Pro+ Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 5 No. 4 June 2006

Lock up data with fixed-content storage

Content-addressed storage safeguards retention data and prevents its alteration. For most companies, fixed-content storage requirements are simple: Store the data securely, do it cheaply and provide fast access. With more data subject to external and internal audits, content-addressed storage (CAS) products are becoming the preferred storage medium for the long-term protection of fixed content. CAS products come in four different architectures: The redundant array of independent nodes (RAIN) architecture is the predominant way vendors offer CAS hardware. Inexpensive servers or nodes with high-capacity disk drives are clustered together; software locks the data stored on each node. As growth occurs, more nodes are added to the RAIN cluster. Network Appliance (NetApp) Inc. presents a network file system over an Ethernet connection on the front end while using WORM technology to lock the data down and data deduplication to optimize its capacity. The system accommodates growth by adding more disk capacity to NAS head configurations ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Deduplication extends to archives

  • Lock up data with fixed-content storage

    For most companies, fixed-content storage requirements are simple: Store the data securely, do it cheaply and provide fast access. With more data subject to external and internal audits, content-addressed storage products are becoming the preferred storage medium for long-term protection of fixed content.

  • Storage growth drives buying plans

    The results from our exclusive semi-annual Purchasing Intentions Survey are in. Storage growth is a key concern for storage managers, as additional capacity has a ripple effect that touches many other components in the storage environment.

  • Is encryption enough?

    Encrypting data at rest is definitely a reliable security measure, but it should be considered only one component of an effective storage security plan.

Columns in this issue

  • Time to think outside the box when it comes to data protection

    Storage Bin: The concept of "That's the way we've always done it" isn't going to work anymore, and it sure won't help you build an efficient disaster recovery plan. It's time to think outside the box when it comes to data protection.

  • The rise of the ultra-dense array

    by  Stephen Foskett

    Disk drives are getting smaller and smaller even as their capacities rise. Now storage vendors are packing more disks than ever into smaller spaces, which saves costly data center real estate. But the denser arrays also have a downside--higher power consumption and more heat.

  • A look at data classification products for e-discovery

    New technology products that look inside data can help you classify and manage that data more effectively. But these tools can also be leveraged for e-discovery, allowing specific data to be found and acted upon quickly to satisfy legal requirements.

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

-ADS BY GOOGLE

Close