Conventional magnetic hard drives are being edged out by solid state storage across the enterprise. But there are still use cases where the spinning disk is best.
This article will look at the benefits of NVMe versus that of spinning disks, but also evaluate both technologies on cost, capacity and performance. It will then list the key applications and use cases where SAS or SATA drives are still the best options.
For this feature I am looking for analyst or consultants’ input, though case studies or white papers from vendors are welcome for background. Pitches by email by close of play, Tuesday 20 October – thank you.
For Computer Weekly, I’m looking at the emerging idea of unified file and object storage.
The piece will explain what this is, and more importantly why vendors are proposing it, and ask whether businesses should adopt it.
Are there use cases that could benefit unified file and object, and is this likely to become a significant segment of the market?
The deadline for suggested spokespeople is 1700 BST, Monday 5th October. I will then reply if further material is needed or to set up an interview. For this article, we are able to speak to vendors along with analysts and consultants/systems integrators.
For Computer Weekly, I am writing 2 feature articles for September 2020.
The first looks at backup techniques to counter ransomware. We are looking for best practice around securing original data, creating the optimal backup routines, configuring backup software, testing, and data restoration. The piece will also touch on the importance of offsite storage. The article will be technology neutral, and highlight best practice across all media (including cloud, disk, tape and optical.
The second article covers erasure encoding. The piece will consider why it is growing in importance, how it is used, and its pros and cons. Are there specific workloads, and storage types, best suited to erasure encoding?
Please send background information, including white papers, research or case studies, by Wednesday September 9th for backup techniques for ransomware and by Friday 11th September for erasure encoding.
This month, Germany took over the EU’s rotating presidency.
For the Daily Swig, this piece will investigate the German Presidency’s plans to improve the EU’s cybersecurity posture.
One of the Presidency’s six priorities is strengthening security and common values. For security, this is focused on better cross-border collaboration, inn crime and counter-terrorism.
For cyber specifically, the Presidency wants closer cooperation on network and information security, especially for critical national infrastructure and “other enterprises in the public interest”. And devices sold in the EU will need a minimum level of IT security.
How will the EU achieve these goals? And are these the right priorities right now? The feature will ask whether the EU’s objectives will mean greater security for citizens, and also assess its impact on the cyber security community, including business, security vendors, the workforce and academia and research.
I’m keen to speak to experts from across the cybersecurity space, especially those who have worked on EU initiatives. Please email
your suggestions for interviewees, or background information, by 1700 BST, Thursday 9th July.
With travel restrictions and social distancing still in force, more media interviews are taking place online, via a webcam.
This short video looks at some simple techniques to make those interviews look – and sound – as good as possible. They will work equally well with Skype, conferencing tools such as Zoom, WebEx or Microsoft Teams, and dedicated webinar platforms.
The video covers:
Audio: headsets and mics
Setting up the web cam
Decluttering and arranging the “set”
If you have any questions about either the technical set up for online video, or media training and interview techniques, do drop me an email.
I am researching two features for Computer Weekly, and am keen to have input from analysts and other industry experts.
The first is on file, block and object in the cloud and looks at the main storage offerings from AWS, Azure and Google Cloud Platform, including versions, performance, target applications and compatibility with on-premises storage.
The second looks at cloud providers on-site hardware offerings. Again, this is focused on AWS, Azure and GCP. Why are cloud providers offering on-site hardware, and what functions does it fulfil? Although some of these devices are multi-function, our focus is on their use for data storage.
The deadline for submissions is 1700 BST, Friday 15 May; please contact me by email if you can help.
In the latest episode of my Security Insights podcast, I speak to Amar Singh about steps organisations can take to secure home working.
Amar is the CEO of the Cyber Management Alliance, a cyber security adviser and crisis management firm. Amar is well-known as a security practitioner, speaker, and former CISO.
The CMA recently issued a free-to-use checklist on the steps security and IT teams can take to ensure working from home isn’t opening up businesses to undue risks. To listen to the interview, go over to the podcast on the Security Insights page.
If you are, or know, an expert in security who’d be a good guest for the podcast, please drop me an email. The podcast sets out to address strategic security issues and thought leadership in both the physical and cyber domains.