Premium Content

Access "Solid-state goes mainstream"

Rich Castagna, Editorial Director Published: 13 Oct 2012

If a tech is judged by the products that crop up around it and the techs it spawns, then it’s hard to argue that solid-state storage hasn’t reached a certain level of maturity. There’s a great scene in Jean Shepherd’s A Christmas Story where Ralph and his buddies convince Flick to lick a metal flagpole on a cold, snowy day to disprove the old tale that a wet tongue will stick to cold metal. Of course, they end up proving that it’s actually true and Flick gets stuck to the flagpole, fire department racing to the scene. Being the first to do something, or succumbing to the dares of others and taking the first steps, can be pretty scary -- and the results can be unpredictable. But in the world of IT you do have a choice: You can play it safe and keep buying “traditional” technology from well-established vendors, or you can take a chance on a startup or some new-fangled technology. Solid-state storage was like that ice-cold flagpole, with lots of people looking at it and talking about it but not so many ready to make the leap. It’s new stuff, and data storage ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • The next frontier for managed print services
    The-next-frontier-for-managed-print-services-(1361197877_756).jpg
    E-Handbook

    The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation ...

  • World-Class EA: The Agile Enterprise
    World-Class-EA---The-Agile-Enterprise-(1360587978_371).jpg
    E-Handbook

    The concept of “agile” has recently come to the fore, typically in connection with technical activities, such as software development. Subsequently, ...

  • Security Visualisation
    Security-visualisation-(1358519141_684).jpg
    E-Handbook

    This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. ...