Pro+ Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 5 No. 8 October 2006

M&A stirs up standards

Wayne Adams, chairman of the Storage Networking Industry Association (SNIA), thinks mergers and acquisitions like the recent Brocade-McData deal are good for developing standards. "Where you might have had two strong opposing views, one gets taken out and then you can move along with less debate," says Adams, who is also a manager within EMC's Office of the CTO. That could happen to the Internet Fibre Channel Protocol (iFCP) standard, invented by Nishan Systems to extend Fibre Channel (FC) traffic over IP. McData acquired Nishan and since August 2003 has been selling its Eclipse SAN router. Brocade's SilkWorm Multiprotocol Router does the same thing, but supports Fibre Channel over IP (FCIP) instead. Experts seem to agree that iFCP is technically superior. FCIP encapsulates FC and forwards it over TCP/IP; iFCP translates 24-bit FC addresses to the Internet addresses of the IP protocol. iFCP may be the better mousetrap, but don't count on its survival--think VHS vs. Betamax. --Jo Maitland

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Survey Says: Users name their 10GbE price

  • The right way to provision storage

    Provisioning storage is still mostly a manual job, but solid planning, including the right interested parties and some improved tools, can help ease the chore. Follow these provisioning best practices to gain greater performance and higher disk utilization.

  • Long-term archiving

    With some legislative requirements mandating data be kept for as long as 70 years, your organization needs an archiving plan that defines what data needs to be kept and why. But don't overlook how you'll restore old data when it needs to be accessed.

  • How to manage encryption keys

    Encryption is an effective way to secure data. But managing encryption keys can be a major undertaking. While there are no encompassing key management tools available yet, some apps can help you keep track of proliferating encryption keys.

Columns in this issue

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

-ADS BY GOOGLE

Close