Tackling the Big Data Deluge in Science with Metadata

Size: px
Start display at page:

Download "Tackling the Big Data Deluge in Science with Metadata"

Transcription

1 Tackling the Big Data Deluge in Science with Metadata The term Big Data has become virtually synonymous with schema on read (where data is applied to a plan or schema as it is ingested or pulled out of a stored location) unstructured data analysis and handling techniques like Hadoop. These schema on read techniques have been most famously exploited on relatively ephemeral human-readable data like retail trends, twitter sentiment, social network mining, log files, etc. But what if you have unstructured data that, on its own, is hugely valuable, enduring, and created at great expense? Data that may not immediately be human readable or indexable on search? Exactly the kind of data most commonly created and analyzed in science and HPC. Research institutions are awash with such data from large-scale experiments and extreme-scale computing that is used for highconsequence applications. As the recent DOE High Performance Computing Operational Review noted: The value and cost of data relative to computation is growing and, with it, a recognition that concerns such as reproducibility, provenance, curation, unique referencing, and future availability are going to become the rule rather than the exception in scientific communities. Schema on write (where data is mapped to a plan or schema when it is written) metadata centric data analysis and handling techniques are critical to meeting research goals of ensuring data consistency and trustworthiness along with being the only techniques capable of meeting these scientific concerns of data identification, access, reproducibility, provenance, curation, unique referencing, and future data availability. In fact, a case can be made that metadata-based techniques are the most valuable Big Data analysis and handling techniques in scientific computing and HPC. Increased sensor resolution from more and more sequencers, cameras, microscopes, telescopes, scanners and instruments of all types are driving a deluge in scientific data. And while today s high capacity scale-out file and object storage systems can accommodate the sheer volume of data produced, they can t help identify what data is valuable or how to move and process that data through a global workflow, sharing it securely with geographically dispersed collaborators. Or how to make sure that data is authentic and unaltered. Reducing the cost of storing increasingly immense datasets is paramount. Cost effectively managing and ensuring continued access to valuable data, is critical to driving results and new discovery. The alternative is that important scientific data becomes effectively lost forever, even as more and more data is being stored. 1 DOE High Performance Computing Operational Review (HPCOR) Enabling Data-Driven Scientific Discovery at DOE HPC Facilities,

2 Metadata is the Key Metadata is the key to keeping track of all this unstructured scientific data. Metadata is data about data. In the case of scientific data, metadata is structured data (written in a prescribed schema or order) that describes what the data is, how it was derived, and where it is located. Metadata makes scientific data easy to find, track, share, move and manage at low cost. Unfortunately, today s high capacity storage systems only provide bare bones system metadata consisting of as little as file name, owner and creation/access timestamps. Data intensive scientific workflows need supplemental enhanced metadata, along with access rights and security safeguards. Workflow constituents can then find and access valuable data by querying such extensive metadata. With the increasing data deluge across all scientific domains, rich workflow specific metadata is essential to enable collaborators to find and share valuable data crucial to their endeavors. Key Benefits of Metadata in Scientific Computing Eliminate Data Junkyards Keep track of, and never lose, valuable data Access and manage data on any storage device, anywhere in the world Orchestrate global data intensive workflows, achieving faster time to results Maintain data provenance, audit, security, and access control Reduce storage costs Metadata can now be easily exploited in a wide range of scientific data intensive workflows in life sciences, government, energy exploration and media & entertainment with the metadata creation and management facilities of the broadly deployable General Atomics Nirvana Metadata Centric Intelligent Storage System. Nirvana is a software product that works with existing storage systems and is developed by the General Atomics Magnetic Fusion Energy and Advanced Concepts group in San Diego, California from a joint effort with the San Diego Supercomputing Center s Storage Resource Broker (SRB). Without an application-specific metadata management system like Nirvana, researchers will likely spend most of their time just looking for data, instead of exploiting that data to accelerate discovery. Eliminating Data Junkyards Today s high capacity scale out file (GPFS, Lustre, Isilon) and object (Cleversafe, WOS, Amplidata) storage systems make it easy to store tremendous quantities of data. As a result, many organizations are accumulating Data Junkyards consisting of tens of millions of files from hundreds of past and present users accumulating for years with no way of identifying their technical or business value. And because there is no detailed description of what the data consists of, organizations are afraid to remove any of it. And as capacity is exhausted the only solution seems to be repeatedly purchase additional storage. This is shown in the figure on the next page. Look familiar? Tackling the Big Data Deluge in Science with Metadata 2

3 Reducing storage costs by removing data that s no longer needed with Nirvana Perhaps not too surprisingly, storage vendors provide no tools to evaluate what is being stored, and analyzing the Data Junkyard by hand is hopeless. Running scanning scripts over millions of files can take days and slows the production file system. But what if you had a tool that could extract a simple inventory of the Data Junkyard in to a separate database explicitly designed for fast query and analysis? Using existing storage system metadata, General Atomics Nirvana can inventory Data Junkyards, characterizing the data according to size, owner, when last accessed, etc. Nirvana exposes what types of files are being stored and usage trends, by file type and user. Nirvana shows how much storage is consumed by duplicate, temporary or improper files types. With this information, administrators and managers can decide what data to keep, move or even delete. How it Works Nirvana is a metadata management and file tracking system that inventories the Data Junkyard using a relational database explicitly designed for fast query and analysis. Nirvana performs background scans on Data Junkyard file systems and records its findings in the Nirvana Metadata Catalog. Administrators can quickly formulate and execute queries and reports over the entire catalog with no performance impact on the production file system. Nirvana identifies what data is valuable and reduces the cost of storing data, by keeping only what is needed. How many files are there? Who owns how many of what types of files? How old are they? When was the last time they were used? Nirvana builds up information to answer those questions and more, and provides information to justify data retention policies and provides continuing analysis of storage consumption. Tackling the Big Data Deluge in Science with Metadata 3

