Browse Definitions:
Reference

Fast Guide to Storage Technologies

This printable page provides a fast guide in table form to storage technologies. To the extent that some technologies depend on other technologies (for example, a storage area network depends on either Fibre Channel or iSCSI for its connection protocol), there is a certain amount of redundancy among some table entries.

 Object Storage  -- Click here to learn more about this emerging storage technology
 

Technology

Advantages

Limitations

Applications

Compact disc, recordable
( CD-R ) or rewritable ( CD-RW ) and DVD
  • Low cost per megabyte
  • Unlimited capacity with multiple discs
  • Portable
  • Widely-supported I/O interfaces
  • Can be formatted for different data formats
  • Long life
  • High data density
  • Immune to corruption once data is written (CD-R and DVD only)
  • Limited capacity on one disc(though much greater than diskette)
  • Slow to moderate read/write speed
  • Data archiving
  • Data distribution
  • Data migration
  • Localized file sharing
  • Offsite storage
Technology

Advantages

Limitations

Applications

Diskettes, 1.44 MB
  • Simple to use
  • Portable
  • Can be formatted for different data formats
  • Limited capacity
  • Limited read/write speed
  • Not supported by many newer computers
  • Local data transfer of small files
  • Storage of small files or programs
Technology

Advantages

Limitations

Applications

Hard drive, external
  • High read/write speed
  • Can be moved among computers
  • Limited capacity
  • Awkward for data transfer among multiple computers
  • Local backup
  • Local archiving
Technology

Advantages

Limitations

Applications

Hard drive, internal
  • Convenient; usually comes with the computer
  • High read/write speed
  • Convenient for use with single computer (but can be shared among multiple computers with proper support
  • Most common form of data storage
  • Limited capacity
  • Without special support, confined to a single computer or server
  • Storage in a single computer
  • Swap files
Technology

Advantages

Limitations

Applications

Removable storage
(ZIP disks, JAZ disks, etc.)
  • Simplicity
  • Portability
  • Unlimited capacity with multiple disks
  • Convenient for use with single computer
  • Proprietary media
  • Limited read/write speed
  • High cost per megabyte
  • Personal computing
  • Local data transfer of small files
  • Local backup
  • Local archiving
Technology

Advantages

Limitations

Applications

Solid-state storage
(USB devices, flash memory, smart cards, etc.)
  • No mechanical parts
  • High read/write speed
  • Small form factor
  • Limited storage capacity
  • High cost per I/O operation
  • Swap files
  • Local data transfer
  • Internet service providers
  • Video processing
  • Relational databases
  • High-speed data acquisition
Technology

Advantages

Limitations

Applications

Direct-attached storage
(DAS)
  • Simplicity
  • Low initial cost
  • Ease of management
  • Storage for each server must be administered separately
  • Inconvenient for data transfer in network environments
  • Server bears load of processing applications
  • Data and application sharing
  • Data backup
  • Data archiving
Technology

Advantages

Limitations

Applications

Disk library
  • High speed
  • High storage capacity
  • High data availability
  • Not as quickly accessible as DAS; intended for "write once, read rarely" data
  • Disk-to-disk (D2D) backup
  • Data archiving
  • Near line storage
Technology

Advantages

Limitations

Applications

Disk-to-disk-to-tape
( D2D2T )
  • Redundancy
  • High read/write speed
  • Unlimited capacity with multiple tapes
  • Complexity
  • Incremental backups
  • Storage virtualization
  • Offsite storage
  • Data archiving
Technology

Advantages

Limitations

Applications

Fibre Channel
(See Storage area network below)
  • Used to transmit data between devices at gigabit speeds
  • Frequently used in storage area networks (SANs)
  • Flexible in terms of distance
  • High cost
  • Management complexity
  • Large databases
  • Bandwidth-intensive applications
  • Storage area networks (SANs)
  • Offsite storage
  • Mission-critical applications
Technology

Advantages

Limitations

Applications

iSCSI
(See Storage area network below)
  • Used to transmit data between devices using the Internet Protocol (IP)
  • Frequently used in storage area networks (SANs)
  • More flexible in terms of distance than Fibre Channel (but not as fast)
  • May not compare favorably with Fibre Channel for large database transfers
  • Management complexity
  • Applications involving remotely distributed databases
  • Storage area networks (SANs)
  • Offsite storage
  • Mission-critical applications
Technology

Advantages

Limitations

Applications

Magnetic tape
  • Low cost per megabyte
  • Portability
  • Unlimited capacity with multiple tapes
  • Inconvenient for quick recovery of individual files or groups of files
  • Data archiving
  • Limited-budget businesses
  • Offsite storage
Technology

Advantages

Limitations

Applications

Network-attached storage
(NAS)
  • Fast file access for multiple clients
  • Ease of data sharing
  • High storage capacity
  • Redundancy
  • Ease of drive mirroring
  • Consolidation of resources
  • Less convenient than storage area network (SAN) for moving large blocks of data
  • Data backup
  • Data archiving
  • Redundant storage
Technology

Advantages

Limitations

Applications

Redundant array of independent disks
(RAID)
  • High speed
  • High storage capacity
  • High data availability
  • High reliability
  • Security
  • Fault tolerance
  • Users may develop false sense of security
  • Recovery from failure is difficult in some systems
  • High cost for optimum systems
  • Swap files
  • Internet service providers
  • Redundant storage
Technology

Advantages

Limitations

Applications

Storage area network
(SAN)
  • Excellent for moving large blocks of data
  • Exceptional reliability
  • Wide availability
  • Fault tolerance
  • Scalability
  • High cost
  • Lack of standardization
  • Management complexity
  • Large databases
  • Bandwidth-intensive applications
  • Mission-critical applications

 

Read more about it at:
> SearchStorage.com provides a "Learning Guide: SAN."
> SearchStorage.com also provides a "Storage University."
> "Fast Guide to RAM" provides a quick guide to the various RAM technologies.
This was last updated in February 2010

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close