Scality RING S3 Connector Storage that Powers Digital Business
|
|
- Julianna Lester
- 6 years ago
- Views:
Transcription
1 Storage that Powers Digital Business
2 Table of Contents I. Introduction: Object Storage for Digital Business... 1 II. S3 Connector Overview... 2 III. S3 Connector Container Architecture... 3 A. S3 Server... 4 B. S3 Vault... 5 C. S3 Metadata... 7 D. Logger... 9 IV. S3 Connector Federated Deployment... 9 V. S3 Connector Deployment Use Cases A. On-Premises Private Storage Cloud B. Support for ISV and Custom Applications C. Geo-Distributed S3 Deployments VI. Summary Table of Figures Figure 1: Market Trending, Adoption of S3 Object Storage... 1 Figure 2: S3 Connector & RING for Secure, Scalable Storage for a Wide Range of Applications... 2 Figure 3: S3 Connector Container Architecture... 4 Figure 4: The S3 Vault Object Model with Accounts, IAM Users and Groups... 6 Figure 5: S3 Metadata with Scale-out Cluster Design... 8 Figure 6: Viewing the S3 Logger Service with Kibana... 9 Figure 7: Six (6) Server RING with S3 Connectors & Store Nodes Figure 8; Active/Active Stretched S3 Deployments Scality. All rights reserved Confidential i
3 I. Introduction: Object Storage for Digital Business Industry observers have long been following the emergence of object storage for large-scale unstructured data, reflected in major public storage cloud offerings from the likes of Amazon, Microsoft, and Google. Far and away, the clear market leader today among these clouds is the Amazon Web Services (AWS) S3 service, which since its launch in 2006 has grown dramatically with EC2 and other value-added services. Figure 1: Market Trending, Adoption of S3 Object Storage Today, the AWS S3 service is used to store trillions of user objects. Its remarkable growth is the result of such popular SaaS solutions as Netflix and Uber, which rely on it to run their key applications. In addition, over the past three years corporate enterprises have dramatically increased the use of S3 with their homegrown media, financial data, and Internet-of-Everything (IoT) applications. Many ISVs are now adopting S3 as their back-end storage API too, including CommVault Simpana and Veritas Netbackup, as well as such emerging players as Ctera. As a result, a defacto object storage API standard has in essence emerged, one that is analogous to SQL for relational databases and NFS for NAS systems. This all serves to create a positive trend for S3, thus increasing application pull for object storage. Many corporations and ISVs are seeking the flexibility that is borne of being able to deploy applications that can run both in the public cloud and in on-premises enterprise cloud solutions, a critical need that is fulfilled by the seamless and highly compatible S3 storage services made available by the Scality RING S3 Connector (known also as S3 Connector). Presently, Scality customers are deploying the RING in mission-critical scenarios, to store over 800 billion objects, and this number is growing fast. The S3 Connector leverages the S3 Server, which provides a Scality-developed open source S3- compatible API. This presents multiple clear advantages for ISVs and enterprise developers, supplying a simplified solution for S3 application development, for instance, while also ensuring the painless transition of applications to the S3 Connector (thus providing high-performance, scale-out storage services for applications that can remain portable across public and enterprise cloud environments) Scality. All rights reserved Confidential 1
4 II. S3 Connector Overview The overarching business goal for Scality s next-generation S3 Connector is to provide scalable, reliable, and highly available storage services to manage the massive volumes of unstructured data that are generated by emerging cloud applications. As the company s new S3-compatible interface to the RING, the S3 Connector succeeds the RS2 Connector, first introduced in The connector provides comprehensive cloud and enterprise security capabilities, scalable performance, advanced data storage and management functionality. For enterprises and service providers, the S3 Connector offers the most secure, scalable and portable storage services for custom and packaged cloud applications on the market today. Figure 2: S3 Connector & RING for Secure, Scalable Storage for a Wide Range of Applications 2016 Scality. All rights reserved Confidential 2
5 The S3 Connector s core proficiencies work in tandem to provide a rich set of storage services with which applications can be deployed seamlessly across public, private and hybrid cloud environments. Rich AWS and Enterprise Security S3 API Compatibility Any-to-Any Scale-Out High-Performance Buckets Geo-Distributed Capabilities Ease of Deployment Support for the full complement of AWS security services, such as multitenant accounts, Identity and Access Management (IAM) for users, groups and roles, AWS-style access keys and secret keys, the latest Signature v4 Authentication mechanism, and data encryption. Also featured is interoperability with such existing enterprise security services as LDAP and Microsoft Active Directory servers. Notwithstanding rapid AWS advancements, a high-degree of S3 API coverage is assured, including core data APIs for Bucket and Object access and Multi-Part-Upload (MPU) for efficient ingest of large objects. S3 Connector development is based on Continuous Integration (CI) and agile delivery of features when ready, which allows Scality to introduce new S3 methods shortly after their AWS publication. This functionality is provided by the S3 Server, which is supported by Scality as an open source project on Github. Applications can access any Bucket or Object from any connector, thus allowing for parallel and multi-user access to data and scaling to billions of buckets and objects. Performance can be scaled-out simply by adding more connectors. Support for low-latency response times and high throughput of reads and writes of Objects in Buckets. Also, performance is optimized for fast Bucket listing operations, including fast partial-path search for selected objects by path prefix. S3 Connector provides integrated geo-replication capabilities for storage across multiple datacenters, supporting Active/Active stretched deployments for site disaster protection with continuous data availability Delivered as a set of easy-to-deploy Docker containers, installation of the S3 Connector is simple, with zero-configuration across the customer s choice of physical, virtual or cloud environments. III. S3 Connector Container Architecture Comprising a set of distributed software-driven services, the S3 Connector offers three (3) complementary functions: S3 API (S3 Server), security (S3 Vault), and a purpose-built metadata engine that is optimized to manage Buckets at cloud-scale (S3 Metadata). These key services are delivered as Docker containers for ease of deployment Scality. All rights reserved Confidential 3
