this post was submitted on 05 Oct 2025
188 points (97.0% liked)
Technology
76072 readers
1527 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I don't know if it was overhyped or too expensive (or both) but Drobo seemed like a good consumer solution to this problem. The idea of being able to live swap drives and have it all handle redundancy, provisioning, recovery, and whatnot automatically is critical for making this a true "home appliance".
I think Drobo suffered from the problem of being slightly too technical for the technology dumb, and slightly too dumbed down for anybody who knows what Network Attached Storage is. Once you have the knowledge to know that you want network attached storage with redundant hardware, a generic RAID solution is within your ability level and there’s no point paying a giant premium for the Drobo branded version.
There's a corp solution called "CyberArk" that's intended for storing passwords and other secrets and providing an audit trail for every access, as well as access controls, etc. It's nothing like a solution for personal data storage, but those core concepts would be great.
The trick is getting Meta, Alphabet, X, banks, retailers, libraries and the rest to agree to use this API for storage of your data. The next (impossible) trick is enforcing their secure deletion of copies of your data in a timely fashion after they have accessed it.