Scality RING S3 Connector Storage that Powers Digital Business

Size: px
Start display at page:

Download "Scality RING S3 Connector Storage that Powers Digital Business"

Transcription

1 Storage that Powers Digital Business

2 Table of Contents I. Introduction: Object Storage for Digital Business... 1 II. S3 Connector Overview... 2 III. S3 Connector Container Architecture... 3 A. S3 Server... 4 B. S3 Vault... 5 C. S3 Metadata... 7 D. Logger... 9 IV. S3 Connector Federated Deployment... 9 V. S3 Connector Deployment Use Cases A. On-Premises Private Storage Cloud B. Support for ISV and Custom Applications C. Geo-Distributed S3 Deployments VI. Summary Table of Figures Figure 1: Market Trending, Adoption of S3 Object Storage... 1 Figure 2: S3 Connector & RING for Secure, Scalable Storage for a Wide Range of Applications... 2 Figure 3: S3 Connector Container Architecture... 4 Figure 4: The S3 Vault Object Model with Accounts, IAM Users and Groups... 6 Figure 5: S3 Metadata with Scale-out Cluster Design... 8 Figure 6: Viewing the S3 Logger Service with Kibana... 9 Figure 7: Six (6) Server RING with S3 Connectors & Store Nodes Figure 8; Active/Active Stretched S3 Deployments Scality. All rights reserved Confidential i

3 I. Introduction: Object Storage for Digital Business Industry observers have long been following the emergence of object storage for large-scale unstructured data, reflected in major public storage cloud offerings from the likes of Amazon, Microsoft, and Google. Far and away, the clear market leader today among these clouds is the Amazon Web Services (AWS) S3 service, which since its launch in 2006 has grown dramatically with EC2 and other value-added services. Figure 1: Market Trending, Adoption of S3 Object Storage Today, the AWS S3 service is used to store trillions of user objects. Its remarkable growth is the result of such popular SaaS solutions as Netflix and Uber, which rely on it to run their key applications. In addition, over the past three years corporate enterprises have dramatically increased the use of S3 with their homegrown media, financial data, and Internet-of-Everything (IoT) applications. Many ISVs are now adopting S3 as their back-end storage API too, including CommVault Simpana and Veritas Netbackup, as well as such emerging players as Ctera. As a result, a defacto object storage API standard has in essence emerged, one that is analogous to SQL for relational databases and NFS for NAS systems. This all serves to create a positive trend for S3, thus increasing application pull for object storage. Many corporations and ISVs are seeking the flexibility that is borne of being able to deploy applications that can run both in the public cloud and in on-premises enterprise cloud solutions, a critical need that is fulfilled by the seamless and highly compatible S3 storage services made available by the Scality RING S3 Connector (known also as S3 Connector). Presently, Scality customers are deploying the RING in mission-critical scenarios, to store over 800 billion objects, and this number is growing fast. The S3 Connector leverages the S3 Server, which provides a Scality-developed open source S3- compatible API. This presents multiple clear advantages for ISVs and enterprise developers, supplying a simplified solution for S3 application development, for instance, while also ensuring the painless transition of applications to the S3 Connector (thus providing high-performance, scale-out storage services for applications that can remain portable across public and enterprise cloud environments) Scality. All rights reserved Confidential 1

4 II. S3 Connector Overview The overarching business goal for Scality s next-generation S3 Connector is to provide scalable, reliable, and highly available storage services to manage the massive volumes of unstructured data that are generated by emerging cloud applications. As the company s new S3-compatible interface to the RING, the S3 Connector succeeds the RS2 Connector, first introduced in The connector provides comprehensive cloud and enterprise security capabilities, scalable performance, advanced data storage and management functionality. For enterprises and service providers, the S3 Connector offers the most secure, scalable and portable storage services for custom and packaged cloud applications on the market today. Figure 2: S3 Connector & RING for Secure, Scalable Storage for a Wide Range of Applications 2016 Scality. All rights reserved Confidential 2

5 The S3 Connector s core proficiencies work in tandem to provide a rich set of storage services with which applications can be deployed seamlessly across public, private and hybrid cloud environments. Rich AWS and Enterprise Security S3 API Compatibility Any-to-Any Scale-Out High-Performance Buckets Geo-Distributed Capabilities Ease of Deployment Support for the full complement of AWS security services, such as multitenant accounts, Identity and Access Management (IAM) for users, groups and roles, AWS-style access keys and secret keys, the latest Signature v4 Authentication mechanism, and data encryption. Also featured is interoperability with such existing enterprise security services as LDAP and Microsoft Active Directory servers. Notwithstanding rapid AWS advancements, a high-degree of S3 API coverage is assured, including core data APIs for Bucket and Object access and Multi-Part-Upload (MPU) for efficient ingest of large objects. S3 Connector development is based on Continuous Integration (CI) and agile delivery of features when ready, which allows Scality to introduce new S3 methods shortly after their AWS publication. This functionality is provided by the S3 Server, which is supported by Scality as an open source project on Github. Applications can access any Bucket or Object from any connector, thus allowing for parallel and multi-user access to data and scaling to billions of buckets and objects. Performance can be scaled-out simply by adding more connectors. Support for low-latency response times and high throughput of reads and writes of Objects in Buckets. Also, performance is optimized for fast Bucket listing operations, including fast partial-path search for selected objects by path prefix. S3 Connector provides integrated geo-replication capabilities for storage across multiple datacenters, supporting Active/Active stretched deployments for site disaster protection with continuous data availability Delivered as a set of easy-to-deploy Docker containers, installation of the S3 Connector is simple, with zero-configuration across the customer s choice of physical, virtual or cloud environments. III. S3 Connector Container Architecture Comprising a set of distributed software-driven services, the S3 Connector offers three (3) complementary functions: S3 API (S3 Server), security (S3 Vault), and a purpose-built metadata engine that is optimized to manage Buckets at cloud-scale (S3 Metadata). These key services are delivered as Docker containers for ease of deployment Scality. All rights reserved Confidential 3

6 Figure 3: S3 Connector Container Architecture Access to S3 Server occurs via standard RESTful HTTP calls over URls, such as S3.scality.com, with all processes deployed on standard servers as Docker containers. Such Docker containers are also available for the Logger (ElasticSearch, aka ELK) and for the Ansible framework components. With the Ansible framework, a federated deployment allows the setup of all Docker containers including S3 Connector components on target servers (refer to S3 Connector Federated Deployment on page 9). A. S3 Server The central component of the S3 Connector, S3 Server supports standard S3 API command URLS, enabling SSL certificate configuration for secure HTTPS access and encryption over-thewire. It supports S3 headers, response codes and error codes. Its processes are stateless, thus applications can access any Bucket or Object resources via multiple servers for requests to ingest (PUT), or access (GET) object data, using standard load balancers. The S3 Server enables scale-out functionality across as many connectors as needed to serve application or user load requirements, even on single Buckets, along with scalable capacity per Bucket. The component provides two (2) means for accessing a Bucket as per the S3 protocol: Path Style and Virtual Hosting. Path Style Using the Bucket name as a path following the domain, in the form For example, with the configured domain as s3.scality.com and the Bucket name testbucket, using path style the URL is Virtual Hosting Using the Bucket name as a subdomain within the configured domain, in the form For example, assuming that the configured domain is s3.scality.com and that the bucket is testbucket, using virtual hosting style the URL will be Scality. All rights reserved Confidential 4

7 To support both Path Style and Virtual Hosting access, the configured domain and any subdomains driving the network traffic must be defined on the S3 machines. S3 Server supports standard S3 API operations on resources, including Buckets and Objects containing data payloads. Addressing schemes with unique key names are constructed on to of Bucket names, as previously described. Object names may include pseudo-path names separated by / delimiters, to provide a path hierarchy akin to that of a file system. The contents of a Bucket can be listed via Bucket GET API calls, including partial path listings of Objects with a common object prefix (e.g., /foo/ ) that lists all Object names starting with indicated path. A wide set of API calls are supported by S3 Server, including standard PUT, GET (including range GETs), DELETE, HEAD, and Multi-Part-Upload (MPU) for efficient, parallel ingest of large objects. The S3 Server component also supports standard and canned Bucket and Object Access Control Lists (ACLs). Advanced API support including Bucket Versioning and Bucket Lifecycle are on Scality s roadmap for the S3 Connector. Offered as an open source product (published on and downloadable from Github), developers and ISVs can download the S3 Server standalone and use it to test and develop S3 compatible applications without the necessity of incurring AWS Account and S3 storage fees. Resulting applications can thus be reliably and compatibly deployed on the S3 Connector and the RING for production use. A full description of the API set supported by the S3 Connector can be found in the Scality S3 Connector API Reference. B. S3 Vault S3 Vault provides identity management and access control security functionality for the S3 Connector. Adhering to the IAM model, the service offers a comprehensive AWS-compatible security service that is able to integrate with external enterprise directory and security services for instance, Active Directory via SAML (Security Assertion Markup Language) version 2.0. More specifically, S3 Vault is responsible for key security and access control capabilities, such as accounts, users, groups, roles, access keys and AWS-style secret keys. ACLs are implemented for arbitrating access to such underlying resources as Buckets and Objects. Thus, the implication is that S3 Vault must reconcile overlapping rules from various roles, ACLs and IAM Policies (to be enabled in a future release), and grant least restrictive access to the resources. S3 Vault supports authentication over the new AWS S3 Signature v4 mechanism as well as the legacy v2 authentication mechanism, and in 2016 follow-on releases the service will also support access control through IAM Policies and data encryption via the S3 SSE-C (Server Side Encryption, with customer-provided Key Management Services). The component was designed to parallel AWS S3 concepts, including: 2016 Scality. All rights reserved Confidential 5

8 Accounts Top logical billing entity associated with multiple tenants (applications or customers); can contain IAM users IAM users Associated with one or more roles (to provide credentials via ACLs); contained in accounts, and can belong to groups Access key IDs and Secret access keys Assigned to accounts or IAM users Authentication Performed through external security services (e.g., Active Directory) over SAML 2.0 Figure 4: The S3 Vault Object Model with Accounts, IAM Users and Groups Two (2) interfaces for managing accounts and users are provided by S3 Vault: a Command Line Interface (CLI) with interactive or scriptable commands, and a documented REST API. Both interfaces provide commands for creating, updating and deleting security objects, including the Account access key IDs and secret access keys. Vault administration itself is authorized via Super-Administrator credentials only, thus ensuring that access to sensitive Account, User and Key management tasks is restricted to only the most privileged administrator. S3 Vault echoes the importance given to identity by AWS S3 with regard to access control, providing authentication of the accessing identity via one of the two AWS Signature schemes Signature v4 or Signature v2 as dictated by the API headers. Requests are allowed or denied in part based on the identity of the requester. For example, the right to create a new Bucket in an account is reserved for registered users (by default), and the right to create Objects in a Bucket is reserved for the owner of the Bucket in question. The Signature v4 and v2 authentication schemes are both based on keyed-hmac (Hash Message Authentication Code) mechanisms. To authenticate a request, the API call must first concatenate selected elements of any API request to form a string, and then use the Account (or User s) secret access key to calculate the HMAC of that string. The HMAC algorithm output termed the signature is added as a parameter of the API request as the final step in signing the request. (The v4 authentication scheme requires an additional header in each API call, and in addition the HMAC is computed on the headers and object payload being passed. This differs from the v2 scheme, which did not require the HMAC signature to include the object payload.) 2016 Scality. All rights reserved Confidential 6

9 Upon receiving an authenticated request, S3 Vault retrieves the AWS secret access key indicated from either the Vault database, or from an external security service via SAML and uses it to compute a signature for the message it received in the same manner as with request authentication. The service next compares the signature it calculated against the signature presented by the requester. If the two signatures match, the system concludes that the requester must have access to the AWS secret access key. If, however, S3 Vault performs the calculations and the two signatures do not match, the request is denied and the system responds with an error message. Initially, S3 Vault implements access control through AWS ACLs on Buckets and Objects, to provide control over basic access privileges to these resources for PUT, GET and DELETE operations. This includes support for standard and canned ACLs, with standard ACLs defining READ, WRITE, READ_ACP, WRITE_ACP, FULL_CONTROL permissions on the underlying resources, whereas canned ACLs serve to define more advanced permissions (e.g., private, public-read, public-read-write, authenticated-read, bucket-owner-read, bucket-owner-full-control, log-delivery-write). In a 2016 follow-on release, S3 Vault will also enable AWS IAM User and Group Policies with the service resolving access control by way of a most restrictive rule among Policies and ACLs, to ensure the highest security. The S3 Connector employs SAML 2.0 as a standards-based XML protocol designed to facilitate the exchange of AAA -related data (authentication, access control, and accounting) between different security domains. SAML is uniquely capable of establishing cross-domain Single-Sign-On (SSO) behavior between S3 Vault and other security services. C. S3 Metadata A distributed metadata database service, S3 Metadata stores system metadata in an ultrareliable, scalable and high-performance manner (e.g., data related to user s Buckets and Object keys, as well as such S3 Vault security-related items as accounts, users and ACLs). Perhaps the most technically challenging aspect of distributed storage solutions is highly scalable metadata management. To that end, Scality invested in a decade s worth of leading distributed systems research both internally, and in collaboration with leading research institutions (e.g., INRIA 1 ) to develop a state-of-the-art Bucket indexing and object metadata engine for the S3 Connector. As a result of the company s diligence, this engine is able to offer a convergence of scalability, resiliency to failures, and high-performance access for high numbers of concurrent requests, resulting in an engine that as the cornerstone of the S3 Metadata service enables the S3 Connector to support extremely large-scale deployments involving millions of Buckets each containing millions of Objects. The engine also serves as the foundational technology for scale-out access and performance support. It is also a key building block in the advanced versioning, lifecycle, and geographically-distributed multiple datacenter deployments planned for future releases. 1 INRIA and Scality distributed systems research 2016 Scality. All rights reserved Confidential 7

10 In delivering its service, S3 Metadata uses a highly available leader/quorum clustered database design based on the Raft 2 distributed consensus algorithm ( with each cluster member managing its own copy of the metadata in a key/value database. Each S3 Bucket is mapped to a database, complete with its own cluster of database server daemons in a Raft session. The underlying key/value database provides the desired properties of fast insertion, scalability to millions of entries (Objects per Bucket), and fast listing operations to present the contents of a Bucket. All of which assures high performance access for applications performing Bucket operations with high rates of PUT, GET and DELETE requests. Figure 5: S3 Metadata with Scale-out Cluster Design As depicted in Figure 5, the key elemental building block is a logical node for storing metadata called a Repd. Multiple Repds form a replication group to tolerate the failure of a minority of Repds, with a consensus protocol in place to achieve consistency. DBAPI is responsible for partitioning and acts as a replication mechanism for sessions and Repds transparent to higherlevel applications (e.g., S3 Connector). The design assigns a set of Repds to each S3 Bucket, and by selecting different sets of Repds from a pool (across separate hosts) for each Bucket, S3 Metadata ensures scalability as the number of Buckets is scaled-out. This also provides highavailability, by allowing full service access to the Bucket as long as a majority of the Repds comprising the session are available. The algorithm is adaptive to failures, including the leader, and provides the ability to dynamically select a new leader of a cluster. To ensure fast response times, the key/value databases underlying the Repds should be stored on flash (SSD) devices. This ensures very low-latency access for Bucket writes, reads, and listing operations on the S3 metadata service. Scality customer service can provide sizing recommendations for CPU and memory, as well as utilities and guidelines covering the SSD requirements for a given number of keys (objects) and the average size of objects expected in the system. 2 Raft distributed Consensus algorithm 2016 Scality. All rights reserved Confidential 8

11 D. Logger S3 Connector offers a logging function that captures and presents log data generated by S3 Connector service events. The Logger channels the comprehensive service logs in a JSONbased format. S3 Vault events are captured in the S3 Connector logs (e.g., account creation, user creation), as are such API interactions as Bucket and Object operations. Viewing and searching the JSONbased logs is easily accomplished via the ElasticSearch tool, which is based on the well-known ELK 3 suite. Figure 6: Viewing the S3 Logger Service with Kibana ELK components can also be included and installed with the S3 Docker containers as part of the standard deployment process. ElasticSearch enables log searching for auditing purposes, and the Kibana tool enables visualization of data through graphs. This can also facilitate performance optimization, as well as drill-down for diagnosis and troubleshooting. A separate tool is also included for converting the JSON logs into a more easily read text format. IV. S3 Connector Federated Deployment The data storage layer for the S3 Connector is supplied by Scality RING. Independently scalable and eminently reliable, the S3 Connector accesses the RING through a native REST interface that is incorporated into the S3 Connector containers. This interface is deployed as part of the federated installation process, providing a simple, high-performance key/value store for access to the powerful data storage mechanisms of Scality RING. Data flows from standard load balancers to one of the S3 Server processes. Each S3 API command is parsed and processed by the S3 Server, which interacts with S3 Vault to 3 ELK suite (ElasticSearch, Kibana and Logstash) 2016 Scality. All rights reserved Confidential 9

12 authenticate the request and ensure that access is granted. Next, the S3 Server contacts the S3 Metadata service to locate or update the requested Bucket and Object key, and once the key is secured the S3 Server sends the data to the RING by passing the key/value pair to the native REST interface for the corresponding read or write action. The S3 Connector s native REST interface is responsible for sending the data to the RING s store nodes over the RING s erasure coding or variable Class-of-Service (CoS) replication mechanisms for high durability data protection. Also, all S3 API, S3 Vault, and S3 Metadata actions are registered to the Logger, thus creating a complete trail of the data and administrative commands associated with the request. For simplicity, the S3 Connectors are deployed uniformly on all RING servers in the physical machine OS or in a VM, as illustrated in Figure 8 in the case of a six (6) server RING. This delivers a simplified uniform (homogeneous) deployment model, both on the initial installation and for new servers added to the RING when scaling out capacity. The S3 Connector optimizes interactions between services to reduce latency in the local (single site) case, as well as to the greatest extent possible in multiple datacenter deployments. S3 container deployment is centralized through Ansible framework scripts, running from a central deployment machine. Ansible does not rely on agents deployed on each of the target hosts, and instead leverages the popular SSH tool for remote access to the target hosts. A set of Ansible federation scripts automates the deployment process, including the installation of Docker components from the deployment machine onto all target hosts. This federated deployment scheme allows for a simple, centralized command line installation of all distributed S3 Connector containers across all RING servers. Figure 7: Six (6) Server RING with S3 Connectors & Store Nodes The standard RING storage processes including storage nodes and IO Daemons are installed as in a typical RING deployment Scality. All rights reserved Confidential 10

13 For a comprehensive description of federated deployment, please refer to the S3 Connector Installation Guide. V. S3 Connector Deployment Use Cases The S3 Connector sustains a wide range of deployment scenarios, supporting the growing hybrid model of public cloud (enabling service providers to create new cloud storage capabilities) and on-premises private enterprise clouds. In addition to the security, performance, and compliance advantages of private cloud deployments, leading industry-analysts state 4 that the use of private clouds at large scale provides a TCO advantage over solely public cloud solutions. In any scenario the need for geo-distributed multi-datacenter deployments is key to supporting access from distributed applications, and to providing site failure protection. A. On-Premises Private Storage Cloud For many enterprises, the deployment of applications in the public cloud advantageous from both a flexibility and economic perspective. Even so, many types of applications require the control, security, and performance advantages of an on-premises enterprise private cloud deployment. Financial Services and Healthcare applications good examples, as the maintaining of large-scale archives of records and compliance data is typically precluded from public cloud storage due to specialized locality and security requirements. The S3 Connector provides a solution for enterprises that are developing new cloud applications designed to use the AWS model and the S3 API for storing large unstructured data. Applications developed and deployed in the AWS public cloud will function without any code changes required in a private cloud environment on the Scality RING, with the S3 Connector providing a totally compatible storage interface. Enterprise multitenancy deployments map well to the AWS security model with accounts and IAM users. Internal departments, applications or workgroups can be assigned their own accounts, users and groups, capable of functioning seamlessly in the on-premises deployment model. The interoperability of the S3 Connector with enterprise directory services (e.g., Active Directory) provides a solution for leveraging existing enterprise assets, rather than forcing a migration to a new proprietary model. B. Support for ISV and Custom Applications Hundreds of applications now leverage the S3 API as the standard protocol for accessing object storage. Many vertical industry ISVs are now delivering products that are S3-compatible, including key business applications for backup and archiving (Veritas, CommVault, IBM Spectrum Protect, ASG/Atempo, QStar, NetApp Altavault), digital media asset management (CatDV), syncand-share (Ctera), and content delivery (Aspera). For storage administrators, this trend virtually ensures that an S3-compatible, on-premises storage solution will be required to support business 4 BTIG Equity Research, April 2016 The Decline and Fall of Enterprise Storage 2016 Scality. All rights reserved Confidential 11

14 processes and workflows in the near-term future. Scality supports application validation through the open source S3 Server, which provides a simplified single Container image. This enables ISVs to develop, test, and certify the functionality of their applications for deployment on the S3 Connector and the Scality RING. The S3 Connector also directly supports custom application development via S3 REST API commands, or through the AWS SDKs for Java, JavaScript, PHP,.NET and many other languages. As such, large enterprises can safely standardize custom applications generating unstructured data for S3 compatibility, without being tied into a specific backend infrastructure. As a side benefit, the application development process itself generates large amounts of unstructured data in the form of images, droplets, etc.). The S3 Connector fully adheres to the S3 specification to provide portability of applications across public and private cloud deployments. The S3 Vault security model maps to the AWS security model for accounts, IAM users and groups, to provide full deployment compatibility and portability. C. Geo-Distributed S3 Deployments The S3 Connector s any-to-any scale-out capabilities extend to geographically-distributed deployments across multiple datacenters (DCs). The S3 Connector supports an Active/Active stretched model for deploying both the data RING and S3 services across two or more DCs connected via metro area networks, such as between San Francisco to San Jose, or between Paris and London. The S3 Metadata service implements the concept of a leader as referred to in S3 Metadata on page 7 and the term Master DC is used to describe the datacenter in which the currentlyassigned leader for the S3 Metadata service resides. In this deployment model, the S3 services comprised of the S3 Servers, S3 Vault and S3 Metadata containers are distributed across DCs, on the RING machines. The data is stored using the Scality RING model stretched across two or more DCs hosted on the same machines as the S3 services. Full any-to-any capability is provided (hence active/active access), and thus any S3 Connector in either DC can access any S3 Bucket resource. The system automatically manages metadata updates to the S3 Metadata service from the connectors, with synchronous updates made to the data RING across DCs for consistency. In some cases, however, the connectors in non-master DCs will incur a remote access penalty while updating metadata across the metro area network. In the event of a network failure or a DC outage, either writes are preserved on the Master DC (when one of the non-master DCs is rendered inaccessible), or read-only access is preserved (should the Master DC become inaccessible). An administrative command allows for switching a non-master DCs role to that of Master DC, which enables read/write access to the surviving DC following inaccessibility or failure of the original Master DC Scality. All rights reserved Confidential 12

15 Figure 8: Active/Active Stretched S3 Deployments As in the case of a typical stretched RING deployment, data updates are written synchronously to all nodes in the RING. This ensures that data is fully protected at the prescribed durability level across DCs, providing full resiliency and consistency. VI. Summary The Scality RING S3 Connector offers a modern and highly compatible S3 API server for Scality RING that provides a state-of-the-art implementation of AWS-compatible security services (e.g., IAM), as well as integration with enterprise-class security servers such as LDAP and Active Directory. In addition, the inclusion of Scale-Out, Geo-Replication, and Lifecycle Management functions provide a powerful solution for customers seeking an in-house S3 storage solution with petabyte-scale capabilities. The S3 Connector enables enterprise-caliber on-premises S3 storage solutions, as well as future enablement of hybrid cloud integration through Bucket Lifecycle support. About Scality Scality powers digital business. The industry leader in software-defined storage, Scality serves over 500 million end-customers worldwide, with over 800 billion objects in production. The Scality RING supports any file and object application, on any hardware, with unlimited capacity and guaranteed reliability. The RING enables organizations to offer always-on public or private services, connecting with applications both old and new, to drive competitiveness and heighten customer satisfaction. Able to seamlessly scale storage to match business growth, the RING runs on all industry standard x86 server platforms (such as those offered by HPE, Dell, Cisco, Seagate, or even mixed form factors, without the necessity for forklift upgrades. With the RING, Scality customers can expect a TCO reduction of up to 90% versus legacy storage. Scality is headquartered in San Francisco, with offices throughout the world. Try the Scality RING online at Scality. All rights reserved Confidential 13

powered by Cloudian and Veritas

powered by Cloudian and Veritas Lenovo Storage DX8200C powered by Cloudian and Veritas On-site data protection for Amazon S3-compliant cloud storage. assistance from Lenovo s world-class support organization, which is rated #1 for overall

More information

REFERENCE ARCHITECTURE Quantum StorNext and Cloudian HyperStore

REFERENCE ARCHITECTURE Quantum StorNext and Cloudian HyperStore REFERENCE ARCHITECTURE Quantum StorNext and Cloudian HyperStore CLOUDIAN + QUANTUM REFERENCE ARCHITECTURE 1 Table of Contents Introduction to Quantum StorNext 3 Introduction to Cloudian HyperStore 3 Audience

More information

The Nasuni Security Model

The Nasuni Security Model White Paper Nasuni enterprise file services ensures unstructured data security and privacy, enabling IT organizations to safely leverage cloud storage while meeting stringent governance and compliance

More information

SoftNAS Cloud Data Management Products for AWS Add Breakthrough NAS Performance, Protection, Flexibility

SoftNAS Cloud Data Management Products for AWS Add Breakthrough NAS Performance, Protection, Flexibility Control Any Data. Any Cloud. Anywhere. SoftNAS Cloud Data Management Products for AWS Add Breakthrough NAS Performance, Protection, Flexibility Understanding SoftNAS Cloud SoftNAS, Inc. is the #1 software-defined

More information

Commvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY

Commvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY Commvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY CONTENTS EXECUTIVE SUMMARY... 2 SOLUTION OVERVIEW... 3 USE CASES... 4 SOLUTION COMPONENTS... 5 Commvault

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS 03 EXECUTIVE OVERVIEW 05 INTRODUCTION 07 MORE CLOUD DEPLOYMENTS MEANS MORE ACCESS 09 IDENTITY FEDERATION IN

More information

Converged Platforms and Solutions. Business Update and Portfolio Overview

Converged Platforms and Solutions. Business Update and Portfolio Overview Converged Platforms and Solutions Business Update and Portfolio Overview IT Drivers In Next 5 Years SCALE SCALE 30,000+ physical servers 500,000+ virtual servers Current tools won t work at this scale

More information

SCALITY ZENKO. Freedom & control across Hybrid IT and Multi-Cloud

SCALITY ZENKO. Freedom & control across Hybrid IT and Multi-Cloud SCALITY Freedom & control across Hybrid IT and Multi-Cloud A Scality White Paper September 2018 SCALITY Hybrid IT and Multi-Cloud Storage Platform I. Introduction: Hybrid IT and Multi-Cloud Storage 3 II.

More information

Eight Tips for Better Archives. Eight Ways Cloudian Object Storage Benefits Archiving with Veritas Enterprise Vault

Eight Tips for Better  Archives. Eight Ways Cloudian Object Storage Benefits  Archiving with Veritas Enterprise Vault Eight Tips for Better Email Archives Eight Ways Cloudian Object Storage Benefits Email Archiving with Veritas Enterprise Vault Most organizations now manage terabytes, if not petabytes, of corporate and

More information

by Cisco Intercloud Fabric and the Cisco

by Cisco Intercloud Fabric and the Cisco Expand Your Data Search and Analysis Capability Across a Hybrid Cloud Solution Brief June 2015 Highlights Extend Your Data Center and Cloud Build a hybrid cloud from your IT resources and public and providerhosted

More information

Rio-2 Hybrid Backup Server

Rio-2 Hybrid Backup Server A Revolution in Data Storage for Today s Enterprise March 2018 Notices This white paper provides information about the as of the date of issue of the white paper. Processes and general practices are subject

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability IT teams in companies of all sizes face constant pressure to meet the Availability requirements of today s Always-On

More information

Migration and Building of Data Centers in IBM SoftLayer

Migration and Building of Data Centers in IBM SoftLayer Migration and Building of Data Centers in IBM SoftLayer Advantages of IBM SoftLayer and RackWare Together IBM SoftLayer offers customers the advantage of migrating and building complex environments into

More information

SwiftStack and python-swiftclient

SwiftStack and python-swiftclient SwiftStack and python-swiftclient Summary Storage administrators around the world are turning to object storage and particularly SwiftStack s enterprise-ready object storage built on OpenStack Swift for

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

IBM Spectrum NAS, IBM Spectrum Scale and IBM Cloud Object Storage

IBM Spectrum NAS, IBM Spectrum Scale and IBM Cloud Object Storage IBM Spectrum NAS, IBM Spectrum Scale and IBM Cloud Object Storage Silverton Consulting, Inc. StorInt Briefing 2017 SILVERTON CONSULTING, INC. ALL RIGHTS RESERVED Page 2 Introduction Unstructured data has

More information

OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems

OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems April 2017 215-12035_C0 doccomments@netapp.com Table of Contents 3 Contents Before you create ONTAP Cloud systems... 5 Logging in

More information

Security and Compliance at Mavenlink

Security and Compliance at Mavenlink Security and Compliance at Mavenlink Table of Contents Introduction....3 Application Security....4....4....5 Infrastructure Security....8....8....8....9 Data Security.... 10....10....10 Infrastructure

More information

Enabling Data Control in a Multi-Cloud World

Enabling Data Control in a Multi-Cloud World Zenko Webinar: Giorgio Regni Scality Co-founder & CTO Laure Vergeron Software Engineer Enabling Data Control in a Multi-Cloud World Thursday, August 3, 2017 Zenko Webinar: Multi-cloud, hybrid stores, open-source

More information

OpenIAM Identity and Access Manager Technical Architecture Overview

OpenIAM Identity and Access Manager Technical Architecture Overview OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...

More information

Cisco Cloud Application Centric Infrastructure

Cisco Cloud Application Centric Infrastructure Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified

More information

Cloud Computing: Making the Right Choice for Your Organization

Cloud Computing: Making the Right Choice for Your Organization Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,

More information

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter White Paper Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter Overcoming Security, Privacy & Compliance Concerns 333 W. San Carlos Street San Jose, CA 95110 Table of Contents

More information

CDMI Support to Object Storage in Cloud K.M. Padmavathy Wipro Technologies

CDMI Support to Object Storage in Cloud K.M. Padmavathy Wipro Technologies CDMI Support to Object Storage in Cloud K.M. Padmavathy Wipro Technologies Abstract Object storage, a leading emerging technology is mainly intended to handle exponential growth of unstructured data. Unlike

More information

Datacenter replication solution with quasardb

Datacenter replication solution with quasardb Datacenter replication solution with quasardb Technical positioning paper April 2017 Release v1.3 www.quasardb.net Contact: sales@quasardb.net Quasardb A datacenter survival guide quasardb INTRODUCTION

More information

Elastic Cloud Storage (ECS)

Elastic Cloud Storage (ECS) Elastic Cloud Storage (ECS) Version 3.1 Administration Guide 302-003-863 02 Copyright 2013-2017 Dell Inc. or its subsidiaries. All rights reserved. Published September 2017 Dell believes the information

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

WHITE PAPER Software-Defined Storage IzumoFS with Cisco UCS and Cisco UCS Director Solutions

WHITE PAPER Software-Defined Storage IzumoFS with Cisco UCS and Cisco UCS Director Solutions WHITE PAPER Software-Defined Storage IzumoFS with Cisco UCS and Cisco UCS Director Solutions Introduction While the data handled by companies has an average growth rate of over 50% per annum, growth of

More information

Energy Management with AWS

Energy Management with AWS Energy Management with AWS Kyle Hart and Nandakumar Sreenivasan Amazon Web Services August [XX], 2017 Tampa Convention Center Tampa, Florida What is Cloud? The NIST Definition Broad Network Access On-Demand

More information

Object Storage Service. Product Introduction. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD.

