Peer Incite archive

From Wikibon

(Difference between revisions)
Jump to: navigation, search
(misc)
 
(380 intermediate revisions not shown)
Line 1: Line 1:
-
The following are notes from Wikibon's weekly storage research meeting.  
+
The following are research notes from Wikibon's [[Peer Incite]] research meetings. The objectives of Peer Incites is to share information and best practices that can help customers apply technology to create business solutions.  
-
If you would like to receive the Peer Incite Newsletter each week, please '''[http://www.wikibon.org/peer-incite_sign-up/peer-incite_sign-up.html Signup]'''
+
Peer Incites are normally scheduled for the 1st & 3rd Tuesday of every month. These meetings are an open, moderated phone forum where a guest practitioner presents a premise to the community. Anyone can participate in the call, have a voice, ask questions or comment. The content of the call is ultimately geared toward the customer. The goal is to catalyze thought and action items that the community posts on Wikibon after the call.
-
[[Future Peer Incite topics]]
+
Peer Incite calls are not vendor sponsored events, however Wikibon clients are allowed an opportunity to suggest topics and invite their customers to host calls.
-
----
+
 +
Since we launched Wikibon, we've hosted many dozen Peer Incites attended by several thousand IT professionals. Thanks to everyone who participated and contributed content.
 +
 +
*If you'd like to participate or present, please [http://wikibon.org/report/ Contact Us].
 +
 +
*If you would like to receive the Peer Incite Newsletter, please Signup in the Peer Incite Newsletter box in the lower right column.
 +
 +
*Check out proposed [[Future Peer Incite topics|topics]] and [[Upcoming Peer Incites]].
 +
 +
----
{|border="1" cellpadding="3"
{|border="1" cellpadding="3"
-
|+'''2007 Storage Peer Incite Newsletters'''
+
|+'''Storage Peer Incite Newsletters'''
|-
|-
-
!width="55"|Date
+
!width="60"|Date
-
!width="350"|Topic
+
!width="450"|Research Notes
-
!width="90"|Audio/Summary
+
!width="80"|Audio/Short
 +
!width="30"|Length
 +
!width="30"|Audio/Full 
!width="30"|Length
!width="30"|Length
|-
|-
-
|09-18-07||[[Storage resource mgmt]]||{{Click||image=Icon_listen.gif|link= Media:08-28-07.mp3‎ | width=67px|height=16px}}||00:00
+
|07-30-13||[[Enhancing Cloud Services with Hybrid Storage]]||||||||00:00:00
|-
|-
-
|09-11-07||[[Infrastructure for email archiving]]||{{Click||image=Icon_listen.gif|link= Media:08-28-07.mp3‎ | width=67px|height=16px}}||00:00
+
|04-23-13||[[Software is Eating the World - Will Amazon Eat Enterprise Infrastructure]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 04-23-13.mp3‎|width=67px|height=16px}}||00:56:54
|-
|-
-
|09-04-07||[[Virtual tape strategies]]||{{Click||image=Icon_listen.gif|link= Media:08-28-07.mp3‎ | width=67px|height=16px}}||00:00
+
|01-22-13||[[Commercial Applications And Hyper-Scale Storage]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 01-22-13.mp3‎|width=67px|height=16px}}||00:53:46
|-
|-
-
|08-28-07||[[Continuous data protection]]||{{Click||image=Icon_listen.gif|link= Media:Continuous_Data_Protection_summary.mp3‎ | width=67px|height=16px}}||04:35
+
|12-18-12||[[Quieting Noisy Neighbors In Cloud Services]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 12-18-12.mp3‎|width=67px|height=16px}}||00:54:19
|-
|-
-
|08-14-07||[[Re-visiting e-mail archiving strategies]]||{{Click||image=Icon_listen.gif|link= Media:08-14-07_Re-visiting_e-mail_archiving_strategies.mp3‎ | width=67px|height=16px}}||04:41
+
|11-27-12||[[Optimizing Infrastructure for Analytics-Driven Real-Time Decision Making]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 11-27-12.mp3‎|width=67px|height=16px}}||00:59:47
|-
|-
-
|08-04-07||[[Strategies for Storage Consolidation]]||{{Click||image=Icon_listen.gif|link= Media:08-07-07_Research_mtg-Strategies_for_storage_consol_summary.mp3‎ | width=67px|height=16px}}||05:52
+
|11-13-12||[[Achieving Enterprise-Class Data Protection on a Small-Business Budget]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 11-13-12.mp3‎|width=67px|height=16px}}||00:52:44
|-
|-
-
|07-31-07||[[How-to optimize and justify DR expenditures]]||{{Click||image=Icon_listen.gif|link= Media:How-to_optimize_and_justify_dr_expenditures.mp3| width=67px|height=16px}}||05:59
+
|09-04-12||[[Long-Distance Data Replication for Continuous Business Uptime]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 09-04-12.mp3‎|width=67px|height=16px}}||00:58:36
|-
|-
-
