archive-au.com » AU » T » TECHTARGET.COM.AU

Total: 919

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Tier Wars: Hardware, storage management software and document management software stake a claim for
    citing images or MP3 files as likely escapees from such applications Document management systems are also incapable of addressing documents they do not manage and do not concern themselves with other data management tasks like backup and maintenance of archives He therefore advocates storage management software as the most logical tool with which to tier as they not only offer greater coverage but also offer more efficient and secure means of data storage by leveraging technologies such as compression deduplication single instance storage and encryption McClure concludes that The best approach is to select an archiving vendor that provides integration with document management systems allowing for the data in the archive to be available on demand searchable and if relevant declared as a record into a document management system Paul Lancaster Director of Systems Engineering Symantec also has issues with document management driven tiering which he says may claim to do some tiering but ultimately this requires an organisation to make changes to business processes which can be difficult to implement However if we look at the management side from an application owner document management may be able to put in place prerequisites that are purely limited to the document management applications If document management is in charge of tiering organisations will probably have to redesign the associated applications and there would also then be a need for associated changes in the methods of data protection Lancaster instead advocates tiering at file level because the interrogation files it requires creates metadata that allows tiering to be applied to data beyond the document management system He also points out that Symantec can tier data at the moment of its creation saving the need for later classification and movement Co existence is possible But hardware vendors are also happy to co exist with other tiering players Adrian De Luca Hitachi Data Systems Director Pre Sales Solutions for Australia and New Zealand says there can be synergies doing it in both layers of the stack The advantage of implementing tiering at the software or application level means the policies for moving the data between tiers can be very sophisticated since it based on rich metadata associated with the content This is great if you want to implement an archiving policy for retention purposes However the downside is that you will need to create policies for each application which can become complex and end up being a management nightmare Storage vendors on the other hand can implement tiering at the volume block or file level which can address solve a number of other problems For example if a critical application requires more performance promoting the data volumes from tier 3 to tier 1 non disruptively can provide immediate relief Some storage technologies can move individual blocks from a volume this is particularly useful if you have any hot areas being accessed frequently to improve transaction times File servers are a perfect candidate for tiering due to the rich nature and value of the files

    Original URL path: http://searchstorage.techtarget.com.au/news/2240018911/Tier-Wars-Hardware-storage-management-software-and-document-management-software-stake-a-claim-for (2016-02-10)
    Open archived version from archive

  • Tiering debate rolls on as IBM and EMC decide if they are both great minds or indifferent fools
    year award Storage Gumbo is another player in this one along with Drunken Data XIV round XIV Debate around IBM s XIV is still going this week with GrumpyStorage and The Storage Buddhist continuing the chatter Also well and truly alive is EMC NetApp animosity this week fanned by StorageZilla s gleeful quoting of EMC reseller Dan Weis deconstruction of just how NetApp kit gets configured NetApp meanwhile makes the proud claim that it is Number Two in Canada in terms of places to work and rather well positioned on a magic quadrant The Blue Staple has also blogged about SNIA s new Cloud Storage Initiative and HDS Hu Yoshida has some SNIA love too He s saying what you re thinking GrumpyStorage also asks if vendor partner programs are any use FWIW I heard a vendor say this week that it is 100 channel before luring a customer on stage who said they go direct for all sales negotiations and support with a nominal channel partner helping out with box drops and the like proving that everyone uses a channel either until the client wants to go direct or the business is big enough that the vendor wants all the margin But I digress Pivot Point looks at Windows Guest Defragmentation and modern backup looks at protecting Exchange data Storagebod swipes at everyone for insisting that technology alone brings change he s got a point there and Preston de Guise points out why tape is still important StorageIO points out Seagate s new domiciling decision that will see it move from the Caymans to Ireland If I was an accountant I know where I d prefer to go StorageRap files from Storage Networking World sand EMC s David Spencer blogs about using Survivor as a source of leadership inspiration Lastly bid farewell to The Backup Blog from which Scott Waterhouse is signing off due to work commitments Dig Deeper on Data management processes All News Get Started Evaluate Manage Problem Solve Prepare an after action report for disaster recovery What should I consider when crafting an object storage data protection plan How can I implement a scale out architecture for my SMB Keys to a painless data migration process Load More View All Riverbed Technology debuts Riverbed Granite remote storage appliance Launchpad6 leverages AWS to build video CMS platform Record management standards improved How to improve storage resources utilisation Load More View All News Prepare an after action report for disaster recovery What should I consider when crafting an object storage data protection plan How can I implement a scale out architecture for my SMB Three considerations to ensure data storage efficiency View All Get started What should I consider when crafting an object storage data protection plan View All Evaluate Prepare an after action report for disaster recovery How can I implement a scale out architecture for my SMB Keys to a painless data migration process Three considerations to ensure data storage efficiency View All Manage Converged architecture