Object Storage Service. Product Introduction. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 04 Date 2017-12-20 HUAWEI TECHNOLOGIES CO., LTD. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Reasons to Deploy Oracle on EMC Symmetrix VMAX

Reasons to Deploy Oracle on EMC Symmetrix VMAX Enterprises are under growing urgency to optimize the efficiency of their Oracle databases. IT decision-makers and business leaders are constantly pushing the boundaries of their infrastructures and applications

More information

Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack

Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack Robert Collazo Systems Engineer Rackspace Hosting The Rackspace Vision Agenda Truly a New Era of Computing 70 s 80 s Mainframe Era 90

More information

Introducing Amazon Elastic File System (EFS)

Introducing Amazon Elastic File System (EFS) Introducing Amazon Elastic File System (EFS) Danilo Poccia, Technical Evangelist, AWS @danilop 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Goals and expectations for this session

More information

STORAGE MADE EASY ENTERPRISE FILE FABRIC

STORAGE MADE EASY ENTERPRISE FILE FABRIC SOLUTION GUIDE STORAGE MADE EASY ENTERPRISE FILE FABRIC IBM COS ABOUT STORAGE MADE EASY ENTERPRISE FILE FABRIC The Storage Made Easy File Fabric enables IT to regain control of "cloud data sprawl" by unifying

More information

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules

More information

CONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED DATA PLATFORM

CONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED DATA PLATFORM CONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED PLATFORM Executive Summary Financial institutions have implemented and continue to implement many disparate applications

More information

Powerful Insights with Every Click. FixStream. Agentless Infrastructure Auto-Discovery for Modern IT Operations

Powerful Insights with Every Click. FixStream. Agentless Infrastructure Auto-Discovery for Modern IT Operations Powerful Insights with Every Click FixStream Agentless Infrastructure Auto-Discovery for Modern IT Operations The Challenge AIOps is a big shift from traditional ITOA platforms. ITOA was focused on data

More information

NewSQL Without Compromise

NewSQL Without Compromise NewSQL Without Compromise Everyday businesses face serious challenges coping with application performance, maintaining business continuity, and gaining operational intelligence in real- time. There are

More information

TIBCO Cloud Integration Security Overview

TIBCO Cloud Integration Security Overview TIBCO Cloud Integration Security Overview TIBCO Cloud Integration is secure, best-in-class Integration Platform as a Service (ipaas) software offered in a multi-tenant SaaS environment with centralized

More information

Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN

Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN Avaya-FatPipe Solution Overview Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN The Avaya SDN-Fx and FatPipe Networks solution provides a fabric-based SDN architecture for simplicity

More information

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service

More information

"Software-defined storage Crossing the right bridge"

Software-defined storage Crossing the right bridge Navigating the software-defined storage world shaping tomorrow with you René Huebel "Software-defined storage Crossing the right bridge" SDS the model and the promises Control Abstraction The promises

More information

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON White Paper SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON Abstract This white paper explains the benefits to the extended enterprise of the on-premise, online file sharing storage

More information

EASILY DEPLOY AND SCALE KUBERNETES WITH RANCHER

EASILY DEPLOY AND SCALE KUBERNETES WITH RANCHER EASILY DEPLOY AND SCALE KUBERNETES WITH RANCHER 2 WHY KUBERNETES? Kubernetes is an open-source container orchestrator for deploying and managing containerized applications. Building on 15 years of experience

More information

HOW SNOWFLAKE SETS THE STANDARD WHITEPAPER

HOW SNOWFLAKE SETS THE STANDARD WHITEPAPER Cloud Data Warehouse Security HOW SNOWFLAKE SETS THE STANDARD The threat of a data security breach, someone gaining unauthorized access to an organization s data, is what keeps CEOs and CIOs awake at night.

More information

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments. WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish

More information

Data Protection for Virtualized Environments

Data Protection for Virtualized Environments Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized

More information

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time

More information

Enterprise Cloud Data Protection With Storage Director and IBM Cloud Object Storage October 24, 2017

Enterprise Cloud Data Protection With Storage Director and IBM Cloud Object Storage October 24, 2017 Storage Director Overview Enterprise Cloud Data Protection With Storage Director and IBM Cloud Object Storage October 24, 2017 Tributary Systems Business Overview Tributary Systems, Inc., founded in 1990,

More information

Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications

Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications Technical Brief Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications As application teams deploy their Dockerized applications into production environments,

More information

PRODUCT BROCHURE Mailbox Shuttle and Archive Shuttle:

PRODUCT BROCHURE Mailbox Shuttle and Archive Shuttle: PRODUCT BROCHURE Mailbox Shuttle and Archive Shuttle: Seamlessly migrate email and archives. Email is a mission-critical service, so it s important that when you migrate your live mail the solution you

More information

Addressing Data Management and IT Infrastructure Challenges in a SharePoint Environment. By Michael Noel

Addressing Data Management and IT Infrastructure Challenges in a SharePoint Environment. By Michael Noel Addressing Data Management and IT Infrastructure Challenges in a SharePoint Environment By Michael Noel Contents Data Management with SharePoint and Its Challenges...2 Addressing Infrastructure Sprawl

More information

Nasuni UniFS a True Global File System

Nasuni UniFS a True Global File System Nasuni UniFS a True Global File System File systems are the time-proven way to store, share, and protect unstructured data. But traditional device-based file systems no longer meet the needs of the modern

More information

WHITE PAPER. RedHat OpenShift Container Platform. Benefits: Abstract. 1.1 Introduction

WHITE PAPER. RedHat OpenShift Container Platform. Benefits: Abstract. 1.1 Introduction WHITE PAPER RedHat OpenShift Container Platform Abstract Benefits: Applications are designed around smaller independent components called microservices. Elastic resources: Scale up or down quickly and

More information

Vision of the Software Defined Data Center (SDDC)

Vision of the Software Defined Data Center (SDDC) Vision of the Software Defined Data Center (SDDC) Raj Yavatkar, VMware Fellow Vijay Ramachandran, Sr. Director, Storage Product Management Business transformation and disruption A software business that

More information

AWS Integration Guide

AWS Integration Guide AWS Integration Guide Cloud-Native Security www.aporeto.com AWS Integration Guide Aporeto integrates with AWS to help enterprises efficiently deploy, manage, and secure applications at scale and the compute

More information

Why Converged Infrastructure?

