Data Storage

Computer data storage is accomplished on a variety of physical devices including memory chips, disk and tape drives, flash and other solid state memory and new storage mediums that store and read information. Data storage is an overhead archival cost that must also be managed for risk and compliance across a lifecycle of demand, usability and disposal.

What to earn top dollar for your top database skills? Being certified or proficient in these skills will give your paycheck a boost of 10 percent, or more.
The end of the year always brings predictions for what we can expect in the year ahead. DriveScale’s chief scientist Tom Lyon looks into the crystal ball for his thoughts on what’s in store for hyperconverged systems and the data center.
NewsA Moscow district court decision last week said that LinkedIn had failed to observe a 2014 federal law that internet companies that process the personal data of Russian citizens must store that data in Russia.
BlogThere are three areas where it seems like potentially new next-practices are emerging. But it's unclear if these are baked, or fully thought through.
Comments (1)
Gartner Group’s Magic Quadrant for Data Center Outsourcing has identified 19 top firms for this critical work. In part one we introduced the Leaders and Niche Players. Today we focus on the Challengers and Visionaries.
BlogWhile data storage is becoming less expensive, the rate of data growth is such that the cost of processing, auditing, securing and exploiting data is rising faster than any savings accrued through decreasing storage costs.
FeatureEvery data lake project must have a line of business champion and goal. Just like every other project. Projects without a funding business sponsor tend to fail.
Comments (1)
BlogThe good news is that the business data lake and the data warehouse concepts can easily exist side by side –they can be viewed as ideal companions solving quite a number of issues by being together.
BlogThe design of some IT systems can leave gaps, particularly between the application and the database. Understanding and pointing out these gaps should be the concern of all IT auditors.
FeatureSince no data is taken in a ransomware attack, many perimeter security products cannot fight or counteract the loss if it’s successful in breaching an organization.
FeatureEnterprises are increasingly turning to all-flash arrays to support their data centers and prepare their business for what’s next. They must focus on three critical strategies to ensure success.
FeatureA growing number of companies are exploring data lakes, but many struggle with how to turn raw material into actionable insights, according to Rich Dill, an enterprise solution architect at SnapLogic.
Please note you must now log in with your email address and password.