Portal:Storage
From Wikibon
(63 intermediate revisions not shown) | |||
Line 1: | Line 1: | ||
- | + | <meta name="description" content="The Wikibon Data Storage Portal contains data storage industry research, articles, expert opinion, case studies, and data storage company profiles." /> | |
- | < | + | <meta name="title" content="Data Storage Technology Research: Data Storage Portal" /> |
- | < | + | |
- | + | The Wikibon Data Storage Portal contains data storage industry research, articles, expert opinion, case studies, and data storage company profiles. | |
- | + | ||
- | + | ||
- | |||
- | + | '''Latest Information Storage Research''' | |
- | + | * [http://wikibon.org/wiki/v/Storage_Facts%2C_Figures%2C_Best_Practices%2C_and_Estimates Storage Facts, Figures, Best Practices, and Estimates] | |
- | + | ||
- | |||
- | + | {| class="wikitable" style="font-size: 80%; text-align: center; width: 95%;" | |
+ | ![[Image:LinkedIn.gif|100px|link=http://www.linkedin.com/groups?gid=835317&trk=hb_side_g]] | ||
+ | |[[Image:facebook.jpeg|100px|link=http://www.facebook.com/pages/Wikibon/6191646228]] | ||
+ | |[[Image:twitter.jpg|100px|link=http://twitter.com/wikibon]] | ||
+ | |[[Image:blog-2.jpg|100px|link=http://wikibon.org/blog]] | ||
+ | |- | ||
+ | |[http://www.linkedin.com/groups?gid=835317&trk=hb_side_g >>Join our Group] | ||
+ | |[http://www.facebook.com/pages/Wikibon/6191646228 >>Become a Fan] | ||
+ | |[http://twitter.com/wikibon >>Follow @Wikibon] | ||
+ | |[http://wikibon.org/blog >>Read the Blog] | ||
+ | |-} | ||
- | { | + | __NOTOC__ |
- | + | {| | |
- | + | |+ | |
- | + | | colspan="2" | <tipoftheday category="wikitips" /> | |
- | + | |+ | |
- | + | | width="50%" valign="top" | | |
- | + | ===Featured Case Study=== | |
- | + | [[Image:Student_union.jpg|250px]] | |
- | + | ==[[Virtualization Energizes Cal State University]]== | |
- | + | <p style="color: #666;">John Charles is the CIO of California State University, East Bay (CSUEB) and Rich Avila is Director, Server & Network Operations. In late 2007 they were both looking down the barrel of a gun. The total amount of power being used in the data center was 67KVA. The maximum power from the current plant was 75kVA. PG&E had informed them that no more power could be delivered. They would be out of power in less than six months. A new data center was planned, but would not be available for two years. </p> | |
- | + | [[Virtualization Energizes Cal State University | read more...]] | |
- | + | | valign="top" | | |
- | + | {{Storage professional alerts 2}} | |
- | + | |+ | |
- | + | | valign="top" | | |
- | < | + | ===Featured How-To Note=== |
- | + | [[Image:Storage_virtualization.jpg|left|250px]] | |
- | + | | | |
- | + | ==[[Storage virtualization design and deployment|Storage Virtualization Design and Deployment]]== | |
- | + | <p style="color: #666;">A main impediment to storage virtualization is the lack of multiple storage vendor (heterogeneous) support within available virtualization technologies. This inhibits deployment across a data center. The only practical approach is either to implement a single vendor solution across the whole of the data center (practical only for small and some medium size data centers) or to implement virtualization in one or more of the largest storage pools within a data center. | |
- | + | </p> | |
- | </ | + | [[Storage virtualization design and deployment | read more...]] |
- | + | |}[[Category:Backup and restore]][[Category: Blade computing]][[Category: Business compliance]][[Category: CDP]][[Category: Careers]][[Category: Careers wikitips]][[Category: Clustered storage]][[Category: Compliance and discovery]][[Category: Enterprise mobile wikitips]] | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | {{ | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | < | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | The | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | [[Category: | + |
Current revision as of 00:18, 23 February 2010
The Wikibon Data Storage Portal contains data storage industry research, articles, expert opinion, case studies, and data storage company profiles.
Latest Information Storage Research
![]() | ![]() | ![]() | ![]() | ||||
---|---|---|---|---|---|---|---|
>>Join our Group | >>Become a Fan | >>Follow @Wikibon | >>Read the Blog |
WikitipDiligence and securityIs your organization taking every reasonable step to provide technology security? Of course, there is no such thing as a perfectly secure network, but one of the best ways to satisfy the duty of reasonable protection of a network, beyond compliance, is the exercising of a number of fundamental security principles. Foremost of these principles is diligence. One key advantage to exercising heightened diligence is that the organization can use these initiatives to establish a better stance on security altogether. They are also able to respond to legal scenarios by demonstrating that it made good-faith efforts to provide security. Diligence can cover a wide spectrum of focus, but to generalize, staying aware of security and technology developments in the following areas will help an organization's security posture:
For example, typically protecting sensitive information, such as PCI-DSS data, requires agreements with vendors. These agreements are created to ensure security requirements. It is critical to isolate information security directives across physical, monitoring, and computing technology domains, with specificity for your organization’s needs. Minimizing risk is the bottom line, and no detail can be too small. If you have questions, ask. Review the practices your vendors use to support products on your network, and practices that you require of your partners. If you require a vendor to operate in an insecure mode, you may be liable for breaches of its security that can be tied to your requirements. Minimizing risk to the enterprise is the duty of a responsible and secure organization. This goes beyond typical reactive responses to breach events. It actually delves much further into the health of the organization, minimizing risk, and public perception.
|
Featured Case StudyVirtualization Energizes Cal State UniversityJohn Charles is the CIO of California State University, East Bay (CSUEB) and Rich Avila is Director, Server & Network Operations. In late 2007 they were both looking down the barrel of a gun. The total amount of power being used in the data center was 67KVA. The maximum power from the current plant was 75kVA. PG&E had informed them that no more power could be delivered. They would be out of power in less than six months. A new data center was planned, but would not be available for two years. |
|
Featured How-To Note |
Storage Virtualization Design and DeploymentA main impediment to storage virtualization is the lack of multiple storage vendor (heterogeneous) support within available virtualization technologies. This inhibits deployment across a data center. The only practical approach is either to implement a single vendor solution across the whole of the data center (practical only for small and some medium size data centers) or to implement virtualization in one or more of the largest storage pools within a data center. |