Storix Blog

About Us

SysAdmins creating software for SysAdmins.

  • AIX backup software AIX mksysb: Here’s Something Even Better - It’s alarming each time we hear that some AIX system administrators aren’t doing full-system backup. If you’re not backing up your applications and your operating system, you’re leaving your business vulnerable to extended downtime. If you’re like most sysadmins, you’ll probably say, “We’re OK—I use AIX mksysb to back up everything.” We can certainly see why you love mksysb so much. It’s a tremendous backup utility. But as we explained in our last article, AIX mksysb may not be backing up absolutely everything you need. And this fantastic utility may be costing you more than you think in manpower. So, there’s a tradeoff involved here.
  • AIX backup software AIX Backup: Why You Need More Than mksysb - In our last article, we discussed the challenges of backing up Linux on IBM Power servers. In a nutshell, sysadmins often wish there were a mksysb for Linux—but there isn’t. So they resort to using one of the various backup systems on the market. But most of them provide either data-only backup or image backup, neither of which offers the comprehensive, flexible backup functionality that will fully protect your business. It’s best to go with a file-level backup solution instead.
  • Backup Solutions for Linux on Power Linux Backup on IBM Power: Where is my mksysb for Linux? - If you’re in charge of Linux backup on IBM Power systems, you’ve probably wished for mksysb. Here’s why you should be looking for more than AIX's mksysb.
  • SAP HANA backup SAP HANA Backup: Is Your Business Adequately Protected? - If your SAP HANA backup software only backs up data, it’s leaving you vulnerable. This white paper explains how true disaster recovery can help you meet your RTO.
  • rootkit attack Drovorub Linux Malware: A serious rootkit threat to Linux servers - You’ve probably read about the SolarWinds hack. It’s been all over the news the past couple weeks. The same group suspected of that hack is also behind a new rootkit called Drovorub. This attack specifically targets the Linux kernel versions 3.7 or lower due to a lack of adequate kernel signing enforcement.
  • Storix® System Backup Administrator announces support for Linux distributions optimized for IBM POWER8 - San Diego – September 23, 2015– Storix, Inc., providers of disaster recovery solutions for Linux and Unix systems, today announced the general availability of System Backup Administrator (SBAdmin) version, which includes support for little endian configurations of Linux distributions optimized for IBM Power 8 processors.
  • Storix® System Backup Administrator Announces Support for SUSE Linux Enterprise 12 - San Diego – February 26, 2015 – Storix, Inc., providers of disaster recovery solutions for Linux and Unix systems, today announced the general availability of System Backup Administrator (SBAdmin) version, which includes support for the latest release of SUSE Linux Enterprise Server (SLES) 12. “From an operating system perspective, SUSE has been working very […]
  • Linus Names Next Linux Release - Here is a comical article from The Register discussing Linus Tovalds decision to name the next major release of the Linux kernel. Linus deceided to ask the community for input regarding the naming. We are not sure if this is an example of disfunctional democracy or improper polling techniques.
  • Linux “Ghost” Vulnerability - In case you are not already aware, there has been a Linux vulnerability discovered commonly known as “GHOST” which is a ‘buffer overflow’ bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library. Remote attackers can use this flaw to execute arbitrary code with the permissions of the user running the application. It […]
  • alt Sony Pictures’ ‘wipeout’ - Last week Sony Pictures announced that they had been hit by a particularly nasty hacker attack¹, which among other things, stole payroll information, wiped computers clean, and taunted staff with a picture of a skull and a scrolling banner attributing responsibility. This comes in the wake of an attack on Sony’s Computer Entertainment subdivision in […]
  • The One Backup Mistake that Can Shut You Down - Organizations, even ones who consider themselves to have solid backup and recovery plans, often make one critical mistake that can render all of their careful planning moot – they fail to back up their infrastructure. Most companies are good at backing up critical data. Fewer are good at doing full system backups so they can […]
  • Business Continuity Concepts – Part 1: planning - Learn the Language When planning for Disaster Recovery*, there are 3 major concerns that need to be addressed: Maximum Tolerable Downtime, Recovery Time Objective, and Recovery Point Objective. Usually these areas need to be discussed by all major stakeholders rather than being unilaterally decided upon by a single person such as a CIO or IT […]