background preloader

The Past, Present, and Future of Data Storage

The Past, Present, and Future of Data Storage
As we approach the end of 2011 and look forward to another year, we pause to reflect on the long history of data storage. Mankind's ability to create, process, store, and recall information is light years ahead of the days of cave paintings and engravings on stone tablets. Vast amounts of information can be stored on drives smaller than your thumb, and data centers are cropping up at an increasingly high rate. What does the future of data storage hold? Are we really that close to holographic drives? Is 2012 the year SSDs become mainstream? Embed this image on your site:

http://mozy.com/infographics/the-past-present-and-future-of-data-storage/

Related:  bigscary78Newish Computerish

Cloud Computing vs. Virtualization EmailShareEmailShare Like the article? Cloud computing and Virtualization are both technologies that were developed to maximize the use of computing resources while reducing the cost of those resources. Solid-state drive DDR SDRAM based SSD. Max 128 GB and 3072 MB/s. PCIe, DRAM and NAND-based SSD.

Create The Ultimate USB Rescue Drive « Not Just A Random Blog Ever been at a friends house and needed to edit a photo, but all they have is MS Paint? Or have you ever been at grandmas and she asks you to remove the hundreds of viruses and spywares (she got from clicking the “You’ve won! Download this for your prize” banners), but she has no anti-spyware software and still on dial-up? Well that’s where a rescue USB drive comes in handy. Semantic Sensor Web Millions of sensors around the globe currently collect avalanches of data about our environment. The rapid development and deployment of sensor technology involves many different types of sensors, both remote and in situ, with such diverse capabilities as range, modality, and maneuverability. It is possible today to utilize networks with multiple sensors to detect and identify objects of interest up close or from a great distance. The lack of integration and communication between these networks, however, often leaves this avalanche of data stovepiped and intensifies the existing problem of too much data and not enough knowledge. With a view to alleviating this glut, we propose that sensor data be annotated with semantic metadata to provide contextual information essential for situational awareness. In particular, we present an approach to annotating sensor data with spatial, temporal, and thematic semantic metadata.

Data Center Infrastructure,Storage-Design Guide: SAN Distance Extension Using ISLs - Brocade Community Forums - 36627 Synopsis: Designs with best practices for a two-site data center disaster recovery solution using Brocade Fiber Channel ISL connections over extended distance. Contents Overview The most common reason for extending a Fibre Channel (FC) storage area network (SAN) over extended distances is to safeguard critical business data and provide near-continuous access to applications and services in the event of a localized disaster. Designing a distance extension solution involves a number of considerations, both business and technical. From the business perspective, applications and their data need to be classified by how critical they are for business operation, how often data must be backed up, and how quickly it needs to be recovered in the event of failure.

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Build the Ultimate USB Thumb Drive Toolbox If you like this story, help other people find it by giving it a digg. Thanks! What’s a USB key good for? Carrying files from one computer to another? If you think that’s all, then you’re missing out. Sensor web The concept of the "sensor web" is a type of sensor network that is especially well suited for environmental monitoring.[1][2][3] The phrase the "sensor web" is also associated with a sensing system which heavily utilizes the World Wide Web. OGC's Sensor Web Enablement (SWE) framework defines a suite of web service interfaces and communication protocols abstracting from the heterogeneity of sensor (network) communication.[4] Definition[edit]

What is RAID (redundant array of independent disks)? - Definition from WhatIs.com What is RAID? RAID (redundant array of independent disks; originally redundant array of inexpensive disks) is a way of storing the same data in different places (thus, redundantly) on multiple hard disks. By placing data on multiple disks, I/O (input/output) operations can overlap in a balanced way, improving performance. Since multiple disks increases the mean time between failures (MTBF), storing data redundantly also increases fault tolerance.

7 Most Notorious Computer Hacker Groups of All Time With the recent attack on PlayStation Network and a bunch of high-profile websites, computer hackers are back in the limelight again. Hackers and hacker groups were quite famous in the 80’s and 90’s but their popularity started fading since the Y2K days. Today, we are once again witnessing hackers threatening to take on giant corporations sending chills down everyone's spine. We have already featured here some of the most infamous black hat hackers of all time. This time, we will take a quick look at some of the most notorious computer hacker groups that ever existed: Masters of Deception Encrypting a USB Key using TrueCrypt If you are a healthcare professional you have a duty to maintain the security of patient identifiable data. Within your job you sometimes need to use a USB key to transfer lists or letters between computers. If you lose your un-encrypted USB key with patient identifiable data then it may deemed negligent and you may face disciplinary action. In this how-to I will talk through how to setup an easy to use secure software encryption scheme for a USB stick/key for use with Windows.

Related: