Feeds
75%
Iomega StorCenter ix4-200d

Iomega StorCenter ix4-200d

Eco-friendly four-bay Nas?

  • alert
  • submit to reddit

3 Big data security analytics techniques

Both have four 500GB hard drives – Seagate Barracuda LP in the ix4-200d’s case – USB ports, two Ethernet ports, an LCD screen and so on. The biggest physical difference is that the Terastation’s hard drives are easily removed from a front door, while the ix4-200d’s are more permanently stored away. You can still remove the hard drives, but first you just need to undo a couple of screws and three sided of the case.

Iomega StorCenter ix4-200d

The settings page reveals most of standard Nas features you’d expect

Configuration is done solely from a web interface, with the bundled CD providing a manual, device finding software and EMC Retrospect Express HD for backing up files. The ix4-200d’s web interface has a crispness to it that the Ajax interfaces from Qnap and Synology lack.

Features are divided into sensible categories, with separate pages for the web file browser, settings and user control. All the standards you’d expect from a high end Nas are supported like CIFS, SMB, NFS, AFP (including native Apple Time Machine support), FTP, Windows Active Directory so Windows, Linux and Apple users should all be happy.

At first glance, the ix4-200d provides an excellent DynamicDNS solution for remote access. From the ix4-200d’s web interface you simply choose a name for Nas and pick between iomegalink.com or myiomega.com domain names and you’re away.

However, after the first year you’ll be charged $9.95 annually for the service and you can’t use alternative, namely free, DNS services either, unless you configure your router to do the job of remote access instead.

Iomega StorCenter ix4-200d

BitTorrent port selection is restricted, although our speeds were fine

DLNA compatibility hints the ix4-200d has a few consumer features, with 1080p PS3 and Xbox360 streaming no problem. BitTorrent downloading is also handled through the browser. However, we discovered you could only choose a port between 6881 and 6999, ports that used to be and, most likely still are, throttled by ISPs.

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.