Letting the Customers Speak on our Behalf: Reduxio’s Customer Centric Approach

Mike Grandinetti - Thursday, January 11, 2018

“The customer is always right.”


The Data Storage Industry in review and what to expect from Reduxio in 2018

Mark Weiner - Wednesday, December 27, 2017

The new role of Data Storage

Companies and organizations of all sizes are drowning in a relentless deluge of data. Mankind has created more data in the past 18 months than in all of history — it’s almost impossible to wrap your head around this statistic — and this trend will continue to grow as more industries become part of the digital economy.


There’s Something Happening Here: Reduxio Wins Coveted Innovation Award

Mike Grandinetti - Wednesday, December 13, 2017

The iconic rock band, Buffalo Springfield the 1997 Rock & Roll Hall of Fame inductee that was the predecessor to Crosby, Still, Nash and Young, was led by Stephen Stills and Neil Young. The song “For What It’s Worth”, written by Stills in 1967, for many symbolizes the changing of an era.

Recently, the top global IT analyst firms, notably Forrester and IDC, have written in-depth research notes that describe the changing of an era in data storage, management and protection and highlight...


Things Storage Admins Don't Have To Do Anymore [PART 2]

Mike Grandinetti - Friday, July 07, 2017

 

In our first part of this  Blog, we introduced the first 6 tedious and unproductive things that Storage Administrators don't have to do anymore thanks to Reduxio. Since Reduxio launched TimeOS 3.0 last week and added new amazing capabilities such as NoRestore™ and NoMigrate it makes sense that we keep building up this list.

 


On-Demand Webinar: Ransomware - Sit Back & Relax

Eyal Worthalter - Wednesday, June 14, 2017

In August 2016 Barnstable Police Department, a 130-person team in a small tourist town, became one of the average 4,000 victims per day of a ransomware attack.

Barnstable had recently deployed Reduxio's HX550 in order to improve application performance and since their mail servers were constantly running out of space and VDI boot times were frequently more than 3 minutes. Reduxio and Barnstable were able to completely avoid any data loss and complete a full systems recovery, ransom unpaid,...


High Tech Mergers and Acquisitions and the Death of Shareholder Value

Mike Grandinetti - Tuesday, May 02, 2017

Here’s something to think about. If you knew in advance, statistically, that by acquiring a company,  post-merger, these two things could happen: (1) your own company’s profit margins, earnings growth, and return on capital will fall behind that of your industry peers in the three years following the deal; and (2) in that same three years, the stock returns of your merged company will be, on average, 24% lower than the returns for rival acquirers that you actually beat out on the deal, would...


Are You Getting the Right Support for Your Data Storage?

Daniel Slabodar - Friday, April 14, 2017

Of the various problems that IT organizations face, I can quickly identify two closely-related important issues. The first  is purchasing new equipment and being able to use it within a relatively short period of time. The second one is building up the knowledge and expertise needed to  manage the equipment, and having this information accessible at any given time, and especially, during a major crisis.


How to Use Hackathons to Stand Out

Eyal Worthalter - Friday, February 10, 2017

Many people get the chance to participate in a hackathon, but only few of these opportunities turn out to have a significant impact on their lives. In my case though, a particular hackathon experience changed the course of my career.


Ransomware: Be afraid. Be very afraid.

Eli Lopez - Friday, October 07, 2016

Cyber attacks happen. How can you recover quickly?

If you are in IT management, everywhere you turn, you see warnings of malicious forces working diligently with the one aim of compromising your security and eating your data for lunch.

It’s not a question of if anymore but rather of when. Many times the cyber security tools will not prevent the break-in, but only alert you of the compromise.

1