Top Data Storage Acquisitions: SSD Technology in Demand

SSD Technology,Data StorageIn December 2011, the closely scrutinized $1.4 billion Seagate-Samsung deal closed to place an exclamation point on the year by which hard disks (HDDs) and solid-condition drive (SSD) technology were in demand. There is a lot of consolidation among hard disk suppliers throughout the entire year, carrying out a flurry of storage array purchases this year. But storage array purchases didn’t entirely disappear this year.

1. Seagate-Samsung make deadline, Western Digital-HGST deal pending.

Seagate Technology acquired Samsung Electronics’ M8 products for $1.4 billion in December. The offer needed seven several weeks to shut, mainly due to major regulating hurdles. The Seagate-Samsung acquisition gave Seagate its archrival’s enterprise hard disk business, which brought government bodies to possess serious concerns by what which means for competition available on the market. The offer gives Seagate Samsung’s type of 2.5-inch high-capacity hard disk drives. Samsung will even provide Seagate with chips for enterprise SSDs, while Seagate will give hard disk drives to Samsung for Computers and consumer products.

Using the alarms sounding the brand new Year, the greatest hard disk deal of — Western Digital’s suggested $4.3 billion takeover of Hitachi Global Storage Technology (HGST) – didn’t near the coast time for you to result in the 2011 calendar. The Western Digital-HGST deal is anticipated to shut next March, annually after it was initially introduced. The close was postponed by anti-trust rules, but Western Digital finally won Eu approval in November to get Hitachi’s Hard disk drive business after saying yes to market off some assets to get rid of concerns regarding competition.

2. Hitachi and BlueArc make it official.

The only real surprise with this particular data storage technology acquisition is it required such a long time. Before finishing the $600 million Hitachi-BlueArc deal, Hitachi Data Systems (HDS) offered BlueArc NAS systems for 5 years with an OEM deal. And although BlueArc filed forms to accomplish an IPO and go public, it depended on HDS in excess of 40% of their revenue and not were built with a lucrative quarter before joining the HDS fold.

3. Oracle brings Pillar in to the fold.

It’s tough to put a cost on that one. What we should can say for certain is the fact that Oracle Corp. Boss Ray Ellison plus some key business affiliates were owed $544 million by Pillar Data Systems, caused by financial loans and interest that funded Pillar from the beginning. In This summer, Oracle acquired Pillar, calling it a vital 4th element to the data storage strategy. Just how much Oracle really pays Ellison, Pillar and also the a number of other gamers involved won’t be revealed until 2014, when Pillar’s performance is going to be examined.

But enough concerning the amounts let’s talk storage. Pillar’s Axiom storage array handles block and file work on the same time frame, and it is application-aware — using faster disk drives for data that’s more dynamic than data designated to reduced disks. The Oracle purchase of Pillar was referred to by Oracle included in its technique to “redefine storage” and, essentially, build out a type of hardware items which makes its programs improve your speed.

4. NetApp grabs LSI’s Engenio.

NetApp Corporation.’s $480 million purchase of LSI’s Engenio means NetApp has two platforms after many years of positioning its single, unified platform like a competitive advantage versus. the different network-attached storage (NAS) and storage-area network (SAN) possibilities using their company suppliers. But NetApp executives performed in the two different marketplaces the organization is focusing on, saying the Engenio block-storage systems is going to be situated in video along with other high-performance computing (HPC) marketplaces as the NetApp FAS platform is targeted at mainstream storage and virtualized infrastructures. Just like the HDS-BlueArc and Oracle-Pillar deals, the gamers within this acquisition understood one another well- NetApp Boss Tom Georgens held exactly the same publish at Engenio before joining NetApp in 2005.

5. SanDisk bets on Pliant, multi-level cell (MLC).

SanDisk Corp. acquired startup Pliant Technology for $327 million, giving SanDisk entry in to the enterprise market and supplying more assets for growth and development of Pliant’s technology. SanDisk purchasing Pliant was the business’s method of betting on Pliant’s MLC-based expensive technology because the next large factor. SanDisk intends to still sell Pliant’ single-level cell (SLC) expensive too, but SanDisk executives see MLC as the easiest method to push more expensive technology into enterprise shops.

