eGroup + Zerto + Azure = IT Resilience

In last Friday’s post, I discussed the concept that “Things that have never happened before, happen every day” and the need for a posture of resilience to remain operationally ready for anything. Storage industry veteran Paul Zeiter, currently president at Zerto, said recently that “One of the big challenges facing companies today is the need to change the way they think about coping with change. Traditional approaches to managing change…

Read More

Availability = Survival

As IT veterans, I’m certain we all have stories like the one I shared previously – many of those without the happy ending. It reminds me of the prime concepts of a (fascinating) survival book I read several years ago by Laurence Gonzales called “Deep Survival: Who Lives, Who Dies, and Why,” where the key themes of accident investigation are: Things that have never happened before, happen every day (for example, the…

Read More

eGroup Named a Fastest Growing Company in SC

eGroup has been named one of the 40 fastest-growing companies in South Carolina for 2017 by SC Biz News. Twenty large companies and 20 small companies have been named to the statewide Roaring Twenties list presented annually by SC Biz News. This honor recognizes the state’s best-performing companies based on both dollar and percentage increases in revenue from 2015-2016. In order to qualify for the Roaring Twenties designation, companies…

Read More

The Case for Preparedness

By: Mike Carter Are you prepared? Are you sure? In the early minutes of Saturday morning, April 2011, a water main broke underneath the street in Columbia, SC. A $30B lending provider, located just feet away from the break, with over 1,200 servers (95% of them virtualized) located in their basement Data Center, experienced a massive subterranean flood that destroyed the entire electrical subsystem beneath the building, effectively rendering…

Read More

How Secure is Your Environment?

Most companies today understand the very real need to protect their data. Most invest significant funds to mitigate or prevent the threats that aim to compromise their data. Typically, the go to investment is a firewall on the edge of the network to protect against outside attacks. And that is a great start. But that is far from the end. Unfortunately, many companies don’t realize what to do with…

Read More