6 Figure 3: S3 Connector Container Architecture Access to S3 Server occurs via standard RESTful HTTP calls over URls, such as S3.scality.com, with all processes deployed on standard servers as Docker containers. Such Docker containers are also available for the Logger (ElasticSearch, aka ELK) and for the Ansible framework components. With the Ansible framework, a federated deployment allows the setup of all Docker containers including S3 Connector components on target servers (refer to S3 Connector Federated Deployment on page 9). A. S3 Server The central component of the S3 Connector, S3 Server supports standard S3 API command URLS, enabling SSL certificate configuration for secure HTTPS access and encryption over-thewire. It supports S3 headers, response codes and error codes. Its processes are stateless, thus applications can access any Bucket or Object resources via multiple servers for requests to ingest (PUT), or access (GET) object data, using standard load balancers. The S3 Server enables scale-out functionality across as many connectors as needed to serve application or user load requirements, even on single Buckets, along with scalable capacity per Bucket. The component provides two (2) means for accessing a Bucket as per the S3 protocol: Path Style and Virtual Hosting. Path Style Using the Bucket name as a path following the domain, in the form For example, with the configured domain as s3.scality.com and the Bucket name testbucket, using path style the URL is Virtual Hosting Using the Bucket name as a subdomain within the configured domain, in the form For example, assuming that the configured domain is s3.scality.com and that the bucket is testbucket, using virtual hosting style the URL will be Scality. All rights reserved Confidential 4
7 To support both Path Style and Virtual Hosting access, the configured domain and any subdomains driving the network traffic must be defined on the S3 machines. S3 Server supports standard S3 API operations on resources, including Buckets and Objects containing data payloads. Addressing schemes with unique key names are constructed on to of Bucket names, as previously described. Object names may include pseudo-path names separated by / delimiters, to provide a path hierarchy akin to that of a file system. The contents of a Bucket can be listed via Bucket GET API calls, including partial path listings of Objects with a common object prefix (e.g., /foo/ ) that lists all Object names starting with indicated path. A wide set of API calls are supported by S3 Server, including standard PUT, GET (including range GETs), DELETE, HEAD, and Multi-Part-Upload (MPU) for efficient, parallel ingest of large objects. The S3 Server component also supports standard and canned Bucket and Object Access Control Lists (ACLs). Advanced API support including Bucket Versioning and Bucket Lifecycle are on Scality s roadmap for the S3 Connector. Offered as an open source product (published on and downloadable from Github), developers and ISVs can download the S3 Server standalone and use it to test and develop S3 compatible applications without the necessity of incurring AWS Account and S3 storage fees. Resulting applications can thus be reliably and compatibly deployed on the S3 Connector and the RING for production use. A full description of the API set supported by the S3 Connector can be found in the Scality S3 Connector API Reference. B. S3 Vault S3 Vault provides identity management and access control security functionality for the S3 Connector. Adhering to the IAM model, the service offers a comprehensive AWS-compatible security service that is able to integrate with external enterprise directory and security services for instance, Active Directory via SAML (Security Assertion Markup Language) version 2.0. More specifically, S3 Vault is responsible for key security and access control capabilities, such as accounts, users, groups, roles, access keys and AWS-style secret keys. ACLs are implemented for arbitrating access to such underlying resources as Buckets and Objects. Thus, the implication is that S3 Vault must reconcile overlapping rules from various roles, ACLs and IAM Policies (to be enabled in a future release), and grant least restrictive access to the resources. S3 Vault supports authentication over the new AWS S3 Signature v4 mechanism as well as the legacy v2 authentication mechanism, and in 2016 follow-on releases the service will also support access control through IAM Policies and data encryption via the S3 SSE-C (Server Side Encryption, with customer-provided Key Management Services). The component was designed to parallel AWS S3 concepts, including: 2016 Scality. All rights reserved Confidential 5
8 Accounts Top logical billing entity associated with multiple tenants (applications or customers); can contain IAM users IAM users Associated with one or more roles (to provide credentials via ACLs); contained in accounts, and can belong to groups Access key IDs and Secret access keys Assigned to accounts or IAM users Authentication Performed through external security services (e.g., Active Directory) over SAML 2.0 Figure 4: The S3 Vault Object Model with Accounts, IAM Users and Groups Two (2) interfaces for managing accounts and users are provided by S3 Vault: a Command Line Interface (CLI) with interactive or scriptable commands, and a documented REST API. Both interfaces provide commands for creating, updating and deleting security objects, including the Account access key IDs and secret access keys. Vault administration itself is authorized via Super-Administrator credentials only, thus ensuring that access to sensitive Account, User and Key management tasks is restricted to only the most privileged administrator. S3 Vault echoes the importance given to identity by AWS S3 with regard to access control, providing authentication of the accessing identity via one of the two AWS Signature schemes Signature v4 or Signature v2 as dictated by the API headers. Requests are allowed or denied in part based on the identity of the requester. For example, the right to create a new Bucket in an account is reserved for registered users (by default), and the right to create Objects in a Bucket is reserved for the owner of the Bucket in question. The Signature v4 and v2 authentication schemes are both based on keyed-hmac (Hash Message Authentication Code) mechanisms. To authenticate a request, the API call must first concatenate selected elements of any API request to form a string, and then use the Account (or User s) secret access key to calculate the HMAC of that string. The HMAC algorithm output termed the signature is added as a parameter of the API request as the final step in signing the request. (The v4 authentication scheme requires an additional header in each API call, and in addition the HMAC is computed on the headers and object payload being passed. This differs from the v2 scheme, which did not require the HMAC signature to include the object payload.) 2016 Scality. All rights reserved Confidential 6