4 With Nirvana s reports, retention policies can be formulated and applied across all users. Files that are important to keep, but not current, can be moved off to lower cost storage, violations of storage policy can be detected, and terabytes of unused and unwanted data can be cleaned away. The need to buy additional expensive storage, because you do not know what else to do, is no longer necessary. General Atomics Fusion Research stores key research data on expensive, enterprise class storage. Data growth necessitated the purchase of even more expensive storage. Nirvana was used to characterize the data stored and found that 65% of data stored wasn t accessed for years, multiple copies of the same data were found and one user generated over 80% of the files, limiting storage system performance. With this analysis in hand, superfluous data was removed, eliminating the need to buy more storage. Keeping Track of Valuable Data Like a needle in a haystack, high value data stored in large scale storage systems can be effectively lost over time losing its value forever. Nirvana prevents this by creating and exploiting detailed, additional, application-specific metadata about data valuable to all stakeholders. Data can be discovered and accessed through an object s attributes such as creation date, size, frequency of access, author, keywords, projects, devices and more. With Nirvana, valuable information can be found and analyzed even if it resides on very different, incompatible, platforms anywhere in the world. Nirvana can execute complex queries for quick and simple data discovery and also generate summary reports characterizing large data collections. The following figure illustrates standard storage file system metadata and example application-specific (in this case, genome sequencing) metadata added with Nirvana. Nirvana example comprehensive application-specific (genomics) metadata Tackling the Big Data Deluge in Science with Metadata 4

5 Orchestrating Global Data Intensive Workflows; Access and Manage Data on any Storage Device, Anywhere in the World With collaborative scientific research done on a global scale, today s data intensive workflows are geographically dispersed, spanning multiple storage tiers across many vendor s storage devices over multiple administrative domains among different organizations. By presenting a single global namespace across any storage device, anywhere in the world, Nirvana allows data to be easily and securely shared among globally distributed teams. Nirvana also automatically moves data to various workflow resources, based on policies, so data is always available at the right place, at the right time, and at the right cost while keeping an audit trail as data is ingested, transformed, accessed, and archived through its complete lifecycle. Nirvana can also create multiple copies of the data to be stored at multiple locations for extra data protection and disaster recovery. Nirvana global workflow orchestration is showing in the following figure. Nirvana orchestrates global data intensive workflows Tackling the Big Data Deluge in Science with Metadata 5

6 Data Provenance Provenance (from the French provenir, "to come from"), is the chronology of the ownership, custody or location of a historical object in order to verify its authenticity. In the context of electronic data, provenance is the information on how data was created, accessed and processed throughout its processing pipeline and workflow. In many fields, data sets are useless without knowing the exact provenance and processing pipeline used to produce derived results. Nirvana tracks data within workflows, through all transformations, analyses, and interpretations, ensuring data authenticity. With Nirvana, data is optimally managed, shared, and reused with verified provenance of the data and the conditions under which it was generated so results are reproducible and analyzable for defects. An example of how provenance is used in genomics research 2 is shown in the figure below. The provenance of the genomics data produced is a record of all the hardware components (sequencer, computers) and software (including version) used in the processing pipeline (base conversion, alignment, pre-processing and variant analysis) to create the final data product. Provenance is essentially like hitting the record button during the process, so derived results can be authenticated and reproduced as needed. Provenance metadata is stored in the Nirvana Metadata Catalog (MCAT) so it can be queried and validated. Genomics sequencing processing and data provenance metadata 2 IBM Reference Architecture for Genomics Brings Power to Research, Frank Lee, Ph.D., IBM Systems Magazine, August 2014, Tackling the Big Data Deluge in Science with Metadata 6

7 Audit, Security, and Access Control Nirvana can audit every transaction within a workflow with automated metadata capture and amendment. An audit trail can contain information such as date of transaction, success or error code, user performing transaction, type of transaction, and notes. Audit trails, like everything else with Nirvana, can be easily queried and filtered. Nirvana maintains multiple authentication mechanisms for access to data and metadata. Nirvana creates access control lists for every user-level metadata attribute, ensuring a high level of security. Single-sign-on and access through one common set of APIs, LDAP or Active Directory provide for complete access transparency. Data can only be viewed and modified by users authorized to do so. Nirvana enforces authentication to protect data through Challenge Response Mechanism, Grid Security Infrastructure - GSI, and Kerberos. Support is also built in for data encryption through GSI and Kerberos. Reducing Storage Costs Nirvana restrains the cost of data growth four ways: Nirvana helps prevent worthless data from entering the workflow and being stored. Nirvana migrates data to lower cost storage tiers using workflow policies, not just file policies. Nirvana removes data that s no longer valuable. Nirvana consolidates and automates complete data lifecycle management. The best way to avoid unwanted data to accumulate is to prevent its introduction into the workflow in the first place. Nirvana can help make sure data ingested is valuable and usable by utilizing metadata information about instrument conditions, configuration, data quality, error rates and missing elements to decide whether to store ingested data. Nirvana also reduces storage costs by orchestrating the migration of data to lower cost storage from multiple vendors with automated data life cycle management incorporating detailed workflow policies, not just file policies, for data migration, retention and disposal. For example, data associated with a specific project or person that hasn t been accessed in a year could be migrated, or even deleted. Nirvana can consolidate and lower management costs by migrating data from multiple distributed locations to one central archive storage system. Data can be analyzed and managed, no matter where it s located. Backup or migration from a local administrative domain can be done centrally, enterprisewide with Nirvana. And all this happens behind the scenes, transparent to users and applications. Tackling the Big Data Deluge in Science with Metadata 7

8 Nirvana Components Show in the figure below, the heart of Nirvana is the Metadata Catalog (MCAT) which implements the Global Namespace and maps data objects to Storage Resources. MCAT metadata is stored in a relational database such as Postgres or Oracle to support fast, efficient queries. A Storage Resource is any File or Object Storage System, located anywhere in the world. Location Agents directly access Storage Resources. The Nirvana Client allows the user to interact with the MCAT and Location Agents via Browser GUI, Java, Python or custom SDK. Files can also be viewed and accessed as familiar Windows and Linux folders and files through Nirvana. Nirvana can linearly scale Storage Resources horizontally. Multiple MCATS can be deployed to ensure uninterrupted operation and disaster recovery. Nirvana components A Comprehensive, Affordable, Easily Deployed, Fully Supported Solution General Atomics developed Nirvana in a joint effort with the San Diego Supercomputing Center leveraging successful methods proven in data intensive multinational Big Science research. Nirvana responds to the needs of researchers in collaborative projects to share access to data on remote heterogeneous storage systems as part of a global workflow. Nirvana is a comprehensive, easily deployed solution with enhanced metadata capabilities, bolstering advanced data discovery. Nirvana is tuned for performance and scalability focusing on secure operation, ease of use, ease of administration, and reliability. Nirvana is fully supported, ensuring our customer s success. Tackling the Big Data Deluge in Science with Metadata 8

9 About General Atomics General Atomics ( GA ) and its affiliated companies constitute one of the world's leading resources for high-technology systems ranging from electromagnetic systems, remotely operated surveillance aircraft, airborne sensors, and advanced electronic, wireless and laser technologies. GA carries out the largest and most successful nuclear fusion program in private industry. For More Information Phone: info@nirvanastorage.com Tackling the Big Data Deluge in Science with Metadata 9

10 Technical Data Nirvana is a distributed application - the multiple software components (daemon services and userlaunched clients) communicate across network connections within or between computer hosts to implement and coordinate Nirvana functions. Each of the component types has a supported set of host environments (operating system and processor hardware) on which they can be installed and operate. The Nirvana clients interact with the user via GUI or command line and with their host s filesystems to send client host data to an Agent, receive data from an Agent and write it locally to the client host, and for local logging. The Nirvana Agents interact with their host s filesystems for logging and typically use some portion as Nirvana Storage Resources, and interact with data-stores external to their host such as object store systems and relational databases and even remote from their host such as SFTP sites and Amazon S3. The Nirvana Metadata Catalog program utilizes a back-end database consisting of a standard relational database. Since the database can run on a separate server from the Metadata Catalog, its host environment is not important to Nirvana. Nirvana Key Features Product Delivery Metadata Authentication Encryption Data Protection SDK Scale Cloud Support Comprehensive, supported, commercial solution Expansive workflow specific user defined, entire database row can be assigned to an object, allowing for simple, faster queries, and far more effective for provenance, access control and auditing than simple key, value pair LDAP, AD, Challenge Response Mechanism, Grid Security Infrastructure - GSI, Kerberos GSI, Kerberos Multiple geographically dispersed replicas C, C++, Java,.NET, Python Up to 500 million data objects and beyond Nirvana supports S3 and runs on AWS; Nirvana Global Namespace connects private storage, private clouds, and public clouds into a single searchable entity Nirvana Daemon Component Metadata Catalog Program Database Client Library for MCAT Storage, ILM and Metadata Agents Supported Environment Element Linux: RHEL 6+, CentOS 6+, SLES 11 SP3+ PostgreSQL 9.2+, MySQL 5.5+, Oracle 11g Linux: RHEL 6+, CentOS 6+, SLES 11 SP3+ Windows Server Processor Hardware x86_64, x86_64, (PostgreSQL) x86_64, For daemon components only 64-bit versions are supported. Other operating systems and processor support is available on request. Minimum recommended enterprise-scale entry MCAT server hardware is 2 sockets and 64GB of RAM. Minimum recommended enterprise-scale entry database server hardware is 2 sockets and 128GB RAM. Tackling the Big Data Deluge in Science with Metadata 10

