PRO+ Premium Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 6 No. 11 January 2008

Storage standards: A progress report

Four storage standards (SMI-S, XAM, encryption key management and FAIS) promise to make it much easier to manage storage and data. Several storage standards are emerging that will help storage administrators manage data more efficiently. According to Vincent Franceschini, chairman of the board of the Storage Networking Industry Association (SNIA), a "standards ecosystem" is slowly developing that will allow heterogeneous storage products to better communicate with each other, as well as to protect data and more easily find it. They're lofty goals and progress is measured in baby steps. What follows is an update on four important major standards: the Storage Management Initiative-Specification (SMI-S), eXtensible Access Method (XAM), encryption key management and the Fabric Application Interface Standard (FAIS). Standard 1: SMI-S The most comprehensive of the four standards discussed in this article is SNIA's SMI-S. The ultimate goal of SMI-S is to let applications manage heterogeneous storage environments. It provides ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • 8Gb/sec Fibre Channel widens lane for SAN traffic

  • Unlimited storage

    Clemson University has big plans as it upgrades its data center—and those plans call for lots and lots of storage. Their new IT infrastructure is being built along the lines of the National Science Foundation's Cyberinfrastructure initiative. Clemson expects its new world-class facility to attract a new crop of young faculty who will find the storage, bandwidth and CPU resources needed to support their research efforts.

  • Taming storage virtualization

    Where storage virtualization should reside and how it should be applied depends on the size of the storage infrastructure, the type of applications running in it, and the levels of control and visibility required by administrators. We look at the leading storage virtualization products and help you decide which technology may be best for your storage shop.

Columns in this issue