TSD: a Secure and Scalable Service for Sensitive Data and ebiobanks
|
|
- Clyde Flowers
- 8 years ago
- Views:
Transcription
1 TSD: a Secure and Scalable Service for Sensitive Data and ebiobanks Gard Thomassen, PhD Head of Research Support Services Group University Center for Information Technology (USIT) University of Oslo
2 Outline Sensitive Data TSD setup, solutions, demo, status and future Q&A How to get on board
3 What is sensitive data? Norway : Personal Data Act 2, point 8 race/ethnic data, political opinion, philosophical and religious beliefs, the fact that a person has been suspected of, charged with, indicted for or convicted a criminal act, health, sex life and trade-union membership
4 Who has sensitive data Almost everyone
5 TSD launch in Computerworld 16/5-14
6 Norsk KreftGenom Konsortium Sammenliknet med den hardware vi benyttet fram til overgangen til TSD, som vel kan karakteriseres som en middels brukbar tjenermaskin, med 64 kjerner, kan vi med TSD oppnå en teoretisk hastighetsforbedring på 30X. I tillegg til dette kommer at vi har opitmalisert vår analysepipeline, ved at vi har parallellisert flere trinn. Tidligere ville en sekvenseringsanalyse på 48 svulst/normal-par resultert i kjøringstid på to-tre måneder minimun. Vi kjørte nå denne uka på TSD det samme på to dager og noen timer. Altså forsiktig sagt en dramatisk forbedring. Prof Eivind Hovig, NCGC
7 Teknisk ukeblad & e24, 5/5-14
8 Uniforum
9 TSD Pilot
10 System requirements Security, isolation and access control as given by law Large storage capacity Multi tenant (multiple users) High performance computing (HPC) resource High bandwidth Easy to maintain and operate Easy to use and practical (also for audio and video) Some freedom within confined user space Accessible from anywhere through proper mechanisms A variety of software and public data-sources must be available Windows and Linux support (server/host-side) Data collection services Data sharing services
11 Setup, solutions and status
12 System outline VM-server HPC - Colossus Internet Gateway n 1 Secure encrypted network to special high volume data production sites 1 (project) 1 (storage area) Storage
13 TSD Windows demo
14 Data import and export using TSD File lock server Virtual file lock server NFS mount 3 2 TSD File lock HD 1 Data copied here by sftp (2-factor authentication) encrypted data if sensitive Virtual projectserver 4 Project HD
15 Data collection using TSD minid Nettskjema-minID Nettskjema homepage Encrypted XML (PGP) File lock Project VM Project disk TSD
16 Homepage
17 Projects forskning/sensitiv/mer-om/kunder/
18 TSD status > 80 research projects > 350 users Secure storage (> 1 PiB on disk) Secure data analysis Linux or windows hosts (> 250 VMs) Secure import and export Web-based data harvesting HPC cluster (>1500 cores) Postgres DBs Video and sound display
19 Capabilities enabled by TSD Large scale NGS research on human genomes Large scale medical imaging studies Large scale studies with web-based data collection Off-site analysis of sensitive data Secure storage for verification of published research Electronic consent
20 Nordic collaboration opportunities Laws are fairly similar (Norway very strict) Difficult to exchange sensitive data for research One should learn from each other as these systems demands very special IT-knowledge Services development and system-administration know-how is non-sensitive and may be shared Building TSD addressed many novel security questions in a University setting to be learnt from Large DBs/registeries of health data may enable very interesting research in the future TSD is involved in the NeIC-based Tryggve project We are happy to collaborate!
21 Future of TSD - main topics How to handle video and sound harvesting management metadata analysis Journal system for Psychologists (Univ of Umeå collaboration) Biobanks VMware and VDI infrastructure Galaxy inside TSD Elixir helpdesk connected to TSD Hosting docker containers Invariant storage of research data (connected with Cristin?) National einfrastructure investment in TSD??
22 Main collaborators on TSD Collaborators Norwegian Storage Infrastructure (NorStore) Norwegian Genetics Analysis Platform (GenAp) Norwegian Dietary Registry (Medical Faculty) Institute of Psychology (Faculty of Social Sciences) Norwegian Cancer Sequencing Consortium (NCGC) Reference group Oslo University Hospital, NorStore, Regional Ethical Committee, National Institute of Public Health, Norwegian Cancer Registry, Research Network at OUS, Elixir Norway, NCGC, GenAP, Institute of Psychology.
