Storage

Choosing a storage technology from the many options available is an on-going challenge. Storage-area-networks, network-attached storage, cloud storage, and virtualized storage represent only a few of the methods and combinations that may be considered. TechRepublic covers these areas, as well as best practices, policies, and procedures for establishing a data storage strategy.

  • White Papers // Mar 2009

    Power and Performance of Read-Write Aware Hybrid Caches With Non-Volatile Memories

    Caches made of non-volatile memory technologies, such as Magnetic RAM (MRAM) and Phase-change RAM (PRAM), offer dramatically different power-performance characteristics when compared with SRAM-based caches, particularly in the areas of static/dynamic power consumption, read and write access latency and cell density. In this paper, the authors propose to take advantage...

    Provided By edaa

  • White Papers // Mar 2009

    Using Non-Volatile Memory to Save Energy in Servers

    Recent breakthroughs in circuit and process technology have enabled new usage models for non-volatile memory technologies such as flash and Phase Change RAM (PCRAM) in the general purpose computing environment. These technologies display high density and low power consumption as well as persistency that are appealing properties in a memory...

    Provided By edaa

  • Case Studies // Mar 2009

    Retailer Prepares for Market Expansion

    Mercator S is the second largest retailer in Serbia, the company was running two separate networks for computing and telephony, and using products from different vendors for its network switching, security, and telephone systems. Their challenges are to lower its operating costs by consolidating computing and telephony services onto the...

    Provided By Cisco Systems

  • Webcasts // Mar 2009

    Deploying IP-based Replication Based on Service Levels With EMC Celerra Replicator $

    With EMC Celerra Replicator, the organization can directly specify recovery service levels to provide efficient, snapshot-based, asynchronous data replication over IP networks - all at an affordable price. The attendee of this webcast will learn how to implement simple and affordable disaster recovery. The attendee will find out how Celerra...

    Provided By EMC

  • White Papers // Mar 2009

    Optimizing the HW/SW Boundary of an ECC SoC Design Using Control Hierarchy and Distributed Storage

    Hardware/Software codesign of Elliptic Curve Cryptography has been extensively studied in recent years. However, most of these designs have focused on the computational aspect of the ECC hardware, and not on the system integration into SoC architecture. The authors study the impact of the communication link between CPU and coprocessor...

    Provided By European Design and Automation Association

  • Case Studies // Mar 2009

    ERGO Simplifies the Printing and Distribution of 40 Million Customer Mailings Each Year With Automated Output Management

    ERGO's two print centres are responsible for producing 40 million customer mailings every year and are crucial to the quality of its customer services. ERGO needs to ensure that print processes are efficient and cost-effective, while minimising waste and paper usage to align with environmental goals. ERGO has used CA...

    Provided By CA

  • Webcasts // Mar 2009

    Accelerated Engagement for Microsoft Online Services Partner Webcast Series

    This webcast provides ongoing Accelerated Engagement program updates including service updates, marketing planning and more.

    Provided By Microsoft

  • White Papers // Mar 2009

    Achieving SaaS Security With Connected Online PC Backup

    Off late, more companies than ever recognize the value and convenience of using online backup to protect their data. Enterprises considering online backup Storage as a Service (SaaS) face these security concerns: could an unauthorized individual gain access to backed-up data?, could backed-up data be altered?, will necessary data be...

    Provided By Iron Mountain

  • White Papers // Mar 2009

    Impact of Voltage Scaling on Nanoscale SRAM Reliability

    Low voltage SRAMs are critical for power constrained designs. Currently, the choice of supply voltage in SRAMs is governed by bit cell read static noise margin, writability, data retention etc. However, in the nanometer technology nodes, the choice of supply voltage impacts the reliability of SRAMs as well. Two important...

    Provided By edaa

  • White Papers // Mar 2009

    A File-System-Aware FTL Design for Flash-Memory Storage Systems

    As flash memory became popular over various platforms, there is a strong demand on the performance degradation problem, due to the special characteristics of flash memory. This paper proposes the design of a file-system-aware flash translation layer, in which a filter mechanism is designed to separate the access requests of...

