How to Protect Your Unstructured Data (Without the Hassle)

IT leaders know that their company’s most valuable asset is data.

Blog

Using Hash Digests to Validate Data Copies

Whenever data is migrated or replicated between two systems, one of the most important activities to perform is validating the copy operation results.  It is an unfortunate reality that data gets corrupted either in transit, due to a bad disk write at the destination, or for other reasons.  No matter where the source of the…
Read More

Introducing DobiMigrate CTA Bypass – Migration in Days, Not Weeks

The goal of the CTA has always been pretty straightforward, keep data that is meaningful to the business on high-speed, high-cost storage, and then use policies to transparently tier older, less-valuable data off to cheaper commodity storage [and then cloud storage].CTA accomplishes this by truncating the original file down to a very small pointer, often…
Read More

Can You Do More Than 255?

In my role here at Datadobi, talking about moving, replicating, and syncing unstructured data all the time, I cannot begin to tell you how often I hear people ask if we can handle long file names or long path names.  They of course ask the question for a valid reason.  Many legacy tools cannot handle…
Read More

Customers View of DobiMigrate Performance

One of the things that we love to talk about at Datadobi is migration performance. If you have been involved in any discussion with someone from our team it’s unlikely that you walked away without the knowledge that we are “10x faster than other solutions that exist on the market today”. Where does that come…
Read More

The Impact of Timestamps

The Impact of Timestamps After initial data seeding, Datadobi’s DobiMiner Suite (DobiMigrate, DobiReplicate, and DobiSync) compares timestamps on file system objects residing on both the source and destination platform. These comparisons determine whether full data copies or metadata copies are required when executing differential operations synchronizing content on  the source and destination platforms. Intelligent use of these…
Read More