File System Inventory Summary Report
|
|
- Milo Leonard
- 5 years ago
- Views:
Transcription
1 File System Inventory Summary Report File Storage Usage for Company ABC* October 1, 2008 * This is an excerpt of a file system inventory recently performed for a mid-size technology company. All identifiable customer information has been removed.
2 Important Note: This is an excerpt of a file system inventory recently performed for a mid-size technology company using F5 Data Manager software. All identifiable customer information has been removed. A brief analysis of the data has been added to the bottom of each page. This information was provided by an F5 Networks expert who reviewed the final file system inventory report to help Company ABC understand what Data Manager had uncovered and what corrective action, if any, was required. Background Company ABC is a fast-growing, mid-size technology enterprise. Their IT organization was struggling to cope with storage growth rates that exceeded 70 percent annually, which was causing a series of problems: Users and applications were frequently hitting the capacity limits on their network shares, requiring constant IT firefighting. Manually balancing capacity required constant IT attention, typically during non-business hours, to avoid impacting users. Storage provisioning was disruptive to the business and often created a backlash from users. File migrations were time and resource intensive. Backups were growing increasingly cumbersome and costly. Storage and storage management costs were increasing annually and pressuring IT s storage budget. Company ABC was considering implementing a file virtualization solution to resolve these issues. However, the IT organization wanted to first understand their own file storage environment better and identify particular areas of need. Process The company used F5 Data Manager, a Microsoft Windows-based software solution, to inventory its file system. Data Manager autodiscovers key attributes about a file storage environment, including volumes, shares, exports, security settings, and file system settings. The reporting and capacity forecasting capabilities helped the IT team identify key trends or problem areas that could be improved with file virtualization. The charts and data, which are included on the following pages, are only a subset of the information available through Data Manager. These metrics were generated during the company s initial test of Data Manager on a single NAS filer. 2
3 File Storage Usage for Company ABC Capacity Disk Capacity Information Total Space 1.6 TB Free Space 52.5 GB Used Space 1.5 TB Percent Used 97% Capacity Inventoried 1.5 TB Percent Inventoried 96.6% Analysis Data Manager s inventory of the file share revealed that the device was almost at full capacity. Impact Company ABC had no flexibility to absorb future growth. Unless corrective action was taken, users and business operations would have been disrupted when the server ran out of disk space. Action Company ABC virtualized the file storage environment and implemented automated data management policies that could adapt to client demand, resource capacity, and network conditions in real time. This enabled IT to: - Provision new storage seamlessly. - Dynamically migrate files from the full disk to the new disk without ever impacting user access. - Create a unified storage pool and automated policies that distribute storage capacity across many systems. In addition, virtualizing the storage environment enabled Company ABC to address a number of additional problems uncovered in the inventory, as detailed in the analysis that follows. 3
4 File Storage Usage for Company ABC File Modification Age Modify Time Total Files Total Capacity <6 months 55, GB 6-12 months 37, GB >12 months 992, GB Analysis Nearly 70 percent of all capacity more than 1,000,000 files had not been accessed in six months or more. Impact Unused data was consuming the company s expensive, high performance primary storage and driving the need to purchase more capacity. This static data was also being backed up regularly, unnecessarily lengthening the backup times and consuming excessive backup media. Action The company augmented its primary storage tier with more cost effective-storage SATA storage, then implemented a tiering policy that enables it to: - Automatically move aged data to the more cost-effective secondary storage tier without affecting user access to the data. - Reduce backup time and backup media costs by establishing separate backup practices for each storage tier. 4
5 File Storage Usage for Company ABC Top File Extensions by Capacity Extensions Total Files Total Capacity.BKF GB.PST 2, GB.SPARSEIMAGE GB.PPT 15, GB.ISO GB.XLS 46, GB.VMDK GB.PDF 25, GB.RAR GB.BAK 1, GB Analysis Backup (.BKF) and (.PST) files were consuming 78 percent of available storage capacity on this file server. Impact.BKF and.pst files do not need to reside on expensive Tier 1 storage because they rarely change. In addition to quickly pushing the server to full capacity, storing these files on Tier 1 was contributing to the company s backup problems. Solution By virtualizing the file storage environment and investing in lower-cost storage to serve as a secondary storage tier for non-critical files, Company ABC was able to: - Easily migrate existing.bkf and.pst files to the secondary tier and establish policies that will move any new backup or files from the primary tier automatically, without impacting user access. - Postpone or eliminate the need to purchase additional high-performance disk capacity. - Cut backup windows and costs dramatically by establishing separate backup policies for each storage tier. 5
6 File Storage Usage for Company ABC Top Owners by Capacity Index Owner Total Total Files Capacity 1 BUILTIN\Administrators 445, GB 2 SIERRA\Jordan 17, GB 3 SIERRA\Jones GB 4 SIERRA\Smith GB 5 SIERRA\Anderson GB 6 SIERRA\Hall GB 7 SIERRA\Singh GB 8 SIERRA\Lopez 5, GB 9 SIERRA\Wall GB 10 SIERRA\Munster 7, GB Analysis The top two users consume 26 percent of all capacity on this file server. The next eight users also place a heavy demand on available capacity (21 percent), requiring nearly 324 GB of space. Impact Placing many high-demand storage users on a single server was causing utilization rates to quickly skyrocket, requiring frequent IT intervention to ensure enough space was always available for all users. (Note: Data Manager can also provide this level of detail across multiple file systems.) Solution Company ABC implemented automated data placement policies in its virtualized storage environment which: - Created a unified storage pool that allows all servers to share the load. - Places or moves files to various storage tiers based on various characteristics, including user, file age, last modification date, and file type. 6
7 In addition to the charts on the preceding pages, Data Manager provided Company ABC with data on the areas listed below. The following charts and tables have been removed from this sample report for brevity. File System Structure Files per Directory Level Directories per Directory Level Average Directory Fan-out per Directory Level Leaf Directories per Directory Level Leaf Directory Files per Directory Level Capacity per Directory Level File Access Age File Counts by Access Time Capacity by Access Time File Modification Age File Counts by Modify Time Capacity by Modify Time File Size File Counts by Size Capacity by File Size Top File Extensions by Total Files Top File Extensions by Capacity Top Owners by Total Files Top Owners by Capacity Top File System Paths by Total Files Top File System Paths by Capacity 7
8 Inventory Your File System with the Data Manager 45-Day Trial F5 Data Manager is an extensible storage management platform that helps you better monitor multiple file storage resources. Data Manager gives you a detailed understanding of your unique file storage structure and enables you to identify areas that can be improved with file virtualization. For a detailed look at your file storage environment, download your Data Manager 45-Day Trial or call us at and we ll have one of our experts assist you. Data Manager 45-Day Trial Download Instructions: 1. Go to downloads.f5.com and log in. 2. If you do not have a user account, click Register for an Account, follow the instructions, and log in. 3. Click on the Find a Download button. 4. Click on Data Manager in the F5 product line. On the next page, select the latest version and then click on the product container. 5. Read the End User Software License Agreement and click I Accept. 