|07-24-07||[[EMC's 07-16-07 Platform Announcement]]||{{Click||image=Icon_listen.gif|link= Media:EMC_7-16-07_announcement_summary.mp3| width=67px|height=16px}}||05:29
+
|08-21-12||[[Pre-VMworld special: Harnessing Crowd Wisdom for the Future of Virtualization]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 08-21-12.mp3‎|width=67px|height=16px}}||00:54:13
|-
|-
-
|07-17-07||[[Storage security]]||{{Click||image=Icon_listen.gif|link= Media:Storage_security.mp3| width=67px|height=16px}}||05:26
+
|08-07-12||[[Designing a Network for Service-Provider Scalability]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 08-07-12.mp3‎|width=67px|height=16px}}||00:57:19
|-
|-
-
|07-10-07||[[Can tape be eliminated?]]||{{Click||image=Icon_listen.gif|link= Media:Can_tape_be_eliminated.mp3| width=67px|height=16px}}||04:12
+
|07-10-12||[[Combining Unstructured and Structured Data to Deliver Big Data Business Value]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 07-10-12.mp3‎|width=67px|height=16px}}||00:52:04
|-
|-
-
|07-03-07||[[Mobile device impact on enterprise storage]]||{{Click||image=Icon_listen.gif|link= Media:Mobile device impact on enterprise storage.mp3| width=67px|height=16px}}||03:29
+
|05-15-12||[[Creating a Single Data Repository for Backup and Archive in a Shared-Services IT Environment]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 05-15-12.mp3‎|width=67px|height=16px}}||00:55:11
|-
|-
-
|06-26-07||[[Tiered storage research meeting]]||{{Click||image=Icon_listen.gif|link= Media:Tiered storage.mp3| width=67px|height=16px}}||05:45
+
|04-10-12||[[Creating a Zero Data Loss Environment]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 04-10-12.mp3‎|width=67px|height=16px}}||00:52:33
|-
|-
-
|06-19-07||[[Google storage]]||{{Click||image=Icon_listen.gif|link= Media:Google storage.mp3| width=67px|height=16px}}||06:00
+
|04-03-12||[[Selecting Data Protection Solutions for Cloud Storage Offerings]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 04-03-12.mp3‎|width=67px|height=16px}}||01:00:28
|-
|-
-
|06-14-07||[[Recording the change to records management]]||{{Click||image=Icon_listen.gif|link= Media:Recording the Change to Records Management.mp3| width=67px|height=16px}}||05:24
+
|03-20-12||[[The Rise of 10Gb Ethernet and the Impact of Intels Xeon E5 Family of Processors]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 03-20-12.mp3‎|width=67px|height=16px}}||00:49:05
|-
|-
-
|06-06-07||[[Predicting data deduplication]]||{{Click||image=Icon_listen.gif|link= Media:Predicting Data Deduplication.mp3|width=67px|height=16px}}||05:34
+
|03-06-12||[[Achieving Hyper Productivity Through DevOps - A new Methodology for Business Technology Management]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 03-06-12.mp3‎|width=67px|height=16px}}||00:58:43
|-
|-
-
|06-04-07||[[iSCSI and the future of SAN]]||{{Click||image=Icon_listen.gif|link= Media:ISCSI and the Future of SAN.mp3| width=67px|height=16px}}||03:45
+
|02-09-12||[[Squinting through the Glare of Project Lightning]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 02-09-12.mp3‎|width=67px|height=16px}}||01:02:45
|-
|-
-
|05-29-07||[[Data deduplication and the NetApp IBM Announcements]]||{{Click||image=Icon_listen.gif|link= Media:Data Deduplication & the NetApp IBM Announcement.mp3| width=67px|height=16px}}||04:37
+
|12-13-11||[[Data on Disk is Dead Data - How Flash is Changing Systems Design Forever]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 12-13-11.mp3‎|width=67px|height=16px}}||01:00:03
|-
|-
-
|05-21-07||[[Hitachi USPV and Thin Provisioning]]||{{Click||image=Icon_listen.gif|link= Media:Hitachi's USPV and Thin Provisioning.mp3| width=67px|height=16px}}||04:55
+
|09-13-11||[[Deploying Network Management in a Virtualized Environment]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 09-13-11.mp3‎|width=67px|height=16px}}||57:28
|-
|-
-
|05-15-07||[[At Your Storage Service]]||{{Click||image=Icon_listen.gif|link= Media:At your storage service.mp3| width=67px|height=16px}}||04:47
+
|07-26-11||[[Cloud Archiving Forever without Losing a Bit]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 07-26-11.mp3‎|width=67px|height=16px}}||1:00:24
|-
|-
-
|05-08-07||[[The State of Big NAS]]||{{Click||image=Icon_listen.gif|link= Media:The State of Big NAS.mp3| width=67px|height=16px}}||04:54
+
|07-12-11||[[Maximizing the Value of VMware Infrastructure and App]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 07-12-11.mp3‎|width=67px|height=16px}}||58:51
|-
|-
-
