LTO tape technology continues to evolve with LTO 5

Size: px
Start display at page:

Download "LTO tape technology continues to evolve with LTO 5"

Transcription

1 with LTO 5

2 Despite the predictions from industry experts, tape isn t dead yet and it continues to serve as a low-cost option for long-term storage for many organizations. Like all data center technologies tape. And with the latest release of LTO-5, organizations are able to trim storage costs even further. Read this SearchStorage.com E- Guide, as data backup expert, W. Curtis Preston, Discusses LTO-5 tape and its role going forward. Preston outlines how LTO tape differs from other tape media, discusses the various generations of LTO tape, and the pros and cons of LTO. LTO-5 tape is slated to be released later this year, with nearly double the capacity of its predecessor LTO-4. W. Curtis Preston, TechTarget executive editor and independent backup expert, outlines how LTO tape differs from other tape media, discusses the various generations of LTO tape, and the pros and cons of LTO in this Q&A. How does differ from other tape media? When Ultrium LTO tape backup technology first came out, the big difference from other types of tape was the LTO Consortium. So, a group of companies came together and agreed on a standard. That allows them to compete in the marketplace without hurting consumers. So you get the good aspects of competition -- tape gets faster, price gets lower, quality gets better -- without having to worry about problems related to interoperability. So, you can buy an LTO tape from any of the vendors associated with the LTO Consortium and it will work with products from any of the other vendors that are a part of the consortium. That's the biggest difference. LTO tape is linear, so the recording head is stationary and the tape moves very quickly across the head. The stripes of data are written in a line from the beginning of the tape to the end. Page 2 of 8

3 What are the pros and cons of? The biggest benefit is that LTO tape is ubiquitous. It's very common, every company supports it, all the operating systems support it, etc. The price is also a selling point. It's inexpensive and reliable. It outsells every other drive type in the midrange open-systems market by a significant margin. Another benefit for data archiving is the write once, read many (WORM) technology that was introduced in LTO-3. This feature ensures data integrity for longterm data retention. The disadvantages of LTO tape are similar or the same as other linear tape technologies. Because the tape moves at such a fast rate, there are dozens of feet of this tape passing the head per second. The problem with this is known as shoe shining. Shoe shining happens when you send data to the tape at a rate that is significantly slower than the rate that the tape is expecting. Tape has to write at a certain rate to get a good signal-to-noise ratio. If a tape is designed to run at 120 MBps, that's the speed it wants to go. When you send something like 20 MBps, it cannot go that slow. So, it speeds up to 120 MBps, writes the data, and then looks to the buffer which is now empty because you aren't supplying the right amount of data. Then, the drive stops and rewinds dozens of feet of tape across the write head. This back and forth shoe shining motion of the tape across the head wears out the tape while you decrease the throughput of the tape. Your 20 MBps turns into 10 MBps, because the drive isn't writing data when it is shoe shining. However, stepping technology has been introduced, which allows drives to step down in speed to compensate. LTO-3 and LTO-4 tape drives can step down to 25 MBps plus compression. What are the main differences between LTO 3 and LTO 4? Speed and capacity are the main differences between each generation. There is more and more data out there, so customers are looking for more and more capacity. The capacity of LTO-3 is 400 GB and it was increased to 800 GB for LTO-4 and there was a similar increase in speed from 80 MBps Page 3 of 8

4 to 120 MBps. Those were the main differences for any generation of LTO and its predecessor. However, LTO-4 introduced something very different, with drive-level encryption of backup data. Using a chip that works very much like the compression chip, LTO-4 users can encrypt data inline at line speed. LTO-5 is slated to be released later this year. What are the differences between LTO-5 and LTO-4? The main differences are going to be speed and capacity again. There is almost a doubling of capacity from 800 GB in LTO-4 to 1.5 TB native capacity for LTO-5. Interestingly, the data transfer rate only goes from 120 MBps to 140 MBps. Historically tapes have gotten faster as the electronic process for writing to tapes is refined. The tape doesn't get any bigger but more data can be written to the tape because the bits are stored closer to each other. When you store the bits closer together the tape gets faster by default. It's interesting that the capacity almost doubles with LTO-5 but the speed only increases by 10%. I think that's a good signal from the LTO Consortium that they understand that tape users need bigger and bigger tapes, but that they don't need faster and faster tapes. I applaud them for not doubling the speed from LTO-4. The faster the drive gets, the harder it is to stream data to the drive at the appropriate rate. Do you think users need this additional capacity now and will upgrade to LTO-5? It's all about the capacity. It's no secret that the world is more and more interested in disk and less and less interested in tape. However, there is still a huge market for tape for backup as well as for data archiving. Some people haven't been bitten by the data deduplication bug. Some have done the math and found that tape is still cheaper, even after deduplication. We have to deal with encryption, but the tape drives have native encryption now. There are many people that are not enamored with disk backup or they don't need it, so there is still a significant market for tape for backup and especially Page 4 of 8