Why Converged Infrastructure? Why Converged Infrastructure? Three reasons to consider converged infrastructure for your organization Converged infrastructure isn t just a passing trend. It s here to stay. According to a recent survey

More information

Data center interconnect for the enterprise hybrid cloud

Data center interconnect for the enterprise hybrid cloud WHITEPAPER Data center interconnect for the enterprise hybrid cloud The world is moving to the cloud. Everything from entertainment and consumer mobile applications to enterprise software and government

More information

VMWARE VSAN LICENSING GUIDE - MARCH 2018 VMWARE VSAN 6.6. Licensing Guide

VMWARE VSAN LICENSING GUIDE - MARCH 2018 VMWARE VSAN 6.6. Licensing Guide - MARCH 2018 VMWARE VSAN 6.6 Licensing Guide Table of Contents Introduction 3 License Editions 4 Virtual Desktop Infrastructure... 5 Upgrades... 5 Remote Office / Branch Office... 5 Stretched Cluster with

More information

Dell EMC Isilon with Cohesity DataProtect

Dell EMC Isilon with Cohesity DataProtect Dell EMC Isilon with Cohesity DataProtect Abstract This guide outlines the Cohesity DataProtect deployment guide for Dell EMC Isilon Data Protection. Table of Contents About This Guide...2 Intended Audience...2

More information

Building Storage-as-a-Service Businesses

Building Storage-as-a-Service Businesses White Paper Service Providers Greatest New Growth Opportunity: Building Storage-as-a-Service Businesses According to 451 Research, Storage as a Service represents a large and rapidly growing market with

More information

TECHNICAL OVERVIEW OF NEW AND IMPROVED FEATURES OF EMC ISILON ONEFS 7.1.1

TECHNICAL OVERVIEW OF NEW AND IMPROVED FEATURES OF EMC ISILON ONEFS 7.1.1 TECHNICAL OVERVIEW OF NEW AND IMPROVED FEATURES OF EMC ISILON ONEFS 7.1.1 ABSTRACT This introductory white paper provides a technical overview of the new and improved enterprise grade features introduced

More information

Using Cohesity with Amazon Web Services (AWS)

Using Cohesity with Amazon Web Services (AWS) Using Cohesity with Amazon Web Services (AWS) Achieve your long-term retention and archival objectives for secondary data Cohesity DataPlatform is a hyperconverged secondary data and application solution

More information

Service Provider Consulting

Service Provider Consulting From Microsoft Services 1 Industry Overview More and more businesses are looking to outsource IT, decrease management requirements and ultimately save money. With worldwide public cloud spending expected

More information

Architecting Applications to Scale in the Cloud

Architecting Applications to Scale in the Cloud Architecting Applications to Scale in the Cloud Nuxeo White Paper White Paper Architecting Applications to Scale in the Cloud Table of Contents Executive Summary... 3 Between IaaS and SaaS... 3 Nuxeo and

More information

Today s trends in the storage world. Jacint Juhasz Storage Infrastructure Architect

Today s trends in the storage world. Jacint Juhasz Storage Infrastructure Architect Today s trends in the storage world Jacint Juhasz Storage Infrastructure Architect NetApp storage portfolio All-Flash Arrays for highest performance All-Flash SolidFire Data ONTAP-v for public cloud All

More information

The intelligence of hyper-converged infrastructure. Your Right Mix Solution

The intelligence of hyper-converged infrastructure. Your Right Mix Solution The intelligence of hyper-converged infrastructure Your Right Mix Solution Applications fuel the idea economy SLA s, SLA s, SLA s Regulations Latency Performance Integration Disaster tolerance Reliability

More information

Understanding Cumulus Deployment Options Enterprise DAM On-Premise, in the Cloud or a Hybrid Approach

Understanding Cumulus Deployment Options Enterprise DAM On-Premise, in the Cloud or a Hybrid Approach TECHNICAL WHITE PAPER Understanding Cumulus Deployment Options Enterprise DAM On-Premise, in the Cloud or a Hybrid Approach Choose the right setup and be the DAM hero Whether your company is moving from

More information

THE HYBRID CLOUD. Private and Public Clouds Better Together

THE HYBRID CLOUD. Private and Public Clouds Better Together THE HYBRID CLOUD Private and Public Clouds Better Together Bruno Terkaly Principal Software Engineer Cloud Architect Open Source/Linux Global ISV at Microsoft A MULTI-CLOUD WORLD A growing trend in the

More information

FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS

FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS WHITE PAPER FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS Over the past 15 years, server virtualization has become the preferred method of application deployment in the enterprise datacenter.

More information

REFERENCE ARCHITECTURE. Rubrik and Nutanix

REFERENCE ARCHITECTURE. Rubrik and Nutanix REFERENCE ARCHITECTURE Rubrik and Nutanix TABLE OF CONTENTS INTRODUCTION - RUBRIK...3 INTRODUCTION - NUTANIX...3 AUDIENCE... 4 INTEGRATION OVERVIEW... 4 ARCHITECTURE OVERVIEW...5 Nutanix Snapshots...6

More information

Hyper-Convergence De-mystified. Francis O Haire Group Technology Director

Hyper-Convergence De-mystified. Francis O Haire Group Technology Director Hyper-Convergence De-mystified Francis O Haire Group Technology Director The Cloud Era Is Well Underway Rapid Time to Market I deployed my application in five minutes. Fractional IT Consumption I use and

More information

Business- Centric Storage

Business- Centric Storage Business- Centric Storage Providing reliable data services more efficiently with FUJITSU Storage ETERNUS ETERNUS Business-Centric Storage Digitization is fundamentally transforming businesses. This transformation

More information

Hedvig as backup target for Veeam

Hedvig as backup target for Veeam Hedvig as backup target for Veeam Solution Whitepaper Version 1.0 April 2018 Table of contents Executive overview... 3 Introduction... 3 Solution components... 4 Hedvig... 4 Hedvig Virtual Disk (vdisk)...

