Premium Content

Access "Deciding where to deploy solid-state storage devices"

sSolStateStorage_deploy_SSDs_cover.png

Sponsored by SearchSolidStateStorage.com

Solid-state storage can be deployed in a storage array alongside traditional hard disk drives, as an all-flash array, as a separate caching appliance, or in the a server using a PCIe card. Each approach has pros and cons which must be weighed based on the workload you are trying to address before deploying a solution. In this Drill Down on where to deploy solid-state storage, you will find an article explaining the pros and cons of all of these options, another piece which discusses effective use cases for solid-state storage, and a third which outlines examples of when flash is not the right tool for the job. This compilation of articles details the solid-state implementations available today and helps you figure out how to decide which is right for your organization's needs. If you are considering an investment in solid-state storage, this Drill Down is great place to start.  Access >>>

Table of contents

  • Four use cases when SSD arrays are the right solution
  • Find the best spot for flash SSD storage
  • When using SSD is a bad idea

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • Discover the next generation of mobile application performance management
    netevo_1014.png
    E-Zine

    Traditional application performance management (APM) tools have given network managers little, if any, visibility into what causes performance ...

  • The economics of cloud computing
    CIO_1014.png
    E-Zine

    The economics of cloud computing doesn't come with any hard-and-fast formulas, and CIOs moving some or all of their infrastructure off-premises must ...

  • Computer Weekly buyer's guide to endpoint security
    BG_0714_endpoint_security.jpg
    E-Handbook

    In this 11-page buyer’s guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise’s ...