ASKER
ASKER
ASKER
Hardware includes cell phones and other digital living devices, tablets, computers, servers, peripherals and components, printers and scanners, gaming consoles, networking hardware such as routers, hubs, switches and modems, storage devices and security equipment such as firewalls and other appliances.
TRUSTED BY
I would lean away from DROBO, they use a proprietary storage system that you can only have attempts of recovery done by them.
you could use something like Openfiler to provide SAN style external storage using various protocols, and limiting which addresses can access it.
Similar to drobo would be unRaid http://lime-technology.com