Business databases for Mac, Windows, iPhone, iPad, and the web | FileMaker.
Category Archives: Storage
MarkLogic: The Operational Database for Big Data
MarkLogic offers next-generation database technology capable of handling any data, at any volume, in any structure. Organizations around the world rely on MarkLogic’s enterprise-grade technology to get to better decisions faster.
TrueCrypt
Main Features:
- Creates a virtual encrypted disk within a file and mounts it as a real disk.
- Encrypts an entire partition or storage device such as USB flash drive or hard drive.
- Encrypts a partition or drive where Windows is installed (pre-boot authentication).
- Encryption is automatic, real-time (on-the-fly) and transparent.
- Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
- Encryption can be hardware-accelerated on modern processors.
- Provides plausible deniability, in case an adversary forces you to reveal the password:Hidden volume (steganography) and hidden operating system.
More information about the features of TrueCrypt may be found in the documentation.
Effect of Thailand floods: Hard disk price rises over 180% so far! Cameras also predicted to rise
Can DRAM replace hard drives and SSDs? RAMCloud creators say yes
The idea of replacing hard disk drives with flash memory has been gaining steam in the IT industry. But a research group at Stanford University is going even further: they say the goal should be to replace hard disks with DRAM.
via Can DRAM replace hard drives and SSDs? RAMCloud creators say yes.
This seems to violate the KISS principle. The comments in the above article are also interesting. RAM disks have been around since early DOS days.
Openfiler — System Requirements
For production deployment in either virtualized or bare-metal configuration, we recommend 64-bit Intel Xeon or AMD Opteron architecture processors for best performance. Future releases of Openfiler may only support 64-bit processors therefore they are highly recommended for new Openfiler installations.
Enterprise Storage Encryption: An Administrator’s …
Storage encryption has historically proven unpopular because of the issues of managing the keys used in various encryption methods, and the system performance burden that encryption/decryption placed on systems hardware. These issues have been iteratively surmounted in a number of advances. Faster CPUs, disk controllers and host bus adapters (HBAs) and tough-to-break encryption now reduce the burden once placed on subsystem, disk, and device encryption.
via Enterprise Storage Encryption: An Administrator’s … – Input Output.
This is a pretty good article. Here’s one more blurb.
Subsystems are encrypted at the hardware level or at the device group level. Subsystems can also be encrypted by the use of third-party software packages designed specifically for this purpose. Subsystem encryption usually means that a single encryption key is used for the group, and that the private encryption key is stored in hardware or in system firmware. This type of protection means that a drive “stolen” or otherwise removed from the group of storage media can’t be decrypted, even by examining the disk using an identical system, as the identical system would be missing the key that unlocks the data by decrypting it.
This seems like a rather high level of security.
NAS shoot-out: 5 storage servers battle for business
With so many use cases and potential buyers, the vendors too often try to be everything to everyone. The result is a class of products that suffers from an identity crisis — so-called business storage solutions that are overloaded with consumer features and missing the ease and simplicity that business users require.
via NAS shoot-out: 5 storage servers battle for business | Storage – InfoWorld.
I found the below snippet to be interesting.
Connecting the NAS boxes to your network should be done via a wired Ethernet cable, and each NAS in this roundup should get two Gigabit Ethernet connections. Strictly speaking, you need only one of these links, but by using both, you gain much greater flexibility. You should use them in a fail-over configuration, which means that if one of your Ethernet cables loses signal, the other will take over. You should also “bond” the two connections together to increase throughput or to balance the network load.
Also.
NAS shoot-out: Everything else but the kitchen sink
All of the NAS boxes in this roundup have the flexibility to do more than merely store your data. These features are too numerous to review in detail, but they include such things as the ability to collect images from IP video surveillance cameras, mobile apps that allow you to access your data from iPhones, iPads, and Android devices, and multimedia servers that provide access to photos, music, and video.In addition to the built-in features, you can generally install software packages that extend the functionality. Typical add-on modules include BitTorrent downloaders, email servers, and content management and blog publishing applications.
ZFS vs UFS
ZFS advantages over UFS:
raidz 1 or 2
Unlimited snapshots, clones, filesystems
pool bases storage…
self healing
Server Message Block
In computer networking, Server Message Block (SMB), also known as Common Internet File System (CIFS, /ˈsɪfs/) operates as an application-layer network protocol[1] mainly used to provide shared access to files, printers, serial ports, and miscellaneous communications between nodes on a network. It also provides an authenticated inter-process communication mechanism. Most usage of SMB involves computers running Microsoft Windows, where it was known as “Microsoft Windows Network” before the subsequent introduction of Active Directory. Corresponding Windows services have names “server” (for a server part) and “workstation” (for a client part).
via Server Message Block – Wikipedia, the free encyclopedia.