Network Data Management Protocol (NDMP) White Paper
|
|
|
- Vivien Fox
- 9 years ago
- Views:
Transcription
1 Network Data Management Protocol (NDMP) White Paper Summary What is the primary goal of enterprise storage management? To back up and restore information in an intelligent, secure, timely, cost-effective manner over all enterprise-wide operating systems. Companies need high-performance backup and the ability to back up data to local media devices, without network traffic. While the data itself may be distributed throughout the enterprise, its cataloging and control must be centralized. The emergence of network-attached storage and dedicated file servers makes storage management more challenging. The current practice for all storage management vendors is to adapt their architecture to the operating systems they support. The result is an implementation with layers of OS dependencies that require the user to change workflow and make concessions to departmental systems in the enterprise. The Network Data Management Protocol (NDMP) is a new approach. Recognizing that these issues must be addressed, Network Appliance and Intelliguard have pioneered a network-based protocol that can be used for communications by all centralized backup applications and all agents on file servers. NDMP will create the first opportunity to provide truly enterprise-wide heterogeneous storage management solutions. The paradigm now shifts, permitting platforms to be driven at a departmental level and backup at the enterprise level. NDMP will allow administrators to back up critical data using any combination of compliant network-attached servers, backup devices, and management applications. The protocol addresses the user's need for centralized control of enterprise-wide network data management while minimizing network traffic. NDMP User Benefits NDMP meets the strategic need to centrally manage and control distributed data, while minimizing network traffic. NDMP, as an embedded protocol, separates the data path and the control path, so network data can be backed up locally yet managed from a central location. NDMP has been pioneered by Intelliguard and Network Appliance and endorsed by industry leaders as a protocol that empowers users to simplify the management and protection of business-critical data. The Problem Data storage requirements are doubling annually. Storage management costs are estimated at $7 per MB per year (Strategic Research 1996). The need for comprehensive, efficient data management is obvious. Centralized, enterprise-wide control of mission-critical data backup is imperative in increasingly heterogeneous environments. Data is spread across multiple hardware
2 and operating system platforms. The emergence of network-attached storage, or dedicated file server "appliances," means that the network-storage environment is growing more complex. An enterprise backup solution must be scalable, meet performance requirements, and provide excellent vendor support. In addition, it must support backup of all platforms on which the enterprise's mission-critical data is stored. The User Challenge The network storage environment is heterogeneous. The operating systems are constantly being upgraded. Dedicated file server "appliances" store mission-critical data. There is a wide variety of backup media devices and technologies, such as 8mm and DLT. The backup software solution must be fully compliant with all platforms on which the data to be backed up is stored and with the media devices being used. The Information Systems department has to ensure that upgrade paths are well planned in order to protect mission-critical data by ensuring timely backup. In complex environments, version control and software distribution are the stuff of which nightmares are made. Then there is the challenge of backing up network-attached storage. Such systems, by their nature, are dedicated appliances and do not support software applications such as backup. Performing NFS mounts of their file systems and backing up over the network has been the traditional method of backup. This is an inefficient, time- and resource-consuming activity. The Backup Software Vendor Challenge Extensive development and testing resources are required by a backup software vendor to ensure complete interoperability and compatibility between various platforms and versions. The vendor works with multiple file system vendors to understand the specific OS internals and seeks to maximize data transfer performance. The effort required to port the backup software and to maintain ongoing platform support is substantial. Tape library or jukebox support typically requires device drivers. These necessary activities extend product development timelines. Resources are diverted from feature enhancements and support to compatibility assurance. The Server Vendor Challenge Server vendors have to meet the demands of their customers by supporting a broad range of backup media devices and major backup software applications. Systems with large storage capacity require very high-performance local backup capabilities. Server vendors work with multiple external vendors and often invest in proprietary APIs to ensure interoperability with backup hardware and software. These extensive development and support efforts eat into development and support cycles that could otherwise be used to improve performance and develop valuable new features.
