Premium Content

Access "Is cloud data storage right for your organisation?"

Antony Adshead and Manek Dubash Published: 26 Nov 2012

The year has been a very cloudy one. And that is not a comment on the UK’s record wet weather in 2012, but about cloud computing, cloud data storage and its near ubiquity in IT marketing. But now the hype is beginning to clear, we can assess the readiness of cloud data storage in its various guises and its limitations. So, let’s look at the various types of data – primary, nearline, backup and archive – and assess the ability of cloud data storage services to handle them. Primary cloud storage This is still cloud data storage’s weakest area, but that is not to say the cloud cannot handle primary data at all; it just has its limits. Cloud’s key technical constraints are latency and bandwidth, as a result of the fact that data is held remotely. Vendors have addressed this by devising hybrid cloud products that store hot data on local drives and this could include flash storage for fast response times. iSCSI block access is available on some hybrid cloud products so it is possible in theory to use cloud data storage for transactional and database uses. But ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Cloud likely future for business applications by Andy Hayler, Contributor

      Outsourcing your business application headaches, together with the flexibility of its leasing model will make the cloud the way forward for large enterprises as well as small businesses.

More Premium Content Accessible For Free

  • Computer Weekly buyer's guide to endpoint security
    BG_0714_endpoint_security.jpg
    E-Handbook

    In this 11-page buyer’s guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise’s ...

  • Social Engineering in IT Security
    Social-Engineering-in-IT Security.jpg
    E-Handbook

    This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how ...

  • Gartner: Digital transformation: How to survive the information crisis
    Gartner-SurviveInformationCrisis.jpg
    E-Handbook

    It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew ...