PerfectStorage ESXi Host Reclaim

NEW: Automatic VMware ESXi Host Space Reclamation

First came PerfectStorage automated space reclamation for thin-provisioned servers and virtual machines and today we are excited to announce PerfectStorage now provides automated space reclamation at the datastore level with the new PerfectStorage ESXi Host Reclaim! Download a 30-Day Free Trial of PerfectStorage

Reclaim Storage Space Without Taking Servers Offline

Reclaim Storage Space Without Taking Servers Offline

Infrastructure engineer Kalle Pihelgas writes about getting maximum storage space efficiency out of his Nutanix running VMware in his blog, Kalle’s Playground. Specifically, Kalle discusses the value of zero-filling VMDKs: “Since Nutanix presents NFS share to ESXi hosts the datastore level reclaim will not be needed. This left me with in-guest reclamation. “After some testing […]

7 Tweaks to Improve New PC Performance

7 Critical Tweaks for Your New PC

PCWorld offers a list of 7 critical things to do immediately with a new PC. Whether you have a new PC or you’re trying to hang on to an old one, here’s how to tweak those steps to make your computer even more efficient and secure: “The first step is by far the most tedious. […]

Cyber Attacks on SCADA Systems Doubled in 2014

Dell’s 2015 Security Threat Report found that cyber attacks against industrial/manufacturing targets doubled in the past year. Attacks on supervisory control and data acquisition (SCADA) systems often go underreported, so the number can be much larger than the amount found in this report, as companies are only required to report security breaches that affect personal […]

gone phishing

A Business Will Fail in 2015 Due to a Cyber Attack

Cyber attacks, already responsible for millions of dollars in damages and reputational harm, are the new normal. Not preparing for a cyber attack or security breach is now the equivalent of negligence. A cyber security expert at AEGIS London is predicting a company will going out of business in 2015 due to the financial consequences […]


How to Choose a Storage Device: HDD, SSD or SSHD?

Are you in the market for a new PC? Here’s a quick guide to help you decide on which technology is right for you. StorageNewsletter recently published a comparison of the available storage technologies on the market today: HDD, SSD, SSHD and PCIe SSD. We’ve summarized┬áthe advantages and disadvantages of each storage technology below. HDD […]

healthcare phishing

When You’re 4 Times More Likely to Get Phished

You’re four times more likely to be the victim of a phishing attack from healthcare-related emails, according to a report from security analytics firm Agari Data reported in TechTarget. 75% of Companies at Risk for Email Spoofing An alarming study conducted by Agari Data found that 75% of enterprises haven’t implemented the DMARC policy for […]

improve sql server performance

Improve SQL Server Performance with a RAM Disk

SQL Server’s heavy reliance on temporary files can slow down I/O performance. Here’s how you can improve SQL Server performance by moving tempdb to a RAM disk. Get Speeds 50 Times Faster Than HDD, 10 Times Faster Than SSD: Download RamDisk Plus

Keeping Old Devices Alive After a Windows Upgrade

Keeping Old Devices Alive After a Windows Upgrade

A fully functional PC, with hardware, software and connected devices working reliably and correctly, requires updated drivers so your system can properly communicate with every device installed on your machine. Download PerfectUpdater and Run a Free Scan for Outdated Drivers

6 Distinct Advantages InstantRecovery Has Over Windows System Restore

4 Cyber Security Questions You Need Answers To

CTOvision recently ran an article offering advice to executives on preparing for cyber threats. “84% of corporations have malware on their networks…Hackers are able to get in quickly and can remain undetected for months or years, doing immeasurable damage. In recent years, it is estimated that cyber attacks and cyber crime have quadrupled, resulting in […]


Anthem Hack Exposes 80MM: How To Protect Your PC

Last month, health insurance company Anthem publicly announced a massive data breach that exposed Social Security Numbers and other personal information on 80 million American customers. You don’t have to be an Anthem customer to be vulnerable to phishing attacks; find out what you can do if you system has been breached (or if you […]


An Easy Fix for Your Slow VM Performance Explained

Raxco’s Bob Nolan explains the role of the SAN, the storage controller and the VM workflow, how each affects virtualized system performance and what system admins can do to improve slow VMware/Hyper-V performance: There is no doubt virtualization has brought enormous efficiencies to corporate IT, but better performance is not one of the benefits companies […]

Why You Shouldn't Wait for Vendor Update Notices

Making Your Windows 10 Upgrade as Smooth as Can Be

As we reported in January, Windows 10 will be a free upgrade to those users running Windows 7 and Windows 8.1 in the first year after the release of the new operating system. Dealing with an in-place upgrade on an existing machine can result in some unintended headaches related to the incompatibility of the software […]