9 Upon receiving an authenticated request, S3 Vault retrieves the AWS secret access key indicated from either the Vault database, or from an external security service via SAML and uses it to compute a signature for the message it received in the same manner as with request authentication. The service next compares the signature it calculated against the signature presented by the requester. If the two signatures match, the system concludes that the requester must have access to the AWS secret access key. If, however, S3 Vault performs the calculations and the two signatures do not match, the request is denied and the system responds with an error message. Initially, S3 Vault implements access control through AWS ACLs on Buckets and Objects, to provide control over basic access privileges to these resources for PUT, GET and DELETE operations. This includes support for standard and canned ACLs, with standard ACLs defining READ, WRITE, READ_ACP, WRITE_ACP, FULL_CONTROL permissions on the underlying resources, whereas canned ACLs serve to define more advanced permissions (e.g., private, public-read, public-read-write, authenticated-read, bucket-owner-read, bucket-owner-full-control, log-delivery-write). In a 2016 follow-on release, S3 Vault will also enable AWS IAM User and Group Policies with the service resolving access control by way of a most restrictive rule among Policies and ACLs, to ensure the highest security. The S3 Connector employs SAML 2.0 as a standards-based XML protocol designed to facilitate the exchange of AAA -related data (authentication, access control, and accounting) between different security domains. SAML is uniquely capable of establishing cross-domain Single-Sign-On (SSO) behavior between S3 Vault and other security services. C. S3 Metadata A distributed metadata database service, S3 Metadata stores system metadata in an ultrareliable, scalable and high-performance manner (e.g., data related to user s Buckets and Object keys, as well as such S3 Vault security-related items as accounts, users and ACLs). Perhaps the most technically challenging aspect of distributed storage solutions is highly scalable metadata management. To that end, Scality invested in a decade s worth of leading distributed systems research both internally, and in collaboration with leading research institutions (e.g., INRIA 1 ) to develop a state-of-the-art Bucket indexing and object metadata engine for the S3 Connector. As a result of the company s diligence, this engine is able to offer a convergence of scalability, resiliency to failures, and high-performance access for high numbers of concurrent requests, resulting in an engine that as the cornerstone of the S3 Metadata service enables the S3 Connector to support extremely large-scale deployments involving millions of Buckets each containing millions of Objects. The engine also serves as the foundational technology for scale-out access and performance support. It is also a key building block in the advanced versioning, lifecycle, and geographically-distributed multiple datacenter deployments planned for future releases. 1 INRIA and Scality distributed systems research 2016 Scality. All rights reserved Confidential 7
10 In delivering its service, S3 Metadata uses a highly available leader/quorum clustered database design based on the Raft 2 distributed consensus algorithm ( with each cluster member managing its own copy of the metadata in a key/value database. Each S3 Bucket is mapped to a database, complete with its own cluster of database server daemons in a Raft session. The underlying key/value database provides the desired properties of fast insertion, scalability to millions of entries (Objects per Bucket), and fast listing operations to present the contents of a Bucket. All of which assures high performance access for applications performing Bucket operations with high rates of PUT, GET and DELETE requests. Figure 5: S3 Metadata with Scale-out Cluster Design As depicted in Figure 5, the key elemental building block is a logical node for storing metadata called a Repd. Multiple Repds form a replication group to tolerate the failure of a minority of Repds, with a consensus protocol in place to achieve consistency. DBAPI is responsible for partitioning and acts as a replication mechanism for sessions and Repds transparent to higherlevel applications (e.g., S3 Connector). The design assigns a set of Repds to each S3 Bucket, and by selecting different sets of Repds from a pool (across separate hosts) for each Bucket, S3 Metadata ensures scalability as the number of Buckets is scaled-out. This also provides highavailability, by allowing full service access to the Bucket as long as a majority of the Repds comprising the session are available. The algorithm is adaptive to failures, including the leader, and provides the ability to dynamically select a new leader of a cluster. To ensure fast response times, the key/value databases underlying the Repds should be stored on flash (SSD) devices. This ensures very low-latency access for Bucket writes, reads, and listing operations on the S3 metadata service. Scality customer service can provide sizing recommendations for CPU and memory, as well as utilities and guidelines covering the SSD requirements for a given number of keys (objects) and the average size of objects expected in the system. 2 Raft distributed Consensus algorithm 2016 Scality. All rights reserved Confidential 8
11 D. Logger S3 Connector offers a logging function that captures and presents log data generated by S3 Connector service events. The Logger channels the comprehensive service logs in a JSONbased format. S3 Vault events are captured in the S3 Connector logs (e.g., account creation, user creation), as are such API interactions as Bucket and Object operations. Viewing and searching the JSONbased logs is easily accomplished via the ElasticSearch tool, which is based on the well-known ELK 3 suite. Figure 6: Viewing the S3 Logger Service with Kibana ELK components can also be included and installed with the S3 Docker containers as part of the standard deployment process. ElasticSearch enables log searching for auditing purposes, and the Kibana tool enables visualization of data through graphs. This can also facilitate performance optimization, as well as drill-down for diagnosis and troubleshooting. A separate tool is also included for converting the JSON logs into a more easily read text format. IV. S3 Connector Federated Deployment The data storage layer for the S3 Connector is supplied by Scality RING. Independently scalable and eminently reliable, the S3 Connector accesses the RING through a native REST interface that is incorporated into the S3 Connector containers. This interface is deployed as part of the federated installation process, providing a simple, high-performance key/value store for access to the powerful data storage mechanisms of Scality RING. Data flows from standard load balancers to one of the S3 Server processes. Each S3 API command is parsed and processed by the S3 Server, which interacts with S3 Vault to 3 ELK suite (ElasticSearch, Kibana and Logstash) 2016 Scality. All rights reserved Confidential 9
