General Tech

Rubrik -  - How Automation Can Advance Your Career

How Automation Can Advance Your Career

Working in IT keeps you on your toes as you constantly evaluate, test, and implement new technologies and applications. In many ways, IT environments are getting more difficult to manage and protect due to rapid data growth, the increase in available tools and integrations, and the rise of cloud adoption. In addition, IT organizations are now (finally!) often considered strategic business partners as data becomes more valuable and business-critical. This shift also means that IT admins are often asked to do more with less, which is why many organizations are leaning on automation. And (despite popular belief) creating scripts and automated tooling isn’t just for developers. Any IT professional—whether you’re an entry-level backup admin or seasoned DBA—can leverage automation. It’s a great way to meet your goals and advance your skillset. To give you a little inspiration, I can still remember exactly where I was and what process I automated for the first time. It was a fully automated NetApp Clustered Data ONTAP upgrade process that included creating a temporary HTTP server that could be used in the field. I also remember, looking back at that specific piece of automation, how rudimentary it was compared to what I’m doing today.…
Rubrik -  - GraphQL vs REST: What You Need to Know

GraphQL vs REST: What You Need to Know

Of late, GraphQL has been presented as a revolutionary alternative to REST APIs—but as with anything else, it has its pros and cons. In some scenarios, GraphQL will indeed be a better solution, but in others, you might find that REST APIs are still preferable. This blog post will walk through the basic differences between GraphQL and REST APIs so you can make the best possible decisions for your automation needs. GraphQL: An Introduction GraphQL follows the same set of constraints as REST APIs, but it organizes data into a graph using one interface. Objects are represented by nodes (defined using the GraphQL schema), and the relationship between nodes is represented by edges in the graph. Each object is then backed by a resolver that accesses the server’s data. When a GraphQL server responds to an end user’s request, it begins with the query root, and the resolver executes every field on the requested object. A key-value map houses each field’s values, and some return another object selecting another set of fields. This continues until only a string or a number is returned. The server then responds with a nested set of objects, as requested by the end user. The…
Rubrik -  - Top 3 Data Management Trends at NetApp Insight

Top 3 Data Management Trends at NetApp Insight

Last week, Rubrik was thrilled to be a sapphire sponsor at  the NetApp Insight Conference, where we had the opportunity to speak firsthand with our customers, give a sneak peek of our upcoming NetApp SnapDiff integration, and highlight our strategic partnership with NetApp. Attending Insight also provided significant, well, insights into what’s top of mind for IT organizations and the biggest challenges enterprises face with data protection. To help navigate the sea of information, we’ve put together a list of the biggest trends and observations from Insight:  1. Everyone is thinking about multi-cloud. Data is everywhere. As data mobility becomes a reality, so does the concept of data in multiple clouds. This multi-cloud operations paradigm leads to complex management and potential compliance violations. At Insight, it became clear when speaking to customers that they need simplification of infrastructure and operations across all environments, especially as data becomes increasingly fragmented. This strategy complements Rubrik’s founding vision to simplify data management and track and store data where it makes the most sense. 2. Customers are looking for modern data protection and control. Many IT orgs today are faced with the problem of clunky, legacy data protection systems with little ROI. On top…
Rubrik -  - How Infrastructure as Code Supports DevOps Best Practices

How Infrastructure as Code Supports DevOps Best Practices

As operations increasingly migrate to the cloud, there are more opportunities to develop support solutions and infrastructure, from ensuring security to improving integrations. Infrastructure as code can help you increase automation and reduce your deployment cycle time so you can help more customers interested in these services. Incorporating infrastructure as code into your IT org’s practices can help eliminate costly human setup errors and inconsistencies, save time, and more easily debug issues with your team or the open source community at large. What is Infrastructure as Code, Anyway? Infrastructure as Code (or IaC) is a descriptive model that allows you to automatically generate a desired environment, including networks, VMs, and connection types. IaC uses the same type of versioning approach that DevOps and software engineering teams use in source code, but it’s applied to build the exact same environment for each and every deployment. Consider IaC a method of automating the process of test environment setup. In the past, you would have had to manually specify the machines, configuration, and network each time you were testing an application in a particular environment. The manual approach is prone to human error and quite time-consuming. IaC automates the process by giving you…
Rubrik -  - 3 Steps to Constructing a Security-First IT Strategy

3 Steps to Constructing a Security-First IT Strategy

How CIOs and other IT leaders can successfully guide their teams into a security-first IT strategy and earn stakeholder buy-in. Cybersecurity threats are not just becoming increasingly frequent and sophisticated– they remain a top financial concern for businesses, regardless of region or industry.  It is now on the shoulders of IT leaders to navigate the technical security landscape and build agile teams that can dynamically respond to new threats. In addition, because of the financial implications of downtime and breaches, these leaders must also be able to abstract the business value of security in order to influence company-wide priorities.   I sat down with Ron Sinopoli, CIO of McHugh Construction, to discuss how CIOs and other IT leaders can effectively drive and advocate for a security-first posture within their organizations. Sinopoli has been the CIO of McHugh for the past year, and he has already led the company through an entire upheaval of its IT strategy in order to uplevel security measures as a strategic priority for the business.   Here’s an inside look at the three major stages Sinopoli led his organization through when shifting to a security-first posture. Stage 1. The Security Event Post-Mortem: Conducting an Honest Analysis  “After all,…
Rubrik -  - Exploring Passive Survivability: Bracing for a Security Attack

Exploring Passive Survivability: Bracing for a Security Attack

Security attacks continue to be on the rise as threats like ransomware grow more mature and complex.  Although preventing ransomware attacks may seem near impossible, there are tools and infrastructure best practices that make recovering from a cyberattack less painful. In a recent article with Infosecurity Magazine, Robert Rhame, Director of EMEA Product Marketing at Rubrik, explores the passive survivability model and how this framework can enable your team to bounce back from a successful attack. Let’s take a quick look at this model and how, according to Rhame, it can prepare your team.  A version of the below excerpted article originally appeared in Infosecurity Magazine. Design Your Infrastructure Like a Ship When it comes to preparing for a threat that you can’t stop, your infrastructure must be designed in such a way that an attack, although damaging to your business, does not cause all of your operations to sink. Like a modern battleship, your infrastructure should be created with an inherent resiliency built into it. This resiliency is different than traditional network segmentation and should be thought of as failure compartmentalization. The prevalence of the cloud, mobile, SaaS, and IoT devices means that organizations must no longer be focused…
Rubrik -  - How We Use CloudOn & CloudOut to Protect Developer Environments

How We Use CloudOn & CloudOut to Protect Developer Environments

For many organizations, drawing up an effective Business Continuity Plan (BCP) and Disaster Recovery (DR) plan is imperative to ensuring business operations don’t stop during an unplanned outage, security threat, or attack. Most strategies focus on recovering mission-critical data and systems such as financial, customer, and ERP applications. In addition, many organizations, including those whose main business is developing software, often consider revenue-impacting systems and data as mission-critical, while software development is an afterthought.  Just like any other tech company, Rubrik is susceptible to unpredictable outages or disasters that can affect its on-premises or cloud infrastructure. That’s why we have a broader definition of mission-critical data and systems that includes our development work environments. We make recovering them a key part of our DR plan so we can continue to develop software in any scenario.  In order to achieve this, we use two powerful features of Rubrik Cloud Data Management: CloudOut: Archives backed up data to object storage platforms such as Amazon S3, Google Cloud Storage, and Azure Blob Storage for quick access and retrieval. CloudOut as a standalone feature might sound like elastic storage on cloud for quick and easy access, but when coupled with CloudOn, it becomes an…
Rubrik -  - The Day the Data Center Stood Still: A Tabletop DR Workshop

The Day the Data Center Stood Still: A Tabletop DR Workshop

When it comes to being ready for the real thing, regular DR testing is crucial to preparing a team for all the moving parts involved when some random day goes really wrong. The trouble is, it’s not always possible to scrape together the time and resources needed to test as often as you should. In many organizations, the first time a crisis team gets together is for the big one.   This blog series shows how you can use tabletop workshops to do some hypothetical training and strengthen your disaster recovery and response strategy. In my first post, I discussed the importance and preparation of a tabletop exercise. This post will help walk through the setup and execution of the exercise. Let’s get started! Tips for Running Your Tabletop Workshop Each workshop has one facilitator to guide the exercise and 5-10 participants in the core and extended crisis team to roleplay the scenario. Note that participants will not necessarily be playing their actual role at the company, but working collectively as a group to address the disaster. Group Discussions One of the main goals of a tabletop workshop is to encourage group discussions that identify holes in your current DR strategy…
Rubrik -  - The Myth of Boring Backup

The Myth of Boring Backup

Am I crazy for thinking backup is exciting? Prior to joining Rubrik, I was a Gartner analyst for 20+ years and spent the majority of my time there covering primary storage and backup and recovery. As a storage analyst, I saw the consistently high client inquiry volumes on backup and recovery and decided to switch my coverage to this area. Some of my colleagues shook their heads and couldn’t understand why I wanted to cover a technology area that was so “boring.” To me, backup is not boring; it’s the biggest pain point in the entire data center infrastructure! It has often become a huge burden that slows down an organization’s quest for agility. As I studied the market and technologies, I realized that the pain was caused by too little innovation. All the major enterprise backup solutions only had incremental improvements in the past 20 years and couldn’t meet the new backup and recovery performance requirements. As a result of relentless data growth, backup windows have become longer and longer, while recovery is too slow to meet the requirement of new digital initiatives and changing expectations. Today, backup has become one of the most exciting fields because it’s experiencing…