TABLE OF CONTENTS CHAPTER 1 INTRODUCTION 2 STUDY GOALS AND OBJECTIVES 2 RESEARCH BACKGROUND 2 REPORT SCOPE AND ORGANIZATION 2 TARGET AUDIENCE 3 RESEARCH METHODOLOGY 3 ANALYST'S CREDENTIALS 4 RELATED BCC RESEARCH REPORTS 4 BCC RESEARCH WEBSITE 4 DISCLAIMER 5 CHAPTER 2 SUMMARY 7 SUMMARY TABLE GLOBAL MARKET FOR FLASH MEMORY BY REGION, THROUGH 2018 ($ MILLIONS) 7 SUMMARY FIGURE GLOBAL MARKET FOR FLASH MEMORY BY REGION, 2012-2018 ($ MILLIONS) 7 CHAPTER 3 STORAGE TECHNOLOGY AND DEVICES 11 STORAGE BASICS 11 FIGURE 1 TYPICAL BUILDING BLOCKS OF A COMPUTER 11 TYPES OF PRIMARY STORAGE 12 RAM 12 Recent Developments 13 ROM 13 SECONDARY STORAGE 14 Forms of Auxiliary Memory 15 HDD 15 TERTIARY STORAGE
16 OFFLINE STORAGE 16 TERMINOLOGY OF STORAGE 16 Volatility - Nonvolatile vs.
Managed Server HSM automatically migrates files from primary storage to secondary and tertiary storage
based on policies set by the storage administrator.
An administrator can readily configure client policies and watermarks that trigger the migration of seldom-accessed workstation files to specific target volumes/directories on primary, secondary, and tertiary storage
This increase doesn't even take into account growing tertiary storage
The HSM software separates active and inactive data, automatically migrating inactive data from primary storage devices (online disk drives) to near-line or off-line secondary or tertiary storage
As more and more businesses discover the flexibility and ease of using storage clouds for their secondary and tertiary storage
, backup-to-cloud has become a must-have feature for all backup software.
This enables effective long-term, fixed-content data preservation on cost-effective secondary and tertiary storage
Admin-istrators want to be able to set policy and move files from primary storage to a secondary or tertiary storage
based on those policies.
The easy-to-use, enterprise-class systems are designed for small and mid-size businesses, however, enterprises also will find the MSA2000 is an ideal solution for their remote office, departmental, secondary and tertiary storage
Mark: Instead of assigning data to a secondary or tertiary storage
venue, you can take a "snapshot" of the data and handle your version-control functions right there in your primary storage venue.
And with less primary data to backup, there is a lower demand for secondary and tertiary storage
assets, both D2D arrays and tape libraries, along with less stress on network bandwidth.
Often used in conjunction with RAID arrays or JBODs, tape subsystems serve as secondary or tertiary storage