You've requested...

Download this next:

All-Flash: The Essential Guide

Computer Weekly keeps its finger on the pulse in the world of data storage, with regular news, features and practical articles. This guide offers a comprehensive survey of the all-flash array market. We look at all-flash products from the big six storage vendors and the startups and specialists. Plus, we give the lowdown on all-flash vs hybrid flash arrays and all-flash vs server-side PCIe SSD. Finally, we look at the shortcomings of measuring the value of flash by metrics designed for spinning disk and suggest practical alternatives.

These are also closely related to: "Magic Quadrant for Solid-State Arrays"

  • NVMe flash storage 101

    Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it. NVMe is a storage protocol designed for the performance and characteristics of flash and will replace the SAS and SATA protocols that were developed for spinning disk and currently act as a bottleneck to solid state drives. It is, however, early days. So far, NVMe can be deployed without complications in limited scenarios, but the tech industry is fast developing ways of implementing NVMe that will see shared storage arrays with the blistering performance of flash NVMe.

  • Hyper-Converged Infrastructure Key Choices: We Look at Hyper-Converged Infrastructure and its Benefits for the Datacentre.

    Hyper-converged infrastructure (HCI) is the rising star heralding an architectural revolution in the datacentre. Hyper-convergence brings together compute and storage in one box often with the hypervisor built in.  With multiple nodes built into scale-out clusters, HCI is easy to manage and easy to grow. We look at why it makes sense to go hyper-converged, how HCI differs from converged infrastructure, the pros and cons of hyper-converged vs traditional storage arrays, HCI software products available, and whether hyper-converged can help unleash the blistering performance potential of NVMe flash storage.

Find more content like what you just read:

  • Infographic: Comparing solid-state storage technologies

    This solid-state storage comparison chart lists and compares several emerging and currently available SSS technologies.

    Download

  • Computer Weekly – 9 October 2018: NHS app marks a new era for UK health service

    In this week's Computer Weekly, we examine the long-awaited mobile app from the NHS and ask what it means for a digital health service. We hear from early experimenters of blockchain to find out what it will take for the technology to be enterprise-ready. And we analyse the impact of M&A on corporate networks. Read the issue now.

    Download

  • A Computer Weekly Buyer's Guide to Next-Generation Storage

    Storage needs are ever increasing—and data volumes constantly expanding. How are today's systems accommodating these capacity demands? In this buyer's guide, Computer Weekly experts look at the evolution of storage systems and how they meet processing demands, the continuing role of all-flash arrays, and how to buy the best storage investment.

    Download

  • Maintain critical services with centralized remote connectivity

    State and local governments have a vast array of services they need to support their constituents with. In this brief, learn how centralized remote IT connectivity helps you manage and maintain all of these critical services—without requiring additional staff or infrastructure.

    Download

  • Which SSD type deserves your data?

    In this guide, storage expert – Phil Goodwin – discusses how flash storage technology is only advantageous in certain types of environments. Discover which kind of SSD deployment is best designed for your environment's big data needs.

    Download

  • Caching and tiering techniques compared

    This expert e-guide explores the three forms of solid state disk caching, provides a side-by-side comparison of caching and tiering, as well as a rundown of the challenges associated with both of these techniques.

    Download

  • Focus: PCIe SSD, NVMe and flash

    PCIe SSD cards fit straight into PCIe slots in servers and array hardware and often brings much higher performance than traditional HDD-format flash drives..

    Download

  • It's hyper converged-with-everything in today's datacentre

    In this e-guide we look at the key hyper-converged vendors and their products, as well as hyper-converged tailored to disaster recovery, backup, cloud functionality, and the software-defined hyper-converged products available.

    Download

  • Bringing cloud-style pricing to SSD storage: An inside look

    In this expert-guide, learn about Nimble Storage's new cloud-style pricing model for their all-flash and hybrid storage arrays, as well as some other new features like support for Docker containers, predictive analytics, and more.

    Download

  • IDC Whitepaper: The Business Value of Dell PowerStore

    Download this eGuide and hear that modernizing and simplifying infrastructure is a key priority for IT organizations as they replace aging storage systems. Learn the benefits of Dell PowerStore to optimize, modernize, and scale business-critical workloads.

    Download

  • Infographic: How blockchain works

    To get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery.

    Download

  • The state of cloud security

    According to Gartner, by 2023, 70% of all enterprise workloads will be deployed in cloud infrastructure and platform services. In this report Gartner looks at the state of cybersecurity, leveraging relevant data to map out how different providers are performing. Download the full report to learn more.

