Storage

Choosing a storage technology from the many options available is an on-going challenge. Storage-area-networks, network-attached storage, cloud storage, and virtualized storage represent only a few of the methods and combinations that may be considered. TechRepublic covers these areas, as well as best practices, policies, and procedures for establishing a data storage strategy.

  • Case Studies // Apr 2014

    A Broadband Company Streamlines its Recovery Processes with IBM Cloud

    Read the case study “A broadband company streamlines its recovery processes with IBM Cloud” to learn how IBM service teams used cloud-based technology to help the company develop an innovative and proven cloud computing solution for its backup and recovery environment. IBM’s turnkey solution helped the company improve protection, recovery,...

    Sponsored By IBM

  • Videos // Apr 2014

    SmartCloud Managed Backup Portal Demo

    As your business expands, your data footprint grows even faster. The information you collect is valuable for better business insights and analytics. But with more data comes more responsibility to protect and secure it. IBM SmartCloud Managed Backup Service can provide you with the scalability to back up increasing amounts...

    Sponsored By IBM

  • White Papers // Apr 2014

    IBM Is A Leader Among Traditional Disaster Recovery Service Providers

    In a recent Forrester Wave report, IBM is identified as a “top dog” among traditional disaster recovery service providers, with a strong product offering and global presence. Read this specially commissioned IBM executive brief of the Wave report to find out how IBM’s disaster recovery services can help you meet...

    Sponsored By IBM

  • White Papers // Mar 2014

    Using Encryption and Access Control for PCI DSS 3.0 Compliance in AWS

    Compliance and security continue to be top concerns for organizations that plan to move their environment to cloud computing. Besides that, achieving PCI compliance is not a simple task. It is difficult for many organizations to navigate the current landscape of information systems and adequately fulfill all PCI DSS requirements....

    Sponsored By Vormetric

  • Downloads // Mar 2014

    Big Data in HR and Finance: Understanding the Real Value

    Big Data continues to create new ways of gathering and analyzing information. In the latest research by Harvard Business Review Analytics Services, a real-world lens of big data is provided for HR and Finance. View this infographic below to discover why big data matters to you and your organization.

    Sponsored By Workday

  • White Papers // Mar 2014

    Smarter Security Intelligence: Leverage Big Data Analytics to Improve Enterprise Security

    Big data has been big news in recent years. While organizations have, to date, been busy exploring and experimenting, they are now beginning to focus on using big data technologies to solve business problems.

    Sponsored By IBM

  • White Papers // Mar 2014

    What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?

    Mobile security is more than protecting the device. It is protecting applications on the device and preventing data leakage in the enterprise. IBM Security AppScan helps determine vulnerabilities early in the application development cycle to eliminate vulnerabilities malware can exploit.

    Sponsored By IBM

  • White Papers // Mar 2014

    Tolly Test Report: IBM Security Web Gateway Appliance

    The report summarizes the Tolly Group’s evaluation of the performance characteristics of the IBM Security Web Gateway AMP 5100 Appliance. It finds the IBM appliance to be 100% effective in blocking inline-preventable web threats and attacks, as well as being powerful and easy to use.

    Sponsored By IBM

  • White Papers // Feb 2014

    APJ IDC CIO Infographic

    APJ businesses face tremendous pressure to reduce capital expenses, maximise existing investments and improve utilisation and efficiency. Overarching management services to add value and the oversight the business needs. View this infographic to find out how.

    Sponsored By EMC

  • White Papers // Jan 2014

    Prefabricated Modular Data Centres

    Data centre systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerised, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    Analytic Databases for Big Data

    Organizations are contemplating a replacement of their analytic databases, data warehouses, and similar platforms to keep pace with new and intensifying requirements for advanced analytics in a "big data" world. As user organizations make such platform replacements -- or add additional platforms to their expanding data warehouse architectures -- they...

    Sponsored By SAP

  • White Papers // Jan 2014

    Big Data Gets Personal: Business Report

    Big data and personal data are converging to shape the Internet's most surprising consumer products. They'll predict your needs and store your memories -- if you let them. Fast-developing methods for collecting and analyzing these types of "big data" promise valuable insights to retailers, urban planners, and for individuals. This...

    Sponsored By SAP

  • White Papers // Dec 2013

    Security Intelligence is the Smart Way to Keep the Cloud Safe

    Many of the same characteristics that make cloud computing attractive can also make it challenging to secure. An integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide visibility and control to help better secure cloud environments.

    Sponsored By IBM

  • White Papers // Dec 2013

    The Benefits of an Integrated Approach to Security in the Cloud

    As cloud computing gains more traction, more businesses are beginning to align their security strategy to better manage the privacy and compliance challenges of this new deployment model. Indeed, cloud models are being used not only to add compute and storage resources, they are also becoming an imperative for data...

    Sponsored By IBM

  • Analyst Briefings // Dec 2013

    NSS Labs Network Intrusion Prevention System Product Analysis- IBM GX7800

    Learn how IBM performed in the latest NSS Labs testing, exploring the security effectiveness and performance characteristics of the GX7800 intrusion prevention appliance. This analyst paper covers: How IBM achieved an exploit block rate of 95.7% Ratings for stability/reliability and evasion Performance ratings based on "real-world" scenarios

    Sponsored By IBM

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • White Papers // Aug 2013

    Boosting Enterpise Security with Integrated Log Management

    This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how IBM® Security QRadar® Log Manager can help organizations stay a step ahead of the latest security threats.

    Sponsored By IBM

  • White Papers // Jul 2013

    Tech Tips: VMware Horizon View

    Straight from our experts at VMware®, follow these technical tips for a successful and smooth implementation of VMware Horizon View™. From application requirements to end user expectations, reference these tips as you move to a virtual desktop infrastructure.

    Sponsored By VMware

  • White Papers // Jul 2013

    IBM: An Early Leader across the Big Data Security Analytics

    This analyst paper, written by Jon Oltsik, Senior Principal Analyst at ESG, show how IBM is an early leader across Big Data Security Analytics. ESG believes that tactical security analytics solutions and compliance centric SIEM tools are no match for todays big data security analytics needs & IBM is one...

    Sponsored By IBM

  • White Papers // May 2013

    Develop an Intelligent Disaster Recovery Solution With Cloud Technologies

    If you're unhappy with the state of your current disaster recovery operations, IBM is offering a must-read Q and A. In this interview, IBM cloud experts share their insights on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps...

    Sponsored By IBM

  • White Papers // Nov 2014

    Opal Drive: Modernizing Digital File Transfers for the Decentralized Frontier

    File storage and transfer has repeatedly shown its vulnerabilities in both security and privacy and this problem is amplified when storing one's files and information in the cloud. In an effort to find a final solution to this problem, decentralized cloud storage was created. Highly skilled individuals and organizations are...

    Provided By OpalTeam

  • White Papers // Nov 2014

    SLA Provided Collaboration Cloud Using OLAP

    Cloud usage is increasing rapidly for Storage. Still there is a problem of replication of the resources when multi clouds are in consideration. This replication causes the lots of memory spaces to get wasted. Thus to get an efficient usage of the memory space, the authors are in need of...

    Provided By Creative Commons

  • White Papers // Nov 2014

    20 Questions about All Flash Arrays

    This whitepaper asks 20 simple questions about all flash arrays and how they can impact the success of your data centre roll out through purpose built flash specific design, integrated storage management stacks, content aware architecture and sustainable bandwidth performance.

    Provided By EMC

  • White Papers // Nov 2014

    Flash Implications in Enterprise Storage Array Designs

    This whitepaper examines some common practices in enterprise storage array design and their resulting trade-0ffs and limitations. The goal of this paper is to help the reader understand the opportunities XtremIO found to improve enterprise storage systems by thinking with random rather than sequential I/O in mind and to illustrate...

    Provided By EMC

  • White Papers // Nov 2014

    15 Minute Guide to Redefine Flash

    The XtremIO storage system is based on a scale-out architecture. Big, small, or anywhere in between, there’s an XtremIO array sized right for you. With a scale-out design that grows accordingly to your needs, additional performance and capacity are added in a building-block approach. XtremIO’s advanced architecture ensures that maximum...

    Provided By EMC

  • White Papers // Nov 2014

    Data Sovereignty and the Cloud

    Cloud Computing is a new way of delivering computing resources, not a new technology. Recent Legal and business developments mean renewed attention is being directed to issues arising from storage of business and personal data in the cloud in Australia, The USA and around the world.

