April 2005
UNIX Update;Apr2005, Vol. 16 Issue 4, p1
Trade Publication
The article reports on the launch by Arkeia Corp. and Silicon Graphics of a turnkey, high-performance backup hardware and software solution designed for technical computing environments in the research, education and government sectors where performance, reliability and cost of data protection are critical, in April 2005. The SGI Altix 350 server, when combined with Arkeia Network Backup software delivers a high performance backup solution which protects as many as 10 client servers and incorporates the Arkeia Data Encryption and the Arkeia Tape Archive modules. For a limited time, customers can enjoy special solution pricing by leasing an SGI Altix 350 Server for as little as $370.30 for 36 months from SGI, and licensing Arkeia Network Backup software from Arkeia for $1,919, which represents over an 80 percent discount off the suggested retail price of the Arkeia software. Arkeia Network Backup features 64-bit Linux support for Intel Itanium 2 and support of Kernel 2.6 Linux distributions. Arkeia also offers a tightly integrated solution for open databases and applications such as MySQL, Oracle, DB2 and Microsoft Exchange. In addition, Arkeia v5.3 supports NDMP network-attached storage devices and Microsoft VolumeShadow Copy Services technology embedded in Windows 2003 servers, while incorporating enhancements to existing elements of the scalable data protection solution for heterogeneous environments.


Related Articles

  • Who's in charge of crypto backup? Schwartau, Winn // Network World;3/10/2003, Vol. 20 Issue 10, p47 

    Focuses on the computer back-up procedure, cryptography. Encryption of the contents of the hard disk; Difficulty in restoring backed-up data to a usable format; Importance of periodically testing backup systems.

  • Manage Your EFS Keys with Cipher. Minasi, Mark // Windows IT Pro;Feb2008, Vol. 14 Issue 2, p65 

    The author focuses on the management of encrypting file system (EFS) with the command-line tool Cipher. He offers tips on how to create a back up for EFS key using the Cipher /x command. He notes the importance for the users to make themselves a recovery agents of files. The process on how to...

  • Deluge of Data Threatens Many Backup Systems. Vizard, Michael // CIO Insight;3/20/2014, p1 

    The article focuses on the challenges facing information technology organizations in managing increasing amounts of data. It cites the results of a survey by data protection systems provider Sepaton, which found that more than half of respondents said they are backing up over 100 terabytes of...

  • Key Management a Barrier to Encryption Adoption. Frenkel, Karen A. // CIO Insight;4/24/2014, p1 

    The article looks at the results of a 2014 survey by information systems and communications security firm Thales on global encryption trends and regional differences. According to the survey, to minimize the impact of security breaches is the primary reason for encryption deployment. Also...

  • Safeguard your farming files online. Abel, Charles // Farmers Weekly;12/4/2009, Vol. 151 Issue 23, Special Section p14 

    The article offers a guide for farmers on protecting their farming data online. Based on a study from the London Chamber of Commerce in England, 90% of businesses that lose data because of a disaster are forced to shut down within two years. Farmer Simon McCowen has devised Boxit4backup, an...

  • Using Transparent Data Encryption. Otey, Michael // SQL Server Pro;Jul2012, Vol. 14 Issue 7, p16 

    The article discusses how to apply the transparent data encryption (TDE) technology to encrypt databases. It states the need to create the master key called the database encryption key (DEK) for the database and the certificate which will secure the master key. It cites that use the alter...

  • Online Enterprise Backup Solutions. Bieda, Tony // Windows IT Pro;Jan2013, Vol. 19 Issue 1, p108 

    The article offers tips for companies on what to consider before jumping into a cloud-based backup solution. It suggests to consider encryption, certified data center, deduplication and onsite backup appliance as well as agents, and operating system (OS) and application support. The article also...

  • QUESTION OF THE MONTH. Pruitt, Jason; Touchstone, Jimmy; Petersen, Chris; Nast, Jeff // Storage Magazine;Aug2008, Vol. 7 Issue 6, p17 

    The article presents explanations made by various executives on the reason for their decision not to encrypt backup tapes. According to Jason Pruitt, senior system administrator, they need to do a cost analysis of the impact of encryption to user applications and the cost of the technology...

  • Data Security in a Mobile World. Allen, Jeffrey // GPSolo;Dec2010, Vol. 27 Issue 8, p4 

    The article presents suggestions for lawyers on data security. It is said that with the advent of Internet and mobile technology, the risks to data security have increased significantly. It is suggested to back up data to an external hard drive. It is stated that encryption may also be used to...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics