Proof of Concept IBM CLOUD OBJECT
|
|
- Hilary Lester
- 5 years ago
- Views:
Transcription
1 Proof of Concept IBM CLOUD OBJECT By Randy Frye Systems Engineer ATS Innovation Center, Malvern PA September October 2017
2 INTRODUCTION IBM Cloud Object Storage is part of the IBM family of Storage and Software-Defined Infrastructure. IBM Cloud Object storage allows you to choose flexible deployment options dedicated and private cloud or public and shared cloud, implemented within a region or across. IBM Cloud Object Storage uses a cluster of storages nodes to store pieces of the data across the available nodes. Its architecture dramatically increases the tolerance to node and disk failures. This document will provide a perspective of the use cases, capabilities, and ease of use of IBM Cloud Object Storage, from the point of view of a Storage Administrator familiar with Fibre-Channel-attached storage. This Proof of Concept is specifically focused towards on-premises Private Cloud COS deployments. 01
3 HOW IT WORKS IBM Cloud Object Storage (COS) is deployed as a cluster using three types of nodes: A Manager to configure and manage the COS infrastructure, Accessers to provide storage system endpoints for applications to access to the underlying storage, and Slicestors to provide data storage. The Accessers utilize a mathematical Information Dispersal Algorithm (IDA) to transform a given object to be stored into multiple slices in such a way that the original object can be read/retrieved from only a subset of those slices. Those slices are then stored on the Slicestor nodes. Use Cases IBM Cloud Object Storage is not a replacement for all other types of storage. There are specific uses to which Cloud Object Storage is well-suited, and other uses to which it is not. If your application is highly transactional, requiring high IOPs at consistent low latency such as a typical database or mission-critical or SAP applications COS may not be the best solution. Instead, Block Storage (such as Fiber-Channel attached storage) will likely be required to provide the performance required for such applications. Block storage utilizes structured data, and must be attached to an operating system to be accessed. COS is a great solution for large-scale data (hundreds of TeraByte to hundreds of PetaBytes) that might be required to be accessible simultaneously from multiple sites, where instantaneous high-iops response is not required. COS becomes considerably more costeffective with multiple PetaBytes of capacity and three or more sites (whether regional or geographically disperse). Cloud Object Storage is well-suited to storage requirements for applications such as document/image/video/music repositories, archives, log files, or large data sets that are not in constant application use. 02
4 COS is designed to store unstructured data as objects. COS is designed to store unstructured data as objects, allowing access from any source through API s or http/s URL s. The data is referenced by object names stored in COS metadata, allowing any system with appropriate credentials to locate any given object data for access. This type of unstructured data is becoming more and more prevalent in today s environments, comprising an estimated 80percent of all data. Even many WWW Web pages consist of a combination of Block-Storage based structured data such as pricing, transactions and statistics, File-Storage based data such as web page styles and structures, and Object-Storage based data such as Images. And on typical web pages, the images are usually a majority of the storage capacity used to present the page. To utilize a metaphor, liken a piece of data to parking a car: With Block Storage, when you write your data, it s like driving into a parking garage (storage system), getting your ticket (block allocation and write acknowledgement), picking a space and parking (writing your data in the allocated blocks). When you read your data, you look at your ticket to find the location where your car is (block where data is located), go to that parking space (block on storage system), and pay your ticket fee and drive out (read acknowledgement and data retrieval). With Object Storage, when you write your data, it s like driving up to valet parking (COS Accesser), and getting your valet ticket (data Object ID). The valet then takes care of figuring out where to park your car with no knowledge of that location required by you (COS IDA and writing to Slicestores). When you read your data, you present the valet ticket (data Object ID) to the valet (COS Accesser). The valet (COS Accesser) figures out where your car is parked (where the Object ID is located), and retrieves it for you (data retrieval). The Information Dispersal Algorithm (IDA), which is applied to every written object, creates multiple slices of each object, and puts one slice on each of the Slicestor storage nodes (the number of Slicestors is referred to as the IDA Width ). The flexible configuration of COS also allows for different configurations to suit specific use cases, all within the same COS system. 03
