EGUIDE:
RAID has been a mainstay of data protection for decades, but now its days may soon be numbered. In the May 2010 cover story of Storage magazine, Marc Staimer details the various issues of traditional RAID today and highlights how alternative technologies aim to address these problems. More...
WHITE PAPER:
Today’s most popular backup storage targets featuring deduplication, however, don’t address the long-term operational issues that are sure to arise as secondary storage environments expand.
WHITE PAPER:
Get help measuring the performance of your software-based storage and traditional hardware-based storage to better predict your current and future storage needs.
PRESENTATION TRANSCRIPT:
Please read this presentation transcript, in which Andrew Burton, features editor for searchstorage.com, interviews Greg Shulz, Founder and Senior Analyst with Storage Dial Group, about RAIDS. Shulz will provide a synopsis of the different RAID levels, their characteristics and when to use each level?
WHITE PAPER:
This document provides information on Dell's PowerVault MD3000i Plus MD1000 storage solution for Microsoft Exchange Server 2007, based on Microsoft Exchange Solution Reviewed Program (ESRP) Storage program.
EGUIDE:
SQL Server performance is highly dependent on how you configure your server's storage subsystems. With that in mind, this e-guide dives into a benefit/cost comparison of the increasingly popular solid-state drive (SSD) trend and explains some of the top mistakes people make when purchasing hardware for SQL Server.
WHITE PAPER:
One approach being used to reduce complexity and TCO in the data center is the implementation of new management software for blade servers, increasing business value and trimming expenses that vex IT budgets and divert important resources for transformational projects.
WHITE PAPER:
In this brief white paper, you will discover tiering strategies that have emerged as an indispensable tool to cost-effectively harness the massive data growth.
WHITE PAPER:
As there are many ways of using VMware technology, there are just as many methods available for protecting this innovative technology. System administrators and IT technologists can use this paper to determine one of three recommended solutions for protecting VMs. Each of these technologies has relative advantages and disadvantages.