5 archiving. There is no other medium that offers what tape does for archiving. The only real competition is optical, and the significant difference in price is such that most people don't even consider it. I think that, because users will always want to store more data in the same footprint, you will see users continuing to upgrade their tape infrastructure. Maybe not as many people as there might be if there was no disk backup and data deduplication, but still a significant number. enterprise tape library Spectra Logic Corporation today released the ExaScale T-Finity enterprise tape library; a high capacity storage system the company said is capable of storing more than 3.6 exabytes of data with up to 400,000 tape slots. Spectra also introduced new management software and features that the company said will increase performance and the useful lifespan of tapes. Spectra s ExaScale T-Finity tape library supports LTO and IBM TS1140 tape drives. A new T-Finity complex can scale to eight libraries, with each library holding up to 40 frames. A fully loaded complex with 400,000 slots could hold 1.2 exabytes with LTO-5 drives (2:1 compression) and 3.6 exabytes with TS1140 drives (3:1 compression). Spectra said its new library scales beyond libraries from enterprise tape library market leaders Oracle and IBM. Oracle s StorageTek SL8500 Modular Library System holds 100,000 slots and 1 exabyte with LTO drives, and the IBM TS3500 has 300,000 slots for 2.7 exabytes with TS1140 drives and 900 PB for LTO drives. Spectra also released Version 12 of its BlueScale management software, adding faster barcode scanning, enhanced motion codes, SSL web certificates and an XML Open Library API so customers can develop software apps for improved tape management. The vendor claims the faster Page 5 of 8

6 barcode scanning and motion code enhancements will significantly speed robotic performance for its enterprise and midrange tape libraries. BlueScale 12 is available on all Spectra T-Series tape libraries and is a free upgrade for current customers. Other Spectra enhancements include a Carbide Clean pre-cleaning media process and Bulk TeraPack Access Port (TAP) system for importing and exporting tapes faster. Carbide Clear cleans tapes before they are shipped, which the vendor claims extends the life of the media. According to Molly Rector, Spectra s chief marketing officer, new tapes accumulate debris during the manufacturing process, which can cause excessive wear on drive heads and reduce their life span. By adding the mechanical cleaning process with a carbide blade, Rector said Spectra can double the useful life of a tape from 800 hours to 1,600 hours. When you get hundreds of thousands of tapes, this becomes very important, Rector said. Bulk TAP is an optional feature on Spectra s T950 and T-Finity enterprise tape libraries that allows administrators to import and export up to 140 tapes at a time, or up to 500 TB of data. According to Enterprise Strategy Group senior analyst Mark Peters, Spectra Logic s tape and management enhancements are part of the company s efforts to convince administrators that tape remains relevant and useful for storage. Tape is perceived badly because over the decades that we ve been using it, it s typically been unreliable because it s uncertain that you ll be able to read what s there, Peters said. It s also been very hard to find what s where. He said that rightly or wrongly, disk is perceived to be much more reliable than tape. Page 6 of 8

7 Peters mentioned that he is specifically interested in the BluScale Version 12 update because it includes the XML API, which organizations can use to develop customized searching capabilities. Peters said improved search is a key for the continued use of tape storage. Administrators want more certainty that data stored on tape will be where the system says it is and it will be readable, he said. Page 7 of 8

8 Free resources for technology professionals TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. What makes TechTarget unique? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. Related TechTarget Websites Page 8 of 8

BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS

BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS E-Guide BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS SearchSolidState Storage A ll-flash storage arrays are becoming Tier-1 storage for mission-critical data. This e-guide showcases the progression

More information

FIVE PERVASIVE FLASH-BASED STORAGE MYTHS

FIVE PERVASIVE FLASH-BASED STORAGE MYTHS E-Guide FIVE PERVASIVE FLASH-BASED STORAGE MYTHS SearchSolidState Storage F lash has rapidly moved from a niche storage product that was used to differentiate storage vendors to a ubiquitous technology.

More information

Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED

Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED T here s two ways you can build your mobile applications: native applications, or mobile cloud applications. Which option is

More information

Benefits of virtualizing your network

Benefits of virtualizing your network While server virtulization can improve your infrastructure as a whole, it can affect. Extending virtualization to can eliminate any unnecessary impacts and allow you to maximize your virtual investment.

More information

ios7: 3 rd party or platform-enabled MAM? Taking a look behind the scenes with Jack Madden

ios7: 3 rd party or platform-enabled MAM? Taking a look behind the scenes with Jack Madden ios7: 3 rd party or platform-enabled? Taking a look behind the scenes with Jack Madden party and platform-enables difference between 3rd party and platform-enabled Jack Madden You re probably well aware

More information

Advanced analytics key component for decision management systems

Advanced analytics key component for decision management systems decision management In the last 20 to 30 years, companies have faced significant changes in how they perform their day-to-day operations, and so have the analytics used to make decisions. In this Q&A Tip

More information

E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD

E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD T o d ay, n e a r ly e v e r y IT function is available as a cloud-based service: email, payroll, HR, analytics, and on and on. While higher-level

More information

5 ways to leverage the free VMware hypervisor Key tips for working around the VMware cost barrier

5 ways to leverage the free VMware hypervisor Key tips for working around the VMware cost barrier 5 ways to leverage the free VMware Key tips for working around the VMware cost barrier While a free VMware virtualization setup only provides a limited list of features and functionalities, the shortcomings

More information

HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT

HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT E-Guide HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT SearchSolidState Storage P erformance is the driving factor for the vast majority of companies considering a solid-state storage

More information

Server OS Buyer s Guide Vendor-neutral tips for choosing the best server operating system for your organization

Server OS Buyer s Guide Vendor-neutral tips for choosing the best server operating system for your organization Vendor-neutral tips for choosing the best server operating system for your organization Traditionally, choosing a server operating system meant simply selecting between Windows or Linux. However, now organizations

More information

The changing face of scale-out networkattached

The changing face of scale-out networkattached scale-out network-attached scale-out network-attached By: Carol Sliwa The face of network-attached (NAS) is changing. Enterprise IT shops are increasingly seeking out the latest wave of scale-out network-attached

More information

Massive SAN Backups. HP World 2002 Los Angeles, CA September, 2002 Denys Beauchemin. The Innovators. We watch your data

Massive SAN Backups. HP World 2002 Los Angeles, CA September, 2002 Denys Beauchemin. The Innovators. We watch your data Massive SAN Backups HP World 2002 Los Angeles, CA September, 2002 Denys Beauchemin Page 1 Agenda Current bottlenecks Splits and multiplex DLT Libraries Backup Server DLT Library sharing between systems

More information

Virtualization backup tools: How the field stacks up

Virtualization backup tools: How the field stacks up tools: How the field Searching for the right virtual backup tools can be a grueling process. While there are plenty of available options, you must make sure to select the most effective products for a

More information

An Oracle White Paper September 2013. Lowering Storage Costs with the World's Fastest, Highest Capacity Tape Drive

An Oracle White Paper September 2013. Lowering Storage Costs with the World's Fastest, Highest Capacity Tape Drive An Oracle White Paper September 2013 Lowering Storage Costs with the World's Fastest, Highest Capacity Tape Drive Executive Overview... 1 Introduction... 1 Unmatched Capacity and Performance... 3 Lowering

More information

Hybrid cloud computing explained

Hybrid cloud computing explained computing explained A few years ago, the IT industry was focused on public cloud computing. Then after facing public cloud security issues, the focus shifted to private clouds. And now the focus has shifted

More information

E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS

E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS B lock-based SANs and file-based networkattached storage are traditional technologies, and new trends and innovations continue to emerge with these age