6. Fusion-io acquires caching software startup IO Turbine.

PCI Express (PCIe)-based solid-condition storage vendor Fusion-io Corporation. went public this year making its first acquisition a couple of several weeks later. Feeling the warmth using their company expensive suppliers for example STEC Corporation. and also the OCZ Technology Group Corporation. — which each introduced new PCIe-based SSD choices this year — Fusion-io bought caching software startup IO Turbine for roughly $95 million. Fusion-io purchasing IO Turbine outlined the growing recognition of SSD-based, or expensive-based, caching.

7. Quantum pockets Pancetera.

Backup and archive player Quantum Corp. acquired Pancetera Software for $12 million. Quantum acquired the virtual machine (VM) backup specialist to enhance its DXi data deduplication line and, eventually, its StorNext file system. The majority of Pancetera’s employees became a member of Quantum, such as the co-founders and Boss, and also the acquisition was seen for Quantum to achieve credibility in the region of safeguarding data on virtual servers.

Read More

Data Security: Your Information, Their Loot

Based on the DataLossDB project run through the Open Source Foundation, 100s of countless medical records, banking account amounts, names, and addresses were stolen or accidentally leaked this year.

RSA
The safety division of information storage firm EMC was hit with a hack that jeopardized their popular SecurID cryptographic secrets, forcing these to offer substitutes for their clients. The stolen information was later utilized in a panic attack on defense giant Lockheed Martin.

Texas Comptroller
A server incorrectly left available to the general public contained the Social Security amounts of three.5 million instructors along with other condition employees.

No hacking essential to access this server. The FBI began a criminal analysis.

Sony
The conglomerate lost names, addresses, and charge card and banking account amounts as cyber-terrorist pillaged its video game, music, and movie divisions. Cyber-terrorist made served by 77 million names, e-mail addresses and passwords after breaking Sony’s Ps network.

SK Communications
An intricate attack on the web company netted the private information of 35 million South Korean customers. That’s inside a country of 50 million people.

SAIC (SAI)
A couple of from the defense contractor’s backup tapes were stolen from an employee’s vehicle. The tapes contained the medical records in excess of 5 million military patients.

Sutter Medical Foundation
A stolen laptop in the health-care provider contained 3.3 million names along with other determining information, together with 943,000 patient diagnoses. This incident triggered a category action suit, alleging negligence in acquiring data.

Nexon
A hacker acquired what they are called, user names, and passwords of 13.two million gamers from the popular video game MapleStory.

262,812,546: Confirmed quantity of records uncovered or stolen this year, from a lot more than 800 separate occurrences.

37.4%: Increase in the amount of reported hacking occurrences over this past year.

Hacking-adeliberately entering computers-abecame the most typical breach this past year:

Hacking 81.%
Unknown/Other 9.8%
Stolen hardware 4.4%
Virus/phishing 2.7%
Lost hardware 2.1%

Read More

Portable Backup Drives Certified to Hold 12TB

Portable Backup Drives,12TB,RAIDHighly Reliable Systems lately certified 4TB drives to be used within their RAIDPac detachable drives. Each RAIDPac consists of 3 SATA drives along with a RAID controller, supplying 12TB of detachable storage in each bay from the RAIDFrame backup solution.

Highly Reliable Systems of Reno, NV introduced their RAIDFrame DAS (Direct Attached Storage) backup system will support Hitachi and Seagate 4TB hard disk drives once they ship (expected first quarter of 2012). In RAID0 mode each RAIDPac holds 12TB of information, which makes it the earth’s biggest detachable backup cartridge. A RAIDPac consists of 3 drives as well as an integrated controller that travels using the backup cartridge. The machine attaches straight to a fileserver or NAS having a single eSATA or USB 3. cable

The organization intends to to produce niche NAS with detachable drive support according to Ubuntu Linux within the first quarter of 2012. The RAIDFrame will come in 1 bay, 2 bay, and 5 bay enclosures. The Two bay systems (pictured) allow further redundancy by permitting two RAIDPacs to become shown a configuration the organization calls “RAID 51”. Using hardware automatic reflecting technology implies that changing inside a new RAIDPac initiates one more block level copy from the primary backup. The RAIDFrame is made for high capacity and rapid server recovery and offers a method to supplement or replace cloud and/or tape methods.

RAIDPacs could be set up with RAID0 for optimum speed or with RAID5 to safeguard against single drive failures. Once the Seagate and Hitachi 4TB drives ship they’ll increase RAIDPac capabilities to 12TB/8TB (RAID0/5). Based on Tom Hoops, the organization CTO, no special motorists are essential since each RAIDPac sometimes appears through the host system like a single detachable hard disk. Unlike tapes a RAIDPac could be utilized directly in desperate situations with no RAIDFrame enclosure. Additionally towards the standard self-centering connector created for daily swap within the RAIDFrame, each RAIDPac has standard SATA and USB3 connections around the back.

Redundancy is accomplished using RAID5 and/or by reflecting to a different RAIDPac. By utilizing multiple tubes (just like tapes – a replacement every day in rotation), past full backup copies could be maintained with time. The whole line continues to be upgraded to permit faster RAID5, faster reflecting, and software management. Backup and restore performance surpasses 400Gigabytes each hour using imaging software on modern servers.

Highly Reliable Systems sells the merchandise through merchants. 6TB RAIDPacs (that contains three 2TB drives and RAID controller) are $1208 MSRP.

For more information call 877-384-6838.

Read More

Get immediate help with excel file repair software

excel file repair software,Kernel,Excel Repair ToolYou will find lots of options with Microsoft Excel so the likelihood of it getting corrupted. Kernel Data Recovery, a number one software brand concentrating in recovery tools, come with an excel file repair software to cope with MS Excel corruption. The program is quick, competent, and simple to use supporting every version of MS Excel.

MS excel uses .xls or .xlsx files to keep data around the hard disk drive. It’s largely utilized in enterprise in addition to individual level. Excel is renowned for supplying solution for innumerous tasks like data representations, charts, graphs, information, figures and statistics. Therefore, it includes many features which causes it to be more susceptive to break.

Excel files could possibly get broken because of virus attacks, accessibility to bad industries on storage media, header file corruption, abrupt closing of MS Excel because of energy sabotage, improper system shut lower while file is being used, etc. The recovery software scans the selected apply for correction and effectively retrieves all of the data inside it and saves them into new excel files. The program takes choose to restore every single detail in the broken file.

Kernel for Excel repair is basically employed for its wonderful features and recovery rate. The strong algorithmic approach is competent enough to retrieve data even from seriously broken files. Together with the information, the program maintains data structures, Unicode figures, OLE objects, fields, including hyperlinks (Web addresses), headers and footnotes. The initial keeps formatting with every formula is maintained to make sure you the perfect recovery.

This excel file repair tool has two repair modes:

  1. Single File mode: Just one excel file could be fixed in a single cycle
  2. Multi File mode: Save considerable time and energy by repairing any amounts of file at one go.

Free Trial Offer version:
Not only two repair modes, however the software is available in two versions also. The free trial offer mode and full version. It’s suggested to make use of the completely functional evaluation version first after which choose the compensated one. This can largely enable you to comprehend the abilities from the tool and you will also see if it’s worth inside your situation or otherwise. Preview the fixed files after which save them at the preferred location using the full version. Click the link to download now and appearance http://www.excelfilerepair.net

Supported versions:
Kernel for excel repair supports MS Excel 2010, Excel 2007, Excel 2003, Excel XP, Excel 2000, Excel 97, Excel 95 worksheet.

Provider of Excel file repair software programs are a number one software company supplying data recovery solutions for enterprise in addition to individual level. They’ve recovery tools for an array of items like Microsoft Office recovery, database recovery, data recovery, email recovery and else.

Read More

McCann E-Investigations Grows its Computer Forensics Imaging Abilities

McCann E-Investigations, a Texas-based computer forensics and investigative firm grows its computer forensics abilities with the capital acquisition of condition from the art computer forensics tools because of its Houston division.