23 How to get on board NB Remember that NorStore (and StoreBioInfo) hands out TSD storage on a per application basis.
24 Thanks to Project group / developers tsd-core@usit virt-core@usit storage-core@usit postgres-core@usit network-core@usit hpc-core@usit windows-core@usit unix-core@usit IT-security@usit Administration / associated IT-dir Lars Oftedal Hans A. Eide Märtha Felton
25 Security details OATH TOTP 2-factor authentication Smart phones or programmable hardware tokens Import/export is under strict control No open connection to the internet All administration happens from the inside Strong separation between projects Hardened FreeBSD gateway and firewall Encrypted backup, one key per project Sys-admins are single users (traceability) Sys-admins have to use same authentication process
ndna Tim Hughes Avdeling for Medisinsk Gene@kk Oslo Universitets Sykehus (Ullevål)
ndna Utvikling av nasjonal analyse- og lagringspla3orm for DNA sekvensdata i helsevesenet Tim Hughes Avdeling for Medisinsk Gene@kk Oslo Universitets Sykehus (Ullevål) My goal Present the ndna project
More informationVeeam Backup and Replication Architecture and Deployment. Nelson Simao Systems Engineer
Veeam Backup and Replication Architecture and Deployment Nelson Simao Systems Engineer Agenda Veeam Backup Server / Proxy Architecture Veeam Backup Server / Backup Proxy Backup Transport Modes Physical
More informationVeeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
More informationUNINETT Sigma2 AS: architecture and functionality of the future national data infrastructure
UNINETT Sigma2 AS: architecture and functionality of the future national data infrastructure Authors: A O Jaunsen, G S Dahiya, H A Eide, E Midttun Date: Dec 15, 2015 Summary Uninett Sigma2 provides High
More informationWindows Server 2008 R2
Windows Server 2008 R2 Olav Tvedt olav@tvedt.info TVEDT.info 10/2/2009 1 Agenda Direct Acces Remote Desktop Services Group Policyer 10/2/2009 2 Direct Access Teknologier i bruk IPv6 Isatap 6To4 Teredo
More informationHow To Price Power In Norsk
Electricity consumption should there be a limit? Implications of people s attitudes for the development of sustainable pricing systems Behave Conference Hege Westskog and Tanja Winther Background for the
More informationSpeaking of Data: Computational Language Analysis
NP-SBJ PRP it S VBD had VP VBN traded VP S-ADV NP-SBJ ADJP-PRD -NONE- RB * over-the-counter TOP h 1 INDEX e 2 def q rel bark v rel prpstn m rel LBL h 4 dog n rel LBL h RELS LBL h 1 ARG0 x 5 LBL h 9 8 ARG0
More informationTECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
More informationHypervisor Competitive Differences: Beyond the Data Sheet. Chris Wolf Senior Analyst, Burton Group
Hypervisor Competitive Differences: Beyond the Data Sheet Chris Wolf Senior Analyst, Burton Group Agenda Project background Evaluation criteria Vendor scorecards Project Background Three month Burton Group
More informationCloud Optimize Your IT
Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release
More informationMaximizing customer protections
Maximizing customer protections 8 7 Vista XP XP end of support 8 XP 7 Vista XP What is the risk of continuing to run XP? Attackers will have the advantage over defenders After support ends, when Microsoft
More informationVMware vcloud Air Security TECHNICAL WHITE PAPER
TECHNICAL WHITE PAPER The Shared Security Model for vcloud Air The end-to-end security of VMware vcloud Air (the Service ) is shared between VMware and the customer. VMware provides security for the aspects
More informationActionPhoto International
360 Panoramic Guide a new visualisation and communication tool Per Erik Berger Managing Director ActionPhoto International AS action-photo.no Agenda What is a 360 Panoramic Guide? Example Bideford Dolphin.
More informationQNAP NAS & Virtualization
QNAP Turbo NAS Storage QNAP NAS & Virtualization Cost-effective IP-SAN / iscsi Storage Solution Presented by: Alfred LIANG, Jérôme JAUSSAUD, Simon CHANG Product Manager QNAP Systems, Inc. November 2011
More informationForklifting to AWS: An Option for Migration to AWS October 2014. Forklifting to AWS: An Option for Migration to AWS
Forklifting to AWS: An Option for Migration to AWS 1 Table of Contents Introduction 3 Migrating from VMware to AWS.3 Using VMware vcenter 4 AWS VM Import Tools.4 Third Party Conversion and Migration Tools
More informationAltaro Hyper-V Backup - Offsite Backups & Seeding Guide
Altaro Hyper-V Backup - Offsite Backups & Seeding Guide The introduction of an Altaro Backup Server role means that you can install the Altaro Backup Server application on another server, and use that
More informationAvailability. for the modern datacentre
Availability for the modern datacentre Sessionens agenda Hvad vil I have med fra denne workshop? Skal vi udelukkende fokusere på v8 features? Skal vi tale design/best practice? Hvad har vi med I dagens
More informationNordic Master in Didactics of Mathematics
Nordic Master in Didactics of Mathematics NORDIMA Barbro Grevholm Seminar i Bergen den 7-8 september 2011 Nordic Master in Didactics of Mathematics Project number NMP-2009/10730 The Master Consortium consists
More informationRecommended ICT Security Architecture In the Higher Education Sector Best Practice Document
Recommended ICT Security Architecture In the Higher Education Sector Best Practice Document Produced by UNINETT led working group on security (UFS122) Authors: Gunnar Bøe, Per Arne Enstad, Øyvind Eilertsen
More informationTil minne om Harald Grimen Det er med sorg vi har mottatt budskapet om at Harald Grimen har gått bort. Han har vært medlem av redaksjonsrådet for
Til minne om Harald Grimen Det er med sorg vi har mottatt budskapet om at Harald Grimen har gått bort. Han har vært medlem av redaksjonsrådet for Etikk i praksis fra vi startet, og har vært en av tidsskriftets
More informationResearch IT Application Development
Research IT Clinical IS OR Services Offered to Research Faculty & Staff: - Application development - Data storage servers - Epic Data extraction (I2B2) - Licensed Software for Researchers - General technology
More informationOn premise Cloud Computing at UC Santa Cruz
Project title: Submitter: Project team: On premise Cloud Computing Carol Jordan ITS Data Center Manager, UCSC 831 459 2631, carol.jordan@ucsc.edu Cliff Pearson, ITS UNIX Systems Josh Sonstroem, ITS UNIX
More informationIn addition to their professional experience, students who attend this training should have technical knowledge in the following areas.
6422A - Implementing and Managing Windows Server 2008 Hyper-V Course Number: 6422A Course Length: 3 Days Course Overview This three-day instructor-led course teaches students how to implement and manage
More informationC a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l s @ t e r r e m a r k. c o m
Cloud Computing for Government & Enterprise C a r l G o e t h a l s T e r r e m a r k E u r o p e C a r l. g o e t h a l s @ t e r r e m a r k. c o m Agenda Some history on Terremark State of Cloud Public
More informationTesting New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM
Testing New Applications In The DMZ Using VMware ESX Ivan Dell Era Software Engineer IBM Agenda Problem definition Traditional solution The solution with VMware VI Remote control through the firewall Problem
More informationHow to Backup XenServer VM with VirtualIQ
How to Backup XenServer VM with VirtualIQ 1. Using Live Backup of VM option: Live Backup: This option can be used, if user does not want to power off the VM during the backup operation. This approach takes
More informationSteven Newhouse, Head of Technical Services
Challenges at EMBL-EBI Steven Newhouse, Head of Technical Services European Bioinformatics Institute Outstation of the European Molecular Biology Laboratory International organisation created by treaty
More informationRunning Agilent GeneSpring MPP on the Cloud
Running Agilent GeneSpring MPP on the Cloud Technical Overview Authors Stephen Madden, Rick A. Fasani, and Michael Rosenberg Agilent Technologies, Inc. Santa Clara, California, USA Introduction Cloud computing
More informationHow To Use Arcgis For Free On A Gdb 2.2.2 (For A Gis Server) For A Small Business
Esri Middle East and Africa User Conference December 10 12 Abu Dhabi, UAE Understanding ArcGIS in Virtualization and Cloud Environments Marwa Mabrouk Powerful GIS capabilities Delivered as Web services