11 Nirvana Client Supported Environment Element Processor Hardware Vdisk for Windows Windows client 7+ x86 Windows Server 2008+, Windows client 7+ x86_64 Windows Gateway Windows client 7+ x86 Windows Server 2008+, Windows client 7+ x86_64 Windows CLI Windows client 7+ x86 Command Line Linux: RHEL 6+, CentOS 6+, SLES 11 SP3+ x86 Linux: RHEL 6+, CentOS 6+, SLES 11 SP3+ MacOS X x86_64, FUSE for Linux Linux: RHEL 6+, CentOS 6+, SLES 11 SP3+ x86_64 Grid Gateway (server Linux: RHEL 6+, CentOS 6+, SLES 11 SP3+ x86_64 side emulation) Globus Tookit v Internet (WebDAV) Gateway Linux: RHEL 6+, CentOS 6+, SLES 11 SP3+ Apache Web Server v x86_64, Java User and Admin Java JRE bit N/A Web server CGI module Linux: RHEL 6+, CentOS 6+, SLES 11 SP3+ Apache Web Server v x86_64, Nirvana SDK C on Linux: RHEL 6+, CentOS 6+, SLES 11 SP3+ x86_64, Java JRE bit N/A C# Microsoft.NET v3+ x86 C# Microsoft.NET v3+ x86_64 Additional clients, operating systems, processor hardware, and 32/64-bit versions on request. Nirvana contains a driver framework for adapting internally standardized data-store operations to the specific function interfaces and behaviors offered by a variety of physical data-stores. Storage Resources Local Host Filesystems Network Share Mounts Cluster Filesystems URL-addressed Resources RDBMS table data RDBMS large object data Hierarchical Storage Management Filesystems Object Stores POSIX and POSIX-similar, NTFS Any network share mount and protocol presenting as a local filesystem: NFS, GPFS, Panasas PanFS, CIFS Aggregate logical construct available to understand multi-node access to the same filesystem and file objects Remote resources addressable using the URL <protocol>:// convention, including FTP, FTPS, SFTP, HTTP, HTTPS, AWS S3 SQL-accessible table data for supported database products SQL-accessible large object data for supported database products Nirvana offers deep integration with Oracle SAM-FS SGI Data Migration Facility 5.3+ DDN Web Object Scaler Other resources are available on request. Tackling the Big Data Deluge in Science with Metadata 11

12 Networking Network Services Use Network Time Built-in Authentication Mechanisms for User Identity External Authentication Mechanisms Authorization Mechanisms for Users and Groups Nirvana components and clients default to TCP/IP v4 port 5625, support IPv6, and are clients of DNS All computers hosting Nirvana programs must have low system clock skew to avoid various timestamp anomalies and possible authentication system dysfunction Encrypted challenge-response (password), Grid Security Infrastructure, Kerberos v5 (RFC 4120) Credentials are collected from a user and passed to host mechanisms such as MS AD, LDAP, PAM and NIS for pass/fail validation Inheritable and object specific Discretionary Access Control and Access Control Lists (user controlled); Mandatory Access Control (user cannot override) configured by administrator; Limited-use tickets (in count and/or time) for specific object access Tackling the Big Data Deluge in Science with Metadata 12

Technical. Overview. ~ a ~ irods version 4.x

Technical. Overview. ~ a ~ irods version 4.x Technical Overview ~ a ~ irods version 4.x The integrated Ru e-oriented DATA System irods is open-source, data management software that lets users: access, manage, and share data across any type or number

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data

More information

Geospatial Data and Storage Resource Broker Online GIS Integration in ESRI Environments with SRB MapServer and Centera.

Geospatial Data and Storage Resource Broker Online GIS Integration in ESRI Environments with SRB MapServer and Centera. Geospatial Data and Storage Resource Broker Online GIS Integration in ESRI Environments with SRB MapServer and Centera White Paper 2 Geospatial Data Access and Management, The SRB MapServer Table of Contents

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443

More information

T a c k l i ng Big Data w i th High-Performance

T a c k l i ng Big Data w i th High-Performance Worldwide Headquarters: 211 North Union Street, Suite 105, Alexandria, VA 22314, USA P.571.296.8060 F.508.988.7881 www.idc-gi.com T a c k l i ng Big Data w i th High-Performance Computing W H I T E P A

More information

ACE Management Server Deployment Guide VMware ACE 2.0

ACE Management Server Deployment Guide VMware ACE 2.0 Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.

More information

Xythos WebFile Server Architecture A Technical Guide to the Core Technology, Components, and Design of the Xythos WebFile Server Platform

Xythos WebFile Server Architecture A Technical Guide to the Core Technology, Components, and Design of the Xythos WebFile Server Platform Xythos WebFile Server Architecture A Technical Guide to the Core Technology, Components, and Design of the Xythos WebFile Server Platform Copyright Xythos Software, Inc. 2006 All Rights Reserved TABLE

More information

WOS Cloud. ddn.com. Personal Storage for the Enterprise. DDN Solution Brief

WOS Cloud. ddn.com. Personal Storage for the Enterprise. DDN Solution Brief DDN Solution Brief Personal Storage for the Enterprise WOS Cloud Secure, Shared Drop-in File Access for Enterprise Users, Anytime and Anywhere 2011 DataDirect Networks. All Rights Reserved DDN WOS Cloud

More information

Diagram 1: Islands of storage across a digital broadcast workflow

Diagram 1: Islands of storage across a digital broadcast workflow XOR MEDIA CLOUD AQUA Big Data and Traditional Storage The era of big data imposes new challenges on the storage technology industry. As companies accumulate massive amounts of data from video, sound, database,

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets

The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets!! Large data collections appear in many scientific domains like climate studies.!! Users and

More information

IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM

IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM Note: Before you use this

More information

(Scale Out NAS System)

(Scale Out NAS System) For Unlimited Capacity & Performance Clustered NAS System (Scale Out NAS System) Copyright 2010 by Netclips, Ltd. All rights reserved -0- 1 2 3 4 5 NAS Storage Trend Scale-Out NAS Solution Scaleway Advantages

More information

NetIQ Identity Manager Setup Guide

NetIQ Identity Manager Setup Guide NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

File Management Suite. Novell. Intelligently Manage File Storage for Maximum Business Benefit. Sophia Germanides Sophia.germanides@novell.