McCann E-Investigations,Computer Forensics

“We have experienced a amazing increase in our computer forensics cases whatsoever our locations.” Stated Serta Weiss, Partner at McCann E-Investigations. “Computer forensics is an extremely fluid industry. As technology gets to be more sophisticated, the pc forensics expert should have the versatility and insight to have the ability to adjust to the altering technology atmosphere.

“Having probably the most leading edge computer forensics tools guarantees that people can provide the greatest quality product to the clients” Weiss mentioned.

Gary Huestis leads the pc forensics team for Houston, Austin and Dallas. “While updates in computer forensics software and hardware tools are key, important too is our EnCase certification. “Stated Gary Huestis. EnCase may be the leading computer forensic solution and it is the standard. Gary continues to be an EnCase Licensed Examiner since 2005.

About McCann EI:

http://www.einvestigations.com

About McCann EI: McCann EI’s Texas-based digital forensics team supplies a one-stop solution for the Digitally Saved Information (ESI) investigative needs. McCann EI’s computer forensics, digital forensics, mobile forensics, and electronic discovery researchers serve lawyers, private industry, and government with similar dedication and expertise which has had clients embracing McCann for more than two-and-a-half decades.

Regardless whether your ESI is held in personal, corporate, mobile, or network drives, McCann EI’s computer forensics team has experience in electronic discovery and recuperating your digital files. Our researchers possess the experience to supply expert witness computer forensic testimony in courts across Texas. McCann EI services Companies, Lawyers, and People State-wide.

Austin Computer Forensics: 512-377-6142
Houston Computer Forensics: 832-628-4904
Dallas Computer Forensics: 214-329-9059
Lubbock Computer Forensics: 806-589-0320
Lufkin Computer Forensics: 936-585-4070
Brownsville Computer Forensics: 956-465-0849

Give us a call toll-free at 800-713-7670

Read More

10 Storage Technology Forecasts From Toshiba for 2012

Toshiba has developed in the forefront of digital data storage and protection because the start from the microcomputer revolution within the eighties. It practically invented NAND expensive, that is increasingly pervasive each day within the IT world, because of its ubiquitous use within mobile phones, tablet Computers, portable storage drives, servers, storage arrays, hubs and various other connected products.

Storage Technology,Toshiba Hard Disk Drives

Toshiba is another major disk drive and data center systems maker. The Japan-based company also offers a firsthand perspective around the IT world in the Off-shore Rim perspective, one which is also growing in importance.

HDDs Still the Mainstay Media
Spinning-disk hard disk drives will still be the mainstay from the storage niche for the expected future, in line with the development of data and also the petabytes of capacity only HDDs can offer.

Total Data Storage Rising to Zettabyte Scales in 2012
The quantity of content produced and duplicated in 2012 will exceed 2 zettabytes (2 trillion gb).

Greater Understanding of Disaster Recovery Needs
Recent disasters in Southeast Asia?anamely, flooding in Thailand, Cambodia and Vietnam?awill drive elevated understanding of the requirement for backup and disaster recovery for companies and customers.

Even Thinner Hard Disk Drives in route
Laptop producers will incorporate more 7mm z-height HDDs to aid thin and lightweight notebook Computers.

More Storage Tiering Visiting Data Centers
Enterprise data centers will expand their utilization of storage tiers to support large data growth, control operating costs, and make more flexible and resilient IT infrastructures.

Solid-Condition Drives Getting Good Play in 2012
Consumer SSD adoption continues to grow and earn a location within the greatest-performance segments of consumer Computers.

More Products for additional Storage Needs
Exterior storage demand continues to grow to supply backup solutions for a lot of products so that as “off-board” storage for all the different limited-storage products, for example media pills.

Self-File encryption Gets To Be More Common
Safeguarding private data remains a significant concern and using self-encrypting storage will expand make it possible for a far more seamless method of safeguarding privacy through the data’s lifecycle.

