Since its launch back in May 2017, the Dell/EMC IDPA (Integrated Data Protection Appliance) product range has been something a joke in the industry for not really being an appliance at all. It’s a rack full of kit (AKA the fridge) with multiple components of a legacy data protection architecture stuffed inside, making it the…
As mentioned at the beginning of my sid-500.com webpage, I intend to publish not only technical articles. Today I would like to share some thoughts for your career. Venturing into the realm of the mind as a technician is a dangerous undertaking. Since I am also a teacher, I have accompanied many course participants and believe […]
Recently I’ve been seeing a resurgence of staffers at legacy data protection vendors quoting huge deduplication ratios on LinkedIn posts. Over the years I’ve seen 30:1, 100:1, even 150:1. 527 more words
Enterprise IT admin’s are a creative bunch, always looking for ways to to do more with less and automating or scripting routine tasks so they can focus on more exciting projects. Keeping production application systems up to date is one of more challenging tasks, especially if they are customer facing systems, it’s sometimes hard to…
Its been long way computers had been evolved, today we take computers for granted in every part of our life, the computer no matter which form either personal, mobile or car had become inseparable, but looking back in history the early engineers or can call then computer scientist had faced tremendous challenges at every steps.
University of Warwick had develop a EDSAC Simulator, EDSAC was the world’s first stored-program computer build by Cambridge University as to operate computing services. The simulator is available here if you are interested.
In the above video Professor David Brailsford from University of Nottingham explains how to use the EDSAC Simulator and remembers the challenges faced by actual EDSAC, courtesy YouTube channel Computerphile.
Take a pause and appreciate those early computer scientist.
Unstructured data has always been a sore spot for the data protection process. The growth in the number of files that make up unstructured data sets and the capacity that they consume now threatens to break the data protection model completely. Considering that every indicator suggests the growth in the unstructured data will not only […]
While virtualization has been here for more than 30 years, it had a larger outreach over the last decade with top technological companies having their own hypervisors, VMware, Microsoft for example. With emergence of multi-core processors and increasingly dense memory, workloads have grown tremendously thus paving way to a number of hypervisors and cloud technologies.…