Data

    Snowflake IPO

    On September 16, 2020, history was made on the New York Stock Exchange. A software company named Snowflake (ticker: SNOW) made its IPO as the largest publicly traded software company, ever. As one of the most hotly anticipated listing in 2020, Snowflake began publicly trading at $120 per share and almost immediately jumped to $300 per share within a matter of minutes. With the never before seen hike in price, Snowflake also became the largest company to ever double in value on its first day of trading, ending with a value of almost $75 billion. 

    What is Snowflake?

    So, what exactly does Snowflake do? What is it that makes a billionaire investors like Warren Buffet and Marc Benioff jump all over a newly traded software company? It must be something special right? With all the speculation surrounding the IPO, it’s worth explaining what the company does. A simple explanation would be that Snowflake helps companies store their data in the cloud, rather than in on-site facilities. Traditionally, a company’s data is been stored on-premises on physical servers managed by that company. Tech giants like Oracle and IBM have led the industry for decades. Well, Snowflake is profoundly different. Instead of helping company’s store their data on-premises, Snowflake facilitates the warehousing of data in the cloud. But that’s not all. Snowflake has the capabilities of making the data queryable, meaning it simplifies the process for businesses looking to pull insights from the stored data. This is what sets Snowflake apart from the other data hoarding behemoths of the IT world. Snowflake discovered the secret to separating data storage from the act of computing the data. The best part is that they’ve done this before any of the other big players like Google, Amazon, or Microsoft. Snowflake is here to stay. 

    Snowflake’s Leadership

    Different than Silicon Valley’s tech unicorns of the past, Snowflake was started in 2012 by three data base engineers. Backed by venture capitalists and one VC firm that wishes to remain anonymous, Snowflake is currently led by software veteran, Frank Slootman. Before taking the reigns at Snowflake, Slootman had great success leading Data Domain and Service Now. He grew Data Domain from just a twenty-employee startup venture to over $1 billion in sales and a $2.4 billion acquisition sale to EMC. I think it’s safe to say that Snowflake is in the right hands, especially if it has any hopes of maturing into its valuation.

    Snowflake’s Product Offering

    We all know that Snowflake isn’t the only managed data warehouse in the industry. Both Amazon Web Service’s (AWS) Redshift and Google Cloud Platform’s (GCP) BigQuery are very common alternatives. So there had to be something that set Snowflake apart from the competition. It’s a combination of flexibility, service, and user interface. With a database like Snowflake, two pieces of infrastructure are driving the revenue model: storage and computing. Snowflake takes the responsibility of storing the data as well as ensuring the data queries run fast and smooth. The idea of splitting storage and computing in a data warehouse was unusual when Snowflake launched in 2012. Currently, there are query engines like Presto that solely exist just to run queries with no storage included. Snowflake offers the advantages of splitting storage and queries: stored data is located remotely on the cloud, saving local resources for the load of computing data. Moving storage to the cloud delivers lower cost, has higher availability, and provides greater scalability.  

     

    Multiple Vendor Options

    A majority of companies have adopted a multi-cloud as they prefer not to be tied down to a single cloud provider.  There’s a natural hesitancy to choose options like BigQuery that are subject to a single cloud like Google. Snowflake offers a different type of flexibility, operating on AWS, Azure, or GCP, satisfying the multi-cloud wishes of CIOs. With tech giants battling for domination of the cloud, Snowflake is in a sense the Switzerland of data warehousing. 

    Learn more about a multi-cloud approach

    Top of Form

    Bottom of Form

     

    Snowflake as a Service

    When considering building a data warehouse, you need to take into account the management of the infrastructure itself. Even when farming out servers to a cloud provider, decisions like the right size storage, scaling to growth, and networking hardware come into play. Snowflake is a fully managed service. This means that users don’t need to worry about building any infrastructure at all. Just put your data into the system and query it. Simple as that. 

    While fully managed services sound great, it comes at a cost. Snowflake users need to be deliberate about storing and querying their data as fully managed services are pricey. If deciding whether to build or buy your data warehouse, it would be wise to compare Snowflake ownership’s total cost to building something themselves.

     

    Snowflake’s User Interface and SQL Functionality

    Snowflake’s UI for querying and exploring tables is as easy on the eyes as it to use. Their SQL functionality is also a strong touching point. (Structured Query Language) is the programming language that developers and data scientists use to query their databases. Each database has slightly different details, wording, and structure. Snowflake’s SQL seems to have collected the best from all of the database languages and added other useful functions. 