3 The Network-Attached Storage Vendor Challenge In the case of network-attached storage, the general-purpose server vendor challenge is compounded. Network-attached storage "appliances" are designed to optimize a single function, namely file service. As such, they do not have the general-purpose operating system required for porting a backup software solution. Indeed, the backup software is likely to have a great deal more lines of code than the dedicated OS itself. Backing up and restoring data over the network is slow and ties up the network. The Solution Backup is an issue that must be addressed by the server vendor, backup software vendor, and backup device vendor communities collectively. The common objective is to provide centrally managed, enterprise-wide data protection for the user in a heterogeneous environment. A common backup architecture must be defined, and the problem of backup must be partitioned between vendor types. This is achieved by defining and promoting an open standard network backup protocol. NDMP is this protocol. Vendor compliance with NDMP provides users with plug-and-play ability in a heterogeneous environment. Best-of-breed solutions, ideally suited for the specific demands of a given network environment, can be chosen from server, backup device, and backup software vendors, and interoperability is assured. By partitioning the problem between vendors, each vendor implements solutions in compliance with one well-defined standard network protocol. Interoperability efforts and widespread vendor support are eliminated. The vendor is free to focus on core competencies, thus improving the user offering and decreasing time-to-market. The Basic Elements of Backup The enterprise backup is a highly complex procedure. The data to be backed up must be defined, and complex interactions with the backup media device and extensive cataloguing and control must be managed. Good enterprise wide backup solutions are designed to assure data protection and efficient restoration of mission-critical data in the event of data loss. This means a great number of control and management features are implemented at the front end, at backup. In a generic sense, the complex task of backup can be broken into the following tasks: Discovery Configuration Scheduling Media management Tape device control Autoloader device control Data client software User interface
4 The Common Backup Architecture We have spoken about the three vendor types associated with backup, namely the file server, backup device, and backup software vendors. Now let's take a look at how file system data and control data flows among the three. Figure 1: Common Backup Architecture Enterprise data is stored in file systems. During a backup, this data is copied to the backup device (e.g., tape in a tape library or jukebox). The backup software controls what is being backed up and manages the database or catalog of the data being backed up. While this is the common architecture of backup today, individual backup software vendors implement their own "protocols" to manage this data flow. While the architecture remains constant, the system calls differ by software package and, sometimes, by server platform. NDMP and the Common Architecture NDMP is an open network protocol that defines common functional interfaces used for these data flows. With NDMP, vendors use common interfaces for common architecture data flows. File system data flows from the file system to the backup device using a common interface, regardless of the platform or device. Control or file meta data is passed to and from the backup software using common interfaces, regardless of the software package. Figure 2: Common Architecture of Backup with NDMP The Network Data Management Protocol (NDMP): NDMP is a network protocol that specifies the communication between the server and the backup software. Communication is defined using
5 a series of defined interfaces. These are XDR encoded messages that are exchanged over a bidirectional TCP/IP connection. The architecture is a client/server model, and the backup software is considered a client to the NDMP server. For every connection between the client on the backup software host and the NDMP host there is a virtual state machine on the NDMP host that is controlled using NDMP. This virtual state machine is referred to as the NDMP server. Server Implementation of NDMP Figure 3: Simple NDMP Configuration The server vendor implements NDMP by including connect, configure, data, tape, and SCSI interfaces in the operating system code. Connect Interface: This allows authentication of the client and negotiates the version of the protocol being used. Configure Interface: This interface allows the backup software to discover the configuration of the NDMP server. Data Interface: This interface deals with the format of the backup data. Backup software initiates backups and restores using this interface. Tape Interface: The tape interface provides complete control of a tape drive. SCSI Interface: The SCSI interface allows low-level control of SCSI devices such as jukeboxes. Backup Software Vendor Implementation of NDMP Backup software adopting NDMP implements notify, file history, and logging interfaces.
6 Notify Interface: This notifies the backup software that the NDMP server requires attention. File History Interface: This interface allows the NDMP server to make entries in the file history of the backup software. The file history building is important for later file retrieval. Logging Interface: This interface provides messages that are used by the operator to monitor backup progress and diagnose problems. Backup Device Vendor Implementation of NDMP Jukebox vendors need only ensure that they remain compliant with SCSI standards. Device drivers are not required in an NDMP environment. The Standardization of NDMP The full specification for NDMP was submitted to the Internet Engineering Task Force (IETF) in October Through the Internet Draft and Request For Comment (RFC) processes, the specification will continue to evolve and gain widespread industry support. The full specification and additional NDMP information is published at NDMP was co-developed by Legato and Network Appliance. The two companies authored the specification and implemented the protocol as a proof of concept. With a proven concept and working specification in place for NDMP, Intelliguard and Network Appliance approached a number of other companies asking for support. Initially, 17 vendor companies endorsed the initiative to make NDMP an open standard backup protocol. Now that the protocol has been submitted to the IETF, and more companies are hearing about the initiative, support for NDMP is growing. NDMP-compliant products will be available to users as vendors implement the protocol in their future product releases. Intelliguard and Network Appliance already ship NDMP-compliant backup software and file servers. Conclusion NDMP provides a logical partitioning of the backup activity, through a series of well-defined interfaces that addresses the flow of file system and control data in the backup and restore process. System and backup software vendors add a limited amount of code in their software, as defined by NDMP. NDMP-compliant servers and devices ship "backup ready." Once attached to the network, the NDMP-compliant backup software can provide backup protection to the server as part of an enterprise-wide solution. NDMP compliance provides true plug-and-play interoperability to users. Users can choose the best enterprise-wide backup software solutions and hardware to meet the demands of their particular environment.
7 NDMP-compliant server vendors can concentrate resources on improving file system internals and tape transfer mechanisms, assured that these enhancements can be utilized by all NDMPcompliant software solutions. As such, enhancements can be utilized by all of the server vendor's customers. Backup software vendors implementing NDMP are free to redirect resources to feature enhancements that are available to all of their customers, regardless of platform. NDMP is openly available and will continue to evolve through the IETF and the NDMP Task Force. As NDMP evolves, it is anticipated that increasing functionality will be added. NDMP continues to gain vendor support, and NDMP-compliant products will be available very soon. Continued vendor support and the release of compliant products will make NDMP a standard whose time has arrived. While vendor development efforts are simplified by NDMP, the real winners are our mutual customers the I.S. user and management community.
Introduction to the Network Data Management Protocol (NDMP)
Intelligent Network Computing Introduction to the Network Data Management Protocol (NDMP) The explosion of data generation and storage in recent years has led to the introduction of new technologies for
Backup Solutions for the Celerra File Server
White Paper Backup Solutions for the Celerra File Server EMC Corporation 171 South Street, Hopkinton, MA 01748-9103 Corporate Headquarters: 508) 435-1000, (800) 424-EMC2 Fax: (508) 435-5374, Service: (800)
Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions
Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Abstract Coyote Point Equalizer appliances deliver traffic management solutions that provide high availability,
Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments
Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable
VERITAS Backup Exec 9.0 for Windows Servers
WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS
HANTZ + PARTNER. The Upgrade Company! www.hantz.com. :: NAStorage Server ::
HANTZ + PARTNER The Upgrade Company! www.hantz.com :: NAStorage Server :: Delivering Power of Storage Top 10 reasons for choosing NAStorage your network attached storage (NAS) server server as 1.Experience
File Services. File Services at a Glance
File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using
NAS Device Backup Solutions
Network Data Management Protocol (NDMP) White Paper Paul Mayer Product Manager Revision 2 April 2002 Table of Contents Introduction...1 Network data management protocol (NDMP)...3 NAS backup configurations...6
Whitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam. [email protected] www.sepusa.com Copyright 2014 SEP
Whitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam [email protected] www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW... 3 SOLUTION COMPONENTS... 4-5 SAP HANA... 6 SEP
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key
Virtualization s Evolution
Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,
COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE
COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE Complementary technologies provide unique advantages over traditional storage architectures Often seen as competing technologies, Storage Area
AFS & Kerberos Best Practices Workshop 2007
Overview Introduction to NDMP A Brief History of NDMP NDMP Concepts and Terminology Example NDMP Topologies and Configurations NDMP Specification (Interfaces, Protocol) Current Backup and Recovery Model
EVOLUTION OF NETWORKED STORAGE
EVOLUTION OF NETWORKED STORAGE Sonika Jindal 1, Richa Jindal 2, Rajni 3 1 Lecturer, Deptt of CSE, Shaheed Bhagat Singh College of Engg & Technology, Ferozepur. [email protected] 2 Lecturer, Deptt
Tivoli Data Protection for NDMP
Tivoli Data Protection for NDMP Dave Cannon Tivoli Storage Management Development Agenda and NDMP Overview of Tivoli Data Protection (TDP) for NDMP Planning the server configuration Server setup Performing
Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems
Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec
Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup
Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP
InfiniBand Software and Protocols Enable Seamless Off-the-shelf Applications Deployment
December 2007 InfiniBand Software and Protocols Enable Seamless Off-the-shelf Deployment 1.0 Introduction InfiniBand architecture defines a high-bandwidth, low-latency clustering interconnect that is used
How To Design A Data Center
Data Center Design & Virtualization Md. Jahangir Hossain Open Communication Limited [email protected] Objectives Data Center Architecture Data Center Standard Data Center Design Model Application Design
Cloud computing: Innovative solutions for test environments
IBM Global Services April 2009 Cloud computing: Innovative solutions for test environments Speed test cycles and reduce cost to gain a competitive edge Page No.2 Contents 2 Executive summary 3 Leading
How To Use An Npm On A Network Device
WHITE PAPER: CA ARCserve Backup Network Data Management Protocol (NDMP) Network Attached Storage (NAS) Option: Integrated Protection for Heterogeneous NAS Environments CA ARCserve Backup: Protecting heterogeneous
Introduction - MSM 150 Appliance
1of 6 An Informational Paper Integrating an Optical Archive System ~ Appliance Solution vs. Software Solution Once the decision has been made to utilize optical storage technology to meet today s stringent
Vicom Storage Virtualization Engine. Simple, scalable, cost-effective storage virtualization for the enterprise
Vicom Storage Virtualization Engine Simple, scalable, cost-effective storage virtualization for the enterprise Vicom Storage Virtualization Engine (SVE) enables centralized administration of multi-platform,
VMware Virtual Machine Protection
VMware Virtual Machine Protection PowerVault DL Backup to Disk Appliance Dell Symantec Symantec DL Appliance Team VMware Virtual Machine Protection The PowerVault DL Backup-to-Disk Appliance Powered by
Fibre Channel Overview of the Technology. Early History and Fibre Channel Standards Development
Fibre Channel Overview from the Internet Page 1 of 11 Fibre Channel Overview of the Technology Early History and Fibre Channel Standards Development Interoperability and Storage Storage Devices and Systems
iscsi: Accelerating the Transition to Network Storage
iscsi: Accelerating the Transition to Network Storage David Dale April 2003 TR-3241 WHITE PAPER Network Appliance technology and expertise solve a wide range of data storage challenges for organizations,
Tandberg Data AccuVault RDX
Tandberg Data AccuVault RDX Binary Testing conducts an independent evaluation and performance test of Tandberg Data s latest small business backup appliance. Data backup is essential to their survival
Building Reliable, Scalable AR System Solutions. High-Availability. White Paper
Building Reliable, Scalable Solutions High-Availability White Paper Introduction This paper will discuss the products, tools and strategies available for building reliable and scalable Action Request System
an introduction to networked storage
an introduction to networked storage How networked storage can simplify your data management The key differences between SAN, DAS, and NAS The business benefits of networked storage Introduction Historical
Technical White Paper BlackBerry Enterprise Server
Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table
CTERA Cloud Storage Platform Architecture
CTERA Cloud Storage Platform Architecture Whitepaper by CTERA Networks Highlights How unstructured data growth drives cloud storage adoption The killer apps of cloud storage reviewed Putting cloud storage
Veritas Backup Exec : Protecting Microsoft SharePoint
Veritas Backup Exec : Protecting Microsoft SharePoint Who should read this paper Technical White Papers are designed to introduce IT professionals to key technologies and technical concepts that are associated
Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците
Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците Why SAN? Business demands have created the following challenges for storage solutions: Highly available and easily
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Faster, Cheaper, Safer: Improving Agility, TCO, and Security with Agentless Job Scheduling. A White Paper Prepared for BMC Software August 2006
A White Paper Prepared for BMC Software August 2006 Table of Contents Executive Summary...1 Introduction...1 The Current Standard Agent-Based Scheduling...1 The Revolution Agentless Job Scheduling...1
OPTIMIZING SERVER VIRTUALIZATION
OPTIMIZING SERVER VIRTUALIZATION HP MULTI-PORT SERVER ADAPTERS BASED ON INTEL ETHERNET TECHNOLOGY As enterprise-class server infrastructures adopt virtualization to improve total cost of ownership (TCO)
Backup Exec 2014: Protecting Microsoft SharePoint
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SHAREPOINT........................................ Backup Exec 2014: Protecting Microsoft SharePoint Who should read this paper Technical White Papers
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
NetVault Backup, NDMP and Network Attached Storage
NetVault, NDMP and Network Attached Storage Simplicity and power for NAS Written by Adrian Moir, Dell Scott Hetrick, Dell Abstract This technical brief explains how Network Data Management Protocol (NDMP)
Understanding Storage Virtualization of Infortrend ESVA
Understanding Storage Virtualization of Infortrend ESVA White paper Abstract This white paper introduces different ways of implementing storage virtualization and illustrates how the virtualization technology
Implementing Network Attached Storage. Ken Fallon Bill Bullers Impactdata
Implementing Network Attached Storage Ken Fallon Bill Bullers Impactdata Abstract The Network Peripheral Adapter (NPA) is an intelligent controller and optimized file server that enables network-attached
Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services
Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services What You Will Learn Windows Server on WAAS reduces the cost and complexity
The Mandate for a Highly Automated IT Function
The Mandate for a Highly Automated IT Function Introduction The traditional IT operational model is highly manual and very hardware centric. As a result, IT infrastructure services have historically been
Network Attached Storage 300
Network Attached Storage 300 High performance, dual-engine NAS solution Overview The IBM Network Attached Storage 300 was designed to meet your storage requirements across many demanding environments.
