The state of MAID 2.0: Finer control of power usage

MAID 1.0 might have been a bust in the market, but MAID 2.0 advances the class of products by delivering a finer ability to control power usage of hard disk.

The next generation of MAID-dedicated products, called MAID 2.0, offer a finer-grained ability to control power usage of hard disks than in the past, and storage arrays are also gaining the ability to spin down disk.

This special report on MAID and disk spin down details the state of MAID 2.0: the capabilities, vendors and available products to control power usage of hard disk. Also included is a podcast with Ian Lock, storage practice lead at GlassHouse Technologies (UK) on MAID 1.0 vs. MAID 2.0 and the best use cases for the technology.

MAID 2.0 and disk spin down reduce energy costs
MAID 2.0 and disk spin down technologies power down disks according to use, making them prime technologies to reduce energy costs and cut the cost of storing persistent data. Find out how the technologies work and the varying levels of control in MAID 2.0 products; plus, read about how one UK university is controlling power usage using Nexsan's AutoMAID.

MAID 2.0 products evolve to incorporate disk spin down
Read about the key benefits of MAID 2.0 products and disk spin down-featured products, and get details on the products available to control power usage of hard disks.

MAID 2.0 technology, disk spin down can help users achieve green storage
In this podcast, Ian Lock, storage practice manager at GlassHouse Technologies (UK), defines MAID 2.0 and disk spin down, explains the differences between MAID 1.0 and MAID 2.0, lays out each technology's benefits and drawbacks, and outlines their best use cases.

This was first published in April 2010



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Storage management and strategy



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...