5 The flexible configuration of COS allows for different configurations to suit specific use cases. The configuration of how many slices must be available is very customizable in IBM COS, allowing you to specify a Read Threshold (how many of the total number of Slicestor storage nodes must be accessible in order to still have access to the data), and a Write Threshold (one or more higher than the Read Threshold ), which specifies the minimum number of slices that must be available for data writes to be accepted. The Read Threshold determines the availability or your data, and the Write Threshold presents a trade-off between reliability of new data and accessibility to write new data. Consider an example of an Image repository provider: The COS system is set up across three sites with a IDA width of 30, and a Read Threshold of 21, enabling data read accessibility as long as at least 21 of the 30 Slicestor nodes are available. End-users store their images in this COS storage pool, with certain expectations. There is an expectation that their images will be safe and not susceptible to irretrievable loss. So, one COS storage vault might be set up with a high Write Threshold such as 28 of 30 slices. This will prevent users from writing new images if more than 2 of the Slicestor nodes are unavailable less availability, but in turn will still have the data available even if 7 more Slicestor nodes fail (21 of 30 still available) more reliability. This provides a very high data reliability for any newly written images. Now let s say that the Image repository provider also creates thumbnails of all images for presentation to the users. Those thumbnails are the first thing users see when they re looking through the repositories, so there s an expectation that they are always available. So, a second COS storage vault might be created with a Write Threshold of 22 of 30 slices. New thumbnails can be created and stored even with only 22 Slicestor nodes operational more availability. However, just 2 more Slicestor node failures (only 20 of 30 slices available) would result in loss of all data less reliability. But since these thumbnail images can be recreated from the reliably intact original images, that s acceptable. 04
6 CLOUD OBJECT STORAGE CAPABILITIES AND BENEFITS When considering the storage requirements for a given scenario, there are numerous considerations: Price (both Capital and Operational), Reliability / Availability / Serviceability (RAS), Performance, Scalability, Security, Ease of Management and Use, Retention and Compliance, Switching Infrastructure, and Disaster Recovery. Price and RAS COS is implemented with low-cost NLSAS storage on industry-standard servers or VM s, and utilizes lower-cost and often pre-existing Ethernet switching infrastructure. This makes the Capital costs for COS significantly lower than equivalent capacity in Fiber Channel SAN-attached storage, which requires vendor-designed storage controller hardware and a FC network. 05
7 In addition, the implementation of IBM s COS makes it possible to have a highly redundant storage deployment, spanning multiple sites, without the need for complete multiple copies of the data for availability. The configuration of how many slices must be available is very customizable in IBM COS, but as a simple example, consider a 3-site COS deployment with 12 storage nodes (4 per site), and a Read Threshold of 7 slices. The IDA is applied to a given object, creating 12 slices, and one slice is put on each of the 12 storage nodes. This object can then be retrieved by reading any 7 of the 12 slices. In terms of reliability, you are able to lose an entire site (4 nodes) plus 1 additional node, and still have access to your data. In terms of price, this only costs you, in terms of RAW storage, 171 percent (12/7) of your usable capacity. Compare to a typical Fiber Channel SAN-attached storage, where you would typically have RAID overhead plus the need to have your data exist at a minimum of two sites percent RAID overhead percent site redundancy overhead = 225 percent of your usable capacity. And with considerably less redundancy than COS, as loss of a single RAID array at both sites would result in loss of data access. Since COS s IDA can be configured to provide sufficient redundancy to allow for complete loss of a site, a complete second set of controllers and disk spindles for site Disaster Recovery is not required, as illustrated in above example. COS also performs CRC-32 data integrity checks on slices and entire files to ensure bit-perfect data delivery, and performs always-on continuous error correction. This built-in integrity checking is performed at regular intervals, even on data that is not recently accessed, providing self-repair capability. This self-repair capability also ensures missing slices (due to hardware failure for example) are rebuilt in a timely manner with no operator intervention required. Software upgrades, hardware refreshes, disk/node/site failures can be accommodated without loss of system availability. The self-repairing integrity checking also allows for moves of entire Slicestor storage nodes and Accessers between sites without disruption to data access (as long as sufficient Slicestors are left online to provide the required Read Threshold ). 06
8 COS can provide data access that is compatible with S3, OpenStack Swift, and Simple object API s. COS can provide data access that is compatible with S3, OpenStack Swift, and Simple object API s. Storage vaults can be configured with multiple authentication methods (internal users, Active Directory, OpenLDAP, S3 secret access key, OpenStack Keystone Identity Service, PKI), as well as anonymous read or read/write. And authenticated users can have owner, read/write, or read-only privileges to a given storage vault. In comparison to some of the other object stores like Ceph, IBM COS provides an ease of deployment, a polished interface and removes the headache of massive architectural design considerations and a requirement around resourcing. Ceph provides File, Block and Object over 1 unified namespace. While this might allow for flexibility, it also adds complexity. Looking into Ceph, we found that while it might enable a lower TCO, it is quickly offset by a need for staffing as the product needs to managed and maintained constantly. The number of tunable options can be overwhelming and without a deep understanding of the product it can cause serious unforeseen performance impacts. Ceph may offer many different products rolled up into one, and while this is convenient, planning and designing all of the commodity hardware for each Ceph component requires a deep understanding of the workload that will run on the object store which might be an unknown. Incorrect hardware purchases can lead to huge performance impacts and can be a very costly mishap. Maintaining each and every operating system in the cluster also requires the resources supporting the cluster to have excellent Linux Administration skills. 07