|05-02-07||[[IBM's Grid Access Manager]]||{{Click||image=Icon_listen.gif|link= Media:IBM Grid Access Manager.mp3| width=67px|height=16px}}||03:45
+
|05-03-11||[[Oracle and Virtualization: Peas in a Pod or Oil and Water?]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 05-03-11.mp3‎|width=67px|height=16px}}||59:17
|-
|-
-
|04-23-07||[[Green Computing]]||{{Click||image=Icon_listen.gif|link= Media:Green Computing.mp3| width=67px|height=16px}}||04:27
+
|03-01-11||[[Big Data - Is your Data Warehouse a Dinosaur?]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 03-01-11.mp3‎|width=67px|height=16px}}||54:16
|-
|-
-
|04-16-07||[[Blade Servers]]||{{Click||image=Icon_listen.gif|link= Media:Blade Servers.mp3| width=67px|height=16px}}||06:12
+
|01-25-11||[[Desktop Virtualization Cold Hard Facts]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 01-25-11.mp3‎|width=67px|height=16px}}||56:14
|-
|-
-
|03-26-07||[[Data Classification]]||{{Click||image=Icon_listen.gif|link= Media:Data Classification.mp3| width=67px|height=16px}}||01:59
+
|01-11-11||[[Archiving Is Broken]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 01-11-11.mp3‎|width=67px|height=16px}}||55:33
|-
|-
-
|03-26-07||[[Storage Virtualization Research Meeting]]||{{Click||image=Icon_listen.gif|link= Media:Storage virtualization.mp3| width=67px|height=16px}}||04:42
+
|11-30-10||[[Is RAID Obsolete?]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 11-30-10.mp3‎|width=67px|height=16px}}||58:22
|-
|-
-
|03-19-07||[[Storage Services Architecture]]||{{Click||image=Icon_listen.gif|link= Media:Storage Services Architecture.mp3| width=67px|height=16px}}||05:08
+
|11-09-10||[[Backup is Broken - Data Protection as a Service is the Fix]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 11-09-10.mp3‎|width=67px|height=16px}}||59:11
|-
|-
-
|03-06-07||[[Email Archiving Research Meeting]]||{{Click||image=Icon_listen.gif|link= Media:E-Mail archiving.mp3| width=67px|height=16px}}||03:37
+
|11-02-10||[[Cloud Meta Data: Driving New Business Model]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 11-02-10.mp3‎|width=67px|height=16px}}||59:28
|-
|-
-
|02-26-07||[[3-Node Disaster Recovery]]||n/a
+
|08-10-10||[[Virtual Storage Consolidation: How Organizations are Moving from Tier 1 to Tier 2 and Eventually the Cloud]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 08-10-10.mp3‎|width=67px|height=16px}}||1:00:47
-
|}
+
|-
 +
|08-03-10||[[Securely Moving to the Cloud]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 08-03-10.mp3‎|width=67px|height=16px}}||55:42
 +
|-
 +
|07-27-10||[[Beyond Spanning Tree Protocol]]||||||{{Click||image=Icon_listen.gif|link= Media:Peer Incite 07-27-10.mp3‎|width=67px|height=16px}}||58:57
 +
|-
 +
|06-29-10||[[The Future of Storage: A Discussion with Technology Gurus]]||||||{{Click||image=Icon_listen.gif|link= Media:06-29-10_Peer_Incite.mp3‎|width=67px|height=16px}}||56:25
 +
|-
 +
|06-15-10||[[From Tape to the Cloud: Data backup strategies for SMBs]]||||||{{Click||image=Icon_listen.gif|link= Media:06-15-10_Peer_Incite_-_mashup.mp3‎|width=67px|height=16px}}||53:52
 +
|-
 +
|06-08-10||[[Primary Storage Optimization: Making Deduplication Invisible]]||||||{{Click||image=Icon_listen.gif|link= Media:06-08-10_Peer_Incite.mp3‎|width=67px|height=16px}}||56:49
 +
|-
 +
|05-04-10||[[Disaster recovery, achieving zero data loss using asynchronous infrastructure]]||||||{{Click||image=Icon_listen.gif|link= Media:05-04-10_Peer_Incite.mp3‎|width=67px|height=16px}}||59:18
 +
|-
 +
|04-27-10||[[What's Next in VMware Backup]]||||||{{Click||image=Icon_listen.gif|link= Media:04-27-10_Peer_Incite.mp3‎|width=67px|height=16px}}||58:30
 +
|-
 +
|04-06-10||[[Common sense approaches to improving data center efficiency]]||||||{{Click||image=Icon_listen.gif|link= Media:04-06-10_Peer_Incite.mp3‎|width=67px|height=16px}}||59:59
 +
|-
 +
|03-23-10||[[Should Function Reside in the Infrastructure or Application Stacks]]||||||{{Click||image=Icon_listen.gif|link= Media:03-23-10_Peer_Incite.mp3‎|width=67px|height=16px}}||59:47
 +
|-
 +
|03-02-10||[[How Virtualization and Cloud Computing Change Business Continuity and Disaster Recovery]]||||||{{Click||image=Icon_listen.gif|link= Media:03-02-10_Peer_Incite.mp3‎|width=67px|height=16px}}||1:00:07
 +
|-
 +
|02-16-10||[[Information Governance and Transparency though Records Management]]||||||{{Click||image=Icon_listen.gif|link= Media:02-16-10_Peer_Incite.mp3‎|width=67px|height=16px}}||1:00:31
 +
|-
 +
|02-02-10||[[FCoE: Fact versus Fiction]]||||||{{Click||image=Icon_listen.gif|link= Media:02-02-10_Peer_Incite.mp3‎|width=67px|height=16px}}||59:31
 +
|-
 +
|01-12-10||[[Opening Pandora's Box of SAN Management]]||||||{{Click||image=Icon_listen.gif|link= Media:01-12-10 Peer Incite - long.mp3‎|width=67px|height=16px}}||58:50
 +
|-
 +
|11-17-09||[[How Strand architected a remote office backup and recovery with a DR twist]]||{{Click||image=Icon_listen.gif|link= Media: 11-17-09 Peer Incite short mashup.mp3|width=67px|height=16px}}||07:33||{{Click||image=Icon_listen.gif|link= Media:11-17-09_Peer_incite_-_Long_mashup.mp3‎|width=67px|height=16px}}||29:23
 +
|-
 +
|09-29-09||[[How CalTech manages to manage a billion files]]||{{Click||image=Icon_listen.gif|link= Media:09-29-09_How_Caltech_manages_-_mashup_short.mp3‎|width=67px|height=16px}}||6:55||{{Click||image=Icon_listen.gif|link= Media:09-29-09 Peer Incite - long mashup.mp3|width=67px|height=16px}}||16:37
 +
|-
 +
|08-25-09||[[Using sourcing strategies to modernize legacy systems]]||||||{{Click||image=Icon_listen.gif|link= Media:‎08-25-09 Peer Incite.mp3|width=67px|height=16px}}||1:01:48
 +
|-
 +
|07-28-09||[[Building a strategic information plan to tame unstructured data]]||||||||
 +
|-
 +
|06-23-09||[[Huddle with Wikibon Analysts discussing NetApps Analyst briefing]]||||||{{Click||image=Icon_listen.gif|link= Media:‎Huddle_with_Wikibon_on_NetApp.mp3|width=67px|height=16px}}||49:47
 +
|-
 +
|06-11-09||[[Data compression for primary storage]]||{{Click||image=Icon_listen.gif|link= Media:Shopzilla_mashup-short_version.mp3‎‎ | width=67px|height=16px}}||05:18||{{Click||image=Icon_listen.gif|link= Media:‎Shopzilla_mashup_long_version.mp3‎‎ | width=67px|height=16px}}||30:09
 +
|-
 +
|05-26-09||[[EMC World 2009]]||||||{{Click||image=Icon_listen.gif|link= Media:05-26-09_Peer_Incite_EMC_World_2009.mp3‎ | width=67px|height=16px}}||1:05:76
 +
|-
 +
|03-17-09||[[Virtualization Energizes California State University East Bay]]||||||{{Click||image=Icon_listen.gif|link= Media:03-17-09_Virtualization_Energizes_Cal_State.mp3‎ | width=67px|height=16px}}||57:38
 +
|-
 +
|02-24-09||Improving Energy Efficiency - Part 1: JCPenney's Green IT Tips||{{Click||image=Icon_listen.gif|link= Media:Daryl_Molitor_Short-1.mp3 | width=67px|height=16px}}||05:57||||
 +
|-
 +
|02-24-09||[[Reducing Data Center Costs thru Improved Energy Efficiency]]|| ||||{{Click||image=Icon_listen.gif|link= Media:02-24-09_Energy_Efficiency_Panel.mp3‎‎ | width=67px|height=16px}}||58:31
 +
|-
 +
|02-03-09||[[Managing Archiving and Retention Risk|X-Pfizer IT Exec Unlocks Legal Risk Secrets - Part II]]||{{Click||image=Icon_listen.gif|link= Media:02-03-09_Archiving_Retention_Mashup_Part_2‎.mp3 | width=67px|height=16px}}||20:08||||
 +
|-
 +
|02-03-09||[[Managing Archiving and Retention Risk|X-Pfizer IT Exec Unlocks Legal Risk Secrets - Part I]]||{{Click||image=Icon_listen.gif|link= Media:02-03-09_Peer_Incite_mashup.mp3 | width=67px|height=16px}}||19:48||{{Click||image=Icon_listen.gif|link= Media:02-03-09_Managing_archiving_and_retention_risk.mp3‎ | width=67px|height=16px}}||1:00:43
 +
|-
 +
|12-16-08||[[EMC strategies for 2009 and beyond]]||{{Click||image=Icon_listen.gif|link= Media:12-16-08_EMC_Peer_Incite_mashup.mp3‎ | width=67px|height=16px}}||23:18||{{Click||image=Icon_listen.gif|link= Media:12-16-08_EMC_Storage_2009.mp3‎ | width=67px|height=16px}}||59:41
 +
|-
 +
|11-18-08||[[2009 Storage budget cuts - what are your options?]]||{{Click||image=Icon_listen.gif|link= Media:11-18-08_Peer_Incite_mashup.mp3‎ | width=67px|height=16px}}||21:35||{{Click||image=Icon_listen.gif|link= Media:11-18-08_2009_Storage_budget_cuts_-_options.mp3‎ | width=67px|height=16px}}||58:03
 +
|-
 +
|11-04-08||[[Financing strategies in tight capital markets]]||{{Click||image=Icon_listen.gif|link= Media:11-04-08_Financing_strategies_in_tight_capital_markets_summary.mp3‎ | width=67px|height=16px}}||07:53||{{Click||image=Icon_listen.gif|link= Media:11-04-08_Financing_strategies_in_tight_capital_markets.mp3‎ | width=67px|height=16px}}||1:04:31
 +
|-
 +
|10-07-08||[[Best practice in tape backup and recovery]]||{{Click||image=Icon_listen.gif|link= Media:10-07-08_Best_practice_in_tape_backup_and_recovery_summary.mp3‎ | width=67px|height=16px}}||08:36||{{Click||image=Icon_listen.gif|link= Media:10-07-08_Best_practice_in_tape_backup_and_recovery.mp3‎ | width=67px|height=16px}}||1:09:07
 +
|-
 +
|08-26-08||[[IBM's stealth XIV announcement]]||{{Click||image=Icon_listen.gif|link= Media:8-26-08_IBM's_stealth_XIV_announcement_summary.mp3‎ | width=67px|height=16px}}||09:07||{{Click||image=Icon_listen.gif|link= Media:8-26-08_IBM's_stealth_XIV_announcement.mp3‎ | width=67px|height=16px}}||1:06:20