    Download

  • Third-party analysis: Endpoint protection platforms (EPPs)

    Endpoint protection platforms (EPPs) are security solutions designed to protect managed end-user endpoints from malicious attacks. This Gartner Magic Quadrant explores the current state of the EPP offering landscape, providing an in-depth analysis of the 16 leading vendors. Read on to learn more.

    Download

  • CW APAC, April 2021: Trend Watch: IoT in India

    In this handbook, focused on the internet of things in India, Computer Weekly looks at the country's potential as an IoT hotspot.

    Download

  • searchStorage.com editors examine the top 6 AFAs

    To cut through the all-flash market chaos, we've compiled An Exclusive Look at AFA Solutions & Vendors, an e-guide that directly compares the top 6 AFA systems and will catch you up on all the market buzz. Download your copy to see what's new with Pure Storage, IBM, HPE, and more.

    Download

  • A workflow for enhancing your threat-resolution strategy

    Want to accelerate the resolution of security attacks? This demo maps out how you can do so by leveraging an integration workflow from Cisco Stealthwatch to EndaceProbe. View now to learn more.

    Download

  • Demystifying storage performance metrics

    We walk you through the key storage metrics you need to know about, look at how storage array makers present them in their product literature, and how to decode IOPS, latency and read/write performance figures.

    Download

  • Continuous threat exposure management: Third party analysis

    In order to truly resolve threat vulnerabilities, organizations need to invest in continuous and repeatable exposure management processes. In this report, experts from Gartner explore the state of continuous threat exposure management solutions, breaking down the essential qualities of an optimal solution. Read on to learn more.

    Download

  • 3 ways to expand technology services and still cut costs

    Organisations that modernise their IT service operations can expect to resolve IT outages 25% more efficiently and increase IT service agent productivity by 30%. Read this guide to see how you can enable business growth by eliminating silos, streamlining processes and creating a solid, common data foundation—all on the ServiceNow platform.

    Download

  • CW ASEAN: Unlock flash opportunities

    Traditional disks can no longer keep up with the needs of modern enterprises. In this issue of CW ASEAN, we take a look at how enterprises are taking to all-flash array storage, and what they need to do to lay the foundation necessary for getting the most out of the technology. Read the issue now.

    Download

  • Three Steps to Application Access Governance Maturity

    To learn how you can boost application access governance at your organization, and to discover why doing so is important, check out this blog.

    Download

  • Storage performance: From fundamentals to bleeding edge

    In this guide we look at LUN provision and management, RAID and flash storage, plus tuning for analytics workloads and key emerging technologies that can give your organisation a competitive advantage in mission-critical operations, such as storage-class memory, NVMe flash and persistent memory.

    Download

  • Put your cloud storage on autopilot with an AI-managed service

    Built from the DNA of HPE Nimble Storage Adaptive Flash Array, HPE Alletra 5000 aims to deliver simple, reliable, and cost-efficient hybrid storage—adaptively designed for both general purpose and secondary workloads. Read on to learn more.

    Download

  • Market Guide for Microsegmentation

    According to Gartner, by 2026, 60% of enterprises working toward zero trust architecture will use more than 1 deployment form of microsegmentation. This market guide explores the current microsegmentation landscape, analyzing how technology is transforming the way organizations implement their zero trust strategies. Read on to learn more.

    Download

  • A Computer Weekly Buyers Guide to IoT

    In these uncertain times, making solid predictions for the year ahead looks like a definition of a mug's game. While this has been the fuel for the fire for the boom in applications such as video conferencing as used to support remote working, the same really can be said for the internet of things (IoT).

    Download

  • Does a proprietary solution automatically mean vendor lock-in?

    The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?

    Download

  • 12-page e-book: SecOps automation best practices

    SecOps leaders, are you adopting or fine-tuning an automation strategy? To support your journey, this 12-page guide presents key considerations and best practices for SecOps automation. Keep reading to unlock the full insights.

    Download

  • Financial services security: Building cyber resilience

    For financial services organizations tasked with managing client’s sensitive financial information, resiliency is non-negotiable. This white paper will provide you with the guidance you need to build a solid foundation upon which you can pursue one or more of these areas of improvement. Download now to learn more.

    Download

  • Containers and storage 101: The fundamentals of container storage

    In this e-guide we look at the basics of Docker storage and backup, key containers capabilities in storage vendors' offers and how containers can be incorporated into the private cloud environment.