12 authenticate the request and ensure that access is granted. Next, the S3 Server contacts the S3 Metadata service to locate or update the requested Bucket and Object key, and once the key is secured the S3 Server sends the data to the RING by passing the key/value pair to the native REST interface for the corresponding read or write action. The S3 Connector s native REST interface is responsible for sending the data to the RING s store nodes over the RING s erasure coding or variable Class-of-Service (CoS) replication mechanisms for high durability data protection. Also, all S3 API, S3 Vault, and S3 Metadata actions are registered to the Logger, thus creating a complete trail of the data and administrative commands associated with the request. For simplicity, the S3 Connectors are deployed uniformly on all RING servers in the physical machine OS or in a VM, as illustrated in Figure 8 in the case of a six (6) server RING. This delivers a simplified uniform (homogeneous) deployment model, both on the initial installation and for new servers added to the RING when scaling out capacity. The S3 Connector optimizes interactions between services to reduce latency in the local (single site) case, as well as to the greatest extent possible in multiple datacenter deployments. S3 container deployment is centralized through Ansible framework scripts, running from a central deployment machine. Ansible does not rely on agents deployed on each of the target hosts, and instead leverages the popular SSH tool for remote access to the target hosts. A set of Ansible federation scripts automates the deployment process, including the installation of Docker components from the deployment machine onto all target hosts. This federated deployment scheme allows for a simple, centralized command line installation of all distributed S3 Connector containers across all RING servers. Figure 7: Six (6) Server RING with S3 Connectors & Store Nodes The standard RING storage processes including storage nodes and IO Daemons are installed as in a typical RING deployment Scality. All rights reserved Confidential 10
13 For a comprehensive description of federated deployment, please refer to the S3 Connector Installation Guide. V. S3 Connector Deployment Use Cases The S3 Connector sustains a wide range of deployment scenarios, supporting the growing hybrid model of public cloud (enabling service providers to create new cloud storage capabilities) and on-premises private enterprise clouds. In addition to the security, performance, and compliance advantages of private cloud deployments, leading industry-analysts state 4 that the use of private clouds at large scale provides a TCO advantage over solely public cloud solutions. In any scenario the need for geo-distributed multi-datacenter deployments is key to supporting access from distributed applications, and to providing site failure protection. A. On-Premises Private Storage Cloud For many enterprises, the deployment of applications in the public cloud advantageous from both a flexibility and economic perspective. Even so, many types of applications require the control, security, and performance advantages of an on-premises enterprise private cloud deployment. Financial Services and Healthcare applications good examples, as the maintaining of large-scale archives of records and compliance data is typically precluded from public cloud storage due to specialized locality and security requirements. The S3 Connector provides a solution for enterprises that are developing new cloud applications designed to use the AWS model and the S3 API for storing large unstructured data. Applications developed and deployed in the AWS public cloud will function without any code changes required in a private cloud environment on the Scality RING, with the S3 Connector providing a totally compatible storage interface. Enterprise multitenancy deployments map well to the AWS security model with accounts and IAM users. Internal departments, applications or workgroups can be assigned their own accounts, users and groups, capable of functioning seamlessly in the on-premises deployment model. The interoperability of the S3 Connector with enterprise directory services (e.g., Active Directory) provides a solution for leveraging existing enterprise assets, rather than forcing a migration to a new proprietary model. B. Support for ISV and Custom Applications Hundreds of applications now leverage the S3 API as the standard protocol for accessing object storage. Many vertical industry ISVs are now delivering products that are S3-compatible, including key business applications for backup and archiving (Veritas, CommVault, IBM Spectrum Protect, ASG/Atempo, QStar, NetApp Altavault), digital media asset management (CatDV), syncand-share (Ctera), and content delivery (Aspera). For storage administrators, this trend virtually ensures that an S3-compatible, on-premises storage solution will be required to support business 4 BTIG Equity Research, April 2016 The Decline and Fall of Enterprise Storage 2016 Scality. All rights reserved Confidential 11
14 processes and workflows in the near-term future. Scality supports application validation through the open source S3 Server, which provides a simplified single Container image. This enables ISVs to develop, test, and certify the functionality of their applications for deployment on the S3 Connector and the Scality RING. The S3 Connector also directly supports custom application development via S3 REST API commands, or through the AWS SDKs for Java, JavaScript, PHP,.NET and many other languages. As such, large enterprises can safely standardize custom applications generating unstructured data for S3 compatibility, without being tied into a specific backend infrastructure. As a side benefit, the application development process itself generates large amounts of unstructured data in the form of images, droplets, etc.). The S3 Connector fully adheres to the S3 specification to provide portability of applications across public and private cloud deployments. The S3 Vault security model maps to the AWS security model for accounts, IAM users and groups, to provide full deployment compatibility and portability. C. Geo-Distributed S3 Deployments The S3 Connector s any-to-any scale-out capabilities extend to geographically-distributed deployments across multiple datacenters (DCs). The S3 Connector supports an Active/Active stretched model for deploying both the data RING and S3 services across two or more DCs connected via metro area networks, such as between San Francisco to San Jose, or between Paris and London. The S3 Metadata service implements the concept of a leader as referred to in S3 Metadata on page 7 and the term Master DC is used to describe the datacenter in which the currentlyassigned leader for the S3 Metadata service resides. In this deployment model, the S3 services comprised of the S3 Servers, S3 Vault and S3 Metadata containers are distributed across DCs, on the RING machines. The data is stored using the Scality RING model stretched across two or more DCs hosted on the same machines as the S3 services. Full any-to-any capability is provided (hence active/active access), and thus any S3 Connector in either DC can access any S3 Bucket resource. The system automatically manages metadata updates to the S3 Metadata service from the connectors, with synchronous updates made to the data RING across DCs for consistency. In some cases, however, the connectors in non-master DCs will incur a remote access penalty while updating metadata across the metro area network. In the event of a network failure or a DC outage, either writes are preserved on the Master DC (when one of the non-master DCs is rendered inaccessible), or read-only access is preserved (should the Master DC become inaccessible). An administrative command allows for switching a non-master DCs role to that of Master DC, which enables read/write access to the surviving DC following inaccessibility or failure of the original Master DC Scality. All rights reserved Confidential 12
15 Figure 8: Active/Active Stretched S3 Deployments As in the case of a typical stretched RING deployment, data updates are written synchronously to all nodes in the RING. This ensures that data is fully protected at the prescribed durability level across DCs, providing full resiliency and consistency. VI. Summary The Scality RING S3 Connector offers a modern and highly compatible S3 API server for Scality RING that provides a state-of-the-art implementation of AWS-compatible security services (e.g., IAM), as well as integration with enterprise-class security servers such as LDAP and Active Directory. In addition, the inclusion of Scale-Out, Geo-Replication, and Lifecycle Management functions provide a powerful solution for customers seeking an in-house S3 storage solution with petabyte-scale capabilities. The S3 Connector enables enterprise-caliber on-premises S3 storage solutions, as well as future enablement of hybrid cloud integration through Bucket Lifecycle support. About Scality Scality powers digital business. The industry leader in software-defined storage, Scality serves over 500 million end-customers worldwide, with over 800 billion objects in production. The Scality RING supports any file and object application, on any hardware, with unlimited capacity and guaranteed reliability. The RING enables organizations to offer always-on public or private services, connecting with applications both old and new, to drive competitiveness and heighten customer satisfaction. Able to seamlessly scale storage to match business growth, the RING runs on all industry standard x86 server platforms (such as those offered by HPE, Dell, Cisco, Seagate, or even mixed form factors, without the necessity for forklift upgrades. With the RING, Scality customers can expect a TCO reduction of up to 90% versus legacy storage. Scality is headquartered in San Francisco, with offices throughout the world. Try the Scality RING online at Scality. All rights reserved Confidential 13
powered by Cloudian and Veritas
Lenovo Storage DX8200C powered by Cloudian and Veritas On-site data protection for Amazon S3-compliant cloud storage. assistance from Lenovo s world-class support organization, which is rated #1 for overall
More informationREFERENCE ARCHITECTURE Quantum StorNext and Cloudian HyperStore
REFERENCE ARCHITECTURE Quantum StorNext and Cloudian HyperStore CLOUDIAN + QUANTUM REFERENCE ARCHITECTURE 1 Table of Contents Introduction to Quantum StorNext 3 Introduction to Cloudian HyperStore 3 Audience
More informationThe Nasuni Security Model
White Paper Nasuni enterprise file services ensures unstructured data security and privacy, enabling IT organizations to safely leverage cloud storage while meeting stringent governance and compliance
More informationSoftNAS Cloud Data Management Products for AWS Add Breakthrough NAS Performance, Protection, Flexibility
Control Any Data. Any Cloud. Anywhere. SoftNAS Cloud Data Management Products for AWS Add Breakthrough NAS Performance, Protection, Flexibility Understanding SoftNAS Cloud SoftNAS, Inc. is the #1 software-defined
More informationCommvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY
Commvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY CONTENTS EXECUTIVE SUMMARY... 2 SOLUTION OVERVIEW... 3 USE CASES... 4 SOLUTION COMPONENTS... 5 Commvault
More informationEXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS 03 EXECUTIVE OVERVIEW 05 INTRODUCTION 07 MORE CLOUD DEPLOYMENTS MEANS MORE ACCESS 09 IDENTITY FEDERATION IN
More informationConverged Platforms and Solutions. Business Update and Portfolio Overview
Converged Platforms and Solutions Business Update and Portfolio Overview IT Drivers In Next 5 Years SCALE SCALE 30,000+ physical servers 500,000+ virtual servers Current tools won t work at this scale
More informationSCALITY ZENKO. Freedom & control across Hybrid IT and Multi-Cloud
SCALITY Freedom & control across Hybrid IT and Multi-Cloud A Scality White Paper September 2018 SCALITY Hybrid IT and Multi-Cloud Storage Platform I. Introduction: Hybrid IT and Multi-Cloud Storage 3 II.
More informationEight Tips for Better Archives. Eight Ways Cloudian Object Storage Benefits Archiving with Veritas Enterprise Vault
Eight Tips for Better Email Archives Eight Ways Cloudian Object Storage Benefits Email Archiving with Veritas Enterprise Vault Most organizations now manage terabytes, if not petabytes, of corporate and
More informationby Cisco Intercloud Fabric and the Cisco
Expand Your Data Search and Analysis Capability Across a Hybrid Cloud Solution Brief June 2015 Highlights Extend Your Data Center and Cloud Build a hybrid cloud from your IT resources and public and providerhosted
More informationRio-2 Hybrid Backup Server
A Revolution in Data Storage for Today s Enterprise March 2018 Notices This white paper provides information about the as of the date of issue of the white paper. Processes and general practices are subject
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationHyper-Converged Infrastructure: Providing New Opportunities for Improved Availability
Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability IT teams in companies of all sizes face constant pressure to meet the Availability requirements of today s Always-On
More informationMigration and Building of Data Centers in IBM SoftLayer
Migration and Building of Data Centers in IBM SoftLayer Advantages of IBM SoftLayer and RackWare Together IBM SoftLayer offers customers the advantage of migrating and building complex environments into
More informationSwiftStack and python-swiftclient
SwiftStack and python-swiftclient Summary Storage administrators around the world are turning to object storage and particularly SwiftStack s enterprise-ready object storage built on OpenStack Swift for
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationOptimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution
DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationIBM Spectrum NAS, IBM Spectrum Scale and IBM Cloud Object Storage
IBM Spectrum NAS, IBM Spectrum Scale and IBM Cloud Object Storage Silverton Consulting, Inc. StorInt Briefing 2017 SILVERTON CONSULTING, INC. ALL RIGHTS RESERVED Page 2 Introduction Unstructured data has
More informationOnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems
OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems April 2017 215-12035_C0 doccomments@netapp.com Table of Contents 3 Contents Before you create ONTAP Cloud systems... 5 Logging in
More informationSecurity and Compliance at Mavenlink
Security and Compliance at Mavenlink Table of Contents Introduction....3 Application Security....4....4....5 Infrastructure Security....8....8....8....9 Data Security.... 10....10....10 Infrastructure
More informationEnabling Data Control in a Multi-Cloud World
Zenko Webinar: Giorgio Regni Scality Co-founder & CTO Laure Vergeron Software Engineer Enabling Data Control in a Multi-Cloud World Thursday, August 3, 2017 Zenko Webinar: Multi-cloud, hybrid stores, open-source
More informationOpenIAM Identity and Access Manager Technical Architecture Overview
OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...
More informationCisco Cloud Application Centric Infrastructure
Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified
More informationCloud Computing: Making the Right Choice for Your Organization
Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,
More informationBest Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter
White Paper Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter Overcoming Security, Privacy & Compliance Concerns 333 W. San Carlos Street San Jose, CA 95110 Table of Contents
More informationCDMI Support to Object Storage in Cloud K.M. Padmavathy Wipro Technologies
CDMI Support to Object Storage in Cloud K.M. Padmavathy Wipro Technologies Abstract Object storage, a leading emerging technology is mainly intended to handle exponential growth of unstructured data. Unlike
More informationDatacenter replication solution with quasardb
Datacenter replication solution with quasardb Technical positioning paper April 2017 Release v1.3 www.quasardb.net Contact: sales@quasardb.net Quasardb A datacenter survival guide quasardb INTRODUCTION
More informationElastic Cloud Storage (ECS)
Elastic Cloud Storage (ECS) Version 3.1 Administration Guide 302-003-863 02 Copyright 2013-2017 Dell Inc. or its subsidiaries. All rights reserved. Published September 2017 Dell believes the information
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications
More informationWHITE PAPER Software-Defined Storage IzumoFS with Cisco UCS and Cisco UCS Director Solutions
WHITE PAPER Software-Defined Storage IzumoFS with Cisco UCS and Cisco UCS Director Solutions Introduction While the data handled by companies has an average growth rate of over 50% per annum, growth of
More informationEnergy Management with AWS
Energy Management with AWS Kyle Hart and Nandakumar Sreenivasan Amazon Web Services August [XX], 2017 Tampa Convention Center Tampa, Florida What is Cloud? The NIST Definition Broad Network Access On-Demand
More informationObject Storage Service. Product Introduction. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 04 Date 2017-12-20 HUAWEI TECHNOLOGIES CO., LTD. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationReasons to Deploy Oracle on EMC Symmetrix VMAX
Enterprises are under growing urgency to optimize the efficiency of their Oracle databases. IT decision-makers and business leaders are constantly pushing the boundaries of their infrastructures and applications
More informationDemystifying the Cloud With a Look at Hybrid Hosting and OpenStack
Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack Robert Collazo Systems Engineer Rackspace Hosting The Rackspace Vision Agenda Truly a New Era of Computing 70 s 80 s Mainframe Era 90
More informationIntroducing Amazon Elastic File System (EFS)
Introducing Amazon Elastic File System (EFS) Danilo Poccia, Technical Evangelist, AWS @danilop 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Goals and expectations for this session
More informationSTORAGE MADE EASY ENTERPRISE FILE FABRIC
SOLUTION GUIDE STORAGE MADE EASY ENTERPRISE FILE FABRIC IBM COS ABOUT STORAGE MADE EASY ENTERPRISE FILE FABRIC The Storage Made Easy File Fabric enables IT to regain control of "cloud data sprawl" by unifying
More informationExecutive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration
Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules
More informationCONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED DATA PLATFORM
CONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED PLATFORM Executive Summary Financial institutions have implemented and continue to implement many disparate applications
More informationPowerful Insights with Every Click. FixStream. Agentless Infrastructure Auto-Discovery for Modern IT Operations
Powerful Insights with Every Click FixStream Agentless Infrastructure Auto-Discovery for Modern IT Operations The Challenge AIOps is a big shift from traditional ITOA platforms. ITOA was focused on data
More informationNewSQL Without Compromise
NewSQL Without Compromise Everyday businesses face serious challenges coping with application performance, maintaining business continuity, and gaining operational intelligence in real- time. There are
More informationTIBCO Cloud Integration Security Overview
TIBCO Cloud Integration Security Overview TIBCO Cloud Integration is secure, best-in-class Integration Platform as a Service (ipaas) software offered in a multi-tenant SaaS environment with centralized
More informationIntroducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN
Avaya-FatPipe Solution Overview Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN The Avaya SDN-Fx and FatPipe Networks solution provides a fabric-based SDN architecture for simplicity
More informationMySQL CLOUD SERVICE. Propel Innovation and Time-to-Market
MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service
More information"Software-defined storage Crossing the right bridge"
Navigating the software-defined storage world shaping tomorrow with you René Huebel "Software-defined storage Crossing the right bridge" SDS the model and the promises Control Abstraction The promises
More informationSECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON
White Paper SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON Abstract This white paper explains the benefits to the extended enterprise of the on-premise, online file sharing storage
More informationEASILY DEPLOY AND SCALE KUBERNETES WITH RANCHER
EASILY DEPLOY AND SCALE KUBERNETES WITH RANCHER 2 WHY KUBERNETES? Kubernetes is an open-source container orchestrator for deploying and managing containerized applications. Building on 15 years of experience
More informationHOW SNOWFLAKE SETS THE STANDARD WHITEPAPER
Cloud Data Warehouse Security HOW SNOWFLAKE SETS THE STANDARD The threat of a data security breach, someone gaining unauthorized access to an organization s data, is what keeps CEOs and CIOs awake at night.
More informationData safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.
WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish
More informationData Protection for Virtualized Environments
Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationEnterprise Cloud Data Protection With Storage Director and IBM Cloud Object Storage October 24, 2017
Storage Director Overview Enterprise Cloud Data Protection With Storage Director and IBM Cloud Object Storage October 24, 2017 Tributary Systems Business Overview Tributary Systems, Inc., founded in 1990,
More informationDocker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications
Technical Brief Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications As application teams deploy their Dockerized applications into production environments,
More informationPRODUCT BROCHURE Mailbox Shuttle and Archive Shuttle:
PRODUCT BROCHURE Mailbox Shuttle and Archive Shuttle: Seamlessly migrate email and archives. Email is a mission-critical service, so it s important that when you migrate your live mail the solution you
More informationAddressing Data Management and IT Infrastructure Challenges in a SharePoint Environment. By Michael Noel
Addressing Data Management and IT Infrastructure Challenges in a SharePoint Environment By Michael Noel Contents Data Management with SharePoint and Its Challenges...2 Addressing Infrastructure Sprawl
More informationNasuni UniFS a True Global File System
Nasuni UniFS a True Global File System File systems are the time-proven way to store, share, and protect unstructured data. But traditional device-based file systems no longer meet the needs of the modern
More informationWHITE PAPER. RedHat OpenShift Container Platform. Benefits: Abstract. 1.1 Introduction
WHITE PAPER RedHat OpenShift Container Platform Abstract Benefits: Applications are designed around smaller independent components called microservices. Elastic resources: Scale up or down quickly and
More informationVision of the Software Defined Data Center (SDDC)
Vision of the Software Defined Data Center (SDDC) Raj Yavatkar, VMware Fellow Vijay Ramachandran, Sr. Director, Storage Product Management Business transformation and disruption A software business that
More informationAWS Integration Guide
AWS Integration Guide Cloud-Native Security www.aporeto.com AWS Integration Guide Aporeto integrates with AWS to help enterprises efficiently deploy, manage, and secure applications at scale and the compute
More informationWhy Converged Infrastructure?
Why Converged Infrastructure? Three reasons to consider converged infrastructure for your organization Converged infrastructure isn t just a passing trend. It s here to stay. According to a recent survey
More informationData center interconnect for the enterprise hybrid cloud
WHITEPAPER Data center interconnect for the enterprise hybrid cloud The world is moving to the cloud. Everything from entertainment and consumer mobile applications to enterprise software and government
More informationVMWARE VSAN LICENSING GUIDE - MARCH 2018 VMWARE VSAN 6.6. Licensing Guide
- MARCH 2018 VMWARE VSAN 6.6 Licensing Guide Table of Contents Introduction 3 License Editions 4 Virtual Desktop Infrastructure... 5 Upgrades... 5 Remote Office / Branch Office... 5 Stretched Cluster with
More informationDell EMC Isilon with Cohesity DataProtect
Dell EMC Isilon with Cohesity DataProtect Abstract This guide outlines the Cohesity DataProtect deployment guide for Dell EMC Isilon Data Protection. Table of Contents About This Guide...2 Intended Audience...2
More informationBuilding Storage-as-a-Service Businesses
White Paper Service Providers Greatest New Growth Opportunity: Building Storage-as-a-Service Businesses According to 451 Research, Storage as a Service represents a large and rapidly growing market with
More informationTECHNICAL OVERVIEW OF NEW AND IMPROVED FEATURES OF EMC ISILON ONEFS 7.1.1
TECHNICAL OVERVIEW OF NEW AND IMPROVED FEATURES OF EMC ISILON ONEFS 7.1.1 ABSTRACT This introductory white paper provides a technical overview of the new and improved enterprise grade features introduced
More informationUsing Cohesity with Amazon Web Services (AWS)
Using Cohesity with Amazon Web Services (AWS) Achieve your long-term retention and archival objectives for secondary data Cohesity DataPlatform is a hyperconverged secondary data and application solution
More informationService Provider Consulting
From Microsoft Services 1 Industry Overview More and more businesses are looking to outsource IT, decrease management requirements and ultimately save money. With worldwide public cloud spending expected
More informationArchitecting Applications to Scale in the Cloud
Architecting Applications to Scale in the Cloud Nuxeo White Paper White Paper Architecting Applications to Scale in the Cloud Table of Contents Executive Summary... 3 Between IaaS and SaaS... 3 Nuxeo and
More informationToday s trends in the storage world. Jacint Juhasz Storage Infrastructure Architect
Today s trends in the storage world Jacint Juhasz Storage Infrastructure Architect NetApp storage portfolio All-Flash Arrays for highest performance All-Flash SolidFire Data ONTAP-v for public cloud All
More informationThe intelligence of hyper-converged infrastructure. Your Right Mix Solution
The intelligence of hyper-converged infrastructure Your Right Mix Solution Applications fuel the idea economy SLA s, SLA s, SLA s Regulations Latency Performance Integration Disaster tolerance Reliability
More informationUnderstanding Cumulus Deployment Options Enterprise DAM On-Premise, in the Cloud or a Hybrid Approach
TECHNICAL WHITE PAPER Understanding Cumulus Deployment Options Enterprise DAM On-Premise, in the Cloud or a Hybrid Approach Choose the right setup and be the DAM hero Whether your company is moving from
More informationTHE HYBRID CLOUD. Private and Public Clouds Better Together
THE HYBRID CLOUD Private and Public Clouds Better Together Bruno Terkaly Principal Software Engineer Cloud Architect Open Source/Linux Global ISV at Microsoft A MULTI-CLOUD WORLD A growing trend in the
More informationFIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS
WHITE PAPER FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS Over the past 15 years, server virtualization has become the preferred method of application deployment in the enterprise datacenter.
More informationREFERENCE ARCHITECTURE. Rubrik and Nutanix
REFERENCE ARCHITECTURE Rubrik and Nutanix TABLE OF CONTENTS INTRODUCTION - RUBRIK...3 INTRODUCTION - NUTANIX...3 AUDIENCE... 4 INTEGRATION OVERVIEW... 4 ARCHITECTURE OVERVIEW...5 Nutanix Snapshots...6
More informationHyper-Convergence De-mystified. Francis O Haire Group Technology Director
Hyper-Convergence De-mystified Francis O Haire Group Technology Director The Cloud Era Is Well Underway Rapid Time to Market I deployed my application in five minutes. Fractional IT Consumption I use and
More informationBusiness- Centric Storage
Business- Centric Storage Providing reliable data services more efficiently with FUJITSU Storage ETERNUS ETERNUS Business-Centric Storage Digitization is fundamentally transforming businesses. This transformation
More informationHedvig as backup target for Veeam
Hedvig as backup target for Veeam Solution Whitepaper Version 1.0 April 2018 Table of contents Executive overview... 3 Introduction... 3 Solution components... 4 Hedvig... 4 Hedvig Virtual Disk (vdisk)...
More informationCyber Group Deploys EMC ViPR for Next-Generation SaaS Application Infrastructure
Buyer Case Study Cyber Group Deploys EMC ViPR for Next-Generation SaaS Application Infrastructure Laura DuBois IDC OPINION 3rd Platform computing has given rise to massive scale datacenters architected
More informationCOMPTIA CLO-001 EXAM QUESTIONS & ANSWERS
COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA
More informationDELL EMC ISILON SCALE-OUT NAS PRODUCT FAMILY Unstructured data storage made simple
SCALE-OUT NAS PRODUCT FAMILY Unstructured data storage made simple ESSENTIALS Simple storage management designed for ease of use Massive scalability of capacity and performance Unmatched efficiency to
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T P ow e ring Digital Transfor m a t i o n T h r ough the C l o u d - R e a d y E n t e r p rise September 2016 Adapted from Developing a Cloud Strategy for Digital
More informationYOUR APPLICATION S JOURNEY TO THE CLOUD. What s the best way to get cloud native capabilities for your existing applications?
YOUR APPLICATION S JOURNEY TO THE CLOUD What s the best way to get cloud native capabilities for your existing applications? Introduction Moving applications to cloud is a priority for many IT organizations.
More informationNew Fresh Storage Approach for New IT Challenges Laurent Denel Philippe Nicolas OpenIO
New Fresh Storage Approach for New IT Challenges Laurent Denel Philippe Nicolas OpenIO Agenda Company profile and background Business and Users needs OpenIO approach Competition Conclusion Company profile
More informationIT your way - Hybrid IT FAQs
Hybrid IT IT your way - Hybrid IT FAQs Create a strategy that integrates in-house and outsourced IT services to meet ever-changing business requirements. Combine on-premise and off premise solutions Mix
More informationDELL EMC ISILON SCALE-OUT NAS PRODUCT FAMILY
DATA SHEET DELL EMC ISILON SCALE-OUT NAS PRODUCT FAMILY Unstructured data storage made simple ESSENTIALS Simple storage management designed for ease of use Massive scalability of capacity and performance
More informationSolution Brief: Commvault HyperScale Software
Solution Brief: Commvault HyperScale Software ENTERPRISE IT SHIFTS Enterprise IT is being transformed with the maturing of public cloud providers that offer compute, storage and application services with
More informationVMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017
: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017 Table of Contents Executive Summary 3 A Single Architecture for Hybrid Cloud 4 Introducing VMware Cloud Foundation 4 Deploying on Premises 6
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More information70-532: Developing Microsoft Azure Solutions
70-532: Developing Microsoft Azure Solutions Exam Design Target Audience Candidates of this exam are experienced in designing, programming, implementing, automating, and monitoring Microsoft Azure solutions.
More informationBlackPearl Customer Created Clients Using Free & Open Source Tools
BlackPearl Customer Created Clients Using Free & Open Source Tools December 2017 Contents A B S T R A C T... 3 I N T R O D U C T I O N... 3 B U L D I N G A C U S T O M E R C R E A T E D C L I E N T...
More informationNasuni for Oil & Gas. The Challenge: Managing the Global Flow of File Data to Improve Time to Market and Profitability
Solution Brief Highlights Optimize collaboration processes for geophysicists with high performance global file sharing. Support a dynamic business environment with easy integration of new acquisitions.
More informationSUSE Enterprise Storage Deployment Guide for Veritas NetBackup Using S3
SUSE Enterprise Storage Deployment Guide for Veritas NetBackup Using S3 by Kian Chye Tan December 2017 Guide Deployment Guide SUSE Enterprise Storage Deployment Guide SUSE Enterprise Storage Deployment
More informationSão Paulo. August,
São Paulo August, 28 2018 A Modernização das Soluções de Armazeamento e Proteção de Dados DellEMC Mateus Pereira Systems Engineer, DellEMC mateus.pereira@dell.com Need for Transformation 81% of customers
More informationVMware vsphere 4. The Best Platform for Building Cloud Infrastructures
Table of Contents Get the efficiency and low cost of cloud computing with uncompromising control over service levels and with the freedom of choice................ 3 Key Benefits........................................................
More informationPrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps
PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : SAA-C01 Title : AWS Certified Solutions Architect - Associate (Released February 2018)
More informationOpen-Xchange. Summit 2017 Brussels. Erik Julin Sr. Director, Technical Business Development
Open-Xchange Summit 2017 Brussels Erik Julin Sr. Director, Technical Business Development Introducing Scality (in 2 slides) Scality Architecture OBJECT APPLICATIONS SCALITY SOFTWARE Object & File Access
More informationCloud Computing 4/17/2016. Outline. Cloud Computing. Centralized versus Distributed Computing Some people argue that Cloud Computing. Cloud Computing.
Cloud Computing By: Muhammad Naseem Assistant Professor Department of Computer Engineering, Sir Syed University of Engineering & Technology, Web: http://sites.google.com/site/muhammadnaseem105 Email: mnaseem105@yahoo.com
More informationRenovating your storage infrastructure for Cloud era
Renovating your storage infrastructure for Cloud era Nguyen Phuc Cuong Software Defined Storage Country Sales Leader Copyright IBM Corporation 2016 2 Business SLAs Challenging Traditional Storage Approaches
More informationBuild your own Cloud on Christof Westhues
Build your own Cloud on Christof Westhues chwe@de.ibm.com IBM Big Data & Elastic Storage Tour Software Defined Infrastructure Roadshow December 2 4, 2014 New applications and IT are being built for Cloud
More informationPulse Secure Application Delivery
DATA SHEET Pulse Secure Application Delivery HIGHLIGHTS Provides an Application Delivery and Load Balancing solution purposebuilt for high-performance Network Functions Virtualization (NFV) Uniquely customizable,
More information