Pro+ Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 5 No. 6 August 2006

New CAS players avoid hash lock-in

IN 2004, cryptographic researchers announced they had discovered a flaw in the popular MD5 hashing algorithm that allowed it to be "cracked" in a matter of hours. Questions were immediately raised about Centera, EMC's archiving platform that relied on MD5 to create a "content address" of an object to ensure its authenticity. Whether or not the MD5 crack means anything to Centera customers is a matter of opinion. First of all, Centera no longer uses MD5, but a proprietary version of SHA-256. Even so, it would be exceedingly difficult for someone to take advantage of the MD5 vulnerability and, say, remove incriminating evidence stored on a Centera. But from a compliance standpoint, the algorithm used to create a content address must be unassailable, says Paul Carpentier, CTO at Caringo, an Austin, TX-based content-addressed storage (CAS) startup. "As it stands, an expert today cannot say 'Beyond a shadow of a doubt, this is the original document.'" It should come as no surprise, therefore, that newcomers to the CAS space have been...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Virtualization: Tales from the trenches

    We profile five companies that have deployed, or are currently testing, storage virtualization and analyze their implementation experiences. The storage pros behind these efforts tell us how the products they chose are working in their production environments.

  • New CAS players avoid hash lock-in

  • A step-by-step approach to data classification

    The most common shortcoming of a data classification project is the perception that it can be completed through technical analysis at the storage layer without engaging business users. While discovering and analyzing storage is part of the process, good classification requires engaging business users or their IT representatives.

  • Automate data recovery

    Policy-based storage management can automate the data recovery process. But you need to know what types of policies various products support, where the policy manager resides and what it's capable of doing.

  • NetApp spins out Ontap GX

  • Data migration: Proceed with caution

    This first of a three-part series on data migration products focuses on host-level data migration products. Data migration apps can automate, centralize and simplify data migrations while ensuring data integrity.

Columns in this issue

  • Getting started with database archiving

    E-mail archiving gets a lot of the attention these days, but databases shouldn't be overlooked. Database administrators end up managing old and unchanging data within their production databases, so backups are constantly protecting data that hasn't changed.

  • Standards efforts undermined

    Standards efforts undermined

  • More than 50% of the time electronic discovery requests aren't satisfied.

    Storage Bin: In the last year, 91% of large corporations have been through an electronic discovery request. Thirty-three percent of these companies go through one or more requests per month, while 66% of midmarket companies have the same issue. And more than 50% of the time, the requests aren't satisfied.

  • How to count the cost of storage

    by  Stephen Foskett

    The cost of each gigabyte of storage is declining rapidly in every segment of the market. Enterprise storage today costs what desktop storage did less than a decade ago. So why are overall costs increasing?

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

-ADS BY GOOGLE

Close