    Provided By edaa

  • White Papers // Mar 2009

    FSAF: File System Aware Flash Translation Layer for NAND Flash Memories

    NAND Flash Memories require Garbage Collection (GC) and Wear Leveling (WL) operations to be carried out by Flash Translation Layers (FTLs) that oversee flash management. Owing to expensive erasures and data copying, these two operations essentially determine application response times. Since file systems do not share any file deletion information...

    Provided By edaa

  • White Papers // Mar 2009

    A Set-Based Mapping Strategy for Flash-Memory Reliability Enhancement

    With wide applicability of flash memory in various application domains, reliability has become a very critical issue. This paper is motivated by the needs to resolve the lifetime problem of flash memory and a strong demand in turning thrown-away flash-memory chips into downgraded products. The authors propose a set-based mapping...

    Provided By edaa

  • White Papers // Mar 2009

    KAST: K-Associative Sector Translation for NAND Flash Memory in Real-Time Systems

    Flash memory is a good candidate for the storage device in real-time systems due to its non-fluctuating performance, low power consumption and high shock resistance. However, the garbage collection for invalid pages in flash memory can invoke a long blocking time. Moreover, the worst-case blocking time is significantly long compared...

    Provided By edaa

  • White Papers // Mar 2009

    Light NUCA: A Proposal for Bridging the Inter-Cache Latency Gap

    To deal with the \"Memory wall\" problem, microprocessors include large secondary on-chip caches. But as these caches enlarge, they originate a new latency gap between them and fast L1 caches (inter-cache latency gap). Recently, Non-Uniform Cache Architectures (NUCAs) have been proposed to sustain the size growth trend of secondary caches...

    Provided By edaa

  • White Papers // Mar 2009

    A Power-Efficient Migration Mechanism for D-NUCA Caches

    D-NUCA L2 caches are able to tolerate the increasing wire delay effects due to technology scaling thanks to their banked organization, broadcast line search and data promotion/demotion mechanism. Data promotion mechanism aims at moving frequently accessed data near the core, but causes additional accesses on cache banks, hence increasing dynamic...

    Provided By edaa

  • White Papers // Mar 2009

    Virtualization 101

    This white paper explains the fundamental concepts of virtualization and shows how StorCenter ix2 and ix4 NAS devices can help simplify VMWare deployment. This white paper will helps to understand the concepts behind virtualization and how Iomega's products integrate, extend, and accelerate a virtualized environment. The authors will look at...

    Provided By Iomega

  • White Papers // Mar 2009

    Networking With iSCSI: Affordable SANs for Everyone

    Most small and medium businesses already understand the benefits of Network Attached Storage (NAS) devices. Most simply, NAS are the storage elements that connect to a network and provide file-level access to multiple systems. With a NAS, the can consolidate backups and make information readily available to several computers at...

    Provided By Iomega

  • White Papers // Mar 2009

    Sharing a Printer With Your Home Media Network Hard Drive

    Sharing a printer across the network is as simple as plugging one's USB printer into the network hard drive. The network drive is already set up as a print server, so one can access their printer from any computer on the network. One will need to have the printer driver...

    Provided By EMC

  • White Papers // Mar 2009

    Getting To Grips With The Cost Of Repairs

    Fujitsu Siemens Computers is the leading European IT provider with a presence in all key markets across Europe, the Middle East and Africa. The company quickly needed higher levels of consistency in the rules and validation policies applied to the labour cost validation across countries, as well as a systematic...

    Provided By Accenture

  • Webcasts // Mar 2009

    IT Efficiency Tips to Help Retailers Thrive in a Down Economy

    It's a tough time to be in Retail - the economy is stalled, margins are tight, and more pocketbooks are closed. But even today, it's possible to sustain and grow the retail business - if one has the right tools and techniques for making the most of the IT infrastructure....

    Provided By EMC

  • White Papers // Mar 2009

    Achieving Storage Efficiency With Data Deduplication

    The Celerra Data Deduplication feature adds to Dell NX4's impressive storage efficiency capabilities by intelligently reducing space usage and providing further storage efficiency. One can optimize the use of the existing storage environment for file system data through single instancing and compression. A combination of file-level deduplication and compression represents...

    Provided By Dell

  • White Papers // Mar 2009

    Data Storage and Management for Oil and Gas Industry

    Unstable oil prices and a global economic downturn place Exploration and Production (E&P) asset teams under pressure to more precisely characterize prospects and existing dormant assets. At the same time, data managers look to stretch shrinking information technology budgets. By optimizing information resources, exploration and production managers can improve decision...

    Provided By schlum

  • Webcasts // Mar 2009

    Virtual Machine and Storage Integration With VMware and Dell

    This webcast take a deeper dive into storage and networking in VMware Infrastructure. Storage topics included the details on how VMware ESX and ESXi use Fibre Channel, iSCSI, and NAS storage; the architecture of VMware vStorage Virtual Machine File System (VMFS); multipathing in Fibre Channel and iSCSI SANs; raw disk...

    Provided By VMware

  • Webcasts // Mar 2009

    VI Webstart: Deep Dive Into Storage and Network Configurations

    This webcast gives a deeper dive into storage and networking in VMware Infrastructure. Storage topics included the details on how VMware ESX and ESXi use Fibre Channel, iSCSI, and NAS storage; the architecture of VMware vStorage Virtual Machine File System (VMFS); multipathing in Fibre Channel and iSCSI SANs; raw disk...

    Provided By VMware

  • White Papers // Mar 2009

    Offline Impairment Aware RWA Algorithms for Cross-Layer Planning of Optical Networks

    Transparent optical networks are the enabling infrastructure for converged multi-granular networks in the Future Internet. The cross-layer planning of these networks considers physical impairments in the network layer design. This is complicated by the diversity of modulation formats, transmission rates, amplification and compensation equipments, or deployed fiber links. Thereby, the...

    Provided By Technical University of Catalonia

  • White Papers // Mar 2009

    Enterprise Vault 8.0: Optimized Single Instance Storage (OSIS)

    This whitepaper introduces the new Enterprise Vault storage model launched in version 8.0. It will explain how the new model can help provide industry-leading archive storage footprint reduction through single instance storage and compression, as well as describe the various components and technologies employed within Enterprise Vault to do this.

    Provided By Symantec

  • Webcasts // Mar 2009

    Storage Strategy for a Down Economy: Stop Buying Storage!

    Unlocking the "Hidden" storage capacity in most data centers may allow data center managers to avoid capacity upgrades for a year or more. The presenter of this webcast will provide a four-step prescription for identifying available capacity and utilizing it effectively. Moreover, this is not a stop-gap program but rather...

    Provided By Symantec

  • White Papers // Mar 2009

    Organize Your Digital Enterprise with the Virtual File Store

    An organization's ability to take stock of its data is critical, even as files today are increasingly complex and difficult to classify. Clipper Group analyst Anne MacFarland explains how Iron Mountain's Virtual File Store ensures the expertise and security needed to effectively harness information, meet retention requirements and reduce costs....

    Provided By Iron Mountain

  • Webcasts // Mar 2009

    Cut Costs by Upgrading Your EMC Connectrix MDS SAN to 8 G Fibre Channel and FCoE

    Is the existing SAN ready for greater performance while lowering Total Cost of Ownership (TCO) by using 8 Gbps Fibre Channel or Fibre Channel Over Ethernet (FCoE) By upgrading the EMC Connectrix MDS SAN infrastructure, one can take advantage of the higher speeds and improved reliability to not only reduce...