File Management Suite. Novell. Intelligently Manage File Storage for Maximum Business Benefit. Sophia Germanides Sophia.germanides@novell. File Management Suite Novell Intelligently Manage File Storage for Maximum Business Benefit Sophia Germanides Sophia.germanides@novell.com David Condrey dcondrey@novell.comcom Agenda Customer Challenges

More information

Data Management using irods

Data Management using irods Data Management using irods Fundamentals of Data Management September 2014 Albert Heyrovsky Applications Developer, EPCC a.heyrovsky@epcc.ed.ac.uk 2 Course outline Why talk about irods? What is irods?

More information

XpoLog Center Suite Data Sheet

XpoLog Center Suite Data Sheet XpoLog Center Suite Data Sheet General XpoLog is a data analysis and management platform for Applications IT data. Business applications rely on a dynamic heterogeneous applications infrastructure, such

More information

Cisco Data Preparation

Cisco Data Preparation Data Sheet Cisco Data Preparation Unleash your business analysts to develop the insights that drive better business outcomes, sooner, from all your data. As self-service business intelligence (BI) and

More information

Integration with Active Directory. Jeremy Allison Samba Team

Integration with Active Directory. Jeremy Allison Samba Team Integration with Active Directory Jeremy Allison Samba Team Benefits of using Active Directory Unlike the earlier Microsoft Windows NT 4.x Domain directory service which used proprietary DCE/RPC calls,

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

WHITEPAPER. A Technical Perspective on the Talena Data Availability Management Solution

WHITEPAPER. A Technical Perspective on the Talena Data Availability Management Solution WHITEPAPER A Technical Perspective on the Talena Data Availability Management Solution BIG DATA TECHNOLOGY LANDSCAPE Over the past decade, the emergence of social media, mobile, and cloud technologies

More information

Globus Research Data Management: Introduction and Service Overview. Steve Tuecke Vas Vasiliadis

Globus Research Data Management: Introduction and Service Overview. Steve Tuecke Vas Vasiliadis Globus Research Data Management: Introduction and Service Overview Steve Tuecke Vas Vasiliadis Presentations and other useful information available at globus.org/events/xsede15/tutorial 2 Thank you to

More information

In ediscovery and Litigation Support Repositories MPeterson, June 2009

In ediscovery and Litigation Support Repositories MPeterson, June 2009 XAM PRESENTATION (extensible TITLE Access GOES Method) HERE In ediscovery and Litigation Support Repositories MPeterson, June 2009 Contents XAM Introduction XAM Value Propositions XAM Use Cases Digital

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Data Management in an International Data Grid Project. Timur Chabuk 04/09/2007

Data Management in an International Data Grid Project. Timur Chabuk 04/09/2007 Data Management in an International Data Grid Project Timur Chabuk 04/09/2007 Intro LHC opened in 2005 several Petabytes of data per year data created at CERN distributed to Regional Centers all over the

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

InstaFile. Complete Document management System

InstaFile. Complete Document management System InstaFile Complete Document management System Index : About InstaFile 1.1 What is InstaFile 1.2 How does it work 1.3 Where you can use InstaFile 1.4 Why only InstaFile InstaFile features and benefits Start

More information

<Insert Picture Here> Oracle Secure Backup 10.3 Secure Your Data, Protect Your Budget

<Insert Picture Here> Oracle Secure Backup 10.3 Secure Your Data, Protect Your Budget Oracle Secure Backup 10.3 Secure Your Data, Protect Your Budget Program Agenda Oracle Secure Backup Overview What s New in Oracle Secure Backup 10.3 Ease of Management Data Protection:

More information

Introduction to NetApp Infinite Volume

Introduction to NetApp Infinite Volume Technical Report Introduction to NetApp Infinite Volume Sandra Moulton, Reena Gupta, NetApp April 2013 TR-4037 Summary This document provides an overview of NetApp Infinite Volume, a new innovation in

More information

SCALABLE FILE SHARING AND DATA MANAGEMENT FOR INTERNET OF THINGS

SCALABLE FILE SHARING AND DATA MANAGEMENT FOR INTERNET OF THINGS Sean Lee Solution Architect, SDI, IBM Systems SCALABLE FILE SHARING AND DATA MANAGEMENT FOR INTERNET OF THINGS Agenda Converging Technology Forces New Generation Applications Data Management Challenges

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 INSTALLATION GUIDE Table Of Contents 1. Installation Overview... 1 If you are upgrading... 1 Installation Choices... 1 ZENworks

More information

EMC arhiviranje. Lilijana Pelko Primož Golob. Sarajevo, 16.10.2008. Copyright 2008 EMC Corporation. All rights reserved.

