SMBs Using Cloud Storage Also High On Network-Attached Storage

SMBs Using Cloud Storage Also High On Network-Attached Storage

More than seven in ten small and medium-size businesses that use cloud-based storage solutions also use networked-attached storage (NAS), according to a newly released survey by research firm In-Stat.
This report comes close at the heels of an IBM report that said sixty percent of organizations will embrace cloud computing over the next five years. This finding was based on a survey of more than 3,000 global Chief Information Officers.

For those unaware, network-attached storage is a specialized server that is connected to a network which provides file-based data storage services to other devices on the network.  NAS systems are becoming popular for their ability to support one or more hard disk drives (HDDs). According to In-Stat, these systems sometimes boast features such as RAID (redundant array of independent disks) and back up/replication services for all the devices attached to the network.

In-Stat report titled “ Worldwide SMB Network-Attached Storage: Technology and Service Innovation Drive High Growth,” indicates that currently, SMB NAS has grabbed only a small portion of the total NAS market. However, this situation is set to change and this small portion will quickly grow to reap revenues of $2 billion by 2015.

As the market has matured, the definition of NAS has taken on additional aspects,” said Norm Bogen, VP Research. “In particular, system management software has evolved into the most important feature of NAS adoption for several reasons, but primarily because it simplifies the user experience to set up and manage NAS products.”

Findings from IBM report discussed above are also supported by research by Easynet Global Services that show cloud hosting services will be more widely used in the coming year.  A large number of companies are expected to increase their investment in the technology and according to Easynet, 49 per cent of CIOs will standardize on hosted services and other cloud applications.

By Anuradha Shukla

About CloudBuzz

Discover some of the top aggregated and curated technology news stories from around the world under the CloudBuzz authorship.

Catchup on trending stories related to Big Data, Cloud Computing, Wearable Technology, Internet of Things, Virtual Reality, Mobile Technologies and much more from some of the top information sources.

Find out more
View All Articles

Sorry, comments are closed for this post.

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

E-Commerce Advances For Savvy Marketers

E-Commerce Advances For Savvy Marketers

Digital Marketing Platforms Advertising and marketing techniques have progressed rapidly in the last decade with both channel focus and the direction of content shifting considerably due primarily to advances in cloud technology. Gartner’s Magic Quadrant for Digital Commerce 2016 singles out a few ecommerce providers who are topping their sector in both ability to execute…

5 Predictions For Education Technology

5 Predictions For Education Technology

Education Technology Although technology has fast influenced most sectors of our world, education is an area that’s lagged behind. Many classrooms still employ the one-to-many lecturing model wherein the average student is catered for while a few are left behind, and others bored. Recently, there’s been a drive to uncover how to use technology successfully…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Cloud Computing Then & Now

Cloud Computing Then & Now

The Evolving Cloud  From as early as the onset of modern computing, the possibility of resource distribution has been explored. Today’s cloud computing environment goes well beyond what most could even have imagined at the birth of modern computing and innovation in the field isn’t slowing. A Brief History Matillion’s interactive timeline of cloud begins…

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think Last week we touched upon how a project in Finland had blended two of the world’s most important industries, cloud computing and green technology, to produce a data centre that used nearby sea water to both cool their servers and heat local homes.  Despite such positive environmental projects, there…

Cloud Computing Checklist For Startups

Cloud Computing Checklist For Startups

Checklist For Startups  There are many people who aspire to do great things in this world and see new technologies such as Cloud computing and Internet of Things as a tremendous offering to help bridge and showcase their ideas. The Time Is Now This is a perfect time for highly ambitious startups to make some…