sponsored by ComputerWeekly.com
Posted:  16 Mar 2012
Published:  16 Mar 2012
Format:  PDF
Length:  2  Page(s)
Type:  Analyst Brief
Language:  English
ABSTRACT:

By Valdis Filks, research director for storage technologies and strategies.

 

Organisations continue to depend on hardware technologies to solve their storage growth problems, without understanding the source of the problem or where new technologies are applicable

 

Storage and data management analyses require key human decision-making skills, which are imperative to choosing how to exploit storage technology and meet business goals.

 

Technologies need not always be used to solve behavioural problems. The analogy of putting the cart before the horse is well-suited to the problem of managing storage growth.

 

Organisations are constantly buying bigger and better “carts” (ie, storage), but do not invest enough time in learning how to control the “horse” and direct the cart.

 

Storage has taken on a life and an inertia of its own, customers must regain the control of storage and discover how to direct and manage it more efficiently.

 

Click on the button below to download this article

 

 

 

This report is based on independent technology advisory research from Gartner, Inc. Gartner delivers the technology-related insight necessary for IT leaders to make the right decisions every day.

 

 






BROWSE RELATED RESOURCES
Cloud Storage | Data Destruction | Data Management | Data Storage | Solid State Disks | Solid State Storage | Storage Appliances | Storage Best Practices | Storage Capacity | Storage Hardware | Storage Management | Tiered Storage

View All Resources sponsored by ComputerWeekly.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement