Issue OverviewIT in Europe - October 2011
In this edition of IT in Europe, discover how to break free of vendor lock-in with open source storage. Read how IT departments are using open source storage to gain cost-saving advantages. Today's disk systems cost people the largest chunk of their storage spending, and a proprietary system locks them into their vendor’s roadmap and support structure. Access >>>
Premium Content for Free.
In pursuit of affordable shared-storage options
by Antony Adshead, UK Bureau Chief
There are viable, affordable shared-storage options available via open source storage software and AoE-based gear, so why is the big-vendor regime still so powerful?
Storage thin provisioning benefits and challenges
by Stephen Foskett
Storage thin provisioning requires transparency into your storage environment and an understanding of how the technology works. We detail the benefits and challenges.
Remote and mobile data backup: Backup's last frontier
by W. Curtis Preston
With organizations becoming more mobile, the time to get a handle on mobile data backup is now.
Where is the cloud storage market headed?
by Jeff Byrne, Contributor
Break down the cloud storage services market and you’ll find players both big and small jockeying for position in key segments.
- In pursuit of affordable shared-storage options by Antony Adshead, UK Bureau Chief
Open source storage users break free of vendor lock-in
by Manek Dubash
Open source storage frees users of the need for proprietary software on top of commodity disk. Read how UK IT departments have used it to gain cost-saving advantages.
Exchange 2010 and storage systems
by Brien Posey
With Exchange Server 2010, Microsoft made some significant changes to the email app's database structure, and those changes may also affect the storage it resides on.
Tape makes a comeback (but was it ever gone?)
by Rich Castagna
Somebody out there is spreading rumors about the death of tape, but there’s plenty of life left in this venerable storage technology.
- Open source storage users break free of vendor lock-in by Manek Dubash
More Premium Content Accessible For Free
In this 11-page buyer’s guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise’s ...
This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how ...
It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew ...