Full disk encryption is the most commonly used encryption strategy in practice today for data at rest, but does that mean it’s sufficient to prevent unauthorized access to your data? The short answer: ...
It’s important to note, however, that the term disk-to-disk backup may be a bit misleading. What we’re really talking about when we use the expression “disk-to-disk backup” is actually disk-to-disk-to ...
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. LTO technology was introduced to the market more than a decade ago by the LTO Consortium, ...
NERSC recently unveiled their new Community File System (CFS), a long-term data storage tier developed in collaboration with IBM that is optimized for capacity and manageability. The CFS replaces ...
It has been four years since IBM announced its Storage Tank platform, a SAN-based file system designed to enable multiple application servers to access and share files in a single namespace across ...
There are a number of Linux commands that will display file system types along with the file system names, mount points and such. Some will also display sizes and available disk space. The df command ...
Cloud storage is increasingly sophisticated and flexible. The initial appeal of storing data in the cloud was flexibility and cost, and to achieve that, the majority of cloud services based their ...