By: Sean Dempsey
WAN Optimization on Surface Pro
A couple of weeks ago I promised to show you Replify Accelerator providing WAN Optimization on a Surface Pro. Here it is.
iOS We Can!
I knew it would happen. Long ago when we first demonstrated full-on WAN optimization running on a Windows PC, potential customers would say "that's cool, but what about Macs?". Then when we showed it on a Mac, it became "Cool, but what about my Blackberry?
Replify Participate in UKTI Workshop in India with Tata
Replify selected as one of 20 UK companies to participate in UKTI workshop in India with Tata
Altobridge Announces ChinaCache Deal
Our GSM technology partner, Altobridge, has just announced a major deal with ChinaCache to develop a joint offering combining content distribution with WAN Optimization all the way to the network edge, and right onto the device.
Replify becomes Associate of CSIT
Replify is pleased to announce that it has become an Associate Member of the Centre for Secure Information Technology (CSIT). CSIT is a thought leader in secure information technology research with a network of commercial & research partnerships and a portfolio of successful technology transfer from academy lead research into industry.
Replify Accelerator with Netapp
A leading UK IT Managed Services company is now using Replify Accelerator along with their Netapp appliances for backup replication. The combination means that windows back-ups are eliminated and the recovery time for data protection is significantly improved over the WAN.
As easy as pi
I've blogged in the past on the portability of the Replify technology and the power it packs into a small resource footprint, but every so often I'm amazed myself at what we can do. I bought a Raspberry Pi as soon as they were launched, but with pressures of work my plans of turning it into a home automation system made little progress.
Disaster Recovery using Replify
Ensuring your data is backed up and safe from outages is a vital task for an enterprise and most will have some sort of backup and recovery mechanism in place. But to make the backup really safe, you want the data to be somewhere other than where it's being generated and consumed