    Provided By EMC

  • White Papers // Mar 2009

    Gordon: Using Flash Memory to Build Fast, Power-Efficient Clusters for Data-Intensive Applications

    As the society becomes more information-driven, the authors have begun to amass data at an astounding and accelerating rate. At the same time, power concerns have made it difficult to bring the necessary processing power to bear on querying, processing, and understanding this data. They describe Gordon, a system architecture...

    Provided By Association for Computing Machinery

  • Webcasts // Mar 2009

    What's New in BMC MAINVIEW Storage Resource Manager

    MAINVIEW SRM is BMC's premier storage monitor/manager. As many know it consists of three major components, Allocation, Reporting and Automation. What may not be known however is that BMC, over the last couple of years, has made major improvements in Performance, Usefulness and Reliability. This webcast will show four enhancements...

    Provided By BMC Software

  • White Papers // Mar 2009

    Phantom-BTB: A Virtualized Branch Target Buffer Design

    Modern processors use Branch Target Buffers (BTBs) to predict the target address of branches such that they can fetch ahead in the instruction stream increasing concurrency and performance. Ideally, BTBs would be sufficiently large to capture the entire working set of the application and sufficiently small for fast access and...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    Webcast-in-a-Whitepaper: Key Issues in Messaging Archiving

    E-mail use is growing 20% per year, and e-discovery is driving the need to preserve communication. Unfortunately, preserving that communication is easier said than done. Download this free guide to learn more about the ten most common issues reported by organizations just like yours! You'll get an overview of...

    Provided By GFI Software, formerly Sunbelt Software

  • Webcasts // Mar 2009

    Legacy Database Archiving With Symantec Enterprise Vault and Applimation

    Archiving has manifested itself to become a significant component in any organization's plan to better manage the growth of unstructured data - now what about structured data? With Applimation, customers can now archive from Oracle, SAP, and Peoplesoft applications directly into their central Enterprise Vault repository.

    Provided By Symantec

  • Webcasts // Mar 2009

    Capture, Retain, and Analyze CDRs and IPDRs With Maximum Efficiency and Performance

    Massive Call Detail Record (CDR) and IP Data Record (IPDR) volumes create some serious challenges. Wireline, wireless, and internet service providers must not only collect and store billions of CDRs and other event records, but they must also be able to run complex queries to identify and extract specific records...

    Provided By EMC

  • White Papers // Mar 2009

    Fail-Aware Untrusted Storage

    This paper considers a set of clients collaborating through an online service provider that is subject to attacks, and hence not fully trusted by the clients. The paper introduces the abstraction of a fail-aware untrusted service, with meaningful semantics even when the provider is faulty. In the common case, when...

    Provided By IBM

  • Case Studies // Mar 2009

    Optical Retailer Focuses on Superior Service

    A leading optical retailer, Pearle Vision of Charlotte, North Carolina, their challenge is that paper-based records system slowed business operations and exposed confidential client data to risk. They chose Cisco to overcome these challenges. Cisco storage solution improves patient care, improves efficiency and revenue, and provides network and physical security...

    Provided By Cisco Systems

  • White Papers // Mar 2009

    Many-Core Chips - A Case for Virtual Shared Memory

    The authors make the case for Virtual Shared Memory (VSM) for supporting future many-core chips. VSM is a shared memory abstraction implemented over distributed memory by a hypervisor, providing the operating system direct access to all memory in the system. VSM on a distributed-memory system, such as a many-core chip...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    Advanced File Sharing and Management

    Dell NX4 offers a variety of advanced features that can help organizations achieve storage efficiency and lower TCO, including data deduplication that can reduce required storage capacity and an open API that works with third-party policy engines to enable tiered storage access. To keep data safe and available, Dell NX4...

    Provided By Dell

  • White Papers // Mar 2009

    Measurements-Based Modeling of Burst Errors on Multiple Parallel Storage Channels

    This paper presents a measurement-based burst error model for storage devices that use multiple parallel channels when they are affected by external disturbances. The burst errors are modeled using a set of Markov processes and channel error measurements are exploited to specify the parameters of the Markov processes and to...

    Provided By University of Patras