• September 26, 2006 26 Sep'06

    ISCSI gets a boost from InfiniBand

    The speedy InfiniBand protocol has already gained popularity in some bleeding-edge storage systems; a new spec will now standardize connection to iSCSI storage.  Continue Reading

  • September 25, 2006 25 Sep'06

    Iron Mountain aftermath: Be your own second layer of data protection

    After receiving reader feedback, Jerome Wendt continues with his thoughts on the Iron Mountain fire and offers advice for users sending their data offsite.  Continue Reading

  • September 25, 2006 25 Sep'06

    NetApp operations chief talks growth

    Tom Georgens, executive vice president and general manager at NetApp -- also rumored to be in the running as next CEO -- discusses what's driving its growth.  Continue Reading

  • September 22, 2006 22 Sep'06

    Virtual File Allocation Table (VFAT)

    Virtual File Allocation Table (VFAT) is the part of the Windows 95 and later operating system that handles long file names, which otherwise could not be handled by the original file allocation table file allocation table (FAT) programming.  Continue Reading

  • September 22, 2006 22 Sep'06

    storage virtualization

    Storage virtualization is the apparent pooling of data from multiple storage devices, even different types of storage devices, into what appears to be a single device that is managed from a central console.  Continue Reading

  • September 22, 2006 22 Sep'06

    Backups are not archives

    While it's possible to restore data from old backups, you shouldn't use them as archives. Leading storage expert W. Curtis Preston details the differences between the two technologies and explains why you need an e-mail archiving program.  Continue Reading

  • September 22, 2006 22 Sep'06

    Rethinking data protection strategies

    Thirty-one percent of organizations say they'll experience significant revenue loss or another adverse business impact within one hour or less of application downtime--it's no wonder organizations are "rethinking" their data protection strategies.  Continue Reading