     

    A Battle Among Tech Giants

    As the proverb goes, competition creates reason for caution. Snowflake is rubbing shoulders with some of the world’s largest companies, including Amazon, Google, and Microsoft. While Snowflake has benefited from an innovative market advantage, the Big Three are catching up quickly by creating comparable platforms.

    However, Snowflake is dependent on these competitors for data storage. They’ve only has managed to thrive by acting as “Switzerland”, so customers don’t have to use just one cloud provider. As more competition enters the “multicloud” service industry, nonalignment can be an advantage, but not always be possible. Snowflake’s market share is vulnerable as there are no clear barriers to entry for the industry giants, given their technical talent and size. 

    Snowflake is just an infant in the public eye and we will see if it sinks or swims over the next year or so. But with brilliant leadership, a promising market, and an extraordinary track record, Snowflake may be much more than a one hit wonder. Snowflake may be a once in a lifetime business.

    DTC – A True Partnership

    For Over Half of a Century We’ve Been Committed to Serving IT Departments and Saving IT Budgets 

     

    Our Story

    In 1965, we opened our doors for business with the idea to transform the IT equipment industry through technology, transparency, standards, and processes. We planted our roots as a round reel tape company in Downey, CA. As a family owned and operated business over the past 50 years, we have sprouted into one of the most trustworthy, reliable, and authoritative organizations in the industry. 

    From disk pack tape storage and round reel tape to hard drives, networked storage, tape libraries, and cloud backup systems; our business and partnerships continue to prosper and grow with the constantly innovative IT industry. DTC proudly works with all organizations, letting our reputation speak for itself.

    DTC’s 3 Point Message is Simple:

     

    • Our goal is to reach 100% Recyclability of old storage media and IT assets.

     

    Electronics recycling is our bread and butter. We’ve been both saving the environment and companies money, by setting the standard for secure handling and re purposing of used and obsolete electronics. Recycling of electronics and IT equipment is an essential part of a company’s waste management strategy. If you are looking for a safe and secure way of electronics recycling, then you should consider our proven services. We specialize in ethical disposal and reprocessing of used and obsolete electronics and computer equipment. We can help accomplish legal and conservational goals as a responsible organization. Let us be the solution to your problem and help your organization stay socially responsible. 

     

    Learn more about recycling your old IT assets

     

    • Our pledge since day one has been to keep your data safe.

     

    Data security is main concern for IT departments in any organization, and rightly so. Many of our partners demand that their data is handled appropriately and destroyed according to both government and industry standards. DTC provides honest and secure data destruction services which include physical destruction with a mobile shredder and secure data erasure methods like degaussing. All of our destruction services are effective, auditable, and certified. Ship storage assets to our secured facility or simply ask for the mobile data destroyer to be deployed on site. With over 50 years of service, we’ve never had one data leak. Now that’s experience you can trust!

    Learn more about DTC data security

     

    • Our process will help you save time and money.

     

    Our IT asset disposition (ITAD) process will help your organization recoup dollars from your surplus, used IT Assets and free up storage space at your facility. Our equipment buyback program is dedicated to purchasing all types of surplus and used data storage and IT equipment. We use the highest standards to ensure you get the greatest return your initial IT investment. With the current pace of hardware evolution, most companies are upgrading their systems every two years. This leads to a lot of surplus IT equipment. DTC has the experience and resources to get you the most for your old IT assets.

    Get the most return on your IT investment 

    The Value We Provide

    DTC’s diverse knowledge-base and experiences, allow our partners to utilize our purchasing and sales personnel as a valued resource for questions, research, and answers. Our vast database and the contact list of customers, resellers, recyclers, suppliers, and industry partners allows us to excellent pricing when sourcing your IT Equipment. Don’t believe us? Let us know what you need, and we will find it for you. 

    How we can help you?

    Here is brief list of services we provide:

     

    Ready to work with a trusted partner? Contact Us Today



    The TikTok Controversy: How Much Does Big Tech Care About Your Data and its Privacy?

    If you have a teenager in your house, you’ve probably encountered them making weird dance videos in front of their phone’s camera. Welcome to the TikTok movement that’s taking over our nation’s youth. TikTok is a popular social media video sharing app that continues to make headlines due to cybersecurity concerns. Recently, the U.S. military banned its use on government phones following a warning from the DoD about potential personal information risk. TikTok has now verified that it patched multiple vulnerabilities that exposed user data. In order to better understand TikTok’s true impact on data and data privacy, we’ve compiled some of the details regarding the information TikTok gathers, sends, and stores.