More informationProject Assured Data Access. Henry Hughes
Project Assured Data Access Henry Hughes Background Significant investment in medical research specifically in trying to unlock the value of the data collected by the government and NHS in order to further
More informationIntroduction to ovirt
Introduction to ovirt James Rankin What is ovirt? Large scale, centralized management for server and desktop virtualization Based on leading performance, scalability and security infrastructure technologies
More informationEMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Genetec Omnicast Client Applications
RSA SecurID Two-Factor Authentication with Genetec Omnicast Client Applications A Detailed Review EMC Information Infrastructure Solutions Abstract This white paper provides the reader with an overall
More informationHyper-V 3.0 - Enterprise Ready! Presented by Luther Allin
Hyper-V 3.0 - Enterprise Ready! Presented by Luther Allin Presenter: Luther Allin IT Manager, Miller & Martin PLLC Thank you for being here today August 1, 2014 Outline for Our Session Miller & Martin
More informationXenDesktop Workshop. Hva, Hvordan.? The best desktop virtualization solution is now even better
powered by XenDesktop Workshop. Hva, Hvordan.? The best desktop virtualization solution is now even better Stian A. Petersen Løsnings Arkitekt Stian@commaxx.no Commaxx Denne workshop er basert på følgende:
More informationHvordan kunders informasjonsbehov er endret og hvordan bedrifter kan tilpasse seg denne endringen. Steinar Heggemsnes HP Exstream
Hvordan kunders informasjonsbehov er endret og hvordan bedrifter kan tilpasse seg denne endringen. Steinar Heggemsnes HP Exstream Kommunikasjon i går og i dag Agenda: Kommunikasjon i går og i dag Hvordan
More informationPrivate vs. Public Cloud Solutions
Private vs. Public Cloud Solutions Selecting the right cloud technology to fit your organization Introduction As cloud storage evolves, different cloud solutions have emerged. Our first cloud whitepaper
More informationCitrix XenServer 7 Feature Matrix
Citrix XenServer 7 Matrix Citrix XenServer 7 Matrix A list of Citrix XenServer 7 features by product edition, including entitlements XenApp and XenDesktop license holders. The most comprehensive application
More informationCloud on TEIN Part I: OpenStack Cloud Deployment. Vasinee Siripoonya Electronic Government Agency of Thailand Kasidit Chanchio Thammasat University
Cloud on TEIN Part I: OpenStack Cloud Deployment Vasinee Siripoonya Electronic Government Agency of Thailand Kasidit Chanchio Thammasat University Outline Objectives Part I: OpenStack Overview How OpenStack
More informationovirt Introduction James Rankin Product Manager Red Hat jrankin@redhat.com Virtualization Management the ovirt way
ovirt Introduction James Rankin Product Manager Red Hat jrankin@redhat.com Agenda What is ovirt? What does it do? Architecture How To Contribute What is ovirt? Large scale, centralized management for server
More informationSysadmin Training in the Virtual Unix Lab p.1/23
Sysadmin Training in the Virtual Unix Lab An Interactive Course System with a Tutorial Component, User Adaption and Result Verification via Domain Specific Languages Sysadmin Training in the Virtual Unix
More informationMobile Computing and Virtual Desktops
Mobile Computing and Virtual Desktops buzzetti@us.ibm.com The IBM Worldwide Design Centers comprise certified IT architects and specialists using state-of-the-art methodologies and technologies in the
More informationMaximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
More informationLanguage policies and language use in Norwegian higher education
Language policies and language use in Norwegian higher education National Languages g and Terminology in Higher Education, Science & Technology, 7 November 2013 Marita Kristiansen Norwegian School of Economics
More informationSURFsara HPC Cloud Workshop
SURFsara HPC Cloud Workshop www.cloud.sara.nl Tutorial 2014-06-11 UvA HPC and Big Data Course June 2014 Anatoli Danezi, Markus van Dijk cloud-support@surfsara.nl Agenda Introduction and Overview (current
More informationEnterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
More informationDaly Computers Webinar for MEEC: P4000 SAN Solutions
Daly Computers Webinar for MEEC: P4000 SAN Solutions Scalable storage optimized for server and desktop virtualization Peter Threatt, System Engineer - Daly Kevin George, Storage Solutions Architect - HP
More informationClick. Schedule. Relax.
Reliability and Security Reliability and Security: Twelve Essential Questions to Ask Online Employee Scheduling Providers about Reliability and Security 2003 ScheduleSource, Inc. All rights reserved. Table
More informationYOUR STRATEGIC VIRTUALIZATION ALTERNATIVE. Greg Lissy Director, Red Hat Virtualization Business. James Rankin Senior Solutions Architect
YOUR STRATEGIC VIRTUALIZATION ALTERNATIVE Greg Lissy Director, Red Hat Virtualization Business James Rankin Senior Solutions Architect 1 THE VIRTUALIZATION MARKET HAS CHANGED The release of Red Hat Enterprise
More informationCloud Failover Appliance
Cloud Failover Appliance Cloud Failover Appliance (CFA) is an enterprise-grade disaster recovery solution that recovers systems and applications in minutes - without all the hardware and complexity. With
More informationVirus vaccines patents, Nagoya, and access to products 02.09.2014 Marit Rode
Virus vaccines patents, Nagoya, and access to products 02.09.2014 Marit Rode PHARMAQ business description A leading global Aquatic Animal Health company, specialising in vaccines and therapeutics Established
More informationRES PowerFuse Version Comparison Chart (1/9)
RES PowerFuse Version Comparison Chart (1/9) Alerting Allows you to set up notifications of specific events, which can consist of sending e-mails to one or more recipients, sending SNMP notifications (
More informationVMware Cloud Environment
VMware Cloud Environment Enterprise level virtual datacentre: providing highly redundant, fast and scalable solutions. An eukhost Technical White Paper. Page 1 Introduction... 3 Traditional physical solutions...
More informationA small selection of emails we have chosen to include to show some of our communication with the open source community and how this has proceeded.
Chapter 1 Various emails A small selection of emails we have chosen to include to show some of our communication with the open source community and how this has proceeded. 1.1 Communication with a teachers
More informationSecuring sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File
More informationThe Galaxy workflow. George Magklaras PhD RHCE
The Galaxy workflow George Magklaras PhD RHCE Biotechnology Center of Oslo & The Norwegian Center of Molecular Medicine University of Oslo, Norway http://www.biotek.uio.no http://www.ncmm.uio.no http://www.no.embnet.org
More informationWhat Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
More informationHIPAA Requirements for Data Security
HIPAA Requirements for Data Security Dennis Schmidt, HIPAA Security Officer UNC School of Medicine March, 2012 What does HIPAA Compliant Mean? It depends! The HIPAA Security Rule does not give many specific
More informationPosition Summary. Open Position PROGRAMMER III UCD. Non-Exempt. Uncovered DESKTOP SUPPORT/JUNIOR SYSTEM ADMINISTRATOR. Hai Nguyen
Page 1 of 5 Position Summary Employee Details Employee First Name: Employee Last Name: Open Position Employee ID: Classification Payroll Title: PROGRAMMER III UCD Payroll Title Code: 7285 Job Group: Overtime
More informationSoftware as a Service
Cloud på System z? zenterprise Heterogeneous Virtual Infrastructure Application APP APP APP APP APP APP IT Process and Service OS and Middleware Workload-Aware Optimization Infrastructure Hardware Middleware
More informationWhere are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
More informationOnline Storage Replacement Strategy/Solution
I. Current Storage Environment Online Storage Replacement Strategy/Solution ISS currently maintains a substantial online storage infrastructure that provides centralized network-accessible storage for
More informationCopyright 2014, Oracle and/or its affiliates. All rights reserved. 2
2 CON8358 - Building a Private Cloud with OpenStack Oracle OpenStack for Oracle Linux Ronen Kofman Director of Product Development Oracle OpenStack September, 2014 Safe Harbor Statement The following is
More informationSURFsara HPC Cloud Workshop
SURFsara HPC Cloud Workshop doc.hpccloud.surfsara.nl UvA workshop 2016-01-25 UvA HPC Course Jan 2016 Anatoli Danezi, Markus van Dijk cloud-support@surfsara.nl Agenda Introduction and Overview (current
More informationFakultät für Physik Ludwig Maximilians Universität Klaus Steinberger Ralph Simmler Alexander Thomas. HA Cluster using Open Shared Root
Ludwig Maximilians Universität Klaus Steinberger Ralph Simmler Alexander Thomas HA Cluster using Open Shared Root Agenda Our Requirements The Hardware Why Openshared Root Technical Details of Openshared
More informationAmazon Web Services Demo Tech Exchange. Slides: http://goo.gl/mwz0es. ssw@iu.edu
Amazon Web Services Demo Tech Exchange Slides: http://goo.gl/mwz0es ssw@iu.edu $ dig +short emergency.iu.edu emergency.iu.edu.s3-website-us-east-1.amazonaws.com. s3-website-us-east-1.amazonaws.com. 54.231.14.220
More informationIDA Call 6 for Cloud Computing. Presented by: Don Ng, CISSP don.sh.ng@starhub.com, Senior Manager SaaS Partner Program Date: 12th November, 2012
IDA Call 6 for Cloud Computing Presented by: Don Ng, CISSP don.sh.ng@starhub.com, Senior Manager SaaS Partner Program Date: 12th November, 2012 1 > StarHub: Trusted Track Record StarHub is Singapore's
More informationCitrix XenDesktop Backups with Xen & Now by SEP
Citrix XenDesktop Backups with Xen & Now by SEP WWW.SEPUSA.COM Table of Contents INTRODUCTIONANDOVERVIEW...3 CITRIXXENDESKTOPENVIRONMENT...4 CITRIXDESKTOPDELIVERYCONTROLLERBACKUP...5 CITRIXLICENSESERVERBACKUP...5
More informationAcronis Backup & Recovery 11.5
Acronis Backup & Recovery 11.5 Update 2 Installation Guide Applies to the following editions: Advanced Server Server for Windows Virtual Edition Server for Linux Advanced Server SBS Edition Workstation
More informationPassTest. Bessere Qualität, bessere Dienstleistungen!