    Download

  • 27-page eBook: A guide to data innovation & AI

    Gartner recently stated that most organizations aren’t doing digital transformation, they’re doing digital optimization. Organizations that are able to best exploit their data and embrace all things AI will be able to truly turbo charge their digital transformation initiatives. In this eBook, explore everything about data innovation and AI.

    Download

  • Run your production workloads from anywhere with Dell APEX

    Looking to seamlessly connect your public and private clouds? Looking to extend modern cloud and Kubernetes ecosystems on-premises? These aren’t just floating questions. Tune into this short video to learn how Dell APEX Cloud Platforms can help.

    Download

  • Five Ways to Improve Cybersecurity at Your Government Agency

    Government agencies, regardless of their mission or size, hold onto a significant amount of data. Some of this data is highly confidential when you consider it includes the DMV, the IRS and more. Because of the nature of the data they collect, cybersecurity is always top of mind. Read on to learn cybersecurity tips that any agency can benefit from.

    Download

  • 5 endpoint security best practices

    With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To get started writing a policy customized for your company, here are five universal endpoint security best practices to consider.

    Download

  • A guide to continuous software delivery

    Software empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.

    Download

  • How to Increase AWS Visibility and Improve Cloud Security

    This actionable guide will help security teams that use AWS take inventory of the wide array of data logged in your AWS infrastructure and prioritize the collection sources that provide the most insight into your unique environment.

    Download

  • Want to optimize your digital experiences? Here are 3 overlooked ways

    In this blog post, discover 3 key ways you can enhance digital experiences and productivity that you may be overlooking in your digital transformation strategy.

    Download

  • Computer Weekly – 24 May 2022: Set innovation free and make great ideas a reality

    In this week's Computer Weekly, we look at Gartner's call to innovate – and innovation across retail, the circular economy and the automotive sector. We talk to Verastar's CTO about customer engagement in its small business services. And we examine how poor data quality is frustrating corporate desires to be data-driven. Read the issue now.

    Download

  • Cloud Analytics Automation

    How can you democratize data analytics across your organization? Access this 48-page For Dummies e-book to understand how cloud analytics automation is revolutionizing data usage and business outcomes, including 10 important questions you need to ask when considering a cloud analytics automation platform for your enterprise.

    Download

  • How to institute DevOps with cloud service APIs, IT automation

    Learn how to overcome IT's top DevOps challenges—including infrastructure automation and the risks cloud service APIs pose. Additionally, you'll gain a developer's perspective on creating agile Docker containers for DevOps, with varied approaches storage vendors take in managing them.

    Download

  • Analyst Vendor Comparison for Privileged Access Management

    CyberArk has been named a Leader in the 2023 Gartner® Magic Quadrant™ for Privileged Access Management.  CyberArk Privileged Access Management secures privileged credentials and secrets wherever they exist: on-premises, in the cloud, and anywhere in between, like an invisible force field protecting your organization's most critical assets.

    Download

  • Why zero trust is IT security's best hope

    This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.

    Download

  • Shifting from MFA to continuous adaptive trust

    Multi-Factor Authentication (MFA) alone isn’t a perfect solution to solving identity related fraud and account takeovers. There’s a better, more dynamic, and flexible approach needed– one that implements continuous adaptive trust. Download this Gartner Report to learn the details of MFA and its current place in the security process.

    Download

  • Market Guide to GRC Tools for Assurance Leaders

    As risk profiles continue to grow in size and complexity at accelerated rates, organizational assurance leaders are turning to modern governance, risk, and compliance (GRC) tools to gain access to risk data, improve visibility and reporting, and enhance department agility.

    Download

  • How to choose HR software

    Evaluating HR software can be complex. Our new, free 40-page guide to choosing HR software is a great place  to start. It's yours now in exchange for taking our short survey on your employee experience purchase plans.

    Download

  • Tips for building a better webinar: Visualizing data

    Webinars help build a solid audience, nurture relationships, and increase brand awareness. But, when presenting a complicated, dense, or downright dry topic, how can you make it appealing and eye-catching instead of text-heavy and dull? Access this webinar to learn more.

    Download

  • CW ANZ – February 2019: Home in on storage minutiae

    In this edition of CW ANZ, we look at how organisations are using storage analytics to manage their storage footprint and what suppliers are doing to help enterprises get the most of out of the technology.

    Download

  • How to achieve compliant communication

    Working closely with Microsoft, Theta Lake offers modern, AI-enabled compliance and security capabilities that enable organizations of all sizes to use the full breadth of Microsoft Teams capabilities. Download this white paper to learn more about Theta Lake’s approach to compliant communication.

    Download