    What is TikTok?

    TikTok is a video sharing application thar allows users to create short, fifteen-second videos on their phones and post the content to a public platform. Videos can be enriched with music and visual elements, such as filters and stickers. By having a young adolescent demographic, along with the content that is created and shared on the platform, have put the app’s privacy features in the limelight as of late. Even more so, questions the location of TikTok data storage and access have raised red flags.

    You can review TikTok’s privacy statement for yourself here.

    TikTok Security Concerns

    Even though TikTok allows users to control who can see their content, the app does ask for a number of consents on your device. Most noteworthy, it accesses your location and device information. However, there’s no evidence to support the theory of malicious activity or that TikTok is violating their privacy policy, it is still advised to practice caution with the content that’s both created and posted.

    The biggest concern surrounding the TikTok aplication is where user information is stored and who has access to it. According the TikTok website, “We store all US user data in the United States, with backup redundancy in Singapore. Our data centers are located entirely outside of China, and none of our data is subject to Chinese law.” “The personal data that we collect from you will be transferred to, and stored at, a destination outside of the European Economic Area (“EEA”).” There is no other specific information regarding where user data is stored.

    Recently, TikTok published a Transparency Report which lists “legal requests for user information”, “government requests for content removal”, and “copyrighted content take-down notices”. The “Legal Requests for User Information” shows that India, the United States, and Japan are the top three countries where user information was requested. The United States was the number one country with fulfilled request (86%) and number of accounts specified in the requests (255). Oddly enough, China is not listed as having received any requests for user information. 

    What Kind of Data is TikTok Tracking?

    Below are some of the consents TikTok requires on Android and iOS devices after installation of the app is completed. While some of the permissions are to be expected, these are all consistent with TikTok’s written privacy policy. When viewing all that TikTok gathers from its users, it can be alarming. In short, the app allows TikTok to:

    • Access the camera (and take pictures/video), the microphone (and record sound), the device’s WIFI connection, and the full list of contacts on your device.
    • Determine if the internet is available and access it if it is.
    • Keep the device turned on and automatically start itself.
    • Secure detailed information on the user’s location using GPS.
    • Read and write to the device’s storage, install/remove shortcuts, and access the flashlight (turn it off and on).

    You read that right, TikTok has full access to your audio, video, and list of contacts in your phone. The geo location tracking via GPS is somewhat surprising though, especially since TikTok videos don’t display location information. So why collect that information? If you operate and Android device, TikTok has the capability of accessing other apps running at the same time, which can give the app access to data in another app such as a banking or password storage app. 

    Why is TikTok Banned by the US Military?

    In December 2019, the US military started instructing soldiers to stop using TikToK on all government-owned phones. This TikTok policy reversal came just shortly after the release of a Dec. 16 Defense Department Cyber Awareness Message classifying TikTok as having potential security risks associated with its use. As the US military cannot prevent government personnel from accessing TiKTok on their personal phones, the leaders recommended that service members use caution if unfamiliar text messages are received.

    In fact, this was not the first time that the Defense Department had been required to encourage service members to remove a popular app from their phones. In 2016, the Defense Department banned the augmented-reality game, Pokémon Go, from US military owned smartphones. However, this case was a bit different as military officials alluded to concerns over productivity and the potential distractions it could cause. The concerns over TikTok are focused on cybersecurity and spying by the Chinese government.

    In the past, the DoD has put out more general social media guidelines, advising personnel to proceed with caution when using any social platform. And all DoD personnel are required to take annual cyber awareness training that covers the threats that social media can pose.

    3-2-1 Backup Rule

    What is the 3-2-1 Backup Rule?

     

    The 3-2-1 backup rule is a concept made famous by photographer Peter Krogh. He basically said there are two types of people: those who have already had a storage failure and those who will have one in the future. Its inevitable. The 3-2-1 backup rule helps to answer two important questions: how many backup files should I have and where should I store them?

    The 3-2-1 backup rule goes as follows:

    • Have at least three copies of your data.
    • Store the copies on two different media.
    • Keep one backup copy offsite.

    Need help with building your data backup strategy?

    1. Create at least THREE different copies of your data

    Yes, I said three copies. That means that in addition to your primary data, you should also have at least two more backups that you can rely on if needed. But why isn’t one backup sufficient you ask? Think about keeping your original data on storage device A and its backup is on storage device B. Both storage devices have the same characteristics, and they have no common failure causes. If device A has a probability of failure that’s 1/100 (and the same is true for device B), then the probability of failure of both devices at the same time is 1/10,000.

    So with THREE copies of data, if you have your primary data (device A) and two backups of it (device B and device C), and if all devices have the same characteristics and no common failure causes, then the probability of failure of all three devices at the same time will be 1/1,000,000 chance of losing all of your data. That’s much better than having only one copy and a 1/100 chance of losing it all, wouldn’t you say? Creating more than two copies of data also avoids a situation where the primary copy and its backup copy are stored in the same physical location, in the event of a natural disaster.

    1. Store your data on at least TWO different types of media

    Now in the last scenario above we assumed that there were no common failure causes for all of the devices that contain your precious data. Clearly, this requirement is much harder to fulfill if your primary data and its backup are located in the same place. Disks from the same RAID aren’t typically independent. Even more so, it is not uncommon to experience failure of one or more disks from the same storage compartment around the same time.

    This is where the #2 comes in 3-2-1 rule. It is recommended that you keep copies of your data on at least TWO different storage types. For example, internal hard disk drives AND removable storage media such as tapes, external hard drives, USB drives, od SD-cards. It is even possible to keep data on two internal hard disk drives in different storage locations.

     

    Learn more about purchasing tape media to expand your data storage strategy 

    1. Store at least ONE of these copies offsite

    Believe it or not, physical separation between data copies is crucial. It’s bad idea to keep your external storage device in the same room as your primary storage device. Just ask the numerous companies that are located in the path of a tornado or in a flood zone. Or what would you do if your business caught fire? If you work for a smaller company with only one location, storing your backups to the cloud would be a smart alternative. Tapes that are stored at an offsite location are also popular among companies of all sizes.

     

    Every system administrator should have a backup. This principle works for any virtual environment; regardless of the system you are running, backup is king!

    3 Things Star Wars Taught Us About Data Storage

    A long time ago in a galaxy far, far away, a farm boy on a desert planet joined an uprising while saving a princess from a dark lord. Just like that, one of the most popular cinematic stories of all time was created. What began with one film in 1977 rapidly developed into one of the most successful media empires in existence. Now, more than four decades after it was introduced to audiences worldwide, Star Wars remains a global pop culture sensation. 

    While doing my initial research for this article I came across quite an amazing factoid: George Lucas is truly a data backup and cloud storage buff! Knowing this bit of information, I began to see it throughout the Star Wars narrative. In the wake of this newfound knowledge and inspiration, I’d urge you to weigh the following to make sure your organization doesn’t endure the same struggles that Darth and the Skywalkers have over the course of their adventures.

    Have a Data Security Plan in Place

    It is pretty common knowledge that a decent data backup strategy starts with a strong approach to data security. With a data security plan in place, an organization can considerably reduce the chances of relying solely on backups. Sadly, the most minimal types of security appeared to be neglected throughout the Star Wars trilogy.

    The first eight installments of the trilogy are rampant with data security concerns, but possibly the most noticeable happens when Obi-Wan looks into the origins of a Kamino Saberdart. While looking for the planet Kamino in the Jedi Archives, he discovers a blank space. Yoda concludes to Obi-Wan that the planet has likely been deleted from the archives. 

    Some theories state that Jedi training was a specific type of password protection since the Force is required to manipulate the Jedi Archives. This wouldn’t be very wise considering there were numerous of trained Jedi in the galaxy, and their sworn enemies were force users. A great current day example would be both Google and Amazon offices sharing the same keycards. Not exactly infosec friendly to say the least! The Jedi had weak passwords with absolutely no permissions management.

    In an effort to prevent cyber criminals from potentially accessing your company’s vital data, it is good practice to perform regular reviews of your data security strategies. Double check that there are no glaring holes in your data security strategy, habitually change passwords, use two factor authentication, and ALWAYS use encryption. 

    Have a Backup Plan in Place

    Having a data backup plan in place is a key complement to any security strategy. As the Jedi learned, even when your security is set up perfectly, disaster can strike. Inadequate security management on both sides led to the destruction of 6 planets, the mutilation of 2 others, and the obliteration of a handful of super weapons.

    The best approach if such a plan is referred to as a 3-2-1 backup strategy. This means for every piece of data, you have the data itself, a backup copy on site (an external hard drive of some sort), and a final copy in the cloud. Now, I’ve come across several question regarding the use of a specific data storage medium used in the trilogy. So why does the Star Wars universe use such a basic technology as data-tapes? Simply put, backups are better on tape. The fewer moving parts an object has, the more robust it is. Additionally, the long-term life span of electronic memory is a dilemma, compared to that of tape. When you make a backup of something, you want it to be able to survive a long time. 

    We first see the blueprints for the super weapon when Count Dooku, decides that they would be in safe with Darth Sidious on Scarif. By the time Jynn Erso hears of the Stardust version of the plans for the Death Star, it appears that Scarif is the only place in the Galaxy where you could find a copy of the plans. In a way, the plans on Scarif served as the Empire’s cloud storage. All the Death Star needed was an external hard drive following it through space with an additional copy of the plans!

    If you only have one backup, it’s better than nothing. Not much better, but it is. Make certain that you’re using a 3-2-1 approach for a better backup strategy. Also consider a data backups allocated to different geographic regions in case of a natural disaster. Tape is great for this!

    Have a Version Control Plan in Place

    What good is to have backups if you don’t have the right information backed up? If we came away with one thing from the plans used to defeat the first Death Star, its that the Empire didn’t manage their version control. The backups that they had were not up to date. The focus lens for the superlaser is equatorial when the Death Star’s superlaser was actually on the northern hemisphere.

    To operate a reliable backup solution, it needs to run on a consistent basis. Sometimes daily or even more frequently depending on the situation and data on hand. Whatever backup strategy the Death Star was using, it had clearly gone askew. 

    Version History is also a critical piece to the backup puzzle. Version History lets users keep multiple versions of a file over extended periods of time, sometimes forever. Think if the Empire had set up a Version History. They could have reverted to the pre-final plans to destroy the Death Star.

    Whether you manage a small business or a universal enterprise, your data (assuming its properly secured and backed up) can mean the difference between domination and having your battle station blown into a million pieces across the dark void of space. Data security and backup doesn’t need to be a battle. Create a plan that works for you, ensure your data is secured, and verify every so often that it’s up to date with the most recent versions. May The Data Be With You.

    Industries We Serve

    DTC serves a wide range of industries from healthcare, finance, education, and even small business. In today’s rapidly evolving and data focused world, every trade has a need to keep its data safe and its systems running.  Our pledge since day one has been to keep your data safe, no matter what industry you’re in. 

     

    MAKING AN IMPACT IN EVERY INDUSTRY

    At DTC, we work behind the scenes to solve your IT equipment challenges, improve data security, and reduce environmental impact of recycled assets. Whether your organization requires extensive data center services, IT asset disposition, e-waste recycling, on-site data destruction, or just general maintenance and support; we’ve got you covered. For over 50 years, we’ve made a name for ourselves as one of the most trusted brands in our industry, and we want to help you do the same. See below how we can help your industry.

    HEALTHCARE

    With extensive databases of medical records containing vital information, data maintenance, storage, and security is an essential part of healthcare. Regardless of how heavily healthcare institutions depend on computers and other electronic devices, not many organizations have a dedicated IT department with the ability to handle the vast amount of equipment requirements. Our IT equipment specialists can help with your organizations specific needs. We can flawlessly help save your healthcare institute’s budget, while you help save lives.

    A plan for guarding against ransomware in the healthcare industry

    Finance

    Another data breach is the last thing any financial institution needs. Most financial organizations have highly developed IT professionals running their data infrastructures, but upgrades and disposal can become overwhelming. Industry best practices state that companies need to keep their data for several decades and should migrate the data to the latest software version of their backup solution. That’s where we come into play. Since 1965, we have been helping businesses, both large and small, keep their data secure while increasing ROI on used IT equipment.

    Get Help With Securing Your Financial Data

     

    Government

    Today more than ever, government agencies depend on computers and electronics in order to effectively operate within their respective borders. Most governments, whether city, county, state or nationwide, have an extremely long holding period for sensitive, proprietary, or administration-critical data. Even though data tape is the most reliable medium for long-term data storage, they still need to be updated over time. More importantly, we are aware of the importance of data security when it comes to sensitive information on your used equipment.

     

    Education

    The recent COVID-19 pandemic has given us all a firsthand look at how classrooms across the country are integrating 1:1 student to computer learning. Now more than ever, IT equipment has become heavily integrated into school settings. Computer learning means a vast increase in information and data creation; requiring substantial data back up and security measures to protect it. Regardless of how heavily learning institutions depend on computers and other electronic devices, not many school districts have a dedicated IT department with the ability to handle the vast amount of data back up and equipment requirements.

    Learn More About Saving IT Budgets in the Education Field

    Energy and Utilities

    Companies in the energy and utility industries are continuously being asked to find ways to reduce costs and improve efficiency. Whether it’s the power generation and alternative energy services, most companies have a very busy IT department. When the computers, servers, and data storage centers need to be upgraded and replaced; it can be exhausting. The right IT asset disposal (ITAD) partner can help get the most value from old IT equipment; resulting in maximum return on initial investment.

    Learn More About ITAD and How it can Help You

    Small and Mid-size Business

    Entrepreneurship, innovation, and job creation are not only the foundation of a healthy economy but the backbone of America. Entrepreneurs embody the strength and character that help make our country great and we’d like to keep it that way. As a family-owned business since 1965, we understand the struggles and sacrifices of being a business owner. Small businesses and owners may not always have the budget for the latest upgrades in IT equipment or even know what to do with their older equipment. We can help with upgrades and disposal of your data storage tapes and other IT assets when needed. 

    OUR GOAL IS TO BE YOUR MOST VALUED PARTNER

    DTC’s IT equipment specialists and procurement associates are made up of over 130+ years of combined experience making us one of the industry’s best-trained teams. We opened our doors for business in 1965 with the idea to transform the IT lifecycle through technology, transparency, standards, and processes. Our business continues to flourish and grows with the ever-changing IT industry, letting our reputation speak for itself.

    Interested in Learning More About Who We Are?

    Send a message, we’d love to hear from you.

    What is I.T.A.D. ?

    What is ITAD?

    You may have heard some fancy term ITAD or SITAD being thrown around the IT world as of late. What is ITAD exactly? We’ll keep simple, ITAD is an acronym for Information Technology Asset Disposition. Some also refer to it as SITAD (Secure Information Technology Asset Disposition). In a nutshell, IT Asset Disposition is the process of disposing of obsolete, retired, or unwanted equipment in an environmentally friendly and responsible manner. ITAD service partners specialize in the processes related to disposing of and remarketing IT assets. Partnering with an experienced ITAD company can also help organizations focus on alleviating expenses as well as increasing the value of their used IT assets.

    How can ITAD Benefit You?

    IT Asset Disposition service providers can help you get rid of your surplus IT equipment or decommission your current data storage infrastructure. Not only can they dispose of it properly, they will help you get paid for it too! Once they purchase the equipment, they use their own personal end-user network to attempt to recoup as much value from your equipment as possible. There is a still significant life left in some equipment and it could benefit a growing organization that can’t afford to procure new equipment.

    Learn More about Data Center Services Here

    How does the ITAD Market Work?

    The IT asset disposition market is a secondary IT market. It’s used by ITAD companies to remarket the used and retired assets they purchase. Many ITAD companies coordinate with other different ITAD companies to sell the equipment off to the highest bidder. Some ITAD companies rely on a large open network of buyers called broker bin. Others may speak to other ITAD companies directly, although most ITAD companies sell directly to end-users.

    How Do I Choose the ITAD Partner Best for Me?

    With hundreds if not thousands of ITAD companies existing today, it can appear overwhelming to know which one is best for what your company requires.

    Here is a list of things you may want to consider when looking for an ITAD partner:

    1. Does your business have large amounts of inventory and need decommissioning services? You may want to choose a partner who provides:

    2.     Does your business have a small amount of used inventory that you can ship yourself? You may want to consider a partner who offers:

    3.     Does your business have extremely sensitive data on the equipment that needs to be decommissioned? You may want to think about a partner who has:

    You should always be willing to get multiple quotes and get a feel for who works best for you and your organization. No ITAD provider is the same. It is essentially a partnership, should be treated as such.

    If you’re in need of ITAD services for your used IT equipment,

    LTO-9 Tape Technology (Pre-Purchase Program)

    LTO-9 Tape Technology (Pre-Purchase Program)

    Our LTO-9 Pre-Purchase Program allows anyone to pre-order LTO-9 tape technology before it is available. This is the ninth generation of tape technology that delivers on the promise made by the LTO Consortium to develop LTO tape technology through at least 12 generations. In an endeavor to deliver our customers the latest technology on the market, we are offering pre orders of LTO-9 tape technology. This gives our customers the best opportunity to receive the latest generation of LTO tape as soon as it’s available. LTO-9 is expected to be available in Fall 2020.

