Thome | Sep 14, 2018 | Uncategorized
Originally published on the Barracuda Blog, August 30, 2018, by Asaf Cidon Microsoft Office 365 has become so ubiquitous—with more than 100 million monthly active subscribers—that it’s almost become part of our identities particularly inside the network with emails...
by Christine Thome | Sep 14, 2018 | Uncategorized
Originally published on the Quest blog, August 27, 2018, by Bennet Klein Many people think developing a disaster recovery plan is all about calamitous events such as fires and earthquakes, where physical property is damaged and people’s lives are at risk. But...
by Paul Comfort | Sep 14, 2018 | Uncategorized
By Paul Comfort. CISSP, Lead Engineer, Chi Corporation A little background before diving in. A SAN is a Storage Area Network. In x86 server environments, before there were SANs, servers themselves contained or controlled the storage that they used in an isolated...
by Christine Thome | Aug 17, 2018 | Security
Originally published on the Mimecast Blog, August 15, 2018, by Bob Adams, Product Marketing Manager – Security Your organization has been – and will be – attacked. The sophistication of these attacks has changed over time and will continue to evolve....
by Christine Thome | Aug 17, 2018 | Storage
Originally published on the Pivot3 Blog | August 7, 2018 One of the biggest challenges placing stress on IT infrastructure today is the sheer amount of data being created, and it’s only going to increase. By 2025, IDC predicts that global data will reach 163...
by Christine Thome | Aug 17, 2018 | Networking, Uncategorized
Where a Second Lost on the Network has Insurmountable Consequences Originally published on Network World | JUNE 22, 2018 | by Norman Rice, Chief Marketing, Development, and Product Operations Officer of Extreme Networks The network edge is the new...
by Paul Comfort | Aug 17, 2018 | Cloud, Security, Storage
Many businesses are moving towards the cloud for enterprise applications. Where to store important data, however, may be problematic for some. Paul Comfort, Chi Corporation’s lead engineer, answers commonly asked questions to help you determine whether or not...
by admin | Jul 26, 2018 | Infrastructure, Storage
Original article appeared in the March 6, 2018 Pivot 3 Blog. Posted by Edgar Perez – VP of WW Solution Architects and Professional Services It’s clear that many companies have benefited from deploying Hyperconverged Infrastructure (HCI) solutions. Compared to...
by Paul Comfort | Jul 16, 2018 | Infrastructure, mobile threats, Security
Twenty years ago, if you mentioned spam and phishing in the same sentence, one would assume you were enjoying some time on the lake and a sandwich made from canned meat. In today’s IT world, those words have much more menacing meanings (although the canned meat...
by Christine Thome | Jul 3, 2018 | Infrastructure, Storage
Historically, achieving high throughput and lower latency meant overprovisioning hardware or using software to mitigate, but not fully eliminate performance issues. These workarounds have high CAPEX and OPEX costs and still don’t meet the requirements for...