    Original URL path: http://searchstorage.techtarget.com.au/news/2240018913/Tiering-debate-rolls-on-as-IBM-and-EMC-decide-if-they-are-both-great-minds-or-indifferent-fools (2016-02-10)
    Open archived version from archive

  • WA Health buying more Tivoli TSM
    fully integrated into the DoH enterprise SOE and is unable to be supported by any other vendor other than IBM as the manufacturer Quite where that last sentence leaves companies other than IBM hoping to win the support contract SearchStorage ANZ does not know but whoever wins the deal will have a lot of work on their plate given this manifest of the Department s Tivoli fleet Description Quantity of licenses installed IBM Tivoli Storage Manager Extended Edition 10 Processor Value Units PVUs License SW Subscription Support expires 31 12 09 30 IBM Tivoli Storage Manager Storage Area Networks 10 Processor Value Units PVUs License SW Subscription Support expires 31 12 09 1000 IBM Tivoli Storage Manager Extended Edition 10 Processor Value Units PVUs License SW Subscription Support expires 31 12 09 2000 IBM Tivoli Storage Manager for Databases 10 Processor Value Units PVUs License SW Subscription Support expires 31 12 09 800 IBM Tivoli Enterprise Console 10 Processor Value Units PVUs License SW Subscription Support expires 31 12 09 2450 IBM Tivoli Storage Manager for Mail 10 Processor Value Units PVUs License SW Subscription Support expires 31 12 09 40 IBM Tivoli Storage Manager for Databases 10 Processor Value Units PVUs License SW Subscription Support expires 30 6 2010 638 IBM Tivoli Storage Manager Extended Edition 10 Processor Value Units PVUs License SW Subscription Support expires 30 6 2010 2876 IBM Tivoli Storage Manager for Mail 10 Processor Value Units PVUs License SW Subscription Support expires 30 6 2010 20 Source Tender DOH46209 Dig Deeper on Data management processes All News Get Started Evaluate Manage Problem Solve Prepare an after action report for disaster recovery What should I consider when crafting an object storage data protection plan How can I implement a scale out architecture for my SMB Keys to a painless data migration process Load More View All Riverbed Technology debuts Riverbed Granite remote storage appliance Launchpad6 leverages AWS to build video CMS platform Record management standards improved How to improve storage resources utilisation Load More View All News Prepare an after action report for disaster recovery What should I consider when crafting an object storage data protection plan How can I implement a scale out architecture for my SMB Three considerations to ensure data storage efficiency View All Get started What should I consider when crafting an object storage data protection plan View All Evaluate Prepare an after action report for disaster recovery How can I implement a scale out architecture for my SMB Keys to a painless data migration process Three considerations to ensure data storage efficiency View All Manage Converged architecture offerings pick up momentum with IT shops Top 10 enterprise data storage terms from SearchStorage com Eight data migration tips Zoning 101 Why zone Load More View All Problem solve ADS BY GOOGLE Latest TechTarget resources CIO AU Security AU Data Backup Disaster Recovery SMB Storage Storage Channel Search CIO com au Internet of Things Food safety apps set to emerge Food safety could

    Original URL path: http://searchstorage.techtarget.com.au/news/2240018910/WA-Health-buying-more-Tivoli-TSM (2016-02-10)
    Open archived version from archive