9 All-or-Nothing Transform Encryption is applied to every write before it is sliced and dispersed. Performance COS is not going to be fast, compared to Fiber-channel SAN-attached storage. FC storage will typically use 10k/15k and/or flash drives, as compared to the typical NLSAS drives in COS. And access to COS storage is Ethernet-based, sometimes traversing to remote sites, as compared to fast Fiber-Channel storage, typically attached via a local site SAN. COS does optimize data access by re-ranking response times of Accesser nodes and Slicestor storage nodes dynamically during all reads, enabling redirecting of read requests to optimally performing storage nodes. And writes are optimistically written to all Slicestor nodes in parallel, but are acknowledged as soon a configurable Write Threshold is met any missing slices resulting from an inaccessible Slicestor node are automatically detected and rebuilt once the node is available. Scalability COS allows for easy and generous scalability. Capacity can be added at any time by adding more Slicestor storage nodes, with the capability for thousands of storage nodes per system. Additional capacity can be deployed in existing or new storage pools and vault containers. Access points can be added at any time by adding accessors, providing the capability to increase system throughput and/or to add local system accessibility at additional site locations. Both can be added non-disruptively, and performance of the system has a near linear increase in throughput and HTTP operations as the system grows. And COS s global namespace supports yottabyte-scale (1038) object ID s per storage vault. Security All-or-Nothing Transform Encryption is applied to every write before it is sliced and dispersed. This serves to protect data security in motion (between Accessers and Slicestors), as well as data at rest. Transport Layer Security (TLS) is also supported on client-to-accesser networks to provide end-to-end data-in-motion protection. All COS nodes have NSA hardening guidelines applied, and utilize digital certificates and internal firewalls to protect from rogue device attacks. 08
10 IMPLEMENTATION AND SYSTEM EASE OF USE In the ATS Innovation Center, IBM Cloud Object Storage was deployed on a VMWare infrastructure, using one VM for Management, 2 VM s for Accessors, and 6 VM s for SliceStore storage nodes. A single storage vault containing a single Access Pool, was defined with a Slice Width = 6 and Read Threshold = 4. This makes the effective usable capacity 4/6 of the total SliceStore host s RAW capacity. A local user account was then created with access keys and given ownership permission to the storage vault. Anonymous access was also granted to the vault. This complete setup, utilizing nine pre-cloned Linux VM s, was implemented in just over an hour. Write and read access to Object files within the Storage Vault was tested successfully with ease. The COS Manager Web Interface is very easy to use, presenting a single pane of glass view into the entire COS system. The default screen displays a top-level overall health indicator of the system and underlying physical hardware. Drill-down access to information and configuration of the Manager, Accesser and Slicestor nodes is available, providing easy view of node health, IP address, model, and software version. Similar drill-down information/ configuration access is available for Slicestor drives (including drive health, capacity, and information), Storage Vaults (including vault health, name, raw/usable capacities, IDA width and read/write thresholds, quotas, and encryption), and Storage Pools (including names, pool capacities, and which Storage Vaults are in the Pool). COS Manager also has numerous easily-accessible graphs available to visualize key performance indicators and system health. A real-time event stream provides historical records of the system, including conditions that impact the Manager/Accesser/Slicestor nodes, the Storage Vaults, and the Storage Pools. A real-time incident stream displays a list of current issues that require operator intervention to maintain the health of the COS system. And an audit stream provides a historical record of system configuration changes. COS Manager also can be configured to generate , SNMP traps, and/or syslog forwarding for incident and event alerting. 09
11 Want to Learn More? Consider IBM Cloud Object Storage for applications such as document/image/video/music repositories, archives, log files, or large data sets. At ATS, we have a very diverse Innovation Center where we implement Proof of Concepts and specialize in the implementation and architecture of advanced technology. Please contact us with any questions! THEATSGROUP.COM/COMPANY/CONTACT About the ATS Group Since our founding in 2001, the ATS Group has consulted on thousands of system implementations, upgrades, backups and recoveries. We also support customers by providing managed services, performance analysis and capacity planning. With over 60 industrycertified professionals, we support SMBs, Fortune 500 companies, and government agencies. As experts in IBM, VMware, Oracle and other top vendors, we are experienced in virtualization, storage area networks (SANs), high availability, performance tuning, SDS, enterprise backup and other evolving technologies that operate mission-critical systems on premise, in the cloud, or in a hybrid environment.
IBM Cloud Object Storage System features and benefits
IBM Cloud Object Storage System features and benefits Object storage platform to help solve petabyte-andbeyond storage challenges Highlights Scalability that offers a single storage system and namespace
More informationCleversafe Overview Presentation. Cleversafe, Inc. All rights reserved.