6. Click on the Data Manager Trial file to initiate the download. Be sure to download the Installation Guide and User Guide for detailed instructions. For more information on Data Manager or on how F5 ARX file virtualization solutions can help you simplify data management and get storage costs under control, visit or call F5 Networks, Inc. Corporate Headquarters 401 Elliott Avenue West Seattle, WA Phone (888) 88BIGIP Toll-free Fax info@f5.com F5 Networks Asia-Pacific Phone Fax info.asia@f5.com F5 Networks Ltd. Europe/Middle-East/Africa +44 (0) Phone +44 (0) Fax emeainfo@f5.com F5 Networks Japan K.K Phone Fax info@f5networks.co.jp File System Inventory Report 10/ F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, FirePass, and icontrol are trademarks or registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. 8
Automating the Data Center
F5 White Paper This paper discusses an alternative architecture that supports data center automation and dynamic provisioning without operating system virtualization. by Lori MacVittie Technical Marketing
More informationResource Provisioning Hardware Virtualization, Your Way
F5 White Paper Resource Provisioning Hardware Virtualization, Your Way Resource allocation can be a fine line, starving services if the adequate allocation isn t precisely managed. Resource provisioning
More informationOptimizing NetApp SnapMirror Data Replication with F5 BIG-IP WAN Optimization Manager
PARTNER USE CASE Optimizing NetApp SnapMirror Data Replication with F5 BIG-IP WAN Optimization Manager F5 BIG-IP WAN Optimization Manager (WOM) helps organizations optimize data replication with NetApp
More informationF5 icontrol. In this white paper, get an introduction to F5 icontrol service-enabled management API. F5 White Paper
F5 In this white paper, get an introduction to F5 icontrol service-enabled management API. by Lori MacVittie Technical Marketing Manager, Application Services Contents Introduction 3 icontrol Basics 3
More informationUsing the F5 ARX Solution for Automated Storage Tiering
F5 White Paper Using the F5 ARX Solution for Automated Storage Tiering Storage tiering can help organizations reduce costs and optimize their storage environments by automatically matching files with the
More informationBIG-IP Global Traffic Manager
v9 Series Datasheet Global Traffic Manager User Seattle Global Traffic Manager Maximizing ROI, availability, and the user experience across multiple data centers and distributed sites GTM San Francisco
More informationEnabling Flexibility with Intelligent File Virtualization
Enabling Flexibility with Intelligent File Virtualization White Paper Introduction Enterprises today face the challenge of managing and storing an ever-increasing amount of data. Not only is data being
More informationOptimize and Accelerate Your Mission- Critical Applications across the WAN
BIG IP WAN Optimization Module DATASHEET What s Inside: 1 Key Benefits 2 BIG-IP WAN Optimization Infrastructure 3 Data Optimization Across the WAN 4 TCP Optimization 4 Application Protocol Optimization
More informationManaging BIG-IP Devices with HP and Microsoft Network Management Solutions
F5 White Paper Managing BIG-IP Devices with HP and Microsoft Network Management Solutions Using third-party tools such as HP Network Node Manager i and Microsoft System Center Operations Manager, it has
More informationDeploying the BIG-IP LTM with IBM QRadar Logging
Deployment Guide Deploying the BIG-IP LTM with IBM QRadar Logging Welcome to the F5 deployment guide for IBM Security QRadar SIEM and Log Manager. This guide shows administrators how to configure the BIG-IP
More informationGeolocation and Application Delivery
F5 White Paper Geolocation and Application Delivery The data from geolocation providers offers highly valuable data to a variety of stakeholders and is no longer just for advertising. by Lori MacVittie
More informationClustered Multiprocessing: Changing the Rules of the Performance Game
F5 White Paper Clustered Multiprocessing: Changing the Rules of the Performance Game Because improvements in practical computer power lag far behind these exponential hardware improvements, the key to
More informationLarge FSI DDoS Protection Reference Architecture
Large FSI DDoS Protection Reference Architecture Customers ISPa Tier 1: Protecting L3-4 and DNS Network Firewall Services + Simple Load Balancing to Tier 2 Tier 2: Protecting L7 Web Application Firewall
More informationDeploying a Next-Generation IPS Infrastructure