Cloud IT Concentrates on Scalability, Versatility
The still-emerging ways to use cloud computing inside it continues to pay attention to versatility and scalability with virtualized shared storage fundamentally of cloud architecture and value delivery.

SMBs Look Closer at Shared Storage Environments
Shared storage will have an growing role in small , midsize business conditions SMBs will implement shared storage to assist access data faster and their companies running more effectively.

Read More

32% of IT Professionals Have Lost Corporate or Private Data

Research by the portable storage and digital encryption firm revealed 57 percent also admit to carrying unencrypted data on USB sticks, portable hard drives or optical media, despite 98 percent acknowledging data loss to be a ‘serious and growing’ concern. Furthermore, 96 percent believe encrypted hard drives are preferable to unprotected drives for daily data use.

“The survey’s results are disappointing and alarming at the same time because our respondents should be setting a better example,” said John Michael, Managing Director of iStorage.

“Despite nearly all of the IT experts we questioned acknowledging data loss to be a serious and growing concern it seems many are not connecting that to their own data security procedures, with nearly a third admitting to losing a portable device containing confidential data. This is putting themselves and their organisations at risk.”

Read More

CBL Data Recovery Rallies to Respond to Thailand’s Flooding Disaster

CBL Data Recovery,Thailand Flooding Disaster,CBLCBL Data Recovery Technologies, the world’s most trusted name in emergency data recovery services, has proactively opened a Flood Relief Receiving Centre in Bangkok to receive water-soaked digital media from businesses that have been affected by the recent disaster in Thailand.

“Ever since we heard about the flooding, we have been putting additional resources in place at our 14 laboratories around the world to help those companies recover their critical lost business information due to water-damaged media, there is no one in Thailand capable of recovering lost data due to water because it requires special laboratory techniques and technology as well as the ability to cope with the necessary security and confidentiality issues associated with handling sensitive business and government data.” says CBL’s president Bill Margeson.

CBL is a pioneer in laboratory level data recovery services and has 19 years experience in retrieving information from any digital media, such as RAID, NAS, SAN, hard drives, tapes, optical and SSDs.

“All is not lost. We are ready and able to assist Thailand’s businesses get back up and running as soon as possible, over the years, we have helped many organizations recover their lost data due to the flooding disasters like what is occurring in Thailand. Our track record of success is proof positive we have the skills and knowledge to take the necessary steps to recover as much data as possible from damaged media.” adds Margeson.

According to Thai sources, the government is currently assessing the damage. “They anticipate significant damage from the factories located in a number of industrial estates severely affected by the floods, several government departments have yet to determine those companies who are affected and the kind of help needed. “But we are on standby to assist businesses recover their lost data so they can return to business profitability and help the country return to economic health.” says Margeson.

CBL Data Recovery Technologies Thailand’s Flood Relief Receiving Centre is located at:

37th Floor, 98 North Sathorn Road
Silom, Bangak
Bangkok 10500
Thailand
Telephone: 02-105-6300

For additional details on CBL’s Thailand Relief, click here: http://www.cbltech.ca/thailand

About CBL Data Recovery Technologies Inc.

Founded in 1993 and globally headquartered near Toronto, Canada, CBL Data Recovery Technologies Inc. is a leading international provider of data recovery services. CBL employs proprietary techniques to recover data quickly and effectively from a wide array of affected media including hard drives, tapes, other magnetic, optical and removable media. CBL offers services worldwide through its network of data recovery laboratories, customer service centres, and authorized partners.

Read More

Use JetClean to enhance your PC’s health

PC health,JetClean,PC speedup toolUtilities developer BlueSprig just launched JetBoost 1., a totally free PC speedup tool made to optimize your computer by closing lower unnecessary processes. If the doesn’t have sufficient optimisation energy to your requirements, though, you can alternatively try the company’s new JetClean, a suite of tools with lots of more cleaning and repair options.

There’s a module to wash your Registry, for example. A “Windows Clean” tool helps you to release hard disk space by finding and removing leftover temporary files an “Apps Clean” tool keeps your privacy by removing your web, Home windows and application histories and also the Cutting corners Clean module finds and removes damaged cutting corners.