Cleversafe Overview Presentation Private cloud built on Cleversafe dsnet MANAGER dsnet Manager Is deployed to configure and manage the infrastructure ACCESSER LAYER Accessers are deployed to access the
More informationAUTOMATING IBM SPECTRUM SCALE CLUSTER BUILDS IN AWS PROOF OF CONCEPT
AUTOMATING IBM SPECTRUM SCALE CLUSTER BUILDS IN AWS PROOF OF CONCEPT By Joshua Kwedar Sr. Systems Engineer By Steve Horan Cloud Architect ATS Innovation Center, Malvern, PA Dates: Oct December 2017 INTRODUCTION
More informationProof of Concept TRANSPARENT CLOUD TIERING WITH IBM SPECTRUM SCALE
Proof of Concept TRANSPARENT CLOUD TIERING WITH IBM SPECTRUM SCALE ATS Innovation Center, Malvern PA Joshua Kwedar The ATS Group October November 2017 INTRODUCTION With the release of IBM Spectrum Scale
More informationpowered by Cloudian and Veritas
Lenovo Storage DX8200C powered by Cloudian and Veritas On-site data protection for Amazon S3-compliant cloud storage. assistance from Lenovo s world-class support organization, which is rated #1 for overall
More informationA Robust, Flexible Platform for Expanding Your Storage without Limits
White Paper SUSE Enterprise A Robust, Flexible Platform for Expanding Your without Limits White Paper A Robust, Flexible Platform for Expanding Your without Limits Unlimited Scalability That s Cost-Effective
More informationPrivate Cloud Database Consolidation Name, Title
Private Cloud Database Consolidation Name, Title Agenda Cloud Introduction Business Drivers Cloud Architectures Enabling Technologies Service Level Expectations Customer Case Studies Conclusions
More informationElastic Cloud Storage (ECS)
Elastic Cloud Storage (ECS) Version 3.1 Administration Guide 302-003-863 02 Copyright 2013-2017 Dell Inc. or its subsidiaries. All rights reserved. Published September 2017 Dell believes the information
More informationMODERNISE WITH ALL-FLASH. Intel Inside. Powerful Data Centre Outside.
MODERNISE WITH ALL-FLASH Intel Inside. Powerful Data Centre Outside. MODERNISE WITHOUT COMPROMISE In today s lightning-fast digital world, it s critical for businesses to make their move to the Modern
More informationSwiftStack and python-swiftclient
SwiftStack and python-swiftclient Summary Storage administrators around the world are turning to object storage and particularly SwiftStack s enterprise-ready object storage built on OpenStack Swift for
More informationVMware Virtual SAN Technology
VMware Virtual SAN Technology Today s Agenda 1 Hyper-Converged Infrastructure Architecture & Vmware Virtual SAN Overview 2 Why VMware Hyper-Converged Software? 3 VMware Virtual SAN Advantage Today s Agenda
More informationCopyright 2011, Oracle and/or its affiliates. All rights reserved.
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
More informationIBM Spectrum NAS, IBM Spectrum Scale and IBM Cloud Object Storage
IBM Spectrum NAS, IBM Spectrum Scale and IBM Cloud Object Storage Silverton Consulting, Inc. StorInt Briefing 2017 SILVERTON CONSULTING, INC. ALL RIGHTS RESERVED Page 2 Introduction Unstructured data has
More informationEMC Integrated Infrastructure for VMware. Business Continuity
EMC Integrated Infrastructure for VMware Business Continuity Enabled by EMC Celerra and VMware vcenter Site Recovery Manager Reference Architecture Copyright 2009 EMC Corporation. All rights reserved.
More informationHitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage
O V E R V I E W Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage Modular Hitachi Storage Delivers Enterprise-level Benefits Hitachi Adaptable Modular Storage and Hitachi Workgroup
More informationSoftware-defined Storage: Fast, Safe and Efficient
Software-defined Storage: Fast, Safe and Efficient TRY NOW Thanks to Blockchain and Intel Intelligent Storage Acceleration Library Every piece of data is required to be stored somewhere. We all know about
More informationWhite Paper. A System for Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft
White Paper Mimosa Systems, Inc. November 2007 A System for Email Archiving, Recovery, and Storage Optimization Mimosa NearPoint for Microsoft Exchange Server and EqualLogic PS Series Storage Arrays CONTENTS
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
More information"Software-defined storage Crossing the right bridge"
Navigating the software-defined storage world shaping tomorrow with you René Huebel "Software-defined storage Crossing the right bridge" SDS the model and the promises Control Abstraction The promises
More informationVMware vsan 6.6. Licensing Guide. Revised May 2017
VMware 6.6 Licensing Guide Revised May 2017 Contents Introduction... 3 License Editions... 4 Virtual Desktop Infrastructure... 5 Upgrades... 5 Remote Office / Branch Office... 5 Stretched Cluster... 7
More informationActiveScale Erasure Coding and Self Protecting Technologies
WHITE PAPER AUGUST 2018 ActiveScale Erasure Coding and Self Protecting Technologies BitSpread Erasure Coding and BitDynamics Data Integrity and Repair Technologies within The ActiveScale Object Storage
More informationRenovating your storage infrastructure for Cloud era