     How to Buy: CLICK HERE | or call us today @ 1-800-700-7683.

    How to Sell: For those looking to sell your old data tapes prior to upgrading to LTO-9, CLICK HERE to submit your inventory and we will contact you back within 24 Hours.


    LTO TECHNOLOGY FOR LONG-TERM DATA PROTECTION

    LTO tape technology provides organizations with reliable, long-term data protection and preservation. With LTO tape drives, organizations can meet security and compliance requirements, while at the same time, save on storage footprint, power, and cooling costs, which can make a significant difference in operating costs for larger library environments.

    LTO-9 FEATURED HIGHLIGHTS

    • Lowest cost per GB.

    • Tape offers lower power and cooling costs, plus a lower footprint leads to improved TCO.

    • Linear Tape File System (LTFS) support.

    • AES 256-bit Encryption – Military-grade encryption comes standard.

    • WORM technology – Makes data non-rewriteable and non-erasable, which acts as an immutable vault within your tape library to secure and protect an offline copy from ransomware.

    LTO-9 vs. LTO-8

    LTO-9 (Linear Tape-Open 9) is the most recently released tape format from the Linear Tape-Open Consortium, following the LTO-8 format which launched in 2017. LTO-9 is expected to double the capacity of LTO-8 to 60 TB compressed. LTO-8 provides 30 TB of compressed storage capacity and 12 TB of uncompressed capacity, doubling what LTO-7 offered.

    Although, the LTO Consortium has not announced the data transfer rate for LTO-9 yet, LTO-8 features an uncompressed data transfer rate of up to 360 MBps and a compressed data transfer rate of up to 750 MBps. 

    LTO-9 has a similar structure to LTO-8 in that tape drives are backward-compatible with one generation. Essentially, the LTO-8 tapes can read and write to LTO-7 tapes. LTO had typically been able to read back two generations and write back one generation. However, in LTO-8 the backward reading compatibility is limited to one generation. 

    LTO-9 also features the same WORM, LTFS, and 256-bitencryption technology as the prior generation LTO-8.

    Uses for LTO-9

    LTO features high capacity, durability, and portability for a comparatively low cost. Archived data storage is not normally needed on an immediate basis, making tape a solid backup option. More commonly, backup data is used for restores in the event of an incident or data loss.

    LTO-9 tapes housed at an off-site location are a fantastic option for disaster recovery. If an organizations main data hub has an incident, they can use the durable LTO9 tapes to recover their data. According to the LTO consortium, once data becomes less frequently retrieved, it should be migrated to tape. 

    Tape is particularly useful in industries such as entertainment and healthcare that generate large volumes of data every day and require a long-term data storage option that’s less expensive than disk. As ransomware attacks stay in the headlines, tape provides an offline backup storage option immune to a cyber-attack. Data stored on an LTO-9 tape cartridge does not have to be connected to the network. This creates what is called an Airgap and creates a safety net from a cyberattack.

    Pros and Cons of LTO-9 Tape

    Tape capacity continues to expand. When LTO-9 launches, it will have enhanced the compressed capacity of the LTO tape products by almost 60 TB in roughly 10 years. As data levels continue to grow rapidly for many groups, capacity is one of the most important aspects of data storage media. Even the cost of tape is low compared to storing 60 TB on other storage media such as disk or flash. Particularly when taking energy and equipment into consideration as a constant energy source is not required to keep data stored on tape.

    Other advantages of LTO-9 tape include:

    • A reliable generational roadmap that allows customers to count on a new product every few years, and a capacity that is not far off from the original estimate.

    • 256-bit encryption that guarantees security during storage and shipment. Its offline nature also serves as protection from ransomware and cyberattacks, creating an airgap.

    • A reputation of being extremely reliable, with a lifespan of roughly 30 years. The tape format is also portable, making it remarkably easy to transport.

    LTO’s open format also allows customers to access multiple, compatible products. The open format offers intellectual property licenses to prospective manufacturers, leading to innovation and improvements. However, LTO products are not compatible with non-LTO products.

    Depending on the amount of data you need to store, cloud storage can be less expensive than tape. In some instances, cloud backup providers provide a free option up to a specified volume of data. Cloud also offers random access, unlike tape. But restoration of data files can be slow depending on data volume and bandwidth.