 +
|-
 +
|08-12-08||[[EMC's CX4 announcement]]||{{Click||image=Icon_listen.gif|link= Media:8-12-08_EMCs_CX4_announcement_summary.mp3‎ | width=67px|height=16px}}||07:47||{{Click||image=Icon_listen.gif|link= Media:8-12-08_EMCs_CX4_announcement.mp3‎ | width=67px|height=16px}}||57:44
 +
|-
 +
|07-29-08||[[Is MAID finally getting hitched?]]||{{Click||image=Icon_listen.gif|link= Media:7-29-08_Is_MAID_finally_getting_hitched_summary.mp3‎ | width=67px|height=16px}}||08:04||{{Click||image=Icon_listen.gif|link= Media:7-29-08_Is_MAID_finally_getting_hitched.mp3‎ | width=67px|height=16px}}||58:18
 +
|-
 +
|06-24-08||[[Best practices to reduce exchange backup windows]]||{{Click||image=Icon_listen.gif|link= Media:6-24-08_Best_practices_to_reduce_exchange_backup_windows_summary.mp3‎ | width=67px|height=16px}}||08:16||{{Click||image=Icon_listen.gif|link= Media:6-24-08_Best_practices_to_reduce_exchange_backup_windows.mp3‎ | width=67px|height=16px}}||1:01:23
 +
|-
 +
|06-03-08||[[What cloud computing means for next generation storage infrastructure]]||{{Click||image=Icon_listen.gif|link= Media:6-03-08_Seeding_the_cloud_summary.mp3‎ | width=67px|height=16px}}||07:37||{{Click||image=Icon_listen.gif|link= Media:6-03-08_Seeding_the_cloud.mp3‎ | width=67px|height=16px}}||1:01:47
 +
|-
 +
|05-27-08||[[Customer implications and review of EMC World 2008]]||{{Click||image=Icon_listen.gif|link= Media:5-27-08_EMC_World_2008_-_Summary.mp3‎ | width=67px|height=16px}}||09:36||{{Click||image=Icon_listen.gif|link= Media:5-27-08_Peer_Incite_audio.mp3‎ | width=67px|height=16px}}||1:07:15
 +
|-
 +
|05-06-08||[[Best practice in Oracle 11G remote replication]]||{{Click||image=Icon_listen.gif|link= Media:5-6-08_summary.mp3‎ | width=67px|height=16px}}||07:31||{{Click||image=Icon_listen.gif|link= Media:5-6-08_Peer_Incite_audio.mp3‎ | width=67px|height=16px}}||1:05:04
 +
|-
 +
|04-15-08||[[VMware: The storage imperative]]||{{Click||image=Icon_listen.gif|link= Media:4-15-08_VMware-The_storage_imperative_summary.mp3‎ | width=67px|height=16px}}||06:03||{{Click||image=Icon_listen.gif|link= Media:04-15-08_VMware_The_storage_imperative.mp3‎ | width=67px|height=16px}}||1:02:19
 +
|-
 +
|03-18-08||[[Maximizing the value of your NetApp investment]]||{{Click||image=Icon_listen.gif|link= Media:03-18-08_Maximizing_value_of_NetApp_investment_summary_.mp3‎ | width=67px|height=16px}}||09:14||{{Click||image=Icon_listen.gif|link= Media:03-04-08_Maximizing_value_of_NetApp_investment.mp3‎ | width=67px|height=16px}}||1:00:30
 +
|-
 +
|03-04-08||[[Understanding disk-based backup alternatives]]||{{Click||image=Icon_listen.gif|link= Media:03-04-08_Understanding_disk-based_backup_alternatives_summary.mp3‎ | width=67px|height=16px}}||06:42||{{Click||image=Icon_listen.gif|link= Media:03-04-08_Understanding_disk-based_backup_alternatives.mp3 | width=67px|height=16px}}||1:05:09
 +
|-
 +
|02-19-08||[[Developing a storage services architecture]]||{{Click||image=Icon_listen.gif|link= Media:02-19-08_Architecting_storage_services_summary.mp3‎ | width=67px|height=16px}}||06:28||{{Click||image=Icon_listen.gif|link= Media:02-19-08_Architecting_storage_services.mp3‎ | width=67px|height=16px}}||1:06:24
 +
|-
 +
|02-05-08||[[Remote Backup Services: Requirements and Alternatives]]||{{Click||image=Icon_listen.gif|link= Media:02-05-08_Remote_Backup_Services.mp3‎|width=67px|height=16px}}||05:10||||
 +
|-
 +
|01-22-08||[[EMC's DMX Enhancement Announcement]]||{{Click||image=Icon_listen.gif|link= Media:01-22-08_EMC's_DMX_enhancement_announcement.mp3‎ | width=67px|height=16px}}||06:24||||
 +
|-
 +
|01-15-08||[[IBM's acquisition of XIV]]||{{Click||image=Icon_listen.gif|link= Media:01-15-08_IBM_buys_XIV_summary.mp3‎ | width=67px|height=16px}}||04:38||||
 +
|-
 +
|12-11-07||[[Clustered storage]]||{{Click||image=Icon_listen.gif|link= Media:12-11-07_Clustered_storage_summary.mp3‎ | width=67px|height=16px}}||07:00||||
 +
|-
 +
|12-04-07||[[Disk drive power consumption, what can be done?]]||{{Click||image=Icon_listen.gif|link= Media:12-04-07_Disk_drive_power_consumption_summary.mp3‎ | width=67px|height=16px}}||06:41||||
 +
|-
 +
|11-20-07||[[Maximizing storage returns from your EMC relationship]]||{{Click||image=Icon_listen.gif|link= Media:11-20-07_Optimizing_EMC_investment.mp3‎ | width=67px|height=16px}}||07:15||||
 +
|-
 +