Renovating your storage infrastructure for Cloud era Nguyen Phuc Cuong Software Defined Storage Country Sales Leader Copyright IBM Corporation 2016 2 Business SLAs Challenging Traditional Storage Approaches
More informationSvSAN Data Sheet - StorMagic
SvSAN Data Sheet - StorMagic A Virtual SAN for distributed multi-site environments StorMagic SvSAN is a software storage solution that enables enterprises to eliminate downtime of business critical applications
More informationIBM Spectrum Protect Version Introduction to Data Protection Solutions IBM
IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information
More informationHitachi Adaptable Modular Storage and Workgroup Modular Storage
O V E R V I E W Hitachi Adaptable Modular Storage and Workgroup Modular Storage Modular Hitachi Storage Delivers Enterprise-level Benefits Hitachi Data Systems Hitachi Adaptable Modular Storage and Workgroup
More informationRed Hat Enterprise Virtualization (RHEV) Backups by SEP
Red Hat Enterprise Virtualization (RHEV) Backups by SEP info@sepusa.com www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW AGENT BASED BACKUP IMAGE LEVEL BACKUP VIA RHEV API RHEV BACKUP WITH SEP
More informationHCI: Hyper-Converged Infrastructure
Key Benefits: Innovative IT solution for high performance, simplicity and low cost Complete solution for IT workloads: compute, storage and networking in a single appliance High performance enabled by
More informationEight Tips for Better Archives. Eight Ways Cloudian Object Storage Benefits Archiving with Veritas Enterprise Vault
Eight Tips for Better Email Archives Eight Ways Cloudian Object Storage Benefits Email Archiving with Veritas Enterprise Vault Most organizations now manage terabytes, if not petabytes, of corporate and
More informationIBM TS7700 grid solutions for business continuity
IBM grid solutions for business continuity Enhance data protection and business continuity for mainframe environments in the cloud era Highlights Help ensure business continuity with advanced features
More informationBackup Solution. User Guide. Issue 01 Date
Issue 01 Date 2017-08-30 Contents Contents 1 Introduction... 1 1.1 What Is the Backup Solution?... 1 1.2 Why Choose the Backup Solution?... 2 1.3 Concepts and Principles...3 1.3.1 Basic OBS Concepts...3
More informationproduct overview CRASH
product overview CRASH e back up everyone, everywhere PROe Software Continuous backup for business Use CrashPlan PROe for continuous, cross-platform backup that works everywhere, enabling users to easily
More informationREFERENCE ARCHITECTURE Quantum StorNext and Cloudian HyperStore
REFERENCE ARCHITECTURE Quantum StorNext and Cloudian HyperStore CLOUDIAN + QUANTUM REFERENCE ARCHITECTURE 1 Table of Contents Introduction to Quantum StorNext 3 Introduction to Cloudian HyperStore 3 Audience
More informationIBM TS4300 with IBM Spectrum Storage - The Perfect Match -
IBM TS4300 with IBM Spectrum Storage - The Perfect Match - Vladimir Atanaskovik IBM Spectrum Storage and IBM TS4300 at a glance Scale Archive Protect In July 2017 IBM The #1 tape vendor in the market -
More informationWhy Datrium DVX is Best for VDI
Why Datrium DVX is Best for VDI 385 Moffett Park Dr. Sunnyvale, CA 94089 844-478-8349 www.datrium.com Technical Report Introduction Managing a robust and growing virtual desktop infrastructure in current
More informationEMC ISILON HARDWARE PLATFORM
EMC ISILON HARDWARE PLATFORM Three flexible product lines that can be combined in a single file system tailored to specific business needs. S-SERIES Purpose-built for highly transactional & IOPSintensive
More informationIBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM Note: Before you use this
More informationVeritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW
Veritas Backup Exec Powerful, flexible and reliable data protection designed for cloud-ready organizations. OVERVIEW Veritas Backup Exec is the backup solution without barriers, delivered your way. You
More informationDell EMC Surveillance for Reveal Body- Worn Camera Systems
Dell EMC Surveillance for Reveal Body- Worn Camera Systems Functional Validation Guide H14646 REV 1.1 Copyright 2015 Dell Inc. or its subsidiaries. All rights reserved. Published October 2015 Dell believes
More informationDell EMC Surveillance for IndigoVision Body-Worn Cameras
Dell EMC Surveillance for IndigoVision Body-Worn Cameras Functional Validation Guide H14821 REV 1.1 Copyright 2016 Dell Inc. or its subsidiaries. All rights reserved. Published February 2016 Dell believes
More informationRED HAT CEPH STORAGE ROADMAP. Cesar Pinto Account Manager, Red Hat Norway
RED HAT CEPH STORAGE ROADMAP Cesar Pinto Account Manager, Red Hat Norway cpinto@redhat.com THE RED HAT STORAGE MISSION To offer a unified, open software-defined storage portfolio that delivers a range
More informationIBM ProtecTIER and Netbackup OpenStorage (OST)
IBM ProtecTIER and Netbackup OpenStorage (OST) Samuel Krikler Program Director, ProtecTIER Development SS B11 1 The pressures on backup administrators are growing More new data coming Backup takes longer
More informationVMWARE VSAN LICENSING GUIDE - MARCH 2018 VMWARE VSAN 6.6. Licensing Guide
