Access "Midrange rivals top dog"
This article is part of the Vol. 6 No. 3 May 2007 issue of Tips for lowering the cost of storage support contracts
It's getting harder to distinguish between a low-end enterprise array and a high-end midrange array--but there are still some important differences. High-end midrange arrays and low-end enterprise arrays look awfully similar these days. During the last few years, features like clustering, mirrored cache, replication and snapshots have trickled down from enterprise arrays, while low-priced SATA drives have moved up to enterprise arrays to further confuse the already somewhat arbitrary array classifications. How we define high-end midrange arrays Identifying which high-end midrange arrays to include in this article wasn't easy. Depending on how they're defined, there are from 40 to almost 100 different midrange array models. This article focused on models that users would most likely consider an upgrade to their current midrange model or as a replacement for an enterprise-class storage array. We used the following four general characteristics as the criteria to define high-end midrange arrays: The midrange array must contain two controllers in an active-active... Access >>>
Premium Content for Free.
- 10 ways to get the best storage price
- Backup reporting tools cast wider nets
Snapshot: Email archiving on the rise with users
Email archiving on the rise with users
Secure iSCSI storage
One of the raps against iSCSI storage is that it's not as secure as Fibre Channel SANs. But iSCSI can be as secure as you want it to be. It was built from the ground up with strong authentication and encryption capabilities that work … as long as they're used.
- Know when to hold 'em...
- More laptop backup options
Survey Says: WAFS adoption picks up
WAFS adoption picks up
- Storage rethinks power strategies
Midrange rivals top dog
Midrange arrays are encroaching on enterprise storage territory. Today's high-end midrange arrays and low-end enterprise arrays might look very similar. Features like clustering, mirrored cache, replication and snapshots have trickled down from enterprise arrays, while low-priced SATA drives have moved up to enterprise arrays.
- Users test deduplication limits
Negotiating for support
Over a period of just a few years, the amount you spend on support contracts could equal or even exceed the price of the product itself. But storage support contracts are usually optional, and both the extent of coverage and its cost are definitely negotiable. A little hard bargaining and creativity, along with the leverage of seeking maintenance from a third-party support company, can go a long way toward knocking down your support costs.
Storage managers in control
For the first time in five years, the amount of capacity storage managers plan to add this year dropped, according to the results of Storage magazine's latest Purchasing Intentions Survey. To be sure, the decrease was more of a sign that relief may be on the way for storage managers who have spent the last few years trying to keep up with runaway storage growth.
- Survey Says: WAFS adoption picks up
Hot Spots: Time to learn from Microsoft's mistakes
by Jon Oltsik
Security is a cradle-to-grave commitment that spans products, processes and personnel. Microsoft has proved that you can turn on a dime and remedy security shortcomings, and now some leading storage vendors are following its example.
Storage Bin: 50 years of right is now very wrong
A huge portion of the issues we face today in storage and throughout our infrastructure are caused by us trying to use the same systems, architectures and methodologies we're used to for data that has all new requirements.
Editorial: Top 10 reasons to find another vendor
Top 10 reasons to find another vendor
Best Practices: Protecting SharePoint data
SharePoint's collaboration framework is gaining in popularity, but it has a number of data protection challenges that can result in significant levels of complexity rather quickly. Storage and data protection groups must work with application teams to plan an effective data protection strategy.
- Hot Spots: Time to learn from Microsoft's mistakes by Jon Oltsik
More Premium Content Accessible For Free
One of the biggest challenges of building a virtual server infrastructure is fine-tuning the storage that supports the virtual machines. Having ...
Cloud storage, virtualization and the growth of unstructured data have contributed to the way storage architectures are built and used. Virtual ...
While the concept of data archiving has existed for decades, archiving practices that were once considered standard are becoming inadequate. Factors ...