Pro+ Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 5 No. 12 February 2007

Doubts about CDP persist

By most accounts, continuous data protection (CDP) is the next great must-have technology. Yet research suggests users aren't exactly jumping on the bandwagon. Sixty-seven percent of Storage readers aren't currently using a CDP product, and of that number 37% have no plans to start (see "Snapshot: Is CDP part of your backup?" Storage, December 2006). That figure is corroborated by last fall's Storage Purchasing Intentions survey in which 22% of respondents said they have or will implement the technology, and 45% said they plan to evaluate it (see "What storage managers are buying and why," Storage, October 2006). Though these numbers might suggest that user interest hasn't caught up with CDP's technological momentum, users say they're interested, just unclear as to where the technology fits into their backup strategy. "A number of end users believe that CDP is just another name for other data protection methods, such as snapshot or replication, or, even in some cases, RAID," said Natalya Yezhkova, research manager, Storage ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Integrating iSCSI and FC storage

    Mixing iSCSI with Fibre Channel (FC) allows you to make more efficient use of installed storage capacity, but marrying the two protocols isn't without its challenges. Bringing iSCSI into existing FC SANs raises integration issues and leads to a somewhat more complex storage infrastructure that requires IP and FC knowledge, as well as the ability to manage and troubleshoot a multiprotocol storage environment.

  • Removable disk vies with tape

  • Clustering ERP apps

    For mission-critical apps, availability is the key. Clustering those applications can ensure they stay up and running, but clustering often conjures up images of complex technologies and an environment that's fragile and complex. Still, for most companies, the benefits of clustering are profound enough to mitigate its risks.

  • Protect laptop data

    When your company's data is mobile, it's far more vulnerable, so protecting laptop data is critical. Protecting data on laptops is a two-pronged process: ensuring the data is always available using backup, and securing data from prying eyes through encryption.

Columns in this issue

  • Classified data: For your eyes only

    Classified data: For your eyes only

  • Are you taking the iSCSI plunge?

    iSCSI has grown from a theoretical standard into a real technology with real storage products. Although once considered by many to be a Fibre Channel killer, iSCSI has gained a substantial foothold without necessarily displacing Fibre Channel. Companies of all sizes are taking the plunge, and the iSCSI juggernaut appears to be unstoppable.

  • Latest technological innovations coming from Europe

    Storage Bin: If you want to know where the latest technological innovations are coming from, go to Europe.

  • From worm to worst

    by  Stephen Foskett

    Everyone thinks about online data in the same way: You write it, read it, rewrite it and keep it forever. But many organizations have far more data that's written once, read a few times and kept alive forever. You might say this bulk data is "write once, read several times" (WORST), and it can bloat your storage environment.

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

-ADS BY GOOGLE

Close