|11-06-07||[[Hitachi announcement review]]||{{Click||image=Icon_listen.gif|link= Media:11-06-07_Hitachi_announcement_summary.mp3‎ | width=67px|height=16px}}||08:50||||
 +
|-
 +
|10-30-07||[[Green storage procurement options]]||{{Click||image=Icon_listen.gif|link= Media:Green_storage_summary_10-30-07.mp3‎ | width=67px|height=16px}}||05:16||||
 +
|-
 +
|10-23-07||[[IBM storage announcement]]||{{Click||image=Icon_listen.gif|link= Media:IBM_announcement_10-23-07.mp3‎ | width=67px|height=16px}}||05:52||||
 +
|-
 +
|10-09-07||[[Maximizing storage returns from your IBM relationship]]||{{Click||image=Icon_listen.gif|link= Media:Optimizing_storage_returns_on_IBM_investment_10-09-07.mp3‎ | width=67px|height=16px}}||07:50||||
 +
|-
 +
|09-25-07||[[Selecting virtualization approaches ]]||{{Click||image=Icon_listen.gif|link= Media:Selecting_virtualization_approaches_summary.mp3‎‎ | width=67px|height=16px}}||04:46||||
 +
|-
 +
|09-18-07||[[Storage resource management (SRM)]]||{{Click||image=Icon_listen.gif|link= Media:Storage_resource_management_-_SRM.mp3‎ | width=67px|height=16px}}||04:38||||
 +
|-
 +
|09-11-07||[[Infrastructure for email archiving]]||{{Click||image=Icon_listen.gif|link= Media:Infrastructure_for_email_archiving_09-11-07.mp3‎ | width=67px|height=16px}}||05:38||||
 +
|-
 +
|09-04-07||[[Virtual tape strategies]]||{{Click||image=Icon_listen.gif|link= Media:Virtual_tape_strategies_summary.mp3‎ | width=67px|height=16px}}||03:56||||
 +
|-
 +
|08-28-07||[[Continuous data protection]]||{{Click||image=Icon_listen.gif|link= Media:Continuous_Data_Protection_summary.mp3‎ | width=67px|height=16px}}||04:35||||
 +
|-
 +
|08-14-07||[[Re-visiting e-mail archiving strategies]]||{{Click||image=Icon_listen.gif|link= Media:08-14-07_Re-visiting_e-mail_archiving_strategies.mp3‎ | width=67px|height=16px}}||04:41||||
 +
|-
 +
|08-04-07||[[Strategies for Storage Consolidation]]||{{Click||image=Icon_listen.gif|link= Media:08-07-07_Research_mtg-Strategies_for_storage_consol_summary.mp3‎ | width=67px|height=16px}}||05:52||||
 +
|-
 +
|07-31-07||[[How-to optimize and justify DR expenditures]]||{{Click||image=Icon_listen.gif|link= Media:How-to_optimize_and_justify_dr_expenditures.mp3| width=67px|height=16px}}||05:59||||
 +
|-
 +
|07-24-07||[[EMC's 07-16-07 Platform Announcement]]||{{Click||image=Icon_listen.gif|link= Media:EMC_7-16-07_announcement_summary.mp3| width=67px|height=16px}}||05:29||||
 +
|-
 +
|07-17-07||[[Storage security]]||{{Click||image=Icon_listen.gif|link= Media:Storage_security.mp3| width=67px|height=16px}}||05:26||||
 +
|-
 +
|07-10-07||[[Can tape be eliminated?]]||{{Click||image=Icon_listen.gif|link= Media:Can_tape_be_eliminated.mp3| width=67px|height=16px}}||04:12||||
 +
|-
 +
|07-03-07||[[Mobile device impact on enterprise storage]]||{{Click||image=Icon_listen.gif|link= Media:Mobile device impact on enterprise storage.mp3| width=67px|height=16px}}||03:29||||
 +
|-
 +
|06-26-07||[[Tiered storage]]||{{Click||image=Icon_listen.gif|link= Media:Tiered storage.mp3| width=67px|height=16px}}||05:45||||
 +
|-
 +
|06-19-07||[[Google storage]]||{{Click||image=Icon_listen.gif|link= Media:Google storage.mp3| width=67px|height=16px}}||06:00||||
 +
|-
 +
|06-12-07||[[Recording the change to records management]]||{{Click||image=Icon_listen.gif|link= Media:Recording the Change to Records Management.mp3| width=67px|height=16px}}||05:24||||
 +
|-
 +
|06-04-07||[[Predicting data deduplication]]||{{Click||image=Icon_listen.gif|link= Media:Predicting Data Deduplication.mp3|width=67px|height=16px}}||05:34||||
 +
|-
 +
|05-29-07||[[iSCSI and the future of SAN]]||{{Click||image=Icon_listen.gif|link= Media:ISCSI and the Future of SAN.mp3| width=67px|height=16px}}||03:45||||
 +
|-
 +
|05-22-07||[[Data deduplication and the NetApp IBM Announcements]]||{{Click||image=Icon_listen.gif|link= Media:Data Deduplication & the NetApp IBM Announcement.mp3| width=67px|height=16px}}||04:37||||
 +
|-
 +
|05-15-07||[[Hitachi USPV and Thin Provisioning]]||{{Click||image=Icon_listen.gif|link= Media:Hitachi's USPV and Thin Provisioning.mp3| width=67px|height=16px}}||04:55||||
 +
|-
 +
|05-08-07||[[At Your Storage Service]]||{{Click||image=Icon_listen.gif|link= Media:At your storage service.mp3| width=67px|height=16px}}||04:47||||
 +
|-
 +
|05-01-07||[[The State of Big NAS]]||{{Click||image=Icon_listen.gif|link= Media:The State of Big NAS.mp3| width=67px|height=16px}}||04:54||||
 +
|-
 +
|04-25-07||[[IBM's Grid Access Manager]]||{{Click||image=Icon_listen.gif|link= Media:IBM Grid Access Manager.mp3| width=67px|height=16px}}||03:45||||
 +
|-
 +