More information

Cyber Group Deploys EMC ViPR for Next-Generation SaaS Application Infrastructure

Cyber Group Deploys EMC ViPR for Next-Generation SaaS Application Infrastructure Buyer Case Study Cyber Group Deploys EMC ViPR for Next-Generation SaaS Application Infrastructure Laura DuBois IDC OPINION 3rd Platform computing has given rise to massive scale datacenters architected

More information

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA

More information

DELL EMC ISILON SCALE-OUT NAS PRODUCT FAMILY Unstructured data storage made simple

DELL EMC ISILON SCALE-OUT NAS PRODUCT FAMILY Unstructured data storage made simple SCALE-OUT NAS PRODUCT FAMILY Unstructured data storage made simple ESSENTIALS Simple storage management designed for ease of use Massive scalability of capacity and performance Unmatched efficiency to

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T P ow e ring Digital Transfor m a t i o n T h r ough the C l o u d - R e a d y E n t e r p rise September 2016 Adapted from Developing a Cloud Strategy for Digital

More information

YOUR APPLICATION S JOURNEY TO THE CLOUD. What s the best way to get cloud native capabilities for your existing applications?

YOUR APPLICATION S JOURNEY TO THE CLOUD. What s the best way to get cloud native capabilities for your existing applications? YOUR APPLICATION S JOURNEY TO THE CLOUD What s the best way to get cloud native capabilities for your existing applications? Introduction Moving applications to cloud is a priority for many IT organizations.

More information

New Fresh Storage Approach for New IT Challenges Laurent Denel Philippe Nicolas OpenIO

New Fresh Storage Approach for New IT Challenges Laurent Denel Philippe Nicolas OpenIO New Fresh Storage Approach for New IT Challenges Laurent Denel Philippe Nicolas OpenIO Agenda Company profile and background Business and Users needs OpenIO approach Competition Conclusion Company profile

More information

IT your way - Hybrid IT FAQs

IT your way - Hybrid IT FAQs Hybrid IT IT your way - Hybrid IT FAQs Create a strategy that integrates in-house and outsourced IT services to meet ever-changing business requirements. Combine on-premise and off premise solutions Mix

More information

DELL EMC ISILON SCALE-OUT NAS PRODUCT FAMILY

DELL EMC ISILON SCALE-OUT NAS PRODUCT FAMILY DATA SHEET DELL EMC ISILON SCALE-OUT NAS PRODUCT FAMILY Unstructured data storage made simple ESSENTIALS Simple storage management designed for ease of use Massive scalability of capacity and performance

More information

Solution Brief: Commvault HyperScale Software

Solution Brief: Commvault HyperScale Software Solution Brief: Commvault HyperScale Software ENTERPRISE IT SHIFTS Enterprise IT is being transformed with the maturing of public cloud providers that offer compute, storage and application services with

More information

VMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017

VMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017 : INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017 Table of Contents Executive Summary 3 A Single Architecture for Hybrid Cloud 4 Introducing VMware Cloud Foundation 4 Deploying on Premises 6

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

70-532: Developing Microsoft Azure Solutions

70-532: Developing Microsoft Azure Solutions 70-532: Developing Microsoft Azure Solutions Exam Design Target Audience Candidates of this exam are experienced in designing, programming, implementing, automating, and monitoring Microsoft Azure solutions.

More information

BlackPearl Customer Created Clients Using Free & Open Source Tools

BlackPearl Customer Created Clients Using Free & Open Source Tools BlackPearl Customer Created Clients Using Free & Open Source Tools December 2017 Contents A B S T R A C T... 3 I N T R O D U C T I O N... 3 B U L D I N G A C U S T O M E R C R E A T E D C L I E N T...

More information

Nasuni for Oil & Gas. The Challenge: Managing the Global Flow of File Data to Improve Time to Market and Profitability

Nasuni for Oil & Gas. The Challenge: Managing the Global Flow of File Data to Improve Time to Market and Profitability Solution Brief Highlights Optimize collaboration processes for geophysicists with high performance global file sharing. Support a dynamic business environment with easy integration of new acquisitions.

More information

SUSE Enterprise Storage Deployment Guide for Veritas NetBackup Using S3

SUSE Enterprise Storage Deployment Guide for Veritas NetBackup Using S3 SUSE Enterprise Storage Deployment Guide for Veritas NetBackup Using S3 by Kian Chye Tan December 2017 Guide Deployment Guide SUSE Enterprise Storage Deployment Guide SUSE Enterprise Storage Deployment

More information

São Paulo. August,

São Paulo. August, São Paulo August, 28 2018 A Modernização das Soluções de Armazeamento e Proteção de Dados DellEMC Mateus Pereira Systems Engineer, DellEMC mateus.pereira@dell.com Need for Transformation 81% of customers

More information

VMware vsphere 4. The Best Platform for Building Cloud Infrastructures

VMware vsphere 4. The Best Platform for Building Cloud Infrastructures Table of Contents Get the efficiency and low cost of cloud computing with uncompromising control over service levels and with the freedom of choice................ 3 Key Benefits........................................................

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : SAA-C01 Title : AWS Certified Solutions Architect - Associate (Released February 2018)

More information

Open-Xchange. Summit 2017 Brussels. Erik Julin Sr. Director, Technical Business Development

Open-Xchange. Summit 2017 Brussels. Erik Julin Sr. Director, Technical Business Development Open-Xchange Summit 2017 Brussels Erik Julin Sr. Director, Technical Business Development Introducing Scality (in 2 slides) Scality Architecture OBJECT APPLICATIONS SCALITY SOFTWARE Object & File Access

More information

Cloud Computing 4/17/2016. Outline. Cloud Computing. Centralized versus Distributed Computing Some people argue that Cloud Computing. Cloud Computing.

Cloud Computing 4/17/2016. Outline. Cloud Computing. Centralized versus Distributed Computing Some people argue that Cloud Computing. Cloud Computing. Cloud Computing By: Muhammad Naseem Assistant Professor Department of Computer Engineering, Sir Syed University of Engineering & Technology, Web: http://sites.google.com/site/muhammadnaseem105 Email: mnaseem105@yahoo.com

More information

Renovating your storage infrastructure for Cloud era

Renovating your storage infrastructure for Cloud era Renovating your storage infrastructure for Cloud era Nguyen Phuc Cuong Software Defined Storage Country Sales Leader Copyright IBM Corporation 2016 2 Business SLAs Challenging Traditional Storage Approaches

More information

Build your own Cloud on Christof Westhues

Build your own Cloud on Christof Westhues Build your own Cloud on Christof Westhues chwe@de.ibm.com IBM Big Data & Elastic Storage Tour Software Defined Infrastructure Roadshow December 2 4, 2014 New applications and IT are being built for Cloud

More information

Pulse Secure Application Delivery

Pulse Secure Application Delivery DATA SHEET Pulse Secure Application Delivery HIGHLIGHTS Provides an Application Delivery and Load Balancing solution purposebuilt for high-performance Network Functions Virtualization (NFV) Uniquely customizable,

More information