EMC arhiviranje. Lilijana Pelko Primož Golob. Sarajevo, 16.10.2008. Copyright 2008 EMC Corporation. All rights reserved. EMC arhiviranje Lilijana Pelko Primož Golob Sarajevo, 16.10.2008 1 Agenda EMC Today Reasons to archive EMC Centera EMC EmailXtender EMC DiskXtender Use cases 2 EMC Strategic Acquisitions: Strengthen and

More information

CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION

CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION 1 E N D U R A D A T A EDpCloud: A File Synchronization, Data Replication and Wide Area Data Distribution Solution CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION 2 Resilient

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

Server & Application Monitor

Server & Application Monitor Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich

More information

Storage Made Easy Enterprise File Share and Sync (EFSS) Cloud Control Gateway Architecture

Storage Made Easy Enterprise File Share and Sync (EFSS) Cloud Control Gateway Architecture Storage Made Easy Enterprise File Share and Sync (EFSS) Architecture Software Stack The SME platform is built using open Internet technologies. The base operating system used s hardened Linux CentOS. HTTPD

More information

Installing and Administering VMware vsphere Update Manager

Installing and Administering VMware vsphere Update Manager Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

<Insert Picture Here> Solution Direction for Long-Term Archive

<Insert Picture Here> Solution Direction for Long-Term Archive 1 Solution Direction for Long-Term Archive Donna Harland Oracle Optimized Solutions: Solutions Architect Program Agenda Archive Layers SAM QFS connectivity for

More information

Archiving, Indexing and Accessing Web Materials: Solutions for large amounts of data

Archiving, Indexing and Accessing Web Materials: Solutions for large amounts of data Archiving, Indexing and Accessing Web Materials: Solutions for large amounts of data David Minor 1, Reagan Moore 2, Bing Zhu, Charles Cowart 4 1. (88)4-104 minor@sdsc.edu San Diego Supercomputer Center

More information

Archiving Microsoft Office SharePoint Server 2007 Data with the Hitachi Content Platform and Hitachi Data Discovery for Microsoft SharePoint

Archiving Microsoft Office SharePoint Server 2007 Data with the Hitachi Content Platform and Hitachi Data Discovery for Microsoft SharePoint Archiving Microsoft Office SharePoint Server 2007 Data with the Hitachi Content Platform and Hitachi Data Discovery for Microsoft SharePoint Implementation Guide By Art LaMountain and Ken Ewers December

More information

EMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst

EMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst White Paper EMC s Enterprise Hadoop Solution Isilon Scale-out NAS and Greenplum HD By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst February 2012 This ESG White Paper was commissioned

More information

File Services. File Services at a Glance

File Services. File Services at a Glance File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

UNINETT Sigma2 AS: architecture and functionality of the future national data infrastructure

UNINETT Sigma2 AS: architecture and functionality of the future national data infrastructure UNINETT Sigma2 AS: architecture and functionality of the future national data infrastructure Authors: A O Jaunsen, G S Dahiya, H A Eide, E Midttun Date: Dec 15, 2015 Summary Uninett Sigma2 provides High

More information

Actifio Big Data Director. Virtual Data Pipeline for Unstructured Data

Actifio Big Data Director. Virtual Data Pipeline for Unstructured Data Actifio Big Data Director Virtual Data Pipeline for Unstructured Data Contact Actifio Support As an Actifio customer, you can get support for all Actifio products through the Support Portal at http://support.actifio.com/.

More information

Architecture and Mode of Operation

Architecture and Mode of Operation Software- und Organisations-Service Open Source Scheduler Architecture and Mode of Operation Software- und Organisations-Service GmbH www.sos-berlin.com Scheduler worldwide Open Source Users and Commercial

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

Introduction to Arvados. A Curoverse White Paper

Introduction to Arvados. A Curoverse White Paper Introduction to Arvados A Curoverse White Paper Contents Arvados in a Nutshell... 4 Why Teams Choose Arvados... 4 The Technical Architecture... 6 System Capabilities... 7 Commitment to Open Source... 12

More information

Scale-out NAS Unifies the Technical Enterprise

Scale-out NAS Unifies the Technical Enterprise Scale-out NAS Unifies the Technical Enterprise Panasas Inc. White Paper July 2010 Executive Summary Tremendous effort has been made by IT organizations, and their providers, to make enterprise storage

More information

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2 JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide

More information

A value-added service and solutions company focused on media-optimized, data storage-intensive workflows. SAN Scale-Out NAS Data Protection

A value-added service and solutions company focused on media-optimized, data storage-intensive workflows. SAN Scale-Out NAS Data Protection A value-added service and solutions company focused on media-optimized, data storage-intensive workflows SAN Scale-Out NAS Data Protection Our Value Value-added Services Converged Storage Network Data

More information

Document Capture and Distribution

Document Capture and Distribution Document Capture and Distribution WHITE PAPER SmarThru TM Workflow 2 Document Capture and Distribution Introduction This white paper describes the design and the features used by the Samsung SmarThru TM

More information

XenData Archive Series Software Technical Overview

XenData Archive Series Software Technical Overview XenData White Paper XenData Archive Series Software Technical Overview Advanced and Video Editions, Version 4.0 December 2006 XenData Archive Series software manages digital assets on data tape and magnetic

More information

UPSTREAM for Linux on System z

UPSTREAM for Linux on System z PRODUCT SHEET UPSTREAM for Linux on System z UPSTREAM for Linux on System z UPSTREAM for Linux on System z is designed to provide comprehensive data protection for your Linux on System z environment, leveraging

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

Geospatial Imaging Cloud Storage Capturing the World at Scale with WOS TM. ddn.com. DDN Whitepaper. 2011 DataDirect Networks. All Rights Reserved.