- MARCH 2018 VMWARE VSAN 6.6 Licensing Guide Table of Contents Introduction 3 License Editions 4 Virtual Desktop Infrastructure... 5 Upgrades... 5 Remote Office / Branch Office... 5 Stretched Cluster with
More informationStorageCraft OneXafe and Veeam 9.5
TECHNICAL DEPLOYMENT GUIDE NOV 2018 StorageCraft OneXafe and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneXafe, compliments Veeam to create a differentiated
More informationOracle Exadata: Strategy and Roadmap
Oracle Exadata: Strategy and Roadmap - New Technologies, Cloud, and On-Premises Juan Loaiza Senior Vice President, Database Systems Technologies, Oracle Safe Harbor Statement The following is intended
More informationTHE ZADARA CLOUD. An overview of the Zadara Storage Cloud and VPSA Storage Array technology WHITE PAPER
WHITE PAPER THE ZADARA CLOUD An overview of the Zadara Storage Cloud and VPSA Storage Array technology Zadara 6 Venture, Suite 140, Irvine, CA 92618, USA www.zadarastorage.com EXECUTIVE SUMMARY The IT
More informationHigh performance and functionality
IBM Storwize V7000F High-performance, highly functional, cost-effective all-flash storage Highlights Deploys all-flash performance with market-leading functionality Helps lower storage costs with data
More informationWIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS
WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to
More informationStorage Solutions for VMware: InfiniBox. White Paper
Storage Solutions for VMware: InfiniBox White Paper Abstract The integration between infrastructure and applications can drive greater flexibility and speed in helping businesses to be competitive and
More informationThe Fastest And Most Efficient Block Storage Software (SDS)
The Fastest And Most Efficient Block Storage Software (SDS) StorPool: Product Summary 1. Advanced Block-level Software Defined Storage, SDS (SDS 2.0) Fully distributed, scale-out, online changes of everything,
More informationBringing OpenStack to the Enterprise. An enterprise-class solution ensures you get the required performance, reliability, and security
Bringing OpenStack to the Enterprise An enterprise-class solution ensures you get the required performance, reliability, and security INTRODUCTION Organizations today frequently need to quickly get systems
More informationReasons to Deploy Oracle on EMC Symmetrix VMAX
Enterprises are under growing urgency to optimize the efficiency of their Oracle databases. IT decision-makers and business leaders are constantly pushing the boundaries of their infrastructures and applications
More informationMcAfee Security Management Center
Data Sheet McAfee Security Management Center Unified management for next-generation devices Key advantages: Single pane of glass across the management lifecycle for McAfee next generation devices. Scalability
More informationData Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public
Data Protection for Cisco HyperFlex with Veeam Availability Suite 1 2017 2017 Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved. Highlights Is Cisco compatible
More informationHedvig as backup target for Veeam
Hedvig as backup target for Veeam Solution Whitepaper Version 1.0 April 2018 Table of contents Executive overview... 3 Introduction... 3 Solution components... 4 Hedvig... 4 Hedvig Virtual Disk (vdisk)...
More informationWHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution
WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been
More informationHow to Protect SAP HANA Applications with the Data Protection Suite
White Paper Business Continuity How to Protect SAP HANA Applications with the Data Protection Suite As IT managers realize the benefits of in-memory database technology, they are accelerating their plans
More informationActiveScale Erasure Coding and Self Protecting Technologies
NOVEMBER 2017 ActiveScale Erasure Coding and Self Protecting Technologies BitSpread Erasure Coding and BitDynamics Data Integrity and Repair Technologies within The ActiveScale Object Storage System Software
More informationSolidFire and Ceph Architectural Comparison
The All-Flash Array Built for the Next Generation Data Center SolidFire and Ceph Architectural Comparison July 2014 Overview When comparing the architecture for Ceph and SolidFire, it is clear that both
More informationData center interconnect for the enterprise hybrid cloud
WHITEPAPER Data center interconnect for the enterprise hybrid cloud The world is moving to the cloud. Everything from entertainment and consumer mobile applications to enterprise software and government
More informationSnapCenter Software 4.0 Concepts Guide
SnapCenter Software 4.0 Concepts Guide May 2018 215-12925_D0 doccomments@netapp.com Table of Contents 3 Contents Deciding whether to use the Concepts Guide... 7 SnapCenter overview... 8 SnapCenter architecture...
More informationThe definitive guide to IBM Cloud Object Storage dispersed storage
The definitive guide to Object Storage dispersed storage Discover a cost-effective alternative to traditional storage Contents: 1 Why should I read the definitive guide to Object Storage dispersed storage?
More informationBuilding the Storage Internet. Dispersed Storage Overview March 2008
Building the Storage Internet Dispersed Storage Overview March 2008 Project Overview An Open Source Project with Commercial Backing Dispersed Storage an Open Source Project Hosted at www.cleversafe.org
More informationDELL EMC ISILON SCALE-OUT NAS PRODUCT FAMILY
DATA SHEET DELL EMC ISILON SCALE-OUT NAS PRODUCT FAMILY Unstructured data storage made simple ESSENTIALS Simple storage management designed for ease of use Massive scalability of capacity and performance
More informationCDMI Support to Object Storage in Cloud K.M. Padmavathy Wipro Technologies
CDMI Support to Object Storage in Cloud K.M. Padmavathy Wipro Technologies Abstract Object storage, a leading emerging technology is mainly intended to handle exponential growth of unstructured data. Unlike
More informationNimble Storage Adaptive Flash
Nimble Storage Adaptive Flash Read more Nimble solutions Contact Us 800-544-8877 solutions@microage.com MicroAge.com TECHNOLOGY OVERVIEW Nimble Storage Adaptive Flash Nimble Storage s Adaptive Flash platform
More informationGenomics on Cisco Metacloud + SwiftStack
Genomics on Cisco Metacloud + SwiftStack Technology is a large component of driving discovery in both research and providing timely answers for clinical treatments. Advances in genomic sequencing have
More informationCommvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY
Commvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY CONTENTS EXECUTIVE SUMMARY... 2 SOLUTION OVERVIEW... 3 USE CASES... 4 SOLUTION COMPONENTS... 5 Commvault
More informationHitachi Unified Compute Platform Pro for VMware vsphere
SOLUTION PROFILE Hitachi Unified Compute Platform Pro for VMware vsphere Accelerate Your Business-Critical Workloads to the Next-Generation Converged Infrastructure Relentless trends of increasing data
More informationDELL EMC ISILON ONEFS OPERATING SYSTEM
DATA SHEET DELL EMC ISILON ONEFS OPERATING SYSTEM Powering scale-out NAS for the unstructured data workloads of today and tomorrow ESSENTIALS Easy-to-use, single volume, single file system architecture
More informationIBM Spectrum NAS. Easy-to-manage software-defined file storage for the enterprise. Overview. Highlights
IBM Spectrum NAS Easy-to-manage software-defined file storage for the enterprise Highlights Reduce capital expenditures with storage software on commodity servers Improve efficiency by consolidating all
More informationNutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure
Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.
More informationSUSE Enterprise Storage 3
SUSE Enterprise Storage 3 Agenda Enterprise Data Storage Challenges SUSE Enterprise Storage SUSE Enterprise Storage Deployment SUSE Enterprise Storage Sample Use Cases Summary Enterprise Data Storage Challenges
More informationStorage s Pivotal Role in Microsoft Exchange Environments: The Important Benefits of SANs
Solution Profile Storage s Pivotal Role in Microsoft Exchange Environments: The Important Benefits of SANs Hitachi Data Systems Making the Optimal Storage Choice for Performance, Resiliency in Microsoft
More informationIBM N Series. Store the maximum amount of data for the lowest possible cost. Matthias Rettl Systems Engineer NetApp Austria GmbH IBM Corporation
IBM N Series Store the maximum amount of data for the lowest possible cost Matthias Rettl Systems Engineer NetApp Austria GmbH. Agenda Challenges and Concerns Increasing Efficiency - How We Do It The Net
More informationHow CloudEndure Disaster Recovery Works
How CloudEndure Disaster Recovery Works Technical White Paper How CloudEndure Disaster Recovery Works THE TECHNOLOGY BEHIND CLOUDENDURE S ENTERPRISE-GRADE DISASTER RECOVERY SOLUTION Introduction CloudEndure
More information5/24/ MVP SQL Server: Architecture since 2010 MCT since 2001 Consultant and trainer since 1992
2014-05-20 MVP SQL Server: Architecture since 2010 MCT since 2001 Consultant and trainer since 1992 @SoQooL http://blog.mssqlserver.se Mattias.Lind@Sogeti.se 1 The evolution of the Microsoft data platform
More informationDELL POWERVAULT MD FAMILY MODULAR STORAGE THE DELL POWERVAULT MD STORAGE FAMILY
DELL MD FAMILY MODULAR STORAGE THE DELL MD STORAGE FAMILY Simplifying IT The Dell PowerVault MD family can simplify IT by optimizing your data storage architecture and ensuring the availability of your
More informationSoftware Defined Storage for the Evolving Data Center
Software Defined Storage for the Evolving Data Center Petter Sveum Information Availability Solution Lead EMEA Technology Practice ATTENTION Forward-looking Statements: Any forward-looking indication of
More informationDatabase Consolidation onto Private Cloud. Piotr Kołodziej, Oracle Polska
Database Consolidation onto Private Cloud Piotr Kołodziej, Oracle Polska WHAT IS CLOUD COMPUTING? NIST Definition of Cloud Computing v15 Cloud computing is a model for enabling convenient,
More informationStorage for HPC, HPDA and Machine Learning (ML)
for HPC, HPDA and Machine Learning (ML) Frank Kraemer, IBM Systems Architect mailto:kraemerf@de.ibm.com IBM Data Management for Autonomous Driving (AD) significantly increase development efficiency by
More informationLeveraging the power of Flash to Enable IT as a Service
Leveraging the power of Flash to Enable IT as a Service Steve Knipple CTO / VP Engineering August 5, 2014 In summary Flash in the datacenter, simply put, solves numerous problems. The challenge is to use
More informationIntroducing SUSE Enterprise Storage 5
Introducing SUSE Enterprise Storage 5 1 SUSE Enterprise Storage 5 SUSE Enterprise Storage 5 is the ideal solution for Compliance, Archive, Backup and Large Data. Customers can simplify and scale the storage
More informationThe Nasuni Security Model
White Paper Nasuni enterprise file services ensures unstructured data security and privacy, enabling IT organizations to safely leverage cloud storage while meeting stringent governance and compliance
More informationDell EMC SAN Storage with Video Management Systems
Dell EMC SAN Storage with Video Management Systems Surveillance October 2018 H14824.3 Configuration Best Practices Guide Abstract The purpose of this guide is to provide configuration instructions for
More informationStorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide
TECHNICAL DEPLOYMENT GUIDE StorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneBlox, compliments Veeam to create a differentiated diskbased
More informationTurning Object. Storage into Virtual Machine Storage. White Papers
Turning Object Open vstorage is the World s fastest Distributed Block Store that spans across different Datacenter. It combines ultrahigh performance and low latency connections with a data integrity that
More informationDELL EMC ISILON ONEFS OPERATING SYSTEM
DATA SHEET DELL EMC ISILON ONEFS OPERATING SYSTEM Scale-out NAS to maximize the data capital and business value of your unstructured data ESSENTIALS Easy-to-use, single volume, single file system architecture
More informationVeeam Availability Solution for Cisco UCS: Designed for Virtualized Environments. Solution Overview Cisco Public
Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments 1 2017 2017 Cisco Cisco and/or and/or its
More informationCisco SAN Analytics and SAN Telemetry Streaming
Cisco SAN Analytics and SAN Telemetry Streaming A deeper look at enterprise storage infrastructure The enterprise storage industry is going through a historic transformation. On one end, deep adoption
More informationRED HAT GLUSTER STORAGE 3.2 MARCEL HERGAARDEN SR. SOLUTION ARCHITECT, RED HAT GLUSTER STORAGE
RED HAT GLUSTER STORAGE 3.2 MARCEL HERGAARDEN SR. SOLUTION ARCHITECT, RED HAT GLUSTER STORAGE April 2017 Disruption In The Enterprise Storage Industry PUBLIC CLOUD STORAGE TRADITIONAL APPLIANCES SOFTWARE-
More informationSECURE CLOUD BACKUP AND RECOVERY
SECURE CLOUD BACKUP AND RECOVERY Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile data protection, and
More informationVirtualizing SQL Server 2008 Using EMC VNX Series and VMware vsphere 4.1. Reference Architecture
Virtualizing SQL Server 2008 Using EMC VNX Series and VMware vsphere 4.1 Copyright 2011, 2012 EMC Corporation. All rights reserved. Published March, 2012 EMC believes the information in this publication
More informationEMC Surveillance for Edesix Body- Worn Cameras
EMC Surveillance for Edesix Body- Worn Cameras Functional Validation Guide H14820 01 Copyright 2016 EMC Corporation. All rights reserved. Published in the USA. Published February, 2016 EMC believes the
More informationThe FlashStack Data Center
SOLUTION BRIEF The FlashStack Data Center THE CHALLENGE: DATA CENTER COMPLEXITY Deploying, operating, and maintaining data center infrastructure is complex, time consuming, and costly. The result is a
More informationScality RING on Cisco UCS: Store File, Object, and OpenStack Data at Scale
Scality RING on Cisco UCS: Store File, Object, and OpenStack Data at Scale What You Will Learn Cisco and Scality provide a joint solution for storing and protecting file, object, and OpenStack data at
More informationOpenStack and Beyond Built on ProphetStor Federator
Whitepaper: OpenStack and Beyond Built on ProphetStor Federator OpenStack and Beyond Built on ProphetStor Federator AUGUST 2016 For more info, visit prophetstor.com OpenStack and Beyond Built on ProphetStor
More informationXenDesktop Planning Guide: Image Delivery
Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Planning Guide: Image Delivery ( / Machine Creation ) www.citrix.com Overview With previous versions of XenDesktop (version 4 and prior), the
More informationVxRail: Level Up with New Capabilities and Powers GLOBAL SPONSORS
VxRail: Level Up with New Capabilities and Powers GLOBAL SPONSORS VMware customers trust their infrastructure to vsan #1 Leading SDS Vendor >10,000 >100 83% vsan Customers Countries Deployed Critical Apps
More informationby Cisco Intercloud Fabric and the Cisco
Expand Your Data Search and Analysis Capability Across a Hybrid Cloud Solution Brief June 2015 Highlights Extend Your Data Center and Cloud Build a hybrid cloud from your IT resources and public and providerhosted
More informationNimble/Cisco SmartStack Integrated Infrastructure for Enterprise-class Oracle Workloads
Nimble/Cisco SmartStack Integrated Infrastructure for Enterprise-class Oracle Workloads Nimble Storage Overview 2015 NIMBLE STORAGE CONFIDENTIAL: DO NOT DISTRIBUTE 2 Redefining the Storage Market with
More information