PassTest Bessere Qualität, bessere Dienstleistungen! Q&A Exam : 74-409 Title : Server Virtualization with Windows Server Hyper-V and System Center Version : Demo 1 / 11 1.You administer a Windows Server
More informationHow to Backup and Restore a VM using Veeam
How to Backup and Restore a VM using Veeam Table of Contents Introduction... 3 Assumptions... 3 Add ESXi Server... 4 Backup a VM... 6 Restore Full VM... 12 Appendix A: Install Veeam Backup & Replication
More informationTable of Contents Introduction and System Requirements 9 Installing VMware Server 35
Table of Contents Introduction and System Requirements 9 VMware Server: Product Overview 10 Features in VMware Server 11 Support for 64-bit Guest Operating Systems 11 Two-Way Virtual SMP (Experimental
More informationThe EGI Federated Cloud e-infrastructure
The EGI Federated Cloud e-infrastructure Enol Fernández 1,2, Diego Scardaci 1,3, Álvaro López 2 1 EGI.eu, 2 IFCA (CSIC-UC), 3 INFN-Catania www.egi.eu EGI-Engage is co-funded by the Horizon 2020 Framework
More informationAn Open Source Wide-Area Distributed File System. Jeffrey Eric Altman jaltman *at* secure-endpoints *dot* com
An Open Source Wide-Area Distributed File System Jeffrey Eric Altman jaltman *at* secure-endpoints *dot* com What is AFS? A global wide-area Distributed File System providing location independent authenticated
More informationDavid.Balka@chi.frb.org 2009 STREAM FRBC
Virtualization ti Dave Balka David.Balka@chi.frb.org Examination Elements Architecture Management Processes Integrity Availability Security 2 Datacenter Consolidation 3 What is Virtualization A framework
More informationIf you do NOT use applications based on Amazon Web Services raise your hand.
If you do NOT use applications based on Amazon Web Services raise your hand. If you use NetFlix, lower your hand. Use reddit, lower your hand. Use Scribd, lower your hand. Use Spotify, lower your hand.
More informationSoftware services competence in research and development activities at PSNC. Cezary Mazurek PSNC, Poland
Software services competence in research and development activities at PSNC Cezary Mazurek PSNC, Poland Workshop on Actions for Better Participation of New Member States to FP7-ICT Timişoara, 18/19-03-2010
More informationCopyright Giritech A/S. Secure Mobile Access
Secure Mobile Access From everywhere... From any device... From user......to applications Page 3...without compromising on security and usability... and to my PC in the office: Secure Virtual Access Contrary
More informationStorReduce Technical White Paper Cloud-based Data Deduplication
StorReduce Technical White Paper Cloud-based Data Deduplication See also at storreduce.com/docs StorReduce Quick Start Guide StorReduce FAQ StorReduce Solution Brief, and StorReduce Blog at storreduce.com/blog
More informationIBM Storage 23. September 2010. IBM Data Storage. Solutions Day. IBM Storage Brand Manager Nordic Peter Ellegaard. 2010 IBM Corporation
IBM Data Storage Solutions Day IBM Storage Brand Manager Nordic Peter Ellegaard 0 IBM Disk Portfolio Mainframe, System i Distributed, Open Systems Heterogeneous Unified, NAS Enterprise Class DS8000 Solution
More informationMicrosoft Terminal Server and Citrix Presentation Server Deployment Environments
Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Understanding the use of Act! in a Terminal Server or Citrix Presentation Server environment Table of Contents Introduction...
More informationCloud on TIEN Part I: OpenStack Cloud Deployment. Vasinee Siripoonya Electronic Government Agency of Thailand Kasidit Chanchio Thammasat
Cloud on TIEN Part I: OpenStack Cloud Deployment Vasinee Siripoonya Electronic Government Agency of Thailand Kasidit Chanchio Thammasat Outline Part I: OpenStack Overview How OpenStack components work
More informationExperiences and challenges in the development of the JASMIN cloud service for the environmental science community
JASMIN (STFC/Stephen Kill) Experiences and challenges in the development of the JASMIN cloud service for the environmental science community ECMWF Visualisa-on in Meteorology Week, 28 September 2015 Philip
More informationMRKS 60 Q.T.N.A.A.T.A.T.A.a. Network Based Storage Services
[SPRING 201 ] SCHEME OF EVLUTION PROGRM PGDTN SEMESTER II SUBJECT CODE & PTN203-IT MNGEMENT NME CREDIT 4 BK ID B1487 MX. MRKS 60 Q.No Question and Scheme of Evaluation Unit/ Page No. 1 Explain any two
More informationJOHNSON COUNTY COMMUNITY COLLEGE 12345 College Blvd., Overland Park, KS 66210 Ph. 913-469-3812 Fax 913-469-4429
JOHNSON COUNTY COMMUNITY COLLEGE 12345 College Blvd., Overland Park, KS 66210 Ph. 913-469-3812 Fax 913-469-4429 ADDENDUM #1 September 21, 2015 REQUEST FOR PROPOSALS #16-033 FOR CLOUD BASED BACKUP & RECOVERY
More informationThe Virtualization Practice
The Virtualization Practice White Paper: Managing Applications in Docker Containers Bernd Harzog Analyst Virtualization and Cloud Performance Management October 2014 Abstract Docker has captured the attention
More informationCloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems
Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni, Pongsin Poosankam, y Matei Zaharia, Jun Han, y Stephen McCamant, Dawn Song, Vern Paxson, Adrian Perrig,
More informationEMAIL ARCHIVING SERVICES SERVICE DEFINITION
Complete IT Support for Business Westgate IT Email Archiving Services: Service Definition Service Name Email Archiving Services Overview of Service Westgate IT s Email Archiving Services provide a reliable
More informationSteelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
More informationIntro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
More informationContent Distribution Management
Digitizing the Olympics was truly one of the most ambitious media projects in history, and we could not have done it without Signiant. We used Signiant CDM to automate 54 different workflows between 11
More informationAttachment D System Hardware & Software Overview & Recommendations For IRP System
Attachment D System Hardware & Software Overview & Recommendations For IRP System Submitted by Explore Information Services, LLC Table of Contents Table of Contents...2 Explore IRP Configuration Recommendations...3
More informationUnitrends Virtual Backup Installation Guide Version 8.0
Unitrends Virtual Backup Installation Guide Version 8.0 Release June 2014 7 Technology Circle, Suite 100 Columbia, SC 29203 Phone: 803.454.0300 Contents Chapter 1 Getting Started... 1 Version 8 Architecture...
More informationIOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
More informationsecureheller Addressing Information Security at Heller
Addressing Information Security at Heller October 16, 2013 Welcome to the, the program focused on addressing Heller s information security. Security Awareness Data Protection Tools Simplified Usability
More informationEmail Archiving Services
Email Archiving Services A reliable offsite and secure storage facility for your emails G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Effortless Protection... 3 Optional legacy Email Import...
More informationVMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
More informationAn Analysis of Propalms TSE and Microsoft Remote Desktop Services
An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management
More informationGetting Real about Virtual Desktops
Getting Real about Virtual Desktops VDI Overview Important Features Addressing User Requirements Competitive Analysis Determining Costs and ROI Keeping it Simple and Cost Effective Factors in selecting
More informationAccelerate with Ampleflex Cloud! Highly adoptable and dependable platform for deploying services and applications into the Cloud. www.ampleflex.
Accelerate with Ampleflex Cloud! Highly adoptable and dependable platform for deploying services and applications into the Cloud. www.ampleflex.com The Challenge Enterprises are updating applications to
More information