Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

11/6/2010
07:02 PM
Kurt Marko
Kurt Marko
Commentary
Connect Directly
Facebook
LinkedIn
Twitter
RSS
E-Mail
50%
50%

InformationWeek State of Storage Survey

I will be writing InformationWeek's annual State of Storage report in the next few weeks and in preparation InformationWeek Analytics is conducting its third annual storage survey on data management technologies and strategies. We are surveying IT pros to understand your storage usage and challenges. We're also interested in what our readers think are the major trends, both from a technology and business perspective, in the storage world this year.

I will be writing InformationWeek's annual State of Storage report in the next few weeks and in preparation InformationWeek Analytics is conducting its third annual storage survey on data management technologies and strategies. We are surveying IT pros to understand your storage usage and challenges. We're also interested in what our readers think are the major trends, both from a technology and business perspective, in the storage world this year.While the survey provides some great quantitative data, I would also welcome a discussion here on the blog. Some of the technology trends I see accelerating in the coming year include:

  • I/O improvements: 10GbE/8-gig FC array support; bigger caches, integrated SSDs, etc.
  • Versatility improvements: multi-protocol support (iSCSI, FC and NAS/network filesystem) on the same box; multiple drive types (e.g. SAS, SATA, even SSD) per array
  • Expandability/Scalability: ability to manage multiple arrays as a system; create multi-array storage pools
  • Efficiency Improvements: automatic data migration between tiers, integrated data reduction technology (compression, dedupe, etc.) and data reduction on primary (Tier 1) storage
  • Virtualization support: thin provisioning; virtual storage allocation/over subscription
  • Hybrid On-premises/cloud storage architectures; automatic migration of archival data to the cloud
  • What do you think? What are your biggest data management challenges? Capacity growth? Throughput/performance? Data management? Take the survey and share your comments.

    The survey will take under 10 minutes to complete, and as a little incentive, at the end you'll be eligible to win a 32GB iPod Touch (a sweet little device, essentially an iPhone without the phone) from TechWeb. Your responses will remain confidential and will only be reported in aggregate.

    To take the survey, simply click here.

    Contest rules are here.

    Comment  | 
    Print  | 
    More Insights
    Comments
    Newest First  |  Oldest First  |  Threaded View
    Commentary
    Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
    Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
    Edge-DRsplash-10-edge-articles
    7 Powerful Cybersecurity Skills the Energy Sector Needs Most
    Pam Baker, Contributing Writer,  6/22/2021
    News
    Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
    Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    The State of Cybersecurity Incident Response
    In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-2322
    PUBLISHED: 2021-06-23
    Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 ...
    CVE-2021-20019
    PUBLISHED: 2021-06-23
    A vulnerability in SonicOS where the HTTP server response leaks partial memory by sending a crafted HTTP request, this can potentially lead to an internal sensitive data disclosure vulnerability.
    CVE-2021-21809
    PUBLISHED: 2021-06-23
    A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
    CVE-2021-34067
    PUBLISHED: 2021-06-23
    Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.
    CVE-2021-34068
    PUBLISHED: 2021-06-23
    Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.