Deploying a Next-Generation IPS Infrastructure Enterprises require intrusion prevention systems (IPSs) to protect their network against attacks. However, implementing an IPS involves challenges of scale
More informationImproving VDI with Scalable Infrastructure
Improving VDI with Scalable Infrastructure As virtual desktop infrastructure (VDI) has become more prevalent, point solutions have emerged to address associated delivery issues. These solutions burden
More informationArchived. Deploying the BIG-IP LTM with IBM Cognos Insight. Deployment Guide Document version 1.0. What s inside: 2 Products and versions tested
Deployment Guide Document version 1.0 What s inside: Products and versions tested Prerequisites and configuration notes Configuration example and traffic flows 3 Configuring the BIG-IP system for IBM Cognos
More informationDeploying the BIG-IP System with Oracle Hyperion Applications
Deployment Guide DOCUMENT VERSION.0 What s inside: Prerequisites and configuration notes Configuration example Preparation Worksheet Configuring the BIG-IP system for Hyperion Planning Workspace 5 Configuring
More informationValidating Microsoft Exchange 2010 on Cisco and NetApp FlexPod with the F5 BIG-IP System
Validating Microsoft Exchange 2010 on Cisco and NetApp FlexPod with the F5 BIG-IP System As enterprises around the globe move to increasingly virtualized environments, they can use a Cisco and NetApp FlexPod
More informationF5 and Nuage Networks Partnership Overview for Enterprises
Partnership Overview for Enterprises Automate and accelerate application and network services deployment with. Key benefits enable you to: Deploy a flexible, agile, and programmable network that can instantiate
More informationDeploying the BIG-IP LTM with Oracle JD Edwards EnterpriseOne
Deployment Guide Version.0 Deploying the BIG-IP LTM with Oracle What s inside: Prerequisites and configuration notes Configuration example 3 Preparation Worksheet 4 Configuring the BIG-IP for HTTP traffic
More informationGlobal Distributed Service in the Cloud with F5 and VMware
F5 White Paper Global Distributed Service in the Cloud with F5 and VMware Using F5 BIG-IP Global Traffic Manager to orchestrate and deliver access to services in the cloud. by Alan Murphy Technical Marketing
More informationData Center Virtualization Q&A
Data Center Virtualization Q&A Q What's driving the need for data center virtualization? A We know that if business continuity is a key objective of an organization, it means that operations are up and
More informationVMware vcenter Site Recovery Manager
VMware vcenter Site Recovery Manager Welcome to the BIG-IP deployment guide for (SRM). This guide provides procedures for configuring the BIG-IP Local Traffic Manager (LTM), Global Traffic Manager (GTM),
More informationUnified Application Delivery
The vision of a unified application delivery network gets more clear with F5 BIG-IP v10. White Paper by Lori MacVittie The Vision For every problem that arises out of the dust left behind as new technologies
More informationDeploying the BIG-IP System with CA SiteMinder
Deployment Guide Document version 1.0 What's inside: 2 Prerequisites and configuration notes 2 Configuration example 3 Configuring the BIG-IP LTM for the SiteMinder Administrative User Interface servers
More informationComplying with PCI DSS 3.0
New PCI DSS standards are designed to help organizations keep credit card information secure, but can cause expensive implementation challenges. The F5 PCI DSS 3.0 solution allows organizations to protect
More informationDeploying a Next-Generation IPS Infrastructure
Deploying a Next-Generation IPS Infrastructure Enterprises require intrusion prevention systems (IPSs) to protect their network against attacks. However, implementing an IPS involves challenges of scale
More informationMaintain Your F5 Solution with Fast, Reliable Support
What s Inside 2 Standard and Premium Support Features 2 Expert Assistance When You Need It 2 Proactive Case Management 3 irules Support 3 Software Upgrades and Updates 3 Self-Service Resources 3 Expedited
More informationEnabling Long Distance Live Migration with F5 and VMware vmotion
Enabling Long Distance Live Migration with F5 and VMware vmotion F5 Networks and VMware partner to enable live application and storage migrations between data centers and clouds, over short or long distances.