More information

E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES

E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES M id-sized companies plan to use more managed services and many see it as improving security. Read on to find

More information

Evaluating SaaS vs. on premise for ERP systems

Evaluating SaaS vs. on premise for ERP systems Evaluating SaaS vs. on premise Increasingly organizations are given more options and evaluating SaaS vs. on premise options can be challenging for organizations. In this expert E-Guide, readers will learn

More information

Exchange Server 2010 backup and recovery tips and tricks

Exchange Server 2010 backup and recovery tips and tricks Exchange Server backup and recovery tips and tricks Exchange Server backup and recovery Exchange Server A big part of your job as an Exchange Server administrator involves preparing for and recovering

More information

E-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED

E-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED E-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED M obility spurs video conferencing software need; users want software-and cloud-based offerings to interoperate with their legacy

More information

2013 Cloud Storage Expectations

2013 Cloud Storage Expectations 2013 Cloud Storage Expectations cloud A recent TechTarget Survey suggests that while many IT budgets are decreasing or remaining flat, cloud projects are still on the rise and will continue to be throughout

More information

E-Guide to Mobile Application Development

E-Guide to Mobile Application Development Mobilizing enterprise applications for the consumerization of for The rise of the mobile device in the enterprise is changing the way users access and share information at work, as well as how developers

More information

The State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools

The State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools The State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools Why have virtual desktops been positioned as a cure-all for many of today s endpoint

More information

Cloud Storage: Top Concerns, Provider Considerations, and Application Candidates

Cloud Storage: Top Concerns, Provider Considerations, and Application Candidates Cloud Storage: Top Concerns, Provider Considerations, and Application Candidates As cloud technology and deployment models become increasingly sophisticated, once-wary storage professionals are plunging

More information

Software Defined Networking Goes Well Beyond the Data Center

Software Defined Networking Goes Well Beyond the Data Center Software Defined Goes Well Software Defined Goes Well Software-defined networking (SDN) is already changing the data center network, but now the technology could redefine other parts of the network, as

More information

How to Develop Cloud Applications Based on Web App Security Lessons

How to Develop Cloud Applications Based on Web App Security Lessons Applications Based on Before moving applications to the public cloud, it is important to implement security practices and techniques. This expert E-Guide provides guidance on how to develop secure applications

More information

Preparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration

Preparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration Eight essential tips for a successful How a The move to the cloud is happening and it s happening now. But before you jump start your cloud migration project, be sure you understand how to adequately prepare

More information

Streamlining the move to the cloud. Key tips for selecting the right cloud tools and preparing your infrastructure for migration

Streamlining the move to the cloud. Key tips for selecting the right cloud tools and preparing your infrastructure for migration Streamlining the move to the cloud Key tips for selecting the right cloud tools and preparing your infrastructure for migration When planning for a, you must (1) carefully evaluate various cloud tools

More information

WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS

WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS E-Guide WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS SearchDataCenter D ata center managers have a handful of new converged and hyper-converged infrastructure to choose from, and though there are components

More information

Data warehouse software bundles: tips and tricks

Data warehouse software bundles: tips and tricks Data software bundles: tips and tricks Data software bundles: Data The emergence of data appliances has broadened the potential uses of business intelligence (BI) and analytics within many organizations

More information

Many government agencies are requiring disclosure of security breaches. 32 states have security breach similar legislation

Many government agencies are requiring disclosure of security breaches. 32 states have security breach similar legislation Is it safe? The business impact of data protection. Bruce Master IBM LTO Program Linear Tape-Open, LTO, LTO Logo, Ultrium and Ultrium Logo are trademarks of HP, IBM and Quantum in the US and other countries.

More information

Strategies for Writing a HIPAA-Friendly BYOD Policy

Strategies for Writing a HIPAA-Friendly BYOD Policy Strategies for Writing a HIPAA-Friendly BYOD Policy Strategies for Friendly With bring-your-own-device (BYOD) on the rise, it is essential for CIOs to secure their networks against data breaches especially

More information

The skinny on storage clusters

The skinny on storage clusters The skinny on storage clusters Storage clustering can mean different things based on the vendor and the architecture which the technology is built on, but the features or benefits are usually similar across

More information

E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE

E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE T he VMware software-defined data center turns virtualization into Infrastructure as a Service with automation and self-service.