Geospatial Imaging Cloud Storage Capturing the World at Scale with WOS TM. ddn.com. DDN Whitepaper. 2011 DataDirect Networks. All Rights Reserved. DDN Whitepaper Geospatial Imaging Cloud Storage Capturing the World at Scale with WOS TM Table of Contents Growth and Complexity Challenges for Geospatial Imaging 3 New Solutions to Drive Insight, Simplicity

More information

Implementing Network Attached Storage. Ken Fallon Bill Bullers Impactdata

Implementing Network Attached Storage. Ken Fallon Bill Bullers Impactdata Implementing Network Attached Storage Ken Fallon Bill Bullers Impactdata Abstract The Network Peripheral Adapter (NPA) is an intelligent controller and optimized file server that enables network-attached

More information

Dell One Identity Manager Scalability and Performance

Dell One Identity Manager Scalability and Performance Dell One Identity Manager Scalability and Performance Scale up and out to ensure simple, effective governance for users. Abstract For years, organizations have had to be able to support user communities

More information

How To Secure Your Data Center From Hackers

How To Secure Your Data Center From Hackers Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

automates system administration for homogeneous and heterogeneous networks

automates system administration for homogeneous and heterogeneous networks IT SERVICES SOLUTIONS SOFTWARE IT Services CONSULTING Operational Concepts Security Solutions Linux Cluster Computing automates system administration for homogeneous and heterogeneous networks System Management

More information

Designing a Windows Server 2008 Applications Infrastructure

Designing a Windows Server 2008 Applications Infrastructure Designing a Windows Server 2008 Applications Infrastructure Course Number: 6437A Course Length: 3 Days Course Overview This three day course will prepare IT professionals for the role of Enterprise Administrator.

More information

Media Exchange really puts the power in the hands of our creative users, enabling them to collaborate globally regardless of location and file size.

Media Exchange really puts the power in the hands of our creative users, enabling them to collaborate globally regardless of location and file size. Media Exchange really puts the power in the hands of our creative users, enabling them to collaborate globally regardless of location and file size. Content Sharing Made Easy Media Exchange (MX) is a browser-based

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Managed Servers ASA Extract FY14

Managed Servers ASA Extract FY14 Managed Servers ASA Extract FY14 1.0 Service Summary 1.1 Name Managed Servers 1.7 Mission/Vision UW IT currently manages over 900 managed servers for various owners and functions. There are 2 primary types

More information

StorReduce Technical White Paper Cloud-based Data Deduplication

StorReduce Technical White Paper Cloud-based Data Deduplication StorReduce Technical White Paper Cloud-based Data Deduplication See also at storreduce.com/docs StorReduce Quick Start Guide StorReduce FAQ StorReduce Solution Brief, and StorReduce Blog at storreduce.com/blog

More information

Cisco Intelligent Automation for Cloud

Cisco Intelligent Automation for Cloud Product Data Sheet Cisco Intelligent Automation for Cloud Early adopters of cloud-based service delivery were seeking additional cost savings beyond those achieved with server virtualization and abstraction.

More information

THE EMC ISILON STORY. Big Data In The Enterprise. Copyright 2012 EMC Corporation. All rights reserved.

THE EMC ISILON STORY. Big Data In The Enterprise. Copyright 2012 EMC Corporation. All rights reserved. THE EMC ISILON STORY Big Data In The Enterprise 2012 1 Big Data In The Enterprise Isilon Overview Isilon Technology Summary 2 What is Big Data? 3 The Big Data Challenge File Shares 90 and Archives 80 Bioinformatics

More information

Amazon Cloud Storage Options

Amazon Cloud Storage Options Amazon Cloud Storage Options Table of Contents 1. Overview of AWS Storage Options 02 2. Why you should use the AWS Storage 02 3. How to get Data into the AWS.03 4. Types of AWS Storage Options.03 5. Object

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.2

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.2 JAMF Software Server Installation and Configuration Guide for OS X Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide

More information

CloudPassage Halo Technical Overview

CloudPassage Halo Technical Overview TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT. Imaging & Enterprise Content Management

SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT. Imaging & Enterprise Content Management SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT TM OMNIDOCS Imaging & Enterprise Content Management SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT O MNIDOCS Enterprise Content

More information

Scaling Objectivity Database Performance with Panasas Scale-Out NAS Storage

Scaling Objectivity Database Performance with Panasas Scale-Out NAS Storage White Paper Scaling Objectivity Database Performance with Panasas Scale-Out NAS Storage A Benchmark Report August 211 Background Objectivity/DB uses a powerful distributed processing architecture to manage

More information

Intro to Data Management. Chris Jordan Data Management and Collections Group Texas Advanced Computing Center

Intro to Data Management. Chris Jordan Data Management and Collections Group Texas Advanced Computing Center Intro to Data Management Chris Jordan Data Management and Collections Group Texas Advanced Computing Center Why Data Management? Digital research, above all, creates files Lots of files Without a plan,

