Storage: special report

Jennifer Scott takes an in-depth look at everything you need to know when it comes to storage.

Next on the list was thin provisioning as a way to deal with over-subscription.

"When you go to an airport for a flight and they have sold more seats than they were meant to have, they know the user behaviour and they know that they are probably going to be safe it is exactly same thing with thin provisioning," said Reichman.

"Everybody gets an allocation that is bigger than what the physical resource actually is, so you know they are probably not going to use it on day one but it allows for growth over time."

The final feature that we have watched grow in demand over the last year is deduplication, a technology designed to eliminate duplicate copies of data. The deduplicating process can happen with files or at block level and either in-line or at the target.

Advertisement
Advertisement - Article continues below

"As the technology improves, we are seeing more granular deduplication that compares more chunks of data and therefore offers more reduction in size," said Reichman. "Deduplication has seen the biggest benefits where there is a lot of repetition of data, so virtual servers or virtual desktop and departmental file storage is probably the three leading stories for this technology."

The role of storage in the cloud

Not a day goes by without a mention of cloud computing. So many technology companies are basing their product portfolio on this type of environment and are optimising each piece to be used in the cloud.

Businesses are also taking the option more seriously and are looking to adopt cloud environments in the future. If they aren't using it already, that is.

With such a dominant technology on the horizon, what part does storage have to play?

Reichman claimed to see three different usage cases for storage in the cloud and first off was applications like Salesforce.com or Google Mail.

This would allow storage to become more of a service and would change the whole way users purchased it in the future.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Visit/strategy/28115/the-pros-and-cons-of-net-neutrality
Business strategy

The pros and cons of net neutrality

4 Nov 2019
Visit/domain-name-system-dns/34842/microsoft-embraces-dns-over-https-to-secure-the-web
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
Visit/social-media/34844/can-wikipedia-founders-social-network-really-challenge-facebook
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019