Premium Content

Access "Deciding where to deploy solid-state storage devices"

sSolStateStorage_deploy_SSDs_cover.png

Sponsored by SearchSolidStateStorage.com

Solid-state storage can be deployed in a storage array alongside traditional hard disk drives, as an all-flash array, as a separate caching appliance, or in the a server using a PCIe card. Each approach has pros and cons which must be weighed based on the workload you are trying to address before deploying a solution. In this Drill Down on where to deploy solid-state storage, you will find an article explaining the pros and cons of all of these options, another piece which discusses effective use cases for solid-state storage, and a third which outlines examples of when flash is not the right tool for the job. This compilation of articles details the solid-state implementations available today and helps you figure out how to decide which is right for your organization's needs. If you are considering an investment in solid-state storage, this Drill Down is great place to start.  Access >>>

Table of contents

  • Four use cases when SSD arrays are the right solution
  • Find the best spot for flash SSD storage
  • When using SSD is a bad idea

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • The next frontier for managed print services
    The-next-frontier-for-managed-print-services-(1361197877_756).jpg
    E-Handbook

    The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation ...

  • World-Class EA: The Agile Enterprise
    World-Class-EA---The-Agile-Enterprise-(1360587978_371).jpg
    E-Handbook

    The concept of “agile” has recently come to the fore, typically in connection with technical activities, such as software development. Subsequently, ...

  • Security Visualisation
    Security-visualisation-(1358519141_684).jpg
    E-Handbook

    This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. ...