  • OPINION: Whatever happened to the “server room?”
    data center And if not what are the criteria that elevate some densely packed racks to data center status Another reason for our ponderings is that we constantly hear of data center products and feel it is odd to tie products to a physical space Our hypothetical closet for example is as deserving of data center technologies like virtualization as a commercial colocation facility hardened to survive events that would would cause consternation to cockroaches Facilities on that scale we feel sure definitely qualify as data centers Their massive cooling apparatuses and diesel generators are dead giveaways Yet we regularly hear the industry apply the same term to facilities of vastly smaller size even the kind of kit that fits into our hypothetival closet This makes us wonder why we don t also hear more finely graded descriptions of computing facilities There s no shame after all in operating a server room instead of a data center just as there is no shame in being a midmarket company instead of an enterprise There may however be some downside to forcing anyone with a decent collection of computers to consider themselves a data center when today s equipment can plainly survive outside their walls whatever it is they definitively enclose Dig Deeper on Data management processes All News Get Started Evaluate Manage Problem Solve Prepare an after action report for disaster recovery What should I consider when crafting an object storage data protection plan How can I implement a scale out architecture for my SMB Keys to a painless data migration process Load More View All Riverbed Technology debuts Riverbed Granite remote storage appliance Launchpad6 leverages AWS to build video CMS platform Record management standards improved How to improve storage resources utilisation Load More View All News Prepare an after action report for disaster recovery What should I consider when crafting an object storage data protection plan How can I implement a scale out architecture for my SMB Three considerations to ensure data storage efficiency View All Get started What should I consider when crafting an object storage data protection plan View All Evaluate Prepare an after action report for disaster recovery How can I implement a scale out architecture for my SMB Keys to a painless data migration process Three considerations to ensure data storage efficiency View All Manage Converged architecture offerings pick up momentum with IT shops Top 10 enterprise data storage terms from SearchStorage com Eight data migration tips Zoning 101 Why zone Load More View All Problem solve ADS BY GOOGLE Latest TechTarget resources CIO AU Security AU Data Backup Disaster Recovery SMB Storage Storage Channel Search CIO com au Internet of Things Food safety apps set to emerge Food safety could emerge as a key application for the Internet of Things in the coming months providing real time visibility in Cloud security culture a building block for today s businesses As organizations today move more data to the cloud it s important to cultivate a cloud

    Original URL path: http://searchstorage.techtarget.com.au/news/2240018912/OPINION-Whatever-happened-to-the-server-room (2016-02-10)
    Open archived version from archive

  • Tiering evolves as new technologies, services, add new tiers
    aren t adopting solid state as fast as the rhetoric would have you believe Solid state drives which are sold by companies such as STEC Inc and Texas Memory Systems Inc are hard to justify if you depend on a gigabyte capacity per dollar analysis because of the technology s high cost and low capacity Meanwhile the higher capacity but lower performing 3 5 inch SATA drives on tier 2 can hold up to 2 TB of data while 2 5 inch drives can hold up to 500 GB noted Schulz Add smarter second generation power management features on today s storage systems and it s clear that mechanical disks won t go down without a fight And the most game changing advances in the tiered storage model might be at the bottom of the pyramid where services and virtual tape libraries VTLs offer administrators more scale out options for archiving and storing little used data Jeff Boles senior analyst and director of validation services at Taneja Group said both public and private clouds show potential in the archiving tier because the cost per gigabyte of storage is very low In addition the point of entry for vendors and IT organizations is very low Public clouds offer the most savings but less control and security Private clouds put you in control but with more costs and implementation and management responsibilities Dig Deeper on Data management processes All News Get Started Evaluate Manage Problem Solve Prepare an after action report for disaster recovery What should I consider when crafting an object storage data protection plan How can I implement a scale out architecture for my SMB Keys to a painless data migration process Load More View All Riverbed Technology debuts Riverbed Granite remote storage appliance Launchpad6 leverages AWS to build video CMS platform Record management standards improved How to improve storage resources utilisation Load More View All News Prepare an after action report for disaster recovery What should I consider when crafting an object storage data protection plan How can I implement a scale out architecture for my SMB Three considerations to ensure data storage efficiency View All Get started What should I consider when crafting an object storage data protection plan View All Evaluate Prepare an after action report for disaster recovery How can I implement a scale out architecture for my SMB Keys to a painless data migration process Three considerations to ensure data storage efficiency View All Manage Converged architecture offerings pick up momentum with IT shops Top 10 enterprise data storage terms from SearchStorage com Eight data migration tips Zoning 101 Why zone Load More View All Problem solve ADS BY GOOGLE Latest TechTarget resources CIO AU Security AU Data Backup Disaster Recovery SMB Storage Storage Channel Search CIO com au Internet of Things Food safety apps set to emerge Food safety could emerge as a key application for the Internet of Things in the coming months providing real time visibility in Cloud security culture a building

    Original URL path: http://searchstorage.techtarget.com.au/news/2240021729/Tiering-evolves-as-new-technologies-services-add-new-tiers (2016-02-10)
    Open archived version from archive

