TITLE

scaling storage

AUTHOR(S)
Dery, Vic; Nadkarni, Ashish
PUB. DATE
June 2006
SOURCE
Storage Magazine;Jun2006, Vol. 5 Issue 4, p40
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article presents information about the scalability of storage systems. It discusses the factors, besides adding disk capacity, that are important for a storage array to be scalable. Vendors confuse the issue of scalability versus capacity when they do not provide enough information about the virtues of their products. Capacity and scalability requirements can be determined by simply asking if the applications function in a way that suits the business.
ACCESSION #
22443813

 

Related Articles

  • Slice loss concealment using bridge pictures in scalable video coding. Dereboylu, Z.; Worrall, S.; Cellatoglu, A.; Kondoz, A. // Electronics Letters;6/10/2010, Vol. 46 Issue 12, p842 

    The scalable extension of H.264/AVC (scalable video coding, SVC) provides spatial, temporal and/ or quality scalability with a coding performance that is comparable to that of H.264/AVC. As in the transmission of all types of compressed video, packet losses or errors may result in the...

  • SCALABILITY OF COOPERATIVE ALGORITHMS FOR DISTRIBUTED ARCHITECTURES OF PROXY SERVERS. Lancellotti, Riccardo; Mazzoni, Francesca; Colajanni, Michele // Proceedings of the IADIS International Conference on WWW/Interne;Jan2003, p458 

    Systems consisting of multiple proxy servers are a popular solution to deal with performance and network resource utilization problems related to the growth of the Web numbers. After a first period of prevalent enthusiasm towards cooperating proxy servers, the research community is exploring in...

  • Science Intelligence. Hackathron, Richard // DM Review;Aug2005, Vol. 15 Issue 8, p38 

    This article discusses the convergence of business and science in terms of technologies, architectures and procedures for information technology. The challenges of scalability, diversity and complexity, along with an explosion of data volumes are faced by both business and science. The...

  • The Appliance Model. Parkinson, John // CIO Insight;Apr2007, Issue 80, p24 

    The author discusses the applicability of an appliance model for the data center in an information technology (IT) system. The IT appliances aim to do a few things very well in order to outperform a general-purpose computing architecture that depends on layers of software to perform the same...

  • The Human Element of IT. Dowse, Chris; Hertz, Paul // CIO Insight;Jun2009, Issue 105, p26 

    The article presents the study which examines the effects of human elements to the information technology (IT) management in the U.S. The study was conducted to IT executives, managers and other functionaries in the different IT shops, which points out human motivations that dominantly affect...

  • A new algorithm for low-deterministic security. Giffhorn, Dennis; Snelting, Gregor // International Journal of Information Security;Jun2015, Vol. 14 Issue 3, p263 

    We present a new algorithm for checking probabilistic noninterference in concurrent programs. The algorithm, named RLSOD, is based on the Low-Security Observational Determinism criterion. It utilizes program dependence graphs for concurrent programs and is flow-sensitive, context-sensitive,...

  • Evaluating the Performance of EJB Components. Gorton, Ian; Liu, Anna // IEEE Internet Computing;May/Jun2003, Vol. 7 Issue 3, p18 

    Presents an examination of two Enterprise JavaBean-based architectures which reveals differences that can affect the performance and scalability of applications built on them. Enterprise JavaBean architectures; Experiment design; Experimental results.

  • Compliance conundrum. Rapoza, Jim // eWeek;5/8/2006, Vol. 23 Issue 19, p24 

    The article discusses the means Information Technology (IT) managers in big and small businesses of dealing compliance issues in the U.S. Every business needs to make to the point that its IT infrastructure is being provided to deal with the compliance issues from software vendors pitching...

  • Speed traps. Newman, David // Network World;1/16/2006, Vol. 23 Issue 2, p42 

    The article examines the results of the scalability tests conducted to Web front-end devices. The scalability tests demonstrated the limits of system performance in terms of maximum concurrent-connection capacity, Transmission Control Protocol (TCP) multiplexing ratios, and maximum forwarding...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics