Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Conquer the endpoint backup challenge

        Endpoint backup has typically been left to end users or ignored altogether. However, the increased use of smartphones and tablets is driving interest in the technology. Also, the software is evolving and converging with other technologies aimed at increasing user productivity. One challenge for backing up laptops and mobile devices is that they aren't always connected to a corporate network. They must be backed up over the Internet -- which can be troublesome -- or when they reconnect. Depending on how much time passes between backups, this could leave a good deal of data unprotected.

        This handbook looks at how vendors are addressing the challenges associated with backing up these devices, the convergence of mobile backup with file sharing and security, confusion about the difference between file sync and backup, and how to choose a solution that is right for your organization's needs.

        View E-Handbook
      • Overcome today's disaster recovery challenges

        The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups within a reasonable timeframe has become an issue for organizations. Some organizations are opting for alternatives to traditional backup to address these challenges. The cloud has been pushed as an alternative to tape for offsite storage for disaster recovery. However, there are challenges with this approach and with protecting applications running in the cloud.

        View E-Book
      • Open Trusted Technology Provider Standard (O-TTPS)

        The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global supply chain and the integrity of Commercial Off-The-Shelf (COTS) ICT products. It provides a set of guidelines, requirements, and recommendations that help assure against maliciously tainted and counterfeit products throughout the COTS ICT product life cycle encompassing the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal.

        View E-Handbook
      • The identity perimeter

        Successful businesses recognise the value of open communications within and beyond their organisations. However, achieving this means that the physical and virtual perimeters that had previously defined the reach of most organisations’ IT systems have disappeared. This report makes the case for the use of identity and advanced single-sign-on (SSO) to overcome many of the issues of providing open integration between businesses and their customers and partners. It should be of interest to all those in roles charged with the responsibility of providing secure access to online resources and to those who want to make the case for rolling out new online services, but have to overcome the security concerns of others in their organisation before they get the approval to do so.

        View E-Handbook
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • E-book: Focus on virtual machine storage

        Virtualization puts new demands on storage, so whether you opt for FC, iSCSI or NAS, storage will be a key factor for your virtual environment. Read this e-book for expert tips and suggestions on managing storage for virtual servers and virtual desktops including, ten things to know about storage for VMs and choosing NAS for virtual machines.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 4
      Page 1 of 4
    • Page 1 of 1
      • The benefits of data archive storage

        Data archiving is firmly entrenched as a storage management best practice. SearchStorage surveys indicate that 70% of companies use some form of archiving for email, file systems, databases or other applications. Archiving yields multiple benefits, such as effective storage tiering, adequate performance for applications, and enforcing regulatory compliance, corporate information management and preparedness.

        While a significant number of companies currently use some form of archiver, we've found that most companies are actively seeking to expand their data archive storage operations by adding archiving to address additional applications or file systems. In this buyer's guide, we describe the benefits of data archiving, the practical issues related to deploying archivers and other issues related to selecting and implementing data archiving.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 3
      Page 1 of 3
    • Page 1 of 18
      • A lesson in flash caching

        July 2014 Vol. 13 No. 5

        Includes:
        • What you need to know about flash caching
        • Use of solid-state technology continues to climb
        • Users pick Asigra and Veeam as top backup applications
        View E-Zine
      • Storage performance management: Ways to maximize your environment

        Making your storage perform to the very best of its ability is an age-old problem with a long list of ways to approach it. But how should you start to fine-tune a storage system and what do you need to know to get started?

        This handbook covers a range of storage performance management issues and workarounds, from storage tiering and data archiving, to solid-state drive placement and reconsidering the role of tape. We'll explore all the aspects of storage performance -- RAID types, I/O loads, cache sizes -- and compare them so data storage professionals can access helpful information on a variety of performance topics depending on the size of -- and unique demands on -- their data center.

        View E-Handbook
      Page 1 of 18
    • Page 1 of 1
      • Good match: iSCSI and vSphere

        Vol. 9 Num. 5 July/August 2010

        Includes:
        • Unified storage offers savings and efficiency
        • Hospitals strive for centralized image archives
        • Continuous data protection; it's back!
        View E-Zine
      • iSCSI: Ready for prime time?

        Vol. 7 No. 2 April 2008

        Includes:
        • Data management priorities: By The Numbers
        • Automate application recovery
        • Need persists for mainframe storage skills
        View E-Zine
      Page 1 of 1
    • Page 1 of 1
      • New crop of unified storage systems promise unprecedented flexibility

        A challenge that has long plagued storage administrators is that applications use storage in different ways. Some applications make use of storage at the block level, while others depend on file-level storage. Historically, the solution was to maintain two separate storage architectures. However, a new crop of unified storage systems promise to deliver an unprecedented degree of flexibility and to drive down storage management costs. This would seemingly make unified storage an obvious choice for storage admins struggling with disparate storage requirements; but, like many things in IT, vendor hype might not always be solidly based in reality.

        This report outlines the considerations and technical features that must be taken into account before investing in a unified storage appliance so you can obtain a clear picture of how and when they’re appropriate for your IT shop.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Scale-out storage systems deep dive

        Scale-out storage systems can accommodate data growth simply by adding more capacity resources; and processing power can be increased as needed. In this buyer's guide, check out the latest scale-out storage systems to help you decide the best technology for your organization. Get your most important questions answered about scale out network-attached storage (NAS), and learn about the common pitfalls to avoid.

        View E-Handbook
      • Why NAS virtualization is on the rise

        Vol. 9 Num. 6 September 2010

        Includes:
        • Quality Awards V: Compellent regains top midrange arrays spot
        • Top 10 tips for tuning your storage network
        • Aging RAID still an effective protection technology
        View E-Zine
      Page 1 of 1
    • Page 1 of 2
      • Primary storage dishes up dedupe

        Vol. 9 Num. 2 April 2010

        Includes:
        • Tape may be teetering, but it's still a big part of backup ops
        • Dedupe and compression cut storage down to size
        • SAN consolidation with director-class switches
        View E-Zine
      • Enterprise data storage capacity planning guide

        Maximizing your enterprise data storage capacity is more important than ever before. With the majority of storage budgets unable to keep pace with data growth rates, most storage administrators need to find ways to reduce capital and operating expenses to survive the economic downturn. Download this tutorial to learn more about tiered storage.

        View E-Book
      Page 1 of 2
    • Page 1 of 1
      • The past, present and future of RAID data protection

        Seemingly everyone working in IT knows the power of RAID, and setting various RAID levels continues to be a solid foundation of a data protection strategy. But RAID efficiency is being put to the test by rapidly expanding data stores, and the storage industry is racing to meet new demands by exploiting technologies such as wide striping, erasure codes and multi-copy mirroring. Erasure code technology, for example, is gaining traction in a slew of enterprise offerings. It's being presented to end users as a way to improve upon RAID systems that require an increasing number of disk drives to run and, in turn, allows for the possibility of problematic rebuild times.

        In this handbook on the past, present and future of RAID data protection, learn which RAID data protection options are viable today, which ones make sense for your shop, and how RAID can be replaced and improved upon.

        View E-Handbook
      • R.I.P. RAID?

        Vol. 9 Num. 3 May 2010

        Includes:
        • Storage tiering getting more automated
        • Storage managers can reach for their wallets again
        • Hard disk drive technology trends
        View E-Zine
      Page 1 of 1
    • Page 1 of 2
      Page 1 of 2
    • Page 1 of 1
      • Getting started with IT disaster recovery planning

        Whether you're new to IT disaster recovery planning or want to brush up on best practices, we have the answers for you in this essential DR planning guide. Learn how to create a DR plan, and get advice from experts. Discover how to make sure your data is safe in the event of a disaster. Read about the hottest technologies in IT disaster recovery planning, and learn about better disaster recovery strategies, whether your organization is big or small.

        View E-Book
      • Choosing the best disaster recovery planning tool

        Vol. 7 Num. 12 January 2009

        Includes:
        • Consolidated archiving
        • Green is still the color of money in storage
        • Disaster recovery site options
        View E-Zine
      Page 1 of 1
    • Page 1 of 2
      Page 1 of 2
    • Page 1 of 1
      • Best practices for cloud backup integration

        Vol. 11 Num. 2 April 2012

        Includes:
        • Companies still rely on good ol’ NAS
        • Integrated cloud backup
        • Storage for big data
        View E-Zine
      • Better data protection strategies with CDP and deduplication

        Continuous data protection (CDP) and data deduplication are chief among the technologies that data storage managers are investigating when it comes to improved data backup and storage efficiency. In this expert e-book, learn how CDP and deduplication have evolved, and determine the best implementation strategy for your shop. Get your most important data protection questions answered, and learn about better data protection strategies for your enterprise.

        View E-Book
      Page 1 of 1
    • Page 1 of 2
      • Status report: Solid-state storage

        Vol. 10 Num. 8 October 2011

        Includes:
        • Solid-state goes mainstream
        • Storage tiering gets more sophisticated and automated
        • Status report: Solid-state storage
        View E-Zine
      • E-book: Making the case for solid-state storage

        This all-encompassing SearchStorage.com e-book will cover the bases of solid-state drives (SSD). Learn more about how to build a business case for solid-state storage, adding SSD drives instead of disk drives, how to implement NAND flash, and the benefits and fallbacks of standalone SSD arrays.

        View E-Book
      Page 1 of 2
    • Page 1 of 2
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 2
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1

Featured E-ZINES on searchStorage.comView all >>

  • Storage magazine

    Storage magazine keeps IT and storage managers up to date on new storage technologies, and how those techs can meet emerging business requirements.

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchStorage.comView all >>

  • Overcome today's disaster recovery challenges

    The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups within a reasonable timeframe has become an issue for organizations. Some organizations are opting for alternatives to traditional backup to address these challenges. The cloud has been pushed as an alternative to tape for offsite storage for disaster recovery. However, there are challenges with this approach and with protecting applications running in the cloud.

  • Cloud storage challenges and choices

    Our comprehensive e-book tackles the cloud storage challenges and business decisions that surround cloud storage investments, and breaks them into three areas of concentration: architecture, availability and return on investment.

    Get the latest updates on architectural choices when using the cloud for storage, including cloud controllers and application programming interfaces. We provide a short list of technical capabilities to look for in a cloud controller and questions to ask your service provider. Learn which metrics your peers are using to determine if cloud storage projects are meeting their potential, and what sort of service levels you can expect from providers or hybrid projects. Discover how to leverage the most cutting-edge cloud technologies and how not to get taken advantage of when choosing a cloud storage strategy/service.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchStorage.comView all >>

  • Conquer the endpoint backup challenge

    Endpoint backup has typically been left to end users or ignored altogether. However, the increased use of smartphones and tablets is driving interest in the technology. Also, the software is evolving and converging with other technologies aimed at increasing user productivity. One challenge for backing up laptops and mobile devices is that they aren't always connected to a corporate network. They must be backed up over the Internet -- which can be troublesome -- or when they reconnect. Depending on how much time passes between backups, this could leave a good deal of data unprotected.

    This handbook looks at how vendors are addressing the challenges associated with backing up these devices, the convergence of mobile backup with file sharing and security, confusion about the difference between file sync and backup, and how to choose a solution that is right for your organization's needs.

  • Open Trusted Technology Provider Standard (O-TTPS)

    The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global supply chain and the integrity of Commercial Off-The-Shelf (COTS) ICT products. It provides a set of guidelines, requirements, and recommendations that help assure against maliciously tainted and counterfeit products throughout the COTS ICT product life cycle encompassing the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal.

OTHER FEATURED E-HANDBOOKS