More information

Managing the supply chain for SAP

Managing the supply chain for SAP Managing the supply chain for SAP Supply chain projects around collaboration with suppliers, contract lifecycle management and transportation management can provide a quick return on investment (ROI) for

More information

Managing Virtual Desktop Environments

Managing Virtual Desktop Environments Managing Virtual Desktop Environments Desktop virtualization can be extremely beneficial to a company's operating system environment. Yet while working through the virtualization planning process, IT professionals

More information

Unlocking data with document capture and imaging

Unlocking data with document capture and imaging Unlocking data with capture and imaging Unlocking data with Before organizations can banish paper from the office, proper and capture processes must be adopted. This E-Guide reveals the keys to effective

More information

Expert guide to achieving data center efficiency How to build an optimal data center cooling system

Expert guide to achieving data center efficiency How to build an optimal data center cooling system achieving data center How to build an optimal data center cooling system Businesses can slash data center energy consumption and significantly reduce costs by utilizing a combination of updated technologies

More information

Is it Safe? The business impact of data protection. Bruce Master IBM LTO Program

Is it Safe? The business impact of data protection. Bruce Master IBM LTO Program Is it Safe? The business impact of data protection. Bruce Master IBM LTO Program Linear Tape-Open, LTO, LTO Logo, Ultrium and Ultrium Logo are trademarks of HP, IBM and Quantum in the US and other countries.

More information

<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures

<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures 1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage

More information

3 common cloud challenges eradicated with hybrid cloud

3 common cloud challenges eradicated with hybrid cloud 3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,

More information

Storage for Exponential Data

Storage for Exponential Data Storage for Exponential Data Organizations that need to manage large quantities of data continually face an ongoing challenge: managing data growth simply and economically. As your storage increases, you

More information

Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY

Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY C ontinuous delivery offers a number of opportunities and for organizations. By automating the software buildtest-deployment

More information

Social channels changing contact center certification

Social channels changing contact center certification changing contact center certification Companies can expect big changes in contact center certification beginning next year. Many will see overhauled programs for certifications that address the full range

More information

E-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS

E-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS E-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS T his e-guide teaches you the importance of collaboration on a micro level for defending against cyber threats. Learn how to embed security practices

More information

MDM features vs. native mobile security

MDM features vs. native mobile security vs. : Mobile device management or MDM plays a critical role in, but should always trump native security features of mobile devices? Lisa Phifer weighs in on how to choose the best approach for your workforce.

More information

Debunking Five Myths About Tape Storage. Tech Brief. an Internet.com Tech Brief. 2011, Internet.com, a division of QuinStreet, Inc.

Debunking Five Myths About Tape Storage. Tech Brief. an Internet.com Tech Brief. 2011, Internet.com, a division of QuinStreet, Inc. Debunking Five Myths About Tape Storage Tech Brief an Technological change is part of life, and that s true whether you re in your living room or in the data center at the office. Machines and devices

More information

Ten Reasons Why You Should Consider Enterprise-Class Tape for Open Systems Storage

Ten Reasons Why You Should Consider Enterprise-Class Tape for Open Systems Storage Ten Reasons Why You Should Consider Enterprise-Class Tape for Open Systems Storage THE CLIPPER GROUP Captain s Log TM Published Since 2001 Report #TCG2010025 July 12, 2011 Ten Reasons Why You Should Consider

More information

E-Guide SHAREPOINT UPGRADE BEST PRACTICES

E-Guide SHAREPOINT UPGRADE BEST PRACTICES E-Guide SHAREPOINT UPGRADE BEST PRACTICES I n keeping with its practice of updating the collaboration platform SharePoint roughly every three years, Microsoft delivered another version,. Not that it is

More information

Rethink defense-in-depth security model

Rethink defense-in-depth security model e-guide E-Guide Rethink defense-in-depth By Mike Rothman Rethink defense-in-depth T oday s endpoint security modevl is failing. What s next? Learn why endpoint defense-in-depth controls must assume the

More information

CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY?

CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY? E-Guide CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY? SearchCloud Security M ore and more certifications are being created around cloud security. An expert looks at some of the more prominent

More information

Advantages on Green Cloud Computing

Advantages on Green Cloud Computing Advantages on Green Advantages of Green A growing number of organizations are becoming more green-conscious as there are several advantages of green IT. In this e-guide, brought to you by SearchDataCenter.com,

More information

E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE

E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE W hy the need for a baseline? A baseline is a set of metrics used in network performance monitoring to define the normal

More information

A Guide to MAM and Planning for BYOD Security in the Enterprise

A Guide to MAM and Planning for BYOD Security in the Enterprise A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.

More information

GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE

GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE Solution Spotlight GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE SearchFinancial Applications selection C hoosing the right can be challenging, especially as purchasing has evolved to encompass the basics

More information

Hyper-V 3.0: Creating new virtual data center design options Top four methods for deployment

Hyper-V 3.0: Creating new virtual data center design options Top four methods for deployment Creating new virtual data center design options Top four for deployment New features of Hyper-V provide IT pros with new options for designing virtual data centers. Inside this e-guide, our experts take

More information

E-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY

E-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY E-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY and mean for F or IT managers, has always been high priority, however the new IT landscape and increased deployment of cloud has complicated the

More information

Aligning Public Cloud Strategies to Improve Server Efficiency

Aligning Public Cloud Strategies to Improve Server Efficiency How to Successfully Implement Cloud Strategies Aligning Rather than simply being swept up in the cloud computing trend, IT admins must be careful to implement cloud strategies that match their organization's

More information

Moving to the Cloud: A guide for Southeast Asian IT and Business Managers

Moving to the Cloud: A guide for Southeast Asian IT and Business Managers Moving to the Cloud: A guide for Southeast Asian IT and Business Managers Prepare for with these key strategies on cutting costs and managing risk Realizing true value from the cloud requires strong planning

More information

Securing the SIEM system: Control access, prioritize availability

Securing the SIEM system: Control access, prioritize availability The prospect of a SIEM system crash or compromise should scare any enterprise given the role it plays in an organization s security infrastructure. This expert E-Guide discusses the implications of a compromised

More information

Managing Data Center Growth Explore Your Options

Managing Data Center Growth Explore Your Options Managing Growth Explore Your Options Managing Growth: Managing The increasing demand on data centers has forced many IT managers to look for new ways to manage data center growth, either by consolidating,

More information

Does consolidating multiple ERP systems make sense?

Does consolidating multiple ERP systems make sense? Does consolidating make sense? Many manufacturers run or multiple instances of one system as a result of past mergers and acquisitions; others choose to deliberately adopt different systems to meet compliance

More information

Tips to ensuring the success of big data analytics initiatives

Tips to ensuring the success of big data analytics initiatives Tips to ensuring the success of big data Big data analytics is hot. Read any IT publication or website and you ll see business intelligence (BI) vendors and their systems integration partners pitching

More information

Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS

Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS M ost storage vendors now offer all-flash storage arrays, and many modern organizations recognize the need for these highperformance

More information

TIPS TO HELP EVALUATE AND DEPLOY FLASH STORAGE

TIPS TO HELP EVALUATE AND DEPLOY FLASH STORAGE E-Guide TIPS TO HELP EVALUATE AND DEPLOY FLASH STORAGE SearchSolidState Storage F lash storage might seem like an easy answer for your applications because of its high performance, but deciding where to

More information

E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT

E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT F or many reasons, has become a critical issue for many IT organizations and enterprise s alike. With many licensing options, hurdles and

More information

Best and worst practices for Exchange email archiving

Best and worst practices for Exchange email archiving practices for Exchange email archiving Managing an email system can be difficult and frustrating. Add to that the burden of email archiving and even the most experienced IT pro is challenged. In this expert

More information

The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals

The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals Virtualization is a well-established in today s IT environments, but it still remains a top priority among

More information

Taming Big Data Storage with Crossroads Systems StrongBox

Taming Big Data Storage with Crossroads Systems StrongBox BRAD JOHNS CONSULTING L.L.C Taming Big Data Storage with Crossroads Systems StrongBox Sponsored by Crossroads Systems 2013 Brad Johns Consulting L.L.C Table of Contents Taming Big Data Storage with Crossroads

