Storage


Differentiating Storage

Now that SAS/SATA has achieved the status its champions said it would, how do vendors blend the software functions with their gear and provide usable functionality at a reasonable cost?

Why Politics and Storage Don’t Mix

When politics and storage collide, the results are too often unpredictable and unnerving.

Pushbutton Disaster Recovery

Do you know if your disaster recovery processes are up to date?

Thin Is In -- Or Is It?

The downside of thin provisioning at the array level is not being fully articulated by any vendor.

Of Knee-Nippers and Ankle-Biters

It should come as no surprise that new companies have begun to carve out a part of the storage market for themselves.

Signal to Noise in Storage Management

Symantec Veritas CommandCentral is building a strong infrastructure monitoring and management approach that is worth a look.

A Paler Shade of Green Storage

A greater use of the "delete" key may be the greenest data strategy of all.



Storage Security, Part 7: Confusing Encryption with Security

Confusing encryption with data storage security can be dangerous to your storage protection strategy.

Storage Security Part VI: Locking Down the Disk

One company offers a way to secure data when different classes of data have different security requirements.

Storage Security Part V: Disk Encryption

Seagate’s announcement of Momentus drives with DriveTrust technology holds promise for enabling IT to secure data at rest

Storage Security Part IV: Encrypt on the Target

The best place for tape-based data encryption may well be on the media itself, but until key management issues are worked out, the strategy binds you to a particular vendor’s key management system for the foreseeable future. Our storage analyst, Jon Toigo, takes a closer look.

Storage Security in a Box? (Part III in a Series)

Placing storage security in the network is another option for locking down your data

A Seuss-ian View of Storage Security

One of the big puzzles of storage security is how best, architecturally speaking, to deploy the technology. BitArmor answers our questions.

Securing Storage, Part II: Encryption is Only a Start

Storage security needs a more systemic view to succeed.

Rumors of War Underscore Data Security Issues

Our storage analyst, Jon Toigo, begins a series on data security issues and solutions.

Building an Archive: End of a Six Part Series

Is the obvious so difficult to understand? Obviously, yes.

Building an Archive Strategy, Part V: The Devil in the Details

What every storage admin must ask: what must we save and where shall we save it?

Bolted-on Archive Solutions: Ingestion Indigestion—Part IV of a Series

As with everything else in IT, performance is a key consideration when selecting a backup solution. Finding a reliable measure, however, is problematic.

Behind CA’s Storage Reshuffle

The move will likely have mixed impact on most CA customers, although mainframe shops should expect some benefits

Built-in Archiving: Use at Your Own Risk -- Part III of a Series

Can non-native archive management software improve the performance of the e-mail server by automatically archiving messages without user intervention?