Backup that won’t break the bank [EMC]

Backups are data insurance. Real-world insurance policies protect your home, car, and health from financial disaster. Likewise, data backups protect all your organization’s information. Both only kick in after a tragedy and can cost A LOT. They also both come with challenges when it comes to the process, and can leave you wondering why you invested in it in the first place!

 Some of the common back-up and recovery challenges include:

  • IT admin time is in short supply and cannot be spared in managing unreliable backup and recovery processes.
  • Space is used by unnecessary multiple copies of the same files being backed up.
  • Different processes may be used to protect virtualized and physical servers.
  • There are a range of recovery speed requirements based on the criticality of the data to the business.
  • Data in remote/home offices or mobile devices can fall outside the reach of central datacenter protection.
  • If using tape, it costs time and money to move and mishandling of tapes can cause damage.

If you are a small to midsize enterprise you may have just given up on addressing these challenges, since the solutions have always come at way too high of a cost. Until now.

Just imagine what it would be like if…

  • Meeting your backup window was never an issue
  • You could recover data in just a fraction of the time
  • You could make your organization more productive
  • And if you didn’t have to work all those nights and weekends

 The new EMC Data Domain DD160 now makes this possible for small to mid-size enterprises. In fact, IDC interviewed 10 organizations that deployed similar solutions from EMC and found that, on average, these organizations reduced backup times from 11 hours to 3hrs, reduced restore times from 17 hours to 2 hours, and spent significantly less time on tedious and reactive tasks.  And to top it off they achieved a 7 month payback period.

 Read full IDC Study: Next Generation Backup and Recovery

With immediate business impact that can pay for itself in less than a year, this solution is definitely worth considering. [Read more…]

Vision vs. Reality: The BYOD Debate [Cisco]

Gone are the days where workplace communications were limited to an office phone and desktop computer. Employees are demanding the freedom to communicate in multiple streams any time, anywhere, from any device.

Take phones for instance. A recent article published by Gartner predicts by year end 2013, 40 percent of enterprise workers will have abandoned or removed their desk phone in favor of their mobile.

This “Bring Your Own Device” (BYOD) trend is empowering users to communicate more effectively. It allows them to use whichever device they’re most comfortable with and gives them the freedom to access information, clients and colleagues in the office, on the road or in the coffee shop and, increasingly at home.

All great news if you’re a BYOD user. A challenge – some might say nightmare – for the IT department, in whose lap the challenges of creating and managing this unified experience falls.

We invited Softchoice’s own IT Manager James Ambursley and Unified Communications Expert Frank Ball to sit down over a cup of joe and discuss the promise and challenges of BYOD.

What are you overall thoughts on the advent of Bring Your Own Device?

Frank: At the end of the day, it’s a win for everybody – even IT and even if they’re not seeing the light just quite yet. BYOD and the unified communications and collaboration tools behind the scenes that make it a reality ultimately help organizations move with greater speed and agility. It’s technology that empowers people to communicate more effectively, improving business processes and helping businesses achieve better profitability.

James: Well, BYOD is one of those new buzz terms in the industry and I think what it really means is “look out!” Unified communications sounds like a great answer for many organizations but I have concerns that the theory and reality don’t mesh up in a whole host of areas – end user experience/performance, security, resource use and compatibility. [Read more…]