More information

Implementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive

Implementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive Using XenData Software and a Spectra Logic Archive With the Video Edition of XenData Archive Series software on a Windows server and a Spectra Logic T-Series digital archive, broadcast organizations have

More information

WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY

WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY CONTENTS Storage and Security Demands Continue to Multiply.......................................3 Tape Keeps Pace......................................................................4

More information

Tape. Emerging Storage Technology Panel IEEE/NASA Conference MSST2008 September 25, 2008

Tape. Emerging Storage Technology Panel IEEE/NASA Conference MSST2008 September 25, 2008 Tape IBM Tape Systems Emerging Storage Technology Panel IEEE/NASA Conference MSST2008 September 25, 2008 Glen Jaquette IBM Distinguished Engineer / Architect Tape Drives, Automation, & Subsystems 2008

More information

HOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO

HOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO E-Guide HOW MICROSOFT AZURE AD USERS CAN EMPLOY SearchSecurity HOW MICROSOFT AZURE AD USERS CAN EMPLOY T echnology journalist David Strom explaims how to use Azure Active Directory and Azure Multifactor

More information

Seriously: Tape Only Backup Systems are Dead, Dead, Dead!

Seriously: Tape Only Backup Systems are Dead, Dead, Dead! Seriously: Tape Only Backup Systems are Dead, Dead, Dead! Agenda Overview Tape backup rule #1 So what s the problem? Intelligent disk targets Disk-based backup software Overview We re still talking disk

More information

E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE

E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE W orking with individual in hybrid cloud can be complex, but Quality of Experience can be

More information

IBM Half High LTO Gen 4 SAS Tape Drive

IBM Half High LTO Gen 4 SAS Tape Drive IBM Half High LTO Gen 4 SAS Tape Drive Midrange storage for demanding backup, archival and regulatory compliance requirements Highlights Midrange LTO cartridge capacity of up to 1.6 TB 1 Provides data

More information

7 remote office backup options: Which is right for you?

7 remote office backup options: Which is right for you? 7 remote office backup options: Which is right for you? Data protection for remote and branch offices has always been on top of the pain point list for storage administrators. However, with a recent uptick

More information

Deduplication has been around for several

Deduplication has been around for several Demystifying Deduplication By Joe Colucci Kay Benaroch Deduplication holds the promise of efficient storage and bandwidth utilization, accelerated backup and recovery, reduced costs, and more. Understanding

More information

Desktop virtualization: Best practices for a seamless deployment

Desktop virtualization: Best practices for a seamless deployment Desktop virtualization: Best practices for a For years, virtualization efforts have centered on servers and storage, as opposed to desktops and rightfully so. The technology has evolved faster with fewer

More information

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E ach enterprise cloud service has different capabilities. This expert E-Guide deep dives into how to know what you re getting

More information

STORAGE. Buying Guide: TARGET DATA DEDUPLICATION BACKUP SYSTEMS. inside

STORAGE. Buying Guide: TARGET DATA DEDUPLICATION BACKUP SYSTEMS. inside Managing the information that drives the enterprise STORAGE Buying Guide: DEDUPLICATION inside What you need to know about target data deduplication Special factors to consider One key difference among

More information

Best Practices for Scaling a Big Data Analytics Project

Best Practices for Scaling a Big Data Analytics Project Best Practices for Scaling a Big Data Analytics Project Putting an effective "big data" analytics plan in place can be a challenging proposition; thankfully, many proven data management and business intelligence

More information

Skills shortage, training present pitfalls for big data analytics

Skills shortage, training present pitfalls for big data analytics present pitfalls for big The biggest challenges related to big data analytics, according to consultants and IT managers, boil down to a simple one-two punch: The technology is still fairly raw and user-unfriendly,

More information

E-Guide THE CHALLENGES BEHIND DATA INTEGRATION IN A BIG DATA WORLD

E-Guide THE CHALLENGES BEHIND DATA INTEGRATION IN A BIG DATA WORLD E-Guide THE CHALLENGES BEHIND DATA INTEGRATION IN A BIG DATA WORLD O n one hand, while big data applications have eliminated the rigidity of the data integration process, they don t take responsibility

More information

E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES

E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES I n this E-Guide, Mike Chapple; a Search- Security.com expert discusses the new PCI Mobile Payment Acceptance Security Guidelines

