Opens profile photo
Follow
Antony Adshead
@AntonyAdshead
Storage editor at ComputerWeekly.com
Sheffield, UKJoined August 2011

Antony Adshead’s Tweets

IT’s shift to the cloud in detail (from ). With half of servers in the cloud, most backup and nearly all DR cloud-centric, the shift to the cloud is significant – but container backup is one area that is yet to settle down
1
Green storage: Savings to be made but tricky to achieve. Storage upgrades can bring energy savings. New hardware, the cloud and as-a-service procurement models all cut costs, but can need careful tweaking to get right
From capex to opex: Storage procurement options bloom. We look at the growing list of possibilities when it comes to paying for storage infrastructure, ranging from upfront purchases with upgrades to pure pay-as-you-go options
How to get structure from unstructured data. We look at how to gain structure from unstructured data, via AI/ML analytics to create new records, selecting object data via SQL and storing unstructured files in NoSQL formats
Is object storage good for databases? We look at object storage vs block access SAN storage and ask if object storage can be used for database workloads, or is it just good for bulk storage of analytics datasets?
1
Bowled out: NVMe flash pioneer Pavilion Data ceases business. Last of the pioneer NVMe flash array makers, Pavilion made multiprotocol highs-speed boxes – but it seems to have run out of sources of investment and gone out of business
2
Air gaps for backup and how they help against ransomware. The air gap is a basic of backups and storage. We look at what’s meant by an air gap, the rise of the logical air gap, and its place in the fight against ransomware
Edge storage: What it is and the technologies it uses. Storage is moving from the datacentre to the edge. We define edge storage, look at the characteristics of edge computing that shape it and the technologies it requires
1
NFS vs SMB vs CIFS: File storage protocols defined. We take a close look at NFS and SMB – the key file storage access protocols – and weigh up their pros, cons and suitability to differing datacentre environments
#AIOps for storage: Potential huge benefits, but lots of lock-in. Applying AI/ML to storage can help to predict bottlenecks, diagnose I/O issues and recommend upgrades, but suppliers’ products are largely limited to their own hardware
PoINT to offer on-site disk and tape S3 object storage archive. Archival Gateway clusters up to 256 tape readers to provide S3 object storage capable of storing 50 billion objects per bucket, and throughput of 230GBps
Cloud storage TCO: Key pitfalls and how to avoid them. Cloud’s flexibility is part of the attraction, but it can also lead to costs that spiral. We look at key elements in cloud TCO and how to intelligently make use of the cloud
Bfloat16: What it is and how it impacts storage. Bfloat16 is an emerging way to handle very large numbers, developed by Google for its machine and neural learning and prediction. We look at what it means for IT and storage
Data classification: What it is and why you need it. To be compliant, to ensure data is optimally protected, available, analyse-able and stored most cost-effectively – these are reasons why data classification is vital to organisations
1
Podcast: How storage AIOps is revolutionising hybrid cloud ops. We talk to about storage AIOps and the application of AI/ML to monitor storage infrastructure to be able to detect patterns and predict failure, the need to upgrade etc
1
The verdict is for Scottish prosecutor's office. Scotland’s prosecution service saw disk drives in the dock every week with EMC legacy storage. Now it’s got Pure all-flash and has turned over an (Evergreen) new leaf
Four key need-to-knows about CXL. Compute Express Link will pool multiple types of memory and so allow much higher memory capacities and the possibility of rapidly composable infrastructure to meet the needs of varied workloads
Imperial College NHS Trust cuts costs and refresh cycle with cloud storage. Trust expects to saves 30% in storage costs and cut back on five-year refresh headaches in a move that has seen backup and archive data move to Wasabi
3
File, block and object in the cloud era. We look at the three basic ways that storage accesses data – via file, block and object – as well as the ways in which the rise of the cloud and distributed systems have brought changes to them
Global file systems: Hybrid cloud and follow-the-sun access. Global distributed file systems putting enterprise data under a single file access namespace so that enterprises and branch offices can get to data from anywhere
Data gravity: What is it and how to manage it. Data gravity can attract increasing amounts of data, and brings with it onerous management overheads. We look at how to mitigate data gravity in datacentre and cloud
Cloud-to-cloud backup: When native cloud protection is not enough. There's some protection built into the cloud, but it has its limits and full data protection requires that cloud data is secured with cloud-to-cloud backup
Four obstacles to hybrid cloud storage – and possible solutions. We look at obstacles to hybrid cloud storage, such as complexity, a need for object storage, application suitability, and cost, with potential solutions
1
Podcast: How to get truly portable Kubernetes storage We talk to CTO Grant Caley about what is needed from storage to really deliver in a world of Kubernetes containerisation and microservices portability in hybrid cloud working
2
The limits and risks of backup as ransomware protection. Backups can provide a sound means of recovery from ransomware, but they are not 100% certain to foil attackers. We look at the limits and risks of depending on backups
1
Podcast: War, geo-political risk, data storage and compliance. We talk to Mathieu Gorge, CEO of , about impacts on compliance and data storage from instability in geo-political events, such as the Russian invasion of Ukraine
2
Snapshots vs backup: How to use both for optimum RPOs. We look at snapshots and backup, the key difference, their pros and cons and how best to use the two approaches in an integrated data protection strategy for optimal RPO