One good probe deserves another

Posted by Matt Amdur on

During my first week at Delphix I was asked to participate in a support call with a customer. The customer had recently upgraded their 4 vCPU Delphix VM (running on VMware ESX) to a new Delphix version and added two additional vCPUs. After the upgrade the VM would no longer boot. Each time the VM…

Read More

eWeek: Axis Weighs In on the Attempted AT&T Breach

Posted by Michael Logan on

Hackers unsuccessfully attempted to break into AT&T’s customer information database via its website with an automated script. I took some time to share my thoughts on what the intentions of the hackers might have been in terms of the type of data they were seeking. You can read Fahmida Rashid’s full article here, but here’s…

Read More

Webinar Tomorrow: Managing Sensitive and Confidential Data

Posted by Michael Logan on

Join the Axis Team for a Webinar tomorrow, November 16th: Managing Sensitive and Confidential Data in Development & Test Environments Does your organization have production data in development & test environments? Do you worry about the privacy of your test data? Do you share your production data with off-shore vendors? If you answered “Yes” or…

Read More

Live From Vegas: National Workers’ Compensation and Disability Conference

Posted by Michael Logan on

Axis is on the move again! This week we’re exhibiting at the National Workers’ Compensation and Disability Conference & Expo in Las Vegas: What: Handling healthcare claims and benefits can be challenging enough. A data breach or loss of private information can literally cripple a business. Check out the pioneering data masking product, DMsuite, and…

Read More

ZFS 10 year anniversary

Posted by Matthew Ahrens on

Halloween has always been a special holiday for ZFS.  We ran our first code 10 years ago in October 2001.  We integrated ZFS into OpenSolaris on October 31, 2005.  It’s interesting to look back and remember what we had figured out early on, and which ideas weren’t developed until much later.  Ten years ago, we…

Read More

“Pay Attention to the Man Behind the Curtain”

Posted by Michael Logan on

We have been explaining the risks of third party data access for years, and this week Ericka Chickowski of Dark Reading put together an excellent article on some of the costs and concerns associated with it: Data Breach Costs: Beware Vendor Contract Fine Print Organizations often end up paying the consequential costs of data breaches…

Read More