Data Sheet
Language: English
Open-E JovianDSS On- and Off-site Data Protection
Date: Jan 20, 2020
Read the On- and Off-site Data Protection brochure to learn more aout the ultimate data protection.
Keep your data centralized and easy to store while having the ability to search and share information throughout the organization with the massive capacity file (NAS), or block (SAN) data storage filers.
Data Sheet
Language: English
Date: Jan 20, 2020
Read the On- and Off-site Data Protection brochure to learn more aout the ultimate data protection.
Article
Date: Oct 09, 2017
A stretch cluster provides a low total cost of ownership (TCO) solution by creating enterprise-class storage services on industry standard server and storage hardware. This solution with ATTO Technology connectivity, AIC hardware and Open-E JovianDSS software provides 24/7 uptime with business continuity for real-time, mission-critical applications enabling organizations to virtualize these applications and maintain high-availability access.
Article
Date: Feb 21, 2017
Generally speaking, Hyper-converged Storage is the combination of computing, networking and storage in one unified hardware platform. Using commodity HDDs and solid state drives, the Software-defined Infrastructure automatically takes care of the storage and virtualization. The hardware platform is normally based on cheap x86 hardware which can be easily and cost-effectively scaled to growing requirements for performance and storage space.
Article
Date: Jun 17, 2015
Disaster Recovery is one of the most essential strategies for securing lost data against disasters. It includes all processes and procedures that are performed in order to prevent large failures and to avoid the consequences by keeping copies of data. With a consistent strategy, you are able to quickly recover business-critical files and applications of your IT infrastructure - ensuring business continuity and minimization of data loss.
Article
Date: Jun 17, 2015
Disaster Recovery is one of the most essential strategies ecuring to prevent lost data against disasters. It includes all processes and procedures that are performed in order to prevent large failures and to avoid the consequences by keeping copies of data. With a consistent strategy, users are able to recover business-critical files and applications of their IT infrastructure ensuring business continuity and minimization of data loss.
Article
Date: Jun 16, 2015
Disaster Recovery is one of the most essential strategies for securing lost data against disasters. It includes all processes and procedures that are performed in order to prevent large failures and to avoid the consequences by keeping copies of data. With a consistent strategy, you are able to quickly recover business-critical files and applications of your IT infrastructure - ensuring business continuity and minimization of data loss.
Article
Date: Jun 16, 2015
Disaster Recovery is one of the most essential strategies for securing lost data against disasters. It includes all processes and procedures that are performed in order to prevent large failures and to avoid their consequences by keeping copies of the data. With a consistent strategy, you are able to recover business-critical files and applications of your IT infrastructure - ensuring business continuity and minimization of data loss.
Article
Date: Jun 16, 2015
Fibre Channel (FC) Storage uses a high-speed network technology for data storage that has become a common connection type for SAN enterprise storage. It is especially suited for creating SAN topologies for virtualization, data center or other demanding platforms. The technology offers point-to-point, switched, and loop interfaces, and is designed to interoperate with SCSI.
Article
Date: Jun 16, 2015
High Availability through Failover is crucial for many companies. Despite using high-quality hardware and superior connections, still any server can crash, leading to data loss. Providing High Availability can be tricky, but fortunately Open-E DSS V7 is able to work with a second node. It keeps data redundant and when aware of the original node’s failure, the redundant node continues serving clients; effectively replacing the missing node. This process is commonly known as Failover.
Article EOL
Date: Jul 29, 2011
Any interruption in access to key information can result in outrageous costs, proving the importance of high availability of company resources. Storage virtualization provides increased performance and security of information exchange and storage.