|04-18-07||[[Green Computing]]||{{Click||image=Icon_listen.gif|link= Media:Green Computing.mp3| width=67px|height=16px}}||04:27||||
 +
|-
 +
|04-10-07||[[Blade Servers]]||{{Click||image=Icon_listen.gif|link= Media:Blade Servers.mp3| width=67px|height=16px}}||06:12||||
 +
|-
 +
|03-27-07||[[Data Classification]]||{{Click||image=Icon_listen.gif|link= Media:Data Classification.mp3| width=67px|height=16px}}||02:57||||
 +
|-
 +
|03-20-07||[[Storage Virtualization]]||{{Click||image=Icon_listen.gif|link= Media:Storage virtualization.mp3| width=67px|height=16px}}||04:42||||
 +
|-
 +
|03-13-07||[[Storage Services Architecture]]||{{Click||image=Icon_listen.gif|link= Media:Storage Services Architecture.mp3| width=67px|height=16px}}||05:08||||
 +
|-
 +
|03-06-07||[[Email Archiving]]||{{Click||image=Icon_listen.gif|link= Media:E-Mail archiving summary.mp3| width=67px|height=16px}}||05:47||{{Click||image=Icon_listen.gif|link= Media:03-06-07_Email_archiving.mp3| width=67px|height=16px}}||50:45
 +
|-
 +
|02-26-07||[[3-Node Disaster Recovery]]||||||||
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
[[Category:Peer Incite newsletters]][[Category: Podcasts]]

Current revision as of 17:49, 4 September 2013

The following are research notes from Wikibon's Peer Incite research meetings. The objectives of Peer Incites is to share information and best practices that can help customers apply technology to create business solutions.

Peer Incites are normally scheduled for the 1st & 3rd Tuesday of every month. These meetings are an open, moderated phone forum where a guest practitioner presents a premise to the community. Anyone can participate in the call, have a voice, ask questions or comment. The content of the call is ultimately geared toward the customer. The goal is to catalyze thought and action items that the community posts on Wikibon after the call.

Peer Incite calls are not vendor sponsored events, however Wikibon clients are allowed an opportunity to suggest topics and invite their customers to host calls.

Since we launched Wikibon, we've hosted many dozen Peer Incites attended by several thousand IT professionals. Thanks to everyone who participated and contributed content.

  • If you'd like to participate or present, please Contact Us.
  • If you would like to receive the Peer Incite Newsletter, please Signup in the Peer Incite Newsletter box in the lower right column.

Storage Peer Incite Newsletters
Date Research Notes Audio/Short Length Audio/Full Length
07-30-13Enhancing Cloud Services with Hybrid Storage00:00:00
04-23-13Software is Eating the World - Will Amazon Eat Enterprise Infrastructure 00:56:54
01-22-13Commercial Applications And Hyper-Scale Storage 00:53:46
12-18-12Quieting Noisy Neighbors In Cloud Services 00:54:19
11-27-12Optimizing Infrastructure for Analytics-Driven Real-Time Decision Making 00:59:47
11-13-12Achieving Enterprise-Class Data Protection on a Small-Business Budget 00:52:44
09-04-12Long-Distance Data Replication for Continuous Business Uptime 00:58:36
08-21-12Pre-VMworld special: Harnessing Crowd Wisdom for the Future of Virtualization 00:54:13
08-07-12Designing a Network for Service-Provider Scalability 00:57:19
07-10-12Combining Unstructured and Structured Data to Deliver Big Data Business Value 00:52:04
05-15-12Creating a Single Data Repository for Backup and Archive in a Shared-Services IT Environment 00:55:11
04-10-12Creating a Zero Data Loss Environment 00:52:33
04-03-12Selecting Data Protection Solutions for Cloud Storage Offerings 01:00:28
03-20-12The Rise of 10Gb Ethernet and the Impact of Intels Xeon E5 Family of Processors 00:49:05
03-06-12Achieving Hyper Productivity Through DevOps - A new Methodology for Business Technology Management 00:58:43
02-09-12Squinting through the Glare of Project Lightning 01:02:45
12-13-11Data on Disk is Dead Data - How Flash is Changing Systems Design Forever 01:00:03
09-13-11Deploying Network Management in a Virtualized Environment 57:28
07-26-11Cloud Archiving Forever without Losing a Bit 1:00:24
07-12-11Maximizing the Value of VMware Infrastructure and App 58:51
05-03-11Oracle and Virtualization: Peas in a Pod or Oil and Water? 59:17
03-01-11Big Data - Is your Data Warehouse a Dinosaur? 54:16
01-25-11Desktop Virtualization Cold Hard Facts 56:14
01-11-11Archiving Is Broken 55:33
11-30-10Is RAID Obsolete? 58:22
11-09-10Backup is Broken - Data Protection as a Service is the Fix 59:11
11-02-10Cloud Meta Data: Driving New Business Model 59:28