  • EMC, NetApp lock horns again, as Emulex, Pillar and Xiotech enter the fray and IBM gets whacked
    of the phrase and here s Pillar s a full 11 days downstream by our count Another stoush features EMC employee Scott Waterhouse who blogs as the Backup Blog and takes on IBM in a post disputing Big Blue s scalability mantra regarding TSM And in case you missed it if TSM scales so well why is Australia s department of foreign affairs and trade ditching it for CommVault which is generally held to be a midmarket play Another swipe comes from StorageBod who compares NetApp s Data ONTAP 8 to Duke Nukem Forever a game that was delayed so often Wired had to ban it from entering its annual vapourware awards StorageBod also gets angry about overused and floppy definitions of cloud computing StorageZilla is in the same mode and it s not hard to imagine that posts like this one from NetApp s Dave Hitz and this one from Chuck Hollis are in their sights Phew Time for a break let s check a photo from Virtual Geek of the colossal Cisco unified computing rig being deployed for VMworld While we re on the show don t forget your editor will be there You ll find me lurking around the press room or anywhere near free beer Why not tweet me I m ssharwood and we can meet maybe at the VMworld party Tired of tiering The ongoing blogosphere debate about tiering shows no signs of petering out with HDS Hu Yoshida firing up again this week and Online Storage Optimzation having a go too A brace of bloggers also have a look at hard disk efficiency namely Stephen Foskett and StorageMojo There s also a couple of posts about storage and money out there Symantec s Phil Goodwin lands at Storage Nerve with a piece on taming storage budgets as Zerowait ponders if that s going to be hard given the fall of the US dollar compared to Asian currencies HP decides it s right again We ve found a new blog this week from Spectra Logic It s a bit tame so far but we re sure they ll get angry with someone eventually Someone who never gets angry however is Preston de Guise who gets namechecked by StorageZilla this week and then uncorks his usual flood of stuff most recently his explanation why backup does not suck Lastly 3Par has threatened to put yours truly in one of their surreal videos So to give you all a taste of what might happen here s its latest effort See you in San Francisco Dig Deeper on Data management processes All News Get Started Evaluate Manage Problem Solve Prepare an after action report for disaster recovery What should I consider when crafting an object storage data protection plan How can I implement a scale out architecture for my SMB Keys to a painless data migration process Load More View All Riverbed Technology debuts Riverbed Granite remote storage appliance Launchpad6 leverages AWS to build video CMS platform Record

    Original URL path: http://searchstorage.techtarget.com.au/news/2240019581/EMC-NetApp-lock-horns-again-as-Emulex-Pillar-and-Xiotech-enter-the-fray-and-IBM-gets-whacked (2016-02-10)
    Open archived version from archive

  • Alternatives to data replication
    for HP XP and EVA arrays IBM Corp Metro Mirror for synchronous replication and IBM Global Mirror for asynchronous replication NetApp SnapMirror for synchronous and asynchronous block based replication and NetApp SnapVault for file based replication Even though these replication products are similar in many aspects a close technical analysis reveals subtle differences For instance the efficiency of the handshake between primary and target storage systems used during synchronous replication greatly impacts the distance a replication product can support Metro Mirror is able to write data to the target system with a single handshake enabling it to support distances of up to 300 km said Vic Pelz consulting IT architect at IBM That distance goes well beyond the 50 km to 200 km cited by other storage vendors Differences can also be found among asynchronous replication implementations While EMC buffers data to be replicated in memory IBM Metro Mirror tracks changes with so called bitmaps continuously transmitting changes and periodically re synchronizing the source and target to ensure they stay in sync On the other hand Hitachi Data Systems uses change journals stored on disk in its Universal Replicator software The combination of disk based change journals that are pulled by the replication targets instead of pushed by the source makes it extremely resilient capable of automatically recovering from elongated disruptions said Christophe Bertrand senior director solutions and product marketing business continuity at Hitachi Data Systems Because changes are pulled by replication target arrays valuable processing cycles are offloaded from primary arrays to secondary target arrays Comparing data replication methods Type of replication Array based Host based Network based Support of heterogeneous environments Low only works between similar arrays High storage agnostic and works with network and direct attached storage High storage array and platform agnostic Performance and scalability Depends on the storage array very good in high end arrays Good workload is spread across servers limited scalability because of management challenges Very good Cost Requires similar arrays high entry cost expensive for a large number of locations No hardware required low entry cost cost rises proportionally to the number of servers Requires intelligent switches or inline appliances high entry cost expensive for a large number of locations Complexity Medium to high Low Medium to high Replication Modes Synchronous and asynchronous Asynchronous Synchronous and asynchronous Predominant Replication Type Logical unit number LUN or volume block level based File system based LUN or volume block level based Host based replication In host based replication products the replication software runs on servers so unlike array and network based replication it doesn t depend on additional hardware components That makes host based replication the least expensive and easiest replication method to deploy Deploying host based replication only requires installing the replication software on source and target servers and you are ready to go noted Bob Roudebush director of solutions engineering at Double Take Software It s well suited to work in heterogeneous environments supporting the widest range of storage options that include both network and direct attached storage While most products support Windows Linux and Unix support is more tenuous and therefore platform support is clearly one of the critical evaluation criteria when selecting a host based replication product On the downside host based replication adds processing overhead to servers and the installed replication software carries the risk of introducing unknown behavior For critical and high end application servers IT managers tend to favor array based replication over host based replication because it keeps server resources dedicated to the app and doesn t expose it to potential bugs or flaws in the replication software said Lauren Whitehouse an analyst at Milford Mass based Enterprise Strategy Group Furthermore licensing costs and system administration duties increase proportionally with the number of servers giving both array and network based replication an advantage in environments with a large number of servers In addition visibility in host based replication is typically limited to source and target servers This is very different from the centralized architectures of array and network based replication offerings that enable a more holistic view into the replication infrastructure The target markets for host based replication products are typically small to medium sized businesses SMBs that can t afford more expensive replication alternatives enabling them to deploy data protection and disaster recovery architectures that until a few years ago were only seen in larger firms CA Double Take InMage Systems Inc Neverfail and SteelEye Technology are some of the vendors that have enabled smaller companies to deploy replication based DR and data protection at a fraction of the cost of array and network based replication Although each of these products replicates data from one location to another they differ in features such as efficiency bandwidth throttling management high availability failover capabilities platform support and application integration Only a thorough product evaluation will reveal which product offers the best fit for a given environment In addition to these standalone offerings backup software vendors are integrating host based replication into their backup suites with the hope of expanding their reach into the lucrative remote and branch office data protection business We see a convergence of DR and data protection and consider replication to be a feature and not a standalone product said Marty Ward senior director product marketing for the Data Protection Group at Symantec Most backup software vendors are already offering host based data replication options for their backup suites some examples include BakBone Software Inc s NetVault Real Time Data Protector CommVault Continuous Data Replicator CDR EMC RepliStor to complement EMC NetWorker Symantec Backup Exec Continuous Protection Server CPS and Symantec NetBackup PureDisk with a deduplication option as both a standalone product and a NetBackup option The main advantage of combining traditional backups and replication is the ability to manage replicas and backups within a single tool Aside from their host based replication options backup software vendors have been working on integrating their backup suites with leading storage arrays and network based replication products to

