Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

11/6/2010
07:02 PM
Kurt Marko
Kurt Marko
Commentary
Connect Directly
Facebook
LinkedIn
Twitter
RSS
E-Mail
50%
50%

InformationWeek State of Storage Survey

I will be writing InformationWeek's annual State of Storage report in the next few weeks and in preparation InformationWeek Analytics is conducting its third annual storage survey on data management technologies and strategies. We are surveying IT pros to understand your storage usage and challenges. We're also interested in what our readers think are the major trends, both from a technology and business perspective, in the storage world this year.

I will be writing InformationWeek's annual State of Storage report in the next few weeks and in preparation InformationWeek Analytics is conducting its third annual storage survey on data management technologies and strategies. We are surveying IT pros to understand your storage usage and challenges. We're also interested in what our readers think are the major trends, both from a technology and business perspective, in the storage world this year.While the survey provides some great quantitative data, I would also welcome a discussion here on the blog. Some of the technology trends I see accelerating in the coming year include:

  • I/O improvements: 10GbE/8-gig FC array support; bigger caches, integrated SSDs, etc.
  • Versatility improvements: multi-protocol support (iSCSI, FC and NAS/network filesystem) on the same box; multiple drive types (e.g. SAS, SATA, even SSD) per array
  • Expandability/Scalability: ability to manage multiple arrays as a system; create multi-array storage pools
  • Efficiency Improvements: automatic data migration between tiers, integrated data reduction technology (compression, dedupe, etc.) and data reduction on primary (Tier 1) storage
  • Virtualization support: thin provisioning; virtual storage allocation/over subscription
  • Hybrid On-premises/cloud storage architectures; automatic migration of archival data to the cloud
  • What do you think? What are your biggest data management challenges? Capacity growth? Throughput/performance? Data management? Take the survey and share your comments.

    The survey will take under 10 minutes to complete, and as a little incentive, at the end you'll be eligible to win a 32GB iPod Touch (a sweet little device, essentially an iPhone without the phone) from TechWeb. Your responses will remain confidential and will only be reported in aggregate.

    To take the survey, simply click here.

    Contest rules are here.

    Comment  | 
    Print  | 
    More Insights
    Comments
    Threaded  |  Newest First  |  Oldest First
    Commentary
    Ransomware Is Not the Problem
    Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
    Edge-DRsplash-11-edge-ask-the-experts
    How Can I Test the Security of My Home-Office Employees' Routers?
    John Bock, Senior Research Scientist,  6/7/2021
    News
    New Ransomware Group Claiming Connection to REvil Gang Surfaces
    Jai Vijayan, Contributing Writer,  6/10/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    The State of Cybersecurity Incident Response
    In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-35196
    PUBLISHED: 2021-06-21
    ** DISPUTED ** Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended fo...
    CVE-2010-1433
    PUBLISHED: 2021-06-21
    Joomla! Core is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauth...
    CVE-2010-1434
    PUBLISHED: 2021-06-21
    Joomla! Core is prone to a session fixation vulnerability. An attacker may leverage this issue to hijack an arbitrary session and gain access to sensitive information, which may help in launching further attacks. Joomla! Core versions 1.5.x ranging from 1.5.0 and up to and including 1.5.15 are vulne...
    CVE-2010-1435
    PUBLISHED: 2021-06-21
    Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise restricted actions and subsequently retrieve password reset tokens from the database through an already existing SQL injection vector. Joomla! Core versions 1.5.x ranging from 1.5...
    CVE-2010-0413
    PUBLISHED: 2021-06-21
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.