    14 questions to ask before upgrading your servers

    Servers are almost always used with specific objectives in mind. Regardless of whether the server is installed in a small business or large enterprise, the server’s role can change over time and sometimes start fulfilling other services and responsibilities. Therefor, it’s important to reviewing a server’s resource load to help ensure the organization improves performance and avoids downtime. 

    What do you do when your servers are obsolete and ready to be retired? Unfortunately, server upgrades aren’t as easy as just dropping in more RAM, they require extensive planning. 

    The server is essentially the backbone of a businesses’ IT functionality. Acquiring and installing a new server is a large undertaking for any business. Choosing the correct server is important to the value of an organization’s future.

    So, what should you consider when it’s time to upgrade? To make matters a little easier, we’ve put together a list of 14 things to consider when upgrading your servers to ensure your organization’s systems perform at the highest levels.

    Does it fit your needs?

    First, let’s make sure that the new server is able to meet your organization’s IT needs. Determine the necessary requirements, compile this information, and work from there.

    Is integration possible?

    Check if you are able to integrate sections of your existing server into the new server. This could potentially save money on new technology and provide a level of consistency in terms of staff knowledge on the existing technology. Upgrading doesn’t mean that you need to throw your old equipment in the trash.

    What are the costs?

    Once you understand the performance requirements, the next step is to gauge which servers meet this most closely. Technology can be very expensive, so you shouldn’t pay for any technology that won’t be of use to your organization’s output.

    What maintenance is involved?

    Even the most current technology needs to be maintained and any length of downtime could be disastrous for an organization. Ensure that some form of maintenance cover is put in place. Usually, there is a warranty included, but it comes with an expiration date. Make sure you ask about extended warranty options if they’re available.

    What about future upgrades?

    Considering the future is critical when it comes to working with new technology. The fast pace at which technology develops means that you may need to consider growing your server a lot sooner than you expected. 

    Do you have a data backup?

    Never make any changes or upgrades to a server, no matter how minor, without having a data backup. When a server is powered down, there is no guarantee that it will come back online. 

    Should you create an image backup?

    Manufacturers tend to offer disk cloning technologies that streamline recovering servers should a failure occur. Some provide a universal restore option that allows you to recover a failed server. When upgrades don’t go as expected, disk images can help recover not only data but a server’s complex configuration.

    How many changes are you making to your servers?

    Don’t make multiple changes all at once. Adding disks, replacing memory, or installing additional cards should all be performed separately. If things go wrong a day or two after the changes are made, the process of isolating the change responsible for the error is much easier, than doing a myriad of changes all at once. If only a single change is executed, it’s much easier to track the source of the problem.

    Are you monitoring your logs?

    After a server upgrade is completed, never presume all is well just because the server booted back up without displaying errors. Monitor log files, error reports, backup operations, and other critical events. Leverage Windows’ internal performance reports to ensure all is performing as intended whenever changes or upgrades are completed.

    Did you confirm the OS you are running?

    It’s easy to forget the operating system a server is running. By performing a quick audit of the system to be upgraded, you can confirm the OS is compatible and will be able to use the additional resources being installed.

    Does the chassis support the upgrade?

    Server hardware can be notoriously inconsistent. Manufacturers often change model numbers and product designs. Whenever installing additional resources, you should read the manufacturer’s technical specifications before purchasing the upgrades.

    Did you double check that it will work?

    Whenever upgrading new server hardware, don’t automatically think the new hardware will plug-and-play well with the server’s operating system. Since the upgrade is being completed on a server, confirm the component is listed on the OS vendor’s hardware compatibility list. It doesn’t hurt to check the server manufacturer’s forums either.

    Does the software need an update?

    Make sure to keep up on any upgrades requiring software adjustments. You must also update a server’s virtual memory settings following a memory upgrade. 

    Did you get the most value for your money?

    Sure, less expensive disks, RAM, power supplies, and other resources are readily available. But when it comes to servers only high-quality components should be installed. While these items may cost a bit more than others, the performance and uptime benefits more than compensate for any additional expense.

    DTC – Clients

    DTC works with some of the biggest names in #business! We’re here to help. Give our sales team a call today and get your #data on the right track! P: 1-800-700-7683

     

    #Fortune500 #Software #Sports #Food #Beverage #Hospitality #Entertainment #Healthcare #Retail #Education #Energy #Development

    Scroll to top