Storage Technology Tips | Page 35


  • Here comes ILM

    Information lifecycle management and what it means to you.

  • Utility computing: Charge for storage?

    Bits & Bytes: Analyst Jamie Gruener takes a close look at the hype and hope surrounding utility computing and what storage managers and admins should be doing now to prepare.

  • Securing SAN's with iSCSI

    Bits & Bytes: According to Peter Hayden, correctly configured, iSCSI-based arrays offer the highest level of security available in SAN technologies. Read why here.

  • Audit your SAN's security risks

    This tip describes checklists for auditing the security of your storage area networks (SANs).

  • DR: One size doesn't fit all, but it fits most

    Bits & Bytes: The "one size fits all" DR debate continues. This time consultant Kevin Fox weighs in on how to think about establishing a DR plan should you be without one now.

  • Questions surround digital rights mgt.

    Bits & Bytes: Questions abound about digital rights management. John Weinhoeft takes a look at what you need to ask yourself about long-term content management.

  • Tune up your iSCSI storage router

    Cisco's SN 5400 storage router is a popular choice for iSCSI under Windows 2000. However by tuning the iSCSI driver you can improve its performance.

  • EBSI: Is it right for you?

    This tip offers advantages and disadvantages of the new backup initiative and products coming from the Enhanced Backup Solutions Initiative (EBSI).

  • The benefits of WORM disk

    New read-once write-many (WORM) disk is gaining regulatory acceptance. Read about the two WORM disk leaders, EMC's Centera and Net App's SnapLock here.

  • Critical design tasks in DR

    Jon Toigo digs into the second phase of his three-phase planning model: The design phase. He also explains which DR design tasks are critical for those doing DR on a budget.

  • In-band telecom

    Bits & Bytes: Jerome Wendt walks you through in-band telecom. It may be right for you if you are running multiple OSes and a heterogeneous SAN. But, it does have its pitfalls.

  • Avoid circular hierarchy references

    This tip describes an important caveat when dealing with tiered storage hierarchies and moving storage to various volumes: Avoid circular references.

  • Upgrading backup media? Avoid pitfalls

    This tip offers considerations for changing tape formats or backup media, and how best to avoid problems when converting your data to new formats.

  • Stop data leaks by sanitizing media

    Are you doing everything you need to scrub your disks and other storage media of confidential company information? This tip offers some advice on sanitizing media.

  • Staking a claim to global namespace

    Global namespace is the storage management idea of centralizing storage on the file level that allows admins to see distributed storage as one pool.

  • Compliance buying decisions

    Bits & Bytes: SAN expert Christopher Poelker walks you through the best methods for making compliance-related storage purchase.

  • The business side of storage security

    Be safe, not sorry -- addressing the business side of storage security

  • Get 'forensic' data for rapid recovery

    Bits & Bytes: A few storage startups are pioneering forensic data, or "rapid recovery" technology, which could allow for easier data retrieval and rollback in case of corruptions.

  • No easy answer for storage security

    Bits & Bytes: Expert Randy Kerns lists four security elements that should be considered when planning a storage security strategy.

  • Compliance drives storage market

    In this research note, Yankee Group Senior Analyst Jamie Gruener describes the storage impact of recent compliance legislation such as the Sarbanes-Oxley Act.