Barney's Blog

Blog archive

Infinite Storage Possibilities

I've always been fascinated by storage. Not the confusing array of tools. Here's a test: Go to the EMC Web site and see if you understand how each and every tool fits in with each and every other tool. Mirroring, imaging, replication, backup (but not true restore), restore (but not true backup), file level vs. block, NAS vs. SAN. Talk about a confusing array of products -- and I haven't even gotten to the arrays.

What I like about storage is its exponential growth and the exponential possibilities. Nearly unlimited storage opens up a world (perhaps a universe) of possibilities. We could digitize our lives. It would be like a TiVo that records our every movement and sound.

But first we have to make the complex world of storage simple. Make saving simple and retrieving easier. Make finding what you find as easy as coming across what you don't.

For more on this subject, check out last month's Barney's Rubble.

Posted by Doug Barney on 05/02/2012 at 1:19 PM


Featured

  • Microsoft Publishes Windows Deadlines on Upgrading to SHA-2

    Microsoft on Friday described its 2019 timeline for when it will start distrusting Shell Hashing Algorithm-1 (SHA-1) in supported Windows systems, as well as in the Windows Server Update Services 3.0 Service Pack 2 management product.

  • Performing a Storage Refresh on Windows Server 2016, Part 1

    To spruce up some aging lab hardware, Brien decided to make the jump to all-flash storage. Here's a walk-through of the first half of the process.

  • Datacenters Are Cooling Down as Buildouts Heat Up

    Tech giants Google, Apple and others are expanding their datacenter footprints at a rapid rate, and it's pushing the industry to find better ways to power all that infrastructure.

  • Vendors Issue Patches for Linux Container Runtime Flaw Enabling Host Attacks

    This week, the National Institute of Standards and Technology (NIST) described a high-risk security vulnerability (CVE-2019-5736) for organizations using containers that could lead to compromised host systems.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.