Premium Content

Access "Storage Bin 2.0: The life and death of information"

Published: 22 Oct 2012

Four steps to keeping it simple. We make things too hard on ourselves. We sometimes exaggerate our own abilities and complicate our own processes to create a perception of increased value, rather than solve whatever issue needs to be fixed. When vendors do it, it's for a competitive advantage. On the user side, it's considered good for job security. But rational human beings consider it stupid. Take information lifecycle management (ILM). It's a simple-to-understand concept--information has a lifecycle, so manage it accordingly. Duh. Don't put Napster files on the systems running financials. Easy enough, right? Yet that simple premise has spawned countless debates, violent competition and, despite all that attention, seems to have created virtually no significant impact on IT whatsoever. So forget everything you've ever heard or considered regarding ILM, tiered storage, multilayered data and so on. Think about this instead: There are four simple stages of life for any kind of information. This rule applies no matter where information is born or how it lives;... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

  • Columns
    • Storage Bin 2.0: The life and death of information

      We sometimes complicate our processes to create a perception of increased value. Forget information lifecycle management and tiered storage; concentrate on the four simple stages of life for any kind of information.

    • Get your iSCSI game on: Best Practices by Ashish Nadkarni

      iSCSI is a mature protocol for accessing storage and a solid alternative to Fibre Channel. Technologies such as blade servers and server virtualization benefit from iSCSI as it lets you minimize the number of connections required. And because everything is IP-based, there's no more need to waste slots for host bus adapters, which simplifies your configuration.

    • The big pipe: Editorial

    • Backup gets a boost: Hot Spots by Lauren Whitehouse

      Snapshots, continuous data protection and deduplication are making their way into traditional backup products. By capturing, transferring and storing less data in the backup process, organizations can back up more data to disk--retaining data on disk for longer periods of time or enabling disk-to-disk backup for more sets of data than before.

More Premium Content Accessible For Free