Pro+ Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 5 No. 8 October 2006

School expels outsourced backup, enrolls CDP

"I'll never use tape again," says Jonathan Ferrara, IT director at the Revere School District in Massachusetts. Ferrara has used a variety of backup packages, including Symantec Backup Exec and Microsoft NT Backup, but with processes failing to complete or tapes failing, "there was always some sort of problem," he says. That led Ferrara to try outsourcing backup by sending encrypted backup streams across the Internet to a local hosting center, which in turn mirrored the data to North Carolina. "It worked great," he recalls. But after only about a year of use, Ferrara received a bill that was $10,000 more than his initial budget. "I just couldn't justify the cost," he says. Complicating the task were the purchasing procedures Ferrara had to follow. As a state agency, the district can choose to work with any vendor certified by the state's Operational Services Division; if a vendor isn't on that list, it must try to procure a contract from the lowest bidder. Ferrara's outsourcing provider lost that state-approved vendor status ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Survey Says: Users name their 10GbE price

  • The right way to provision storage

    Provisioning storage is still mostly a manual job, but solid planning, including the right interested parties and some improved tools, can help ease the chore. Follow these provisioning best practices to gain greater performance and higher disk utilization.

  • Long-term archiving

    With some legislative requirements mandating data be kept for as long as 70 years, your organization needs an archiving plan that defines what data needs to be kept and why. But don't overlook how you'll restore old data when it needs to be accessed.

  • How to manage encryption keys

    Encryption is an effective way to secure data. But managing encryption keys can be a major undertaking. While there are no encompassing key management tools available yet, some apps can help you keep track of proliferating encryption keys.

Columns in this issue

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

-ADS BY GOOGLE

Close