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information

MicroStrategy Course Catalog

MicroStrategy Course Catalog MicroStrategy Course Catalog 1 microstrategy.com/education 3 MicroStrategy course matrix 4 MicroStrategy 9 8 MicroStrategy 10 table of contents MicroStrategy course matrix MICROSTRATEGY 9 MICROSTRATEGY

More information

Hadoop in the Hybrid Cloud

Hadoop in the Hybrid Cloud Presented by Hortonworks and Microsoft Introduction An increasing number of enterprises are either currently using or are planning to use cloud deployment models to expand their IT infrastructure. Big

More information

Cisco UCS and Fusion- io take Big Data workloads to extreme performance in a small footprint: A case study with Oracle NoSQL database

Cisco UCS and Fusion- io take Big Data workloads to extreme performance in a small footprint: A case study with Oracle NoSQL database Cisco UCS and Fusion- io take Big Data workloads to extreme performance in a small footprint: A case study with Oracle NoSQL database Built up on Cisco s big data common platform architecture (CPA), a

More information

10 Things IT Should be Doing (But Isn t)

10 Things IT Should be Doing (But Isn t) Contents Overview...1 Top Ten Things IT Should be Doing...2 Audit Data Access... 2 Inventory Permissions and Directory Services Group Objects... 2 Prioritize Which Data Should Be Addressed... 2 Remove

More information

Object Oriented Storage and the End of File-Level Restores

Object Oriented Storage and the End of File-Level Restores Object Oriented Storage and the End of File-Level Restores Stacy Schwarz-Gardner Spectra Logic Agenda Data Management Challenges Data Protection Data Recovery Data Archive Why Object Based Storage? The

More information

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide Note Before using this

More information

Jitterbit Technical Overview : Microsoft Dynamics CRM

Jitterbit Technical Overview : Microsoft Dynamics CRM Jitterbit allows you to easily integrate Microsoft Dynamics CRM with any cloud, mobile or on premise application. Jitterbit s intuitive Studio delivers the easiest way of designing and running modern integrations

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

FTP-Stream Data Sheet

FTP-Stream Data Sheet FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control

More information

How To Set Up Egnyte For Netapp Sync For Netapp

How To Set Up Egnyte For Netapp Sync For Netapp Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...

More information

Zmanda Cloud Backup Frequently Asked Questions

Zmanda Cloud Backup Frequently Asked Questions Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What

More information

Moving beyond Virtualization as you make your Cloud journey. David Angradi

Moving beyond Virtualization as you make your Cloud journey. David Angradi Moving beyond Virtualization as you make your Cloud journey David Angradi Today, there is a six (6) week SLA for VM provisioning it s easy to provision a VM, the other elements change storage, network

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

VERITAS NetBackup BusinesServer

VERITAS NetBackup BusinesServer VERITAS NetBackup BusinesServer A Scalable Backup Solution for UNIX or Heterogeneous Workgroups V E R I T A S W H I T E P A P E R Table of Contents Overview...................................................................................1

More information

ACHIEVING HIPAA COMPLIANCE WITH POSTGRES PLUS CLOUD DATABASE

ACHIEVING HIPAA COMPLIANCE WITH POSTGRES PLUS CLOUD DATABASE ACHIEVING HIPAA COMPLIANCE WITH POSTGRES PLUS CLOUD DATABASE TABLE OF CONTENTS 03 04 04 05 08 INTRODUCTION FUNDAMENTALS OF HIPAA AND HITECH HIPAA-COMPLIANT DATA MANAGEMENT IN THE CLOUD POSTGRES PLUS CLOUD

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

Quick Start - NetApp File Archiver

Quick Start - NetApp File Archiver Quick Start - NetApp File Archiver TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS GETTING STARTED Upgrade Configuration Archive Recover Page 1 of 14 Overview - NetApp File Archiver Agent TABLE OF CONTENTS

More information

Information Technology Services Classification Level Range C Reports to. Manager ITS Infrastructure Effective Date June 29 th, 2015 Position Summary

Information Technology Services Classification Level Range C Reports to. Manager ITS Infrastructure Effective Date June 29 th, 2015 Position Summary Athabasca University Professional Position Description Section I Position Update Only Information Position Title Senior System Administrator Position # 999716,999902 Department Information Technology Services

More information

Digital Preservation Lifecycle Management

Digital Preservation Lifecycle Management Digital Preservation Lifecycle Management Building a demonstration prototype for the preservation of large-scale multi-media collections Arcot Rajasekar San Diego Supercomputer Center, University of California,

More information

EaseTag Cloud Storage Solution

EaseTag Cloud Storage Solution EaseTag Cloud Storage Solution The Challenge For most companies, data especially unstructured data, continues to grow by 50 percent annually. The impact of spending more every year on storage, and on protecting

More information

Windows Server 2008 Essentials. Installation, Deployment and Management

Windows Server 2008 Essentials. Installation, Deployment and Management Windows Server 2008 Essentials Installation, Deployment and Management Windows Server 2008 Essentials First Edition. This ebook is provided for personal use only. Unauthorized use, reproduction and/or

More information

Cisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture

Cisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture Reference Architecture Cisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture 2015 Cisco and/or its affiliates. All rights reserved.

More information