Premium Content

Access "Open source storage users break free of vendor lock-in"

Published: 13 Oct 2012

Open source storage: It’s an idea that makes so much sense. After all, the storage systems most of us buy simply comprise a bunch of disks with proprietary controller software on top. Such disk systems cost people the largest chunk of their storage spending, and a proprietary system locks them into their vendor’s roadmap and support structure. Open source storage is a potential solution to this Faustian accord, however. Unlike a fully commercial product, the controller software is open source. This doesn’t mean it’s free necessarily, but it can be, or nearly so. And unless you choose to buy a preconfigured system from an open source vendor, you are free to build your storage with commodity drives. Whatever you do with open source, it’s likely to cost you far less than proprietary storage and offer some benefits of flexibility that you wouldn’t get by striking a pact with a fully commercial vendor. The fundamental concept of all open source products is that the development community produces the software and opens the source code to anyone who wants it. If ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Spies in the VPN
    CWE_150414_ezine_252.png
    E-Zine

    In this week’s Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out ...

  • IT Priorities 2014 Special Report
    prem_IT_priorities_2014_FINAL-1.jpg
    E-Handbook

    Computer Weekly editors draw on their expertise to explain the main technology trends for IT in the UK and across Europe in 2014.

  • Detecting the use of TrueCrypt
    RH 3 Davies-1.jpg
    E-Handbook

    This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of ...