Pro+ Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 6 No. 11 January 2008

Editorial: Welcome to archiving hell

Welcome to archiving hell So you have an email archiving system in place and the archived missives and related attachments are safely tucked away on a content-addressed storage (CAS) or similarly secure storage system. Toss in a slick search tool and maybe an ediscovery app and you're ready for anything a regulatory agency or contentious court of law could throw at you, right? Hopefully. Maybe. Then again, probably not. While email has attained mission-critical status in most companies, instant messaging (IM) and digital phone systems haven't. And all three have something in common: They translate to digital storage in your systems. And digital stuff sitting on spinning disk has a chance of becoming crucial evidence. Archiving only email could mean your company is exposed on those other two corporate communications fronts. And depending on how much your company uses IM and VoIP, that exposure could be considerable. The VoIP part should be pretty easy to determine as all incoming messages are saved to disk, and many VoIP systems ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • 8Gb/sec Fibre Channel widens lane for SAN traffic

  • Unlimited storage

    Clemson University has big plans as it upgrades its data center—and those plans call for lots and lots of storage. Their new IT infrastructure is being built along the lines of the National Science Foundation's Cyberinfrastructure initiative. Clemson expects its new world-class facility to attract a new crop of young faculty who will find the storage, bandwidth and CPU resources needed to support their research efforts.

  • Taming storage virtualization

    Where storage virtualization should reside and how it should be applied depends on the size of the storage infrastructure, the type of applications running in it, and the levels of control and visibility required by administrators. We look at the leading storage virtualization products and help you decide which technology may be best for your storage shop.

Columns in this issue

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

-ADS BY GOOGLE

Close