Storage Technology Tips | Page 35
  • Hadoop may present problems with big data projects

    Before deciding on Hadoop to tackle your organizations' big data analysis needs, review these points of concern, including data sources and sustainability.

  • Object storage benefits revealed

    When dealing with large data sets, you don't want to use system resources to examine all files to get your information. Object storage, and its unique identifiers, eases the process.

  • Working with EVO:RAIL's JSON files

    The proprietary EVO:RAIL JSON file format can be used for hyper-converged system configuration, but administrators need to be extremely wary of errors.

  • How to ease data lake concerns

    While IT might be more concerned with the cost of its data lake architecture, data durability and security should be the most important issues.


  • How to make sure your IP storage is se

    How to make sure your IP storage is secure

  • Here comes ILM

    Information lifecycle management and what it means to you.

  • The seasonality of product announcemen

    The seasonality of product announcements

  • Utility computing: Charge for storage?

    Bits & Bytes: Analyst Jamie Gruener takes a close look at the hype and hope surrounding utility computing and what storage managers and admins should be doing now to prepare.

  • Securing SAN's with iSCSI

    Bits & Bytes: According to Peter Hayden, correctly configured, iSCSI-based arrays offer the highest level of security available in SAN technologies. Read why here.

  • Audit your SAN's security risks

    This tip describes checklists for auditing the security of your storage area networks (SANs).

  • Questions surround digital rights mgt.

    Bits & Bytes: Questions abound about digital rights management. John Weinhoeft takes a look at what you need to ask yourself about long-term content management.

  • Tune up your iSCSI storage router

    Cisco's SN 5400 storage router is a popular choice for iSCSI under Windows 2000. However by tuning the iSCSI driver you can improve its performance.

  • DR: One size doesn't fit all, but it fits most

    Bits & Bytes: The "one size fits all" DR debate continues. This time consultant Kevin Fox weighs in on how to think about establishing a DR plan should you be without one now.

  • EBSI: Is it right for you?

    This tip offers advantages and disadvantages of the new backup initiative and products coming from the Enhanced Backup Solutions Initiative (EBSI).

  • The benefits of WORM disk

    New read-once write-many (WORM) disk is gaining regulatory acceptance. Read about the two WORM disk leaders, EMC's Centera and Net App's SnapLock here.

  • Critical design tasks in DR

    Jon Toigo digs into the second phase of his three-phase planning model: The design phase. He also explains which DR design tasks are critical for those doing DR on a budget.

  • In-band telecom

    Bits & Bytes: Jerome Wendt walks you through in-band telecom. It may be right for you if you are running multiple OSes and a heterogeneous SAN. But, it does have its pitfalls.

  • Avoid circular hierarchy references

    This tip describes an important caveat when dealing with tiered storage hierarchies and moving storage to various volumes: Avoid circular references.

  • Upgrading backup media? Avoid pitfalls

    This tip offers considerations for changing tape formats or backup media, and how best to avoid problems when converting your data to new formats.

  • Stop data leaks by sanitizing media

    Are you doing everything you need to scrub your disks and other storage media of confidential company information? This tip offers some advice on sanitizing media.

  • The business side of storage security

    Be safe, not sorry -- addressing the business side of storage security

  • Staking a claim to global namespace

    Global namespace is the storage management idea of centralizing storage on the file level that allows admins to see distributed storage as one pool.

  • Compliance buying decisions

    Bits & Bytes: SAN expert Christopher Poelker walks you through the best methods for making compliance-related storage purchase.

  • Get 'forensic' data for rapid recovery

    Bits & Bytes: A few storage startups are pioneering forensic data, or "rapid recovery" technology, which could allow for easier data retrieval and rollback in case of corruptions.