More informationThe Programmable Network
Emerging software-defined data center solutions focus on the need for programmability in the network to reduce costs and realize the benefits of automation. Whether the goal is cloud computing or an SDN,
More informationServer Virtualization Incentive Program
Formerly Server Virtualization Incentive Program, VMware Only Program Overview: F5 and VMware VMware, a market leader in virtualization, provides a rich suite of advanced virtualization solutions, from
More informationPrompta volumus denique eam ei, mel autem
VMware Utroque Democritum Horizon View Aeterno Nostro Optimized Aperiam Secure Usu Access Prompta volumus denique eam ei, mel autem The F5 BIG-IP platform optimizes the VMware View user experience and
More informationKeeping Your Head Above the Cloud: Seven Data Center Challenges to Consider Before Going Virtual
Keeping Your Head Above the Cloud: Seven Data Center Challenges to Consider Before Going Virtual One of the pillars of the Virtual Data Center is virtual platform infrastructure, or the virtual machine;
More informationDeploying the BIG-IP System v11 with DNS Servers
Deployment Guide Document version 1.1 What s inside: 2 What is F5 iapp? 2 Prerequisites and configuration notes 2 Configuration example 3 Preparation Worksheet 4 Configuring the BIG-IP iapp for DNS Servers
More informationDESIGN GUIDE. VMware NSX for vsphere (NSX-v) and F5 BIG-IP Design Guide
VMware NSX for vsphere (NSX-v) and F5 BIG-IP Design Guide Contents Intended Audience 3 Overview 3 NSX and BIG-IP Topology Options 4 Topology 1: Parallel to NSX Edge Using VXLAN Overlays with BIG-IP Physical
More information7 Ways Compellent Optimizes VMware Server Virtualization WHITE PAPER FEBRUARY 2009
7 Ways Compellent Optimizes ware Virtualization WHITE PAPER FEBRUARY 2009 Introduction Increasingly, enterprises are turning to server virtualization to enhance IT flexibility while reducing costs. virtualization
More informationWHITE PAPER. F5 and Cisco. Supercharging IT Operations with Full-Stack SDN
+ WHITE PAPER F5 and Cisco Supercharging IT Operations with Full-Stack SDN Contents Introduction 3 Confronting the bottleneck 3 Evolving SDN technologies 4 An integrated solution 5 Application policies,
More informationConsiderations for VoLTE Implementation
Considerations for VoLTE Implementation The mobile industry is in a painful transition as service providers make the costly mass migration to a new network environment: LTE. Adding to the situation, many
More informationArchived. Configuring a single-tenant BIG-IP Virtual Edition in the Cloud. Deployment Guide Document Version: 1.0. What is F5 iapp?
Deployment Guide Document Version: 1.0 What s inside: 2 Configuration example 4 Securing the isession deployment 6 Downloading and importing the new iapp 6 Configuring the BIG- IP systems using the Cloud
More informationSOA Infrastructure Reference Architecture: Defining the Key Elements of a Successful SOA Infrastructure Deployment
F5 White Paper SOA Infrastructure Reference Architecture: Defining the Key Elements of a Successful SOA Infrastructure Deployment The purpose of this paper is to document the infrastructure components
More informationConverting a Cisco ACE configuration file to F5 BIG IP Format
Converting a Cisco ACE configuration file to F5 BIG IP Format Joe Pruitt, 2012-11-12 In September, Cisco announced that it was ceasing development and pulling back on sales of its Application Control Engine
More informationv.10 - Working the GTM Command Line Interface
v.10 - Working the GTM Command Line Interface Jason Rahm, 2009-21-04 A couple weeks ago I blogged about the enhancements that v.10 brought to GTM, the most anticipated being that GTM now has a command
More informationArchived. h h Health monitoring of the Guardium S-TAP Collectors to ensure traffic is sent to a Collector that is actually up and available,
Deployment Guide Document version 1.6 What's inside: 2 Products and versions 2 Prerequisites and configuration notes 2 Configuration example 3 Understanding BIG-IP connection balancing Guardium connections
More informationApplication and Data Security with F5 BIG-IP ASM and Oracle Database Firewall
F5 White Paper Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall Organizations need an end-to-end web application and database security solution to protect data, customers,
More informationF5 Reference Architecture for Cisco ACI
F5 Reference Architecture for Cisco ACI Today s businesses face complex challenges to stay efficient and competitive. Together, F5 and Cisco enable organizations to dramatically reduce time to value on
More informationSecure Mobile Access to Corporate Applications
Secure Mobile Access to Corporate Applications The way corporations operate around mobile devices is currently shifting employees are starting to use their own devices for business purposes, rather than
More informationBIG IQ Reporting for Subscription and ELA Programs
BIG IQ Reporting for Subscription and ELA Programs Chase Abbott, 2018 08 11 October 2018 Rev:D Scope This document describes the following: When reporting is needed and how the report is used How BIG IQ
More informationMulti-Tenancy Designs for the F5 High-Performance Services Fabric
Multi-Tenancy Designs for the F5 High-Performance Services Fabric F5 has transformed the traditional networking design of highly available pairs of hardware devices to create a new architecture a multi-tenant
More informationDocument version: 1.0 What's inside: Products and versions tested Important:
Deployment Guide Document version: 1.0 What's inside: 2 Prerequisites and configuration notes 2 Configuration example 3 Configuring the BIG-IP ASM for Oracle Database Firewall 3 Configuring the BIG-IP
More informationDriving Data Warehousing with iomemory
Driving Data Warehousing with iomemory Fusion s iomemory offers dramatic performance improvements and cost savings for data warehousing environments. Introduction The primary challenge data warehousing
More informationWebshells. Webshell Examples. How does a webshell attack work? Nir Zigler,
Webshells Nir Zigler, 2014-01-09 Webshells are web scripts (PHP/ASPX/etc.) that act as a control panel for the server running them. A webshell may be legitimately used by the administrator to perform actions
More informationInformation management, subscription service, financial news
Storage Economics Engagement Customer Summary INDUSTRY: REGION: Information management, subscription service, financial news Americas BUSINESS SIZE: Enterprise USE CASE Executive Summary The data growth
More informationDeploying WAN-Optimized Acceleration for VMware vmotion Between Two BIG-IP Systems
Deployment Guide Deploying WAN-Optimized Acceleration for VMware vmotion Between Two BIG-IP Systems Welcome to the F5 deployment guide for VMware vmotion. This document contains guidance on configuring
More informationKey metrics for effective storage performance and capacity reporting
Key metrics for effective storage performance and capacity reporting Key Metrics for Effective Storage Performance and Capacity Reporting Objectives This white paper will cover the key metrics in storage
More informationSNMP: Simplified. White Paper by F5
The Simple Network Management Protocol defines a method for managing devices that connect to IP networks. The "simple" in SNMP refers to the requirements for a managed device, not the protocol. This white
More informationUnified Access and Optimization with F5 BIG-IP Edge Gateway
F5 White Paper Unified Access and Optimization with F5 BIG-IP Edge Gateway Integrating security, availability, and application acceleration services to enable context-aware networking. by Peter Silva Technical
More informationThe F5 Application Services Reference Architecture
The F5 Application Services Reference Architecture Build elastic, flexible application delivery fabrics that are ready to meet the challenges of optimizing and securing applications in a constantly evolving
More informationLoad Balancing 101: Nuts and Bolts
Load Balancing 101: Nuts and Bolts Load balancing technology is the basis on which today s Application Delivery Controllers operate. But the pervasiveness of load balancing technology does not mean it
More informationCitrix Federated Authentication Service Integration with APM
Citrix Federated Authentication Service Integration with APM Graham Alderson, 2016-19-12 Introduction This guide will cover how to use APM as the access gateway in front of Storefront when using Citrix
More informationTCO REPORT. NAS File Tiering. Economic advantages of enterprise file management
TCO REPORT NAS File Tiering Economic advantages of enterprise file management Executive Summary Every organization is under pressure to meet the exponential growth in demand for file storage capacity.
More informationEnhancing VMware Horizon View with F5 Solutions
Enhancing VMware Horizon View with F5 Solutions VMware Horizon View is the leading virtualization solution for delivering desktops as a managed service to a wide range of devices. F5 BIG-IP devices optimize
More informationVMware Infrastructure 3
Your Trusted Channel Navigator VMware Infrastructure 3 Data Center Management and Optimization Suite B R O C H U R E VMware Infrastructure 3 Data center management and optimization suite The Responsive
More informationPrompta volumus denique eam ei, mel autem
The Utroque F5 Intelligent Democritum DNS Aeterno Scale Nostro Reference Aperiam Architecture. Usu Prompta volumus denique eam ei, mel autem End-to-end DNS delivery solutions from F5 maximize the use of
More informationWHITE PAPER: GREEN IT. Using Software to Reduce Power Consumption. By Bruce Naegel & Jose Iglesias. June 1, 2008
WHITE PAPER: GREEN IT Using Software to Reduce Power Consumption By Bruce Naegel & Jose Iglesias June 1, 2008 Symantec Technical Network White Paper White Paper: Green IT Using Software to Reduce Power
More informationIntroducing the Dell TM PAN System
Introducing the Dell TM PAN System Third party information provided to you courtesy of Dell Infrastructure Orchestration and the Next Generation Data Center Enterprise data centers are filled with underutilized
More informationF5 iapps: Moving Application Delivery Beyond the Network
F5 iapps: Moving Application Delivery Beyond the Network Traditional application delivery has focused on how to manage the network for applications. F5 iapps are a revolutionary new way of focusing on
More informationArchived. For more information of IBM Maximo Asset Management system see:
Deployment Guide Document Version 1.4 What s inside: 2 Prerequisites and configuration notes 2 Configuration example and traffic flows 6 Configuring the BIG-IP LTM for Maximo 7 Configuring the BIG-IP WebAccelerator
More informationCookies, Sessions, and Persistence
Cookies, Sessions, and Persistence Cookies and sessions are the most useful hack invented, allowing HTTP to become stateful and applications to work on the web. But it is persistence that ties the two
More informationMeeting the Challenges of an HA Architecture for IBM WebSphere SIP
Meeting the Challenges of an HA Architecture for IBM WebSphere SIP Voice and multi-media features available in IBM WebSphere Application Server enable a new generation of integrated applications but also
More informationProviding Security and Acceleration for Remote Users
F5 White Paper Providing Security and Acceleration for Remote Users Delivering applications to remote users is a significant undertaking. Applications need to be available, and they must be delivered securely
More informationThe Copley Press, Inc.
CUSTOMER SUCCESS The Streamlining Operations with Symantec Solutions Enhances Availability, Data Protection and More, with Lower TCO In the fast-changing newspaper industry, needed to enhance availability
More informationIBM Storwize V7000: For your VMware virtual infrastructure
IBM Storwize V7000: For your VMware virtual infrastructure Innovative midrange disk system leverages integrated storage technologies Highlights Complement server virtualization, extending cost savings
More informationMaximize Operational Efficiency in a Tiered Storage Environment
W H I T E P A P E R : T E C H N I C A L Maximize Operational Efficiency in a Tiered Storage Environment Use Cases for Orchestrated Volume and Page-based Migration with Hitachi Tiered Storage Manager (HTSM)
More informationProtecting Against Online Banking Fraud with F5
Protecting Against Online Banking Fraud with F5 Fraud is a relentless threat to financial services organizations that offer online banking. The F5 Web Fraud Protection solution defends against malware,
More informationWHITE PAPER. How Virtualization Complements ShoreTel s Highly Reliable Distributed Architecture
WHITE PAPER How Virtualization Complements s Highly Reliable Distributed Architecture Table of Contents 1. Executive summary...3 2. Why virtualize...3 3. UC system architecture and virtualization...4 4.
More informationF5 and Infoblox DNS Integrated Architecture: Offering a Complete Scalable, Secure DNS Solution
F5 Technical Brief F5 and Infoblox DNS Integrated Architecture: Offering a Complete Scalable, Secure DNS Solution As market leaders in the application delivery market and DNS, DHCP, and IP Address Management
More informationSession Initiated Protocol (SIP): A Five-Function Protocol
Session Initiated Protocol (SIP): A Five-Function Protocol SIP is an application-layer control protocol that can establish, modify, and terminate multimedia sessions (conferences) such as Internet telephony
More informationProtect Against Evolving DDoS Threats: The Case for Hybrid
Protect Against Evolving DDoS Threats: The Case for Hybrid CIOs want harmony. Security directors loathe point products. Network operations won t buy into anything new. CIOs can get the harmony they need
More informationIs Tape Really Cheaper Than Disk?
White Paper 20 October 2005 Dianne McAdam Is Tape Really Cheaper Than Disk? Disk Is... Tape Is... Not since the Y2K phenomenon has the IT industry seen such intensity over technology as it has with the
More informationAPM Cookbook: Single Sign On (SSO) using Kerberos
APM Cookbook: Single Sign On (SSO) using Kerberos Brett Smith, 2014-28-04 To get the APM Cookbook series moving along, I ve decided to help out by documenting the common APM solutions I help customers
More informationGlobal Configurator 3.0
Control Systems Global Configurator 3.0 CONFIGURATION SOFTWARE FOR EXTRON CONFIGURABLE CONTROL SYSTEMS Available for free from www.extron.com No programming skills required Configures Extron IP-based control
More informationSimplifying Security for Mobile Networks
Simplifying Security for Mobile Networks Communications service providers face an array of complex challenges, from network growth and increasing security threats to technology transitions. The comprehensive
More informationF5 in AWS Part 3 Advanced Topologies and More on Highly Available Services
F5 in AWS Part 3 Advanced Topologies and More on Highly Available Services ChrisMutzel, 2015-17-08 Thus far in our article series about running BIG-IP in EC2, we ve talked about some VPC/EC2 routing and
More informationData safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.
WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish
More informationControlling the Cloud: Requirements for Cloud Computing
F5 White Paper Controlling the Cloud: Requirements for Cloud F5 Networks perspective on cloud computing: definition, architecture, and development. by Lori MacVittie Technical Marketing Manager, Applications
More informationEMC Business Continuity for Microsoft Applications
EMC Business Continuity for Microsoft Applications Enabled by EMC Celerra, EMC MirrorView/A, EMC Celerra Replicator, VMware Site Recovery Manager, and VMware vsphere 4 Copyright 2009 EMC Corporation. All
More informationIBM Real-time Compression and ProtecTIER Deduplication
Compression and ProtecTIER Deduplication Two technologies that work together to increase storage efficiency Highlights Reduce primary storage capacity requirements with Compression Decrease backup data
More informationLoad Balancing 101: Nuts and Bolts
Load Balancing 101: Nuts and Bolts Load balancing technology is the basis on which today's Application Delivery Controllers operate. But the pervasiveness of load balancing technology does not mean it
More informationMarket Report. Scale-out 2.0: Simple, Scalable, Services- Oriented Storage. Scale-out Storage Meets the Enterprise. June 2010.
Market Report Scale-out 2.0: Simple, Scalable, Services- Oriented Storage Scale-out Storage Meets the Enterprise By Terri McClure June 2010 Market Report: Scale-out 2.0: Simple, Scalable, Services-Oriented
More informationNetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst
ESG Lab Spotlight NetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab Spotlight explores how NetApp Data ONTAP 8.2 Storage QoS can
More informationManaging the Migration to IPv6 Throughout the Service Provider Network White Paper
Managing the Migration to IPv6 Throughout the Service Provider Network Managing the Migration to IPv6 Throughout the Service Provider Network White Paper Introduction Service providers are feeling increasing
More informationVulnerability Assessment with Application Security
Vulnerability Assessment with Application Security Targeted attacks are growing and companies are scrambling to protect critical web applications. Both a vulnerability scanner and a web application firewall
More informationProtecting Against Application DDoS A acks with BIG-IP ASM: A Three- Step Solution
Protecting Against Application DDoS A acks with BIG-IP ASM: A Three- Step Solution Today's security threats increasingly involve application-layer DDoS attacks mounted by organized groups of attackers
More informationPower of the Portfolio. Copyright 2012 EMC Corporation. All rights reserved.
Power of the Portfolio 1 VMAX / VPLEX K-12 School System District seeking system to support rollout of new VDI implementation Customer found Vblock to be superior solutions versus competitor Customer expanded
More informationStorage s Pivotal Role in Microsoft Exchange Environments: The Important Benefits of SANs
Solution Profile Storage s Pivotal Role in Microsoft Exchange Environments: The Important Benefits of SANs Hitachi Data Systems Making the Optimal Storage Choice for Performance, Resiliency in Microsoft
More informationSymantec Enterprise Vault
Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments
Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationMoving From Reactive to Proactive Storage Management with an On-demand Cloud Solution
Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution The Ever-Present Storage Management Conundrum In the modern IT landscape, the storage management conundrum is as familiar
More informationIBM System Storage DS5020 Express
IBM DS5020 Express Manage growth, complexity, and risk with scalable, high-performance storage Highlights Mixed host interfaces support (FC/iSCSI) enables SAN tiering Balanced performance well-suited for
More informationVERITAS Storage Foundation 4.0 TM for Databases
VERITAS Storage Foundation 4.0 TM for Databases Powerful Manageability, High Availability and Superior Performance for Oracle, DB2 and Sybase Databases Enterprises today are experiencing tremendous growth
More information