Welcome to The NAS Guy Blog
In the ever-evolving world of technology, where data rules supreme and innovations abound, finding your way through the digital labyrinth can be a daunting task. Whether you’re a seasoned tech enthusiast, a curious newcomer, or just someone looking to make sense of the rapidly changing tech landscape, “The NAS Guy” is here to be your guiding light.
Welcome to my tech-savvy haven where we unravel the mysteries of cloud computing, dive deep into storage solutions, explore the intricacies of data backup, and navigate everything in between. If you’ve ever found yourself lost in the jargon of terabytes, cloud migrations, or RAID arrays, fear not – you’re in the right place!
Recent Blog Posts
- AWS Weekly Roundup: AWS Builder Center, Amazon Q, Oracle Database@AWS, and more (July 14, 2025)Summer is well and truly here in the UK! I’m a bit of a summer grinch though so, unlike most people, I’m not crazy about “the glorious sun” scorching me when I’m out and about. On the upside, this provides the perfect excuse to retreat to the comfort of a well-ventilated room where I can … Read more
- Data Resilience Maturity Model: Your Questions AnsweredMastering Resilience: Essential Questions About the Data Maturity Model Data resilience should be a top priority for all organizations. But what does true resilience look like, and how can companies objectively measure and improve it? Enter the Data Resilience Maturity Model (DRMM), a comprehensive framework designed to help businesses assess their current capabilities, benchmark themselves … Read more
- Cyber Resilience Strategies from the Risk to Resilience ReportRansomware attacks are evolving faster than ever, making cyber resilience a top priority for organizations of all sizes. In this post, our principal product marketing manager, Leah Troscianecki, EMEA field CTO, Edwin Weijdema, and VP, Technology GRC, Courtney Elder, answer some of the main questions from Veeam’s Risk to Resilience Report, share real-world insights from … Read more
- Veeam Data Cloud for Microsoft 365 Joins the Unified Multi-Workload Experience As cyberthreats continue to rapidly evolve, protecting your Microsoft 365 and Entra ID data has become critical, since these platforms are the backbone of your organization’s productivity and access management. Safeguarding them requires more than just strong cybersecurity; you also need to navigate complex compliance requirements, overcome recycle bin limitations, guard against accidental deletions, and … Read more
- New Amazon EC2 P6e-GB200 UltraServers accelerated by NVIDIA Grace Blackwell GPUs for the highest AI performanceToday, we’re announcing the general availability of Amazon Elastic Compute Cloud (Amazon EC2) P6e-GB200 UltraServers, accelerated by NVIDIA GB200 NVL72 to offer the highest GPU performance for AI training and inference. Amazon EC2 UltraServers connect multiple EC2 instances using a dedicated, high-bandwidth, and low-latency accelerator interconnect across these instances. The NVIDIA Grace Blackwell Superchips connect … Read more
- Introducing AWS Builder Center: A new home for the AWS builder communityWe really love builders at AWS. We’re constantly thinking of new ways to help technical communities thrive and create spaces like AWS Developer Center and community.aws where people can connect and share their knowledge and experiences. Today, we’re announcing AWS Builder Center, a new home for builders to access all builder resources, engage with the … Read more
- The Challenge of Cloud Storage for Backups: Security Concerns, Bill Shock, and ExpertiseStoring backups in the cloud is an increasingly popular strategy for good reason. A good plan includes storing backups securely off-site, and cloud storage backup solutions offer a convenient way for you to achieve that goal. However, when you store data in the cloud, you may face challenges with managing cloud spend, security, resources, or … Read more
- Enterprise Resilience Made Even Stronger, Simpler, and SaferToday, we’re excited to announce that Veeam Data Platform Premium’s capabilities are expanding! Veeam Recovery Orchestrator, our flagship orchestrated recovery engine that drives enterprise resilience, is out with another update. Even though it’s only been a few months since our last release, in true Veeam fashion, we iterate, innovate, and most importantly, deliver updates as … Read more
- Introducing Oracle Database@AWS for simplified Oracle Exadata migrations to the AWS CloudToday, we’re announcing the general availability of Oracle Database@AWS, a new offering for Oracle Exadata workloads, including Oracle Real Application Clusters (RAC) within AWS. In the past 14 years, customers had the choice of self-managing Oracle database workloads in the cloud using Amazon Elastic Compute Cloud (Amazon EC2) or using fully managed Amazon Relational Database … Read more
- AWS Weekly Roundup: EC2 C8gn instances, Amazon Nova Canvas virtual try-on, and more (July 7, 2025)Every Monday we tell you about the best releases and blogs that caught our attention last week. Before continuing with this AWS Weekly Roundup, I’d like to share that last month I moved with my family to San Francisco, California, to start a new role as Developer Advocate/SDE, GenAI. This excites me because I’ll have … Read more
- Recon Scanner for Veeam Data Platform: Unveiling the Future of Proactive Threat AssessmentIn today’s digital landscape, your systems and data are constantly under siege. Cyberattacks are no longer rare events; they are a common occurrence. Threat actors are using a myriad of tactics, techniques, and procedures (TTPs) to compromise systems. According to the From Risk to Resilience: 2025 Ransomware Trends and Proactive Strategies, these attacks don’t just … Read more
- Amazon Nova Canvas update: Virtual try-on and style options now availableHave you ever wished you could quickly visualize how a new outfit might look on you before making a purchase? Or how a piece of furniture would look in your living room? Today, we’re excited to introduce a new virtual try-on capability in Amazon Nova Canvas that makes this possible. In addition, we are adding … Read more
- Complete Microsoft 365 and Entra ID Protection, Big SavingsMicrosoft 365 is the backbone of productivity for millions of organizations worldwide, powering collaboration, communication, and data storage. Yet, as organizations depend on Microsoft 365 and Entra ID (formerly Azure Active Directory) for more critical operations, the risks to this data, like ransomware, accidental deletion, and regulatory non-compliance, are also at an all-time high. That’s … Read more
- Build the highest resilience apps with multi-Region strong consistency in Amazon DynamoDB global tablesWhile tens of thousands of customers are successfully using Amazon DynamoDB global tables with eventual consistency, we’re seeing emerging needs for even stronger resilience. Many organizations find that the DynamoDB multi-Availability Zone architecture and eventually consistent global tables meet their requirements, but critical applications like payment processing systems and financial services demand more. For these … Read more
- New Amazon EC2 C8gn instances powered by AWS Graviton4 offering up to 600Gbps network bandwidthToday, we’re announcing the general availability of Amazon Elastic Compute Cloud (Amazon EC2) C8gn network optimized instances powered by AWS Graviton4 processors and the latest 6th generation AWS Nitro Card. EC2 C8gn instances deliver up to 600Gbps network bandwidth, the highest bandwidth among EC2 network optimized instances. You can use C8gn instances to run the … Read more
- AWS Weekly Roundup: Project Rainier, Amazon CloudWatch investigations, AWS MCP servers, and more (June 30, 2025)Every time I visit Seattle, the first thing that greets me at the airport is Mount Rainier. Did you know that the most innovative project at Amazon Web Services (AWS) is named after this mountain? Project Rainier is a new project to create what is expected to be the world’s most powerful computer for training … Read more
- The Data Protection Blind Spot: What You’re Missing Below the SurfaceLeft unmanaged, data sprawl creates chaos that weakens operational control and increases risk. Risk can come in all shapes and forms: accommodating for increased expenses associated with data growth, keeping that data safe from threats while maintaining compliance, or even recovering that data without violating your RPO or RTO. While hypervisors and cloud platforms are often … Read more
- Veeam Named a Leader in 2025 Gartner® Magic Quadrant™ for Backup and Data Protection PlatformsI’m proud to announce that Veeam has once again been recognized as a Leader in the 2025 Gartner® Magic Quadrant for Backup and Data Protection Platforms, marking the 9th time in a row we’ve earned this distinction and the 6th consecutive year we’ve been awarded the Highest in Ability to Execute. This recognition is important … Read more
- Amazon FSx for OpenZFS now supports Amazon S3 access without any data movementStarting today, you can attach Amazon S3 Access Points to your Amazon FSx for OpenZFS file systems to access your file data as if it were in Amazon Simple Storage Service (Amazon S3). With this new capability, your data in FSx for OpenZFS is accessible for use with a broad range of Amazon Web Services (AWS) … Read more
- New: Improve Apache Iceberg query performance in Amazon S3 with sort and z-order compactionYou can now use sort and z-order compaction to improve Apache Iceberg query performance in Amazon S3 Tables and general purpose S3 buckets. You typically use Iceberg to manage large-scale analytical datasets in Amazon Simple Storage Service (Amazon S3) with AWS Glue Data Catalog or with S3 Tables. Iceberg tables support use cases such as … Read more
- Turning Change into Opportunity: How Veeam ProPartners Can Thrive Amid Licensing Shifts and VMware UncertaintyThe Channel is at a Crossroads From evolving licensing models to major vendor disruptions, partners are being challenged to rethink how they deliver value and drive growth. As perpetual socket licensing gives way to subscription-based models, and the VMware landscape continues to shift under Broadcom’s ownership, channel partners must adapt quickly to stay competitive. In … Read more
- AWS Weekly Roundup: re:Inforce re:Cap, Valkey GLIDE 2.0, Avro and Protobuf or MCP Servers on Lambda, and more (June 23, 2025)Last week’s hallmark event was the security-focused AWS re:Inforce conference. Now a tradition, the blog team wrote a re:Cap post to summarize the announcements and link to some of the top blog posts. To further summarize, several new security innovations were announced, including enhanced IAM Access Analyzer capabilities, MFA enforcement for root users, and threat … Read more
- Veeam Cyber Secure: Proactive Protection, Swift Response, and Comprehensive Recovery In today’s digital landscape, it’s not a matter of if a ransomware attack will happen, it’s a matter of when. However, with the right strategy in place, organizations can stay ahead of attackers and recover quickly if the worst happens. Veeam offers a suite of robust services designed to protect your organizations before, during, and … Read more
- Run VMs Your Way: A Flexible Alternative to Legacy VirtualizationRed Hat is modernizing virtualization across every environment. Veeam Kasten ensures your data is protected every step of the way. Legacy Virtualization is No Longer Enough The virtualization market is undergoing a monumental shift with Broadcom’s acquisition of VMware. For years, enterprise virtualization meant centralized, monolithic platforms, but those days are numbered. Faced with rising … Read more
- Sync Isn’t Save: Why You Still Need Entra ID Backups for Hybrid EnvironmentsMicrosoft Entra ID is no stranger to organizations across the globe. In fact, many organizations rely upon Entra ID without even realizing it. As with anything that stores data, that data needs to be protected from threats and accidents, sometimes purely for compliance reasons. Veeam first introduced backup capabilities for Entra ID last December, and … Read more
- AWS re:Inforce roundup 2025: top announcementsAt AWS re:Inforce 2025 (June 16-18, Philadelphia), AWS Vice President and Chief Information Security Officer Amy Herzog delivered the keynote address, announcing new security innovations. Throughout the event, AWS announced additional security capabilities focused on simplifying security at scale and enabling organizations to build more resilient applications in the cloud. Below is a comprehensive roundup … Read more
- Amazon GuardDuty expands Extended Threat Detection coverage to Amazon EKS clustersToday, I’m happy to announce Amazon GuardDuty Extended Threat Detection with expanded coverage for Amazon Elastic Kubernetes Service (Amazon EKS), building upon the capabilities we introduced in our AWS re:Invent 2024 announcement of Amazon GuardDuty Extended Threat Detection: AI/ML attack sequence identification for enhanced cloud security. Security teams managing Kubernetes workloads often struggle to detect … Read more
- Unify your security with the new AWS Security Hub for risk prioritization and response at scale (Preview)AWS Security Hub has been a central place for you to view and aggregate security alerts and compliance status across Amazon Web Services (AWS) accounts. Today, we are announcing the preview release of the new AWS Security Hub which offers additional correlation, contextualization, and visualization capabilities. This helps you prioritize critical security issues, respond at scale … Read more
- AWS Backup adds new Multi-party approval for logically air-gapped vaultsToday, we’re announcing the general availability of a new capability that integrates AWS Backup logically air-gapped vaults with Multi-party approval to provide access to your backups even when your AWS account is inaccessible due to inadvertent or malicious events. AWS Backup is a fully managed service that centralizes and automates data protection across AWS services … Read more
- New AWS Shield feature discovers network security issues before they can be exploited (Preview)Today, I’m happy to announce AWS Shield network security director (preview), a capability that simplifies identification of configuration issues related to threats such as SQL injections and distributed denial of service (DDoS) events, and proposes remediations. This feature identifies and analyzes network resources, connections, and configurations. It compares them against AWS best practices to create … Read more