You are able to choose these power tools individually, or all at one time, simply by checking a couple of boxes. Click “Scan Now” as well as your selected modules will examine your computer, confirming back on whatever issues they’ve found. And you will then review them, if you want, or simply click “Repair” to repair them all at one time.

Just just in case that’s insufficient functionality, the designers also have provided a Tools tab that lists a couple of helpful extra supplies. So you receive a System Information program, for example. An Uninstaller module can help you find and take away undesirable programs. The Performance Booster basically offers the same functionality as JetBoost, temporarily closing lower unnecessary ways to release system assets. Along with a handy Portable option enables you to produce a single JetClean executable with all of these features, which you’ll then copy to some USB memory stick and employ with any convenient Home windows PC (this program operates on everything from 2000 to Home windows 8).

Fundamental

JetClean doesn’t have shortage of features, then. But exactly how will they perform?

The Hard Disk cleaner demonstrated just a little disappointing, finding only one.25GB of files on our test PC. It had been already reasonably well enhanced, true, but CCleaner accomplished a lot more, recuperating 2.11GB of drive space.

JetClean did better using the Applications Clean module, though, where it could erase more application activity histories than CCleaner could manage. The Registry Scanner and Cutting corners Clean modules also made an appearance to become reasonably thorough.

A few of the stand-alone tools really are a little around the fundamental side. The Un-install, for example, just calls the conventional application uninstaller. There’s no extra technology, no additional inspections to make certain that each trace of the application is taken away.

There’s nothing particularly clever concerning the Startup Optimisation module, either: it simply lists the programs which are set up to produce when Home windows begins, and optionally enables you to definitely disable them in a click. There’s no extra supplies you’ll get with a few of the competition, for example tips about things to disable and things to keep.

And also the program has got the periodic problem, which reminds you that it’s still very new. The Machine Information program, for example, reported our RAM was running at “NULL MHz”, and our memory stays were produced by “Manufacturer00” and “Manufacturer02”. Which isn’t as informative as we’d wished.

There’s still plenty to love about JetClean, particularly for PC beginners. It’s simple to use, lightweight and portable, and offers a lot of functionality in one small download. It’s also reasonably safe, with, for instance, a Save Center saving any erased Registry secrets, therefore if the cleaning goes a tad too far then your program’s changes may be easily un-tied later.

If you’re a skilled PC user, though, and also have already developed an individual assortment of great free software maintenance and cleanup tools, then JetClean won’t appeal a lot: the majority of the individual tools just aren’t yet effective enough to conquer the very best of your competition. Also it doesn’t help that key functions like a chance to schedule cleaning are restricted to the commercial JetClean Professional (a regular membership-based tool with prices beginning from $1.66 per month click Upgrade within JetClean to discover more).

There’s no harm in using the suite anyway, though, simply to see what you believe: JetClean is indeed a lightweight installation, without any browser tool bars or any other irritations to weigh you lower. Use a copy on your own, and discover just what the program can perform for you personally.

Read More

E&Y Launches Forensic Technology Lab

Forensic-Technology-LabMumbai, Dec 20 (PTI) Ernst & Young India’s Fraud Investigation & Dispute Services (FIDS) today announced the launch of its first forensic technology lab in the country.

“The primary goal of setting up this facility here is to create an environment to accomplish computer forensics investigations like data acquisition, examination and data analysis,” an E&Y statement said.

“It is critical to use globally accepted tools and methodologies to investigate matters in detail and produce quality evidence in the court. Also, not investigating the case thoroughly with the right tools leaves a lot of scope for re-occurrence of an infotech-related fraud,” E&Y India Partner and head of forensic technology Paul Walker said.

“Eleven years after the IT Act, 2000, we have had less than five convictions. The only reason being that India doesn’t have a sound forensics lab. Labs like the one established by Ernst & Young require significant costs and resources to build,” an independent information technology security consultant, Vijay Mukhi, said.

“The Government can set up more such facilities under public-private partnership,” Mukhi said. PTI BA BEN RSY

Read More