• September 26, 2007 26 Sep'07

    How to purchase a data encryption product

    Data security is now a critical problem for every company, regardless of size. This buying guide explores the factors involved in purchasing data encryption hardware and software products.  Continue Reading

  • September 26, 2007 26 Sep'07

    Fibre Channel technology

    This chapter offers an overview of Fibre Channel specifications and devices including HBAs and switches. Readers will also learn about the pros and cons of FC SANs in the storage enterprise.  Continue Reading

  • September 26, 2007 26 Sep'07

    Tape encryption tool purchase considerations

    Storage administrators who use tape-based encryption won't slow up their backups and will have peace of mind knowing that the tape content is secure. But LTO-4 tape drives have specific encryption issues.  Continue Reading

  • September 26, 2007 26 Sep'07

    How to reduce response time in a SAN

    When it comes to storage area network (SAN) metrics and measurements, such as bandwith, input/output per second (IOPS) and utilization, more is usually better. However, when it comes to response time and latency (the amount of time it takes to ...  Continue Reading

  • September 26, 2007 26 Sep'07

    SAN availability and reliability

    This chapter outlines some of the techniques and tactics used to achieve high availability and redundancy in a SAN (FC or iSCSI). These can include port aggregation, trunking, and failover.  Continue Reading

  • September 26, 2007 26 Sep'07

    Storage Decisions: guide to data storage product news

    Vendors at Storage Decisions are launching new NAS systems and data storage technologies such as heterogeneous snapshots and HBA-based authentication. Find out who's unveiling what in New York.  Continue Reading

  • September 25, 2007 25 Sep'07

    Session downloads from Storage Decisions in NYC

    Download all the sessions that were presented to storage professionals at the recent Storage Decisions 2007 conference in New York City on topics such as backup, data protection, archiving, storage virtualization, purchasing patterns, storage ...  Continue Reading