Browse Definitions :
Reference

Storage Learning Guides

We've gathered a collection of our learning guides and tutorials on storage-related topics. You'll find resources about storage technologies, storage management, storage area networks (SANS), network-attached storage (NAS) and more. Then see below, our storage-related quizzes and our larger collection of resources.

Need more basic information before you get started? See our definitions for storage, SAN and NAS.

 

Storage Learning Guides:

  • Advanced Fibre Channel -- This Fast Guide to Advanced Fibre Channel explains FC strategies, protocols, budget concerns and SAN connectivity issues.
  • Advanced storage -- This guide covers storage component features and capabilities including disk drives, RAID, SAN, NAS and backup.
  • Backup -- These resources include tips and tricks for selling, developing and deploying successful data backup services and solutions.
  • Buying Guide: Storage Compliance -- Learn what you need to know about email and document management and archiving, CAS, compliance services and legal discovery tools.
  • Database Storage Management -- This guide explains storage management strategies, step-by-step instructions for using RMAN, and other methods for hot and cold backups. Also includes script samples and troubleshooting advice
  • Disk Storage -- Drives, RAID and disk arrays are all covered in this learning guide.
  • iSCSI -- Both iSCSI and Fibre Channel technologies are covered in this guide.
  • FAQ: Data Deduplication -- See the answers to frequently asked questions about deduping.
  • RAID -- Got questions about RAID levels? See an explanation here.
  • Low-Cost Storage -- See our guidance on low-cost networking, iSCSI, SATA and IP storage.
  • NAS -- Our complete guide to network-attached storage explains NAS protocols, hardware and features and offers advice on NAS management.
  • NAS Project Guide -- Learn how to manage your network-attached storage environment more effectively.
  • NAS Upgrades Buying Guide -- This resource offers purchasing advice for NAS appliances, NAS management software and NAS gateways, and an overview of the specifications of NAS vendors.
  • RAM -- Our Fast Guide to RAM explains what it is and how it works and provides definitions of various types of RAM.
  • SAN -- This storage area networking tutorial explains how to organize, provision and allocate storage effectively.
  • Storage Basics -- Start here to learn about disk drives and arrays, backup, SAN, NAS and storage management.
  • Storage Resource Guide -- Tiered storage, compliance and data replication are among the topics covered in this resource.
  • Storage Virtualization -- This guide covers storage virtualization hardware and software, as well as VSAN product categories.

 

 

Want more storage-specific info? See our storage quizzes, our storage hardware and storage management definitions or the resources on SearchStorage.com

We've got lots more information for you! Check out the full collection of Learning Guides and Tutorials to learn essential information on a wide range of subjects. You'll find guides and tutorials about networking, backup and recovery, and a wide range of other topics, including databases, business intelligence, programming and much more. Also see: Our Favorite Cheat Sheets

Would you like to test your knowledge of other IT topics? See our huge collection of quizzes.

This was last updated in June 2010

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

Dateiendungen und Dateiformate

Gesponsert von:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close