Storage Technology Tips | Page 9


  • How to create a SAN performance baseline

    To understand SAN performance and what is normal SAN behavior, you must have a performance baseline.

  • Tutorial: Creating a tiered SAN architecture

    This tip offers the pros and cons of a tiered SAN architecture, as well as a number of points to consider before creating a tiered SAN.

  • Choosing a low-end NAS product

    Many low-end NAS products are designed for personal or home office use. However, there are some products on the market suitable for certain SMB or enterprise-level applications. Learn what you need...

  • How to reduce response time in a SAN

    When it comes to storage area network (SAN) metrics and measurements, such as bandwith, input/output per second (IOPS) and utilization, more is usually better. However, when it comes to response ti...

  • How to choose and implement a NAS aggregator

    Rick Cook details network-attached storage (NAS) aggregator basics, suggests things to consider before implementing a NAS aggregator, and outlines the major players in the market.

  • How to choose an e-discovery tool

    Here is a list of factors to consider when choosing an e-discovery tool.

  • Ten reasons storage security is critical

    Storage expert Kevin Beaver outlines 10 reasons you need to step up your storage security game.

  • What you need to know about 10 GigE IP SANs

    Rick Cook provides an overview of the state of 10 GigE today, outlines the benefits and limitations of 10 GigE and offers some insight into the future of IP storage networking.

  • How to reduce risk with storage security policies

    This tip outlines the importance of storage security policies and offers advice on how to make sure your storage security policies reflect real-world storage needs.

  • Outsourcing backup: Get the right service level agreeme

    This podcast offers information on how to make sure that a SLA meets your needs and requirements with outsourcing backup.

  • How to increase your storage energy efficiency

    You can improve your storage energy efficiency by spinning down and powering off disk drives not in use, placing disk drives into a slower mode and using RAID levels and tiered storage.

  • Why you should perform data classification

    Regardless of how daunting a task it may be, understanding the data we store is the first step in addressing data management issues. This tip outlines some of the main reasons why data classificati...

  • Using SAS and SATA for tiered storage

    This podcast offers detailed information about SAS and SATA so you can strike the right balance between SAS and SATA in a tiered storage environment.

  • RAID levels defined

    This tip offers a listing of the RAID levels in use today and details the characteristics and applications of each.

  • How to choose the correct RAID level

    This tip offers nine things to consider when deciding which RAID level is right for your organization's needs.

  • What to expect from a storage audit

    This tip outlines the three main types of storage audits, what you stand to gain from each type and offers insight into the audit process.

  • Laptop encryption the hard(ware) way

    This tip explains the pros and cons of hardware-based laptop disk encryption and offers an overview of products on the market today.

  • How to secure laptops in seven steps

    This tip outlines seven essential steps for protecting your company's laptops and offers practical advice on what you can do to get beyond the basics and develop a new mindset about laptop security.

  • RAID: It's alive

    RAID is still relevant today, possibly even more than in the past. However, it has become a transparent, standard feature that isn't often discussed. This tip outlines the state of RAID today.

  • Look at the big IT picture to ensure storage security

    Though storage administration and information security are often handled by two separate groups, getting storage administrators onboard with storage security can greatly help reduce risk of a breach.