    Original URL path: http://searchstorage.techtarget.com.au/news/2240020858/Alternatives-to-data-replication (2016-02-10)
    Open archived version from archive

  • Zoning, part 1: An overview of zoning
    hack into your files on your corporate systems To prevent someone from doing this you have access control lists on the files in the file systems On the shares you have firewalls security gateways packet filtering etc Each of these elements does a complementary and slightly different job in protecting your data How exactly does zoning work I have answered the question in its broadest sense Now to be a bit more technically precise In very simple terms when a node comes up and connects to a fabric the first really useful thing it does is a fabric logon This is how the device gets its 24 bit address which will be used for routing in the fabric SID or DID usually refer to a source address or destination address of this form The device already has its World Wide Name or several as each port on a node or device will have a unique port WWN usually programmed in hardware There is also a node WWN that identifies the node or device and should show up the same on each port The next step occurs when a device logs on to the name server service in the SAN and registers itself The SAN builds up a database of all the devices in the fabric using a mapping of the node and port WWNs to the 24 bit address as well as the capabilities of each device This includes whether the device in is an FCP device one that talks SCSI commands over Fibre Channel Finally a server will ask the name server to send back a list of what other FCP devices it can see in the fabric This is where zoning kicks in The name server only returns a list of those FCP devices that are in the same zone or a common zone In other words I only find out about the devices I am supposed to know about The server therefore has a list of the 24 bit addresses of all the devices it is supposed to be able to see It will then typically do a port logon to each one in turn to try and find out what sort of FCP SCSI device it is This is similar to normal SCSI where the SCSI controller server does a scan of the bus and queries the properties of each device it can see on the bus That in a nutshell is zoning About the author Simon Gordon is a senior solution architect for McDATA based in the UK Simon has been working as a European expert in storage networking technology for more than 5 years He specializes in distance solutions and business continuity Simon has been working in the IT industry for more than 20 years in a variety or technologies and business sectors including software development systems integration Unix and open systems Microsoft infrastructure design as well as storage networking He is also a contributor to and presenter for the SNIA IP Storage Forum

    Original URL path: http://searchstorage.techtarget.com.au/tip/Zoning-part-1-An-overview-of-zoning (2016-02-10)
    Open archived version from archive



  •