More information

E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING

E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING E mployees are circumventing IT protocols and turning to unsanctioned tools such as file-sharing, messaging, collaboration and social media

More information

BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS

BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS E-Guide BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS SearchHealthIT W ith a focus on, the next wave of EHRs will incorporate powers of big data, speech recognition and new database models. This eguide

More information

Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends

Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends A Podcast Briefing produced by Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends Sponsored By: Key Trends in the Identity and Access Management Market

More information

5 free Exchange add-ons you should consider Eliminating administration pain points on a budget

5 free Exchange add-ons you should consider Eliminating administration pain points on a budget 5 free Exchange add-ons you should Eliminating administration pain points on a budget There are countless cost-free ways to supplement the basic features that come with Exchange and that help to streamline

More information

Optimizing Your Backup System

Optimizing Your Backup System NEXTGEN BACKUP SEMINAR PRESENTATION DOWNLOAD Optimizing Your Backup System presentation one Optimizing Your Backup System The backup system is one of the most expensive and troublesome systems in your

More information

A View on the Future of Tape

A View on the Future of Tape R. Fontana, G. Decad IBM Systems September 10, 2015 A View on the Future of Tape 2015 IBM Corporation 1 A View on the Future of Tape TAPE, HDD, NAND Flash are alive and evolving Post Consumer Nature of

More information

Tape Storage at Sun. Dwayne Edling Manager Archive Development Sun Microsystems, Inc.

Tape Storage at Sun. Dwayne Edling Manager Archive Development Sun Microsystems, Inc. Tape Storage at Sun Dwayne Edling Manager Archive Development Sun Microsystems, Inc. Agenda Overview > Leveraging our heritage > Current position > Competitive strengths > Roadmaps Choice Our broad end-to-end

More information

A Comparative TCO Study: VTLs and Physical Tape. With a Focus on Deduplication and LTO-5 Technology

A Comparative TCO Study: VTLs and Physical Tape. With a Focus on Deduplication and LTO-5 Technology White Paper A Comparative TCO Study: VTLs and Physical Tape With a Focus on Deduplication and LTO-5 Technology By Mark Peters February, 2011 This ESG White Paper is distributed under license from ESG.

More information

STORAGE SOURCE DATA DEDUPLICATION PRODUCTS. Buying Guide: inside

STORAGE SOURCE DATA DEDUPLICATION PRODUCTS. Buying Guide: inside Managing the information that drives the enterprise STORAGE Buying Guide: inside 2 Key features of source data deduplication products 5 Special considerations Source dedupe products can efficiently protect

More information

How To Protect Your Online Backup From Being Hacked

How To Protect Your Online Backup From Being Hacked Cloud Backup: Pros, Cons, and Cloud backup has taken the storage world by storm, and most IT professionals have given some serious thought to implementing it. But before you get started on your cloud backup

More information

Key best practices for cloud testing

Key best practices for cloud testing Key best s for testing Key best s for testing and your testing Doing software testing in environments offers economies and scalability possibilities that are intriguing to software development companies

More information

EMC BACKUP MEETS BIG DATA

EMC BACKUP MEETS BIG DATA EMC BACKUP MEETS BIG DATA Strategies To Protect Greenplum, Isilon And Teradata Systems 1 Agenda Big Data: Overview, Backup and Recovery EMC Big Data Backup Strategy EMC Backup and Recovery Solutions for

More information

Big Data and the Data Warehouse

Big Data and the Data Warehouse Big Data and the Data Warehouse When the phrase big data management hit the data management and business intelligence (BI) industry, it had many IT professionals wondering if it would be the real deal

More information

Matthew Parker Chief Technologist Dimensional DBA, LLC

Matthew Parker Chief Technologist Dimensional DBA, LLC Backups and Cold Storage: Scaling And Cost Containment With Tape Storage At The PB Scale And Beyond Without the Disk Cloud. Tape Vs. Disk In the Real World. Matthew Parker Chief Technologist Dimensional

More information

Is Your Data Safe in the Cloud?

Is Your Data Safe in the Cloud? Is Your Data Safe in the? Is Your Data Safe in the? : Tactics and Any organization likely to be using public cloud computing are also likely to be storing data in the cloud. Yet storing data in the cloud

More information