08-10-10Virtual Storage Consolidation: How Organizations are Moving from Tier 1 to Tier 2 and Eventually the Cloud 1:00:47
08-03-10Securely Moving to the Cloud 55:42
07-27-10Beyond Spanning Tree Protocol 58:57
06-29-10The Future of Storage: A Discussion with Technology Gurus 56:25
06-15-10From Tape to the Cloud: Data backup strategies for SMBs 53:52
06-08-10Primary Storage Optimization: Making Deduplication Invisible 56:49
05-04-10Disaster recovery, achieving zero data loss using asynchronous infrastructure 59:18
04-27-10What's Next in VMware Backup 58:30
04-06-10Common sense approaches to improving data center efficiency 59:59
03-23-10Should Function Reside in the Infrastructure or Application Stacks 59:47
03-02-10How Virtualization and Cloud Computing Change Business Continuity and Disaster Recovery 1:00:07
02-16-10Information Governance and Transparency though Records Management 1:00:31
02-02-10FCoE: Fact versus Fiction 59:31
01-12-10Opening Pandora's Box of SAN Management 58:50
11-17-09How Strand architected a remote office backup and recovery with a DR twist 07:33 29:23
09-29-09How CalTech manages to manage a billion files 6:55 16:37
08-25-09Using sourcing strategies to modernize legacy systems 1:01:48
07-28-09Building a strategic information plan to tame unstructured data
06-23-09Huddle with Wikibon Analysts discussing NetApps Analyst briefing 49:47
06-11-09Data compression for primary storage 05:18 30:09
05-26-09EMC World 2009 1:05:76
03-17-09Virtualization Energizes California State University East Bay 57:38
02-24-09Improving Energy Efficiency - Part 1: JCPenney's Green IT Tips 05:57
02-24-09Reducing Data Center Costs thru Improved Energy Efficiency 58:31
02-03-09X-Pfizer IT Exec Unlocks Legal Risk Secrets - Part II 20:08
02-03-09X-Pfizer IT Exec Unlocks Legal Risk Secrets - Part I 19:48 1:00:43
12-16-08EMC strategies for 2009 and beyond 23:18 59:41
11-18-082009 Storage budget cuts - what are your options? 21:35 58:03
11-04-08Financing strategies in tight capital markets 07:53 1:04:31
10-07-08Best practice in tape backup and recovery 08:36 1:09:07
08-26-08IBM's stealth XIV announcement 09:07 1:06:20
08-12-08EMC's CX4 announcement 07:47 57:44
07-29-08Is MAID finally getting hitched? 08:04 58:18
06-24-08Best practices to reduce exchange backup windows 08:16 1:01:23
06-03-08What cloud computing means for next generation storage infrastructure 07:37 1:01:47
05-27-08Customer implications and review of EMC World 2008 09:36 1:07:15
05-06-08Best practice in Oracle 11G remote replication 07:31 1:05:04
04-15-08VMware: The storage imperative 06:03 1:02:19
03-18-08Maximizing the value of your NetApp investment 09:14 1:00:30
03-04-08Understanding disk-based backup alternatives 06:42 1:05:09
02-19-08Developing a storage services architecture 06:28 1:06:24
02-05-08Remote Backup Services: Requirements and Alternatives 05:10
01-22-08EMC's DMX Enhancement Announcement 06:24
01-15-08IBM's acquisition of XIV 04:38
12-11-07Clustered storage 07:00
12-04-07Disk drive power consumption, what can be done? 06:41
11-20-07Maximizing storage returns from your EMC relationship 07:15
11-06-07Hitachi announcement review 08:50
10-30-07Green storage procurement options 05:16
10-23-07IBM storage announcement 05:52
10-09-07Maximizing storage returns from your IBM relationship 07:50
09-25-07Selecting virtualization approaches 04:46
09-18-07Storage resource management (SRM) 04:38
09-11-07Infrastructure for email archiving 05:38
09-04-07Virtual tape strategies 03:56
08-28-07Continuous data protection 04:35
08-14-07Re-visiting e-mail archiving strategies 04:41
08-04-07Strategies for Storage Consolidation 05:52
07-31-07How-to optimize and justify DR expenditures 05:59
07-24-07EMC's 07-16-07 Platform Announcement 05:29
07-17-07Storage security 05:26
07-10-07Can tape be eliminated? 04:12
07-03-07Mobile device impact on enterprise storage 03:29
06-26-07Tiered storage 05:45
06-19-07Google storage 06:00
06-12-07Recording the change to records management 05:24
06-04-07Predicting data deduplication 05:34
05-29-07iSCSI and the future of SAN 03:45
05-22-07Data deduplication and the NetApp IBM Announcements 04:37
05-15-07Hitachi USPV and Thin Provisioning 04:55
05-08-07At Your Storage Service 04:47
05-01-07The State of Big NAS 04:54
04-25-07IBM's Grid Access Manager 03:45
04-18-07Green Computing 04:27
04-10-07Blade Servers 06:12
03-27-07Data Classification 02:57
03-20-07Storage Virtualization 04:42
03-13-07Storage Services Architecture 05:08
03-06-07Email Archiving 05:47 50:45
02-26-073-Node Disaster Recovery
Personal tools