    Provided By NextDC

  • White Papers // Nov 2014

    Journey to the Colo-enabled Cloud: the quest for profitability

    The rapid development of IT and increasing investment in cloud services has led to flexible, customised IT strategies and deployments becoming the preferred approach for organisations today. This has led to IT service providers and end-users taking advantage of a vast array of both new and tried-and-tested offerings, and adopting...

    Provided By NextDC

  • White Papers // Nov 2014

    Deloitte: Smarter Data Centre Outsourcing- Considerations for CFOs

    Is it more cost effective to outsource data centre infrastructure, than to build and manage it internally? To provide an independent perspective on this question, NEXTDC asked Deloitte to explore the business and finance implications associated with managing data centres. This paper outlines the options available to structure an organisations...

    Provided By NextDC

  • White Papers // Nov 2014

    EMC VNX Case Study: SK Telecom

    See how EMC VNX technology helped a leading global communications company to improve customer satisfaction by enhancing communication services and making the smart device environment more flexible and responsive.

    Provided By EMC

  • White Papers // Nov 2014

    Unleash the full power of Flash

    Harness the power of flash storage by building in innovations, like content based data placement and dual-stage metadata.

    Provided By EMC

  • White Papers // Nov 2014

    Make an informed flash decision

    Discover how to make all-flash array a reality. Performance, agility, scale, reliability, and advanced capabilities come together to transform IT operations as never before.

    Provided By EMC

  • White Papers // Nov 2014

    EMC’s Comprehensive Flash Strategy

    How fast is fast enough!? Discover how EMC is demonstrating, once again, its core competency for dramatic—and necessary—change within the flash storage space.

    Provided By EMC

  • White Papers // Nov 2014

    Flash: The disruptive technology powering your mobile life

    Did you know 78% of CMOs and CTOs think that custom content is the future of marketing? Learn how flash technology is transforming industries today.

    Provided By EMC

  • White Papers // Nov 2014

    Redefine Flash

    Find out why XtremIO is the industry’s leading solution, unmatched in the all-flash array market.

    Provided By EMC

  • White Papers // Nov 2014

    XtremIO Case Study: Georgia Tech

    Find out how The Georgia Institute of Technology they utilised EMC’s XtremIO technology to manage an estimated 1200 unique applications such as AutoCAD, CATIA and MATLAB via a VDI environment.

    Provided By EMC

  • White Papers // Oct 2014

    Secure Data Storage and Log Records Using JAR, AES

    In cloud to maintain data in secured manner using Java ARchive files (JAR) for data storage. Whenever user accesses the data no other will get the transactions those are occurring on JAR files. For JAR files providing security through manifest files for accessing permissions. Along with this to provide more...

    Provided By Creative Commons

  • White Papers // Oct 2014

    Improving Data Integrity for Data Storage Security in Cloud Computing

    With the provision of innumerable benefits, cloud has become an emerging standard that brings about various technologies and computing ideas for internet. Massive storage centers are provided by the cloud which can be accessed easily from any corner of the world and at any time. The on-demand service provision with...

    Provided By Creative Commons

  • White Papers // Oct 2014

    Ovum InfoGraphic - Tame the Cloud with Cloud Management

    The role of cloud virtualization is expanding into apps, servers, storage and networks. A pain point of Cloud Fragmentation can be resolved with Virtualization and Cloud Management. This infograph helps to explain the features and capabilities, execution and market impact of HP CloudSystem.

    Provided By HP

  • White Papers // Oct 2014

    Design and Implement Enhancing Security in Multi Cloud Storage System Using Distributed File System

    Distributed computing is a quickest developing engineering. It permits business associations to utilize or access diverse applications, store data without access their individual documents. While considering the force, strength and the security of cloud one can't disregard diverse dangers to client's information on distributed storage. Document access guarantee in true...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Highly Secure Method Based on Ciphertext Policy Attribute Based Encryption in Hadoop System

    Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. Cloud computing is set of resources and services offered through the Internet. The rapid growth in field of \"Cloud computing\" also increases severe...

    Provided By International Journal of Computer Applications