Pro+ Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 5 No. 8 October 2006

Vendors debate different XAM strategies

Developing standards in the storage industry is like achieving consensus at the United Nations--it takes a while. The Extensible Access Method (XAM) Interface, which would define a single access method for archiving devices like EMC's Centera and Hewlett-Packard's (HP) Reference Information Storage System (RISS), is no exception. On the surface, XAM appears to have everyone's support. EMC, HP, Hitachi Data Systems (HDS), IBM and Sun Microsystems are all in the same camp. All agree that a single API--instead of proprietary APIs developed by each vendor--will grow the market much faster. Application providers will only have to write to one API and, more importantly, users will be able to move data from one archival device to another (from Centera to RISS or vice versa) without much hassle. Today, users would have to convert all of the data into the format of the new device, changing addresses and hashes and potentially compromising the integrity of the data in the process. Carl Follstad, manager of data management services at the ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Survey Says: Users name their 10GbE price

  • The right way to provision storage

    Provisioning storage is still mostly a manual job, but solid planning, including the right interested parties and some improved tools, can help ease the chore. Follow these provisioning best practices to gain greater performance and higher disk utilization.

  • Long-term archiving

    With some legislative requirements mandating data be kept for as long as 70 years, your organization needs an archiving plan that defines what data needs to be kept and why. But don't overlook how you'll restore old data when it needs to be accessed.

  • How to manage encryption keys

    Encryption is an effective way to secure data. But managing encryption keys can be a major undertaking. While there are no encompassing key management tools available yet, some apps can help you keep track of proliferating encryption keys.

Columns in this issue

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

-ADS BY GOOGLE

Close