PRO+ Premium Content/Storage

Thank you for joining!
Access your Pro+ Content below.
Vol. 5 No. 8 October 2006

What storage managers are buying and why

By Rich Castagna, Editor in Chief, Storage magazine Like the proverbial certainties of death and taxes, storage managers can count on two factors affecting their budgeting bottom line: data growth and the need to protect that data. Those two themes weave in and out of the results of the second installment of Storage magazine's 2006 Purchasing Intentions Survey. -Disk spending trends -Who's the most favored vendor? -ISCSI buying patterns -Networking infrastructure outlook -Disk and tape together -2007 spending forecasts Our purchasing survey is administered twice a year: in the spring when budgets are fresh and optimism prevails, and in the late summer when hard reality forces some adjustments to planned projects and associated spending. Historically, our second survey has served to confirm technology planning and to point out where adjustments have been required. Overall, storage spending is up, with an average budget increase of approximately 5.2% indicated by respondents. That figure is marginally higher than the 5% ...

Access this PRO+ Content for Free!

Features in this issue

  • Survey Says: Users name their 10GbE price

  • The right way to provision storage

    Provisioning storage is still mostly a manual job, but solid planning, including the right interested parties and some improved tools, can help ease the chore. Follow these provisioning best practices to gain greater performance and higher disk utilization.

  • Long-term archiving

    With some legislative requirements mandating data be kept for as long as 70 years, your organization needs an archiving plan that defines what data needs to be kept and why. But don't overlook how you'll restore old data when it needs to be accessed.

  • How to manage encryption keys

    Encryption is an effective way to secure data. But managing encryption keys can be a major undertaking. While there are no encompassing key management tools available yet, some apps can help you keep track of proliferating encryption keys.

Columns in this issue