Organizations that are standardizing today are enjoying lower management costs, better uptime. INTRODUCTION
WHITEPAPER STANDARDIZED OPERATING ENVIRONMENTS FOR I.T. EFFICIENCY Boost productivity, increase uptime, and enhance business agility by standardizing your IT environment INTRODUCTION Organizations that
Deduplication has been around for several
Demystifying Deduplication By Joe Colucci Kay Benaroch Deduplication holds the promise of efficient storage and bandwidth utilization, accelerated backup and recovery, reduced costs, and more. Understanding
Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server
Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server Double-Take Software, Inc. 257 Turnpike Road; Suite 210 Southborough,
Storage Technologies for Video Surveillance
The surveillance industry continues to transition from analog to digital. This transition is taking place on two fronts how the images are captured and how they are stored. The way surveillance images
Implementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive
Using XenData Software and a Spectra Logic Archive With the Video Edition of XenData Archive Series software on a Windows server and a Spectra Logic T-Series digital archive, broadcast organizations have
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration
Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta
Espial IPTV Middleware. Evo Solution Whitepaper. <Title> Delivering Interactive, Personalized 3-Screen Services
Espial IPTV Middleware Evo Solution Whitepaper Delivering Interactive, Personalized 3-Screen Services April 2010 Espial Group 1997-2010. All rights reserved The 3-Screen Challenge Differentiate
Windows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
OPC: The Ins and Outs to What It s About
OPC: The Ins and Outs to What It s About The Every Man s Guide to OPC Darek Kominek, P. Eng. Alberta, Canada - 2009 Executive Summary The Every Man s Guide to OPC is an easy-toread overview of the most
FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE
FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE The demand for cloud infrastructure is rapidly increasing, the world of information is becoming application and
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
WHAT IS ENTERPRISE OPEN SOURCE?
WHITEPAPER WHAT IS ENTERPRISE OPEN SOURCE? ENSURING YOUR IT INFRASTRUCTURE CAN SUPPPORT YOUR BUSINESS BY DEB WOODS, INGRES CORPORATION TABLE OF CONTENTS: 3 Introduction 4 Developing a Plan 4 High Availability
70-646 R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day
70-646 R3: Windows Server 2008 Administration Course Length: 4 Day Course Overview This course will prepare the student for Exam 70-646: Pro: Windows Server 2008, Server Administrator. Topics covered include
Symantec NetBackup 7.5 for VMware
V-Ray visibility into virtual machine protection Solution Overview: Data Protection Overview There is little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped
Windows TCP Chimney: Network Protocol Offload for Optimal Application Scalability and Manageability
White Paper Windows TCP Chimney: Network Protocol Offload for Optimal Application Scalability and Manageability The new TCP Chimney Offload Architecture from Microsoft enables offload of the TCP protocol
IBM TotalStorage Network Attached Storage 100
1U low-profile IBM NAS solution for central management of remote and distributed locations IBM TotalStorage Network Attached Storage 100 Model R12 Ease of use and ease of management Web-browser interface
Frequently Asked Questions: EMC ViPR Software- Defined Storage Software-Defined Storage
Frequently Asked Questions: EMC ViPR Software- Defined Storage Software-Defined Storage Table of Contents What's New? Platform Questions Customer Benefits Fit with Other EMC Products What's New? What is
The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment
The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment Introduction... 2 Virtualization addresses key challenges facing IT today... 2 Introducing Virtuozzo... 2 A virtualized environment
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
A Cloud WHERE PHYSICAL ARE TOGETHER AT LAST
A Cloud WHERE PHYSICAL AND VIRTUAL STORAGE ARE TOGETHER AT LAST Not all Cloud solutions are the same so how do you know which one is right for your business now and in the future? NTT Communications ICT
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
EPICenter Network Management Software
EPICenter Network Management Software EPICenter management suite is a scalable full-featured network management tool that simplifies configuring, troubleshooting and status monitoring of IP-based networks.
Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication
PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this
WHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business
WHITE PAPER Data Center Fabrics Why the Right Choice is so Important to Your Business Introduction Data center fabrics are emerging as the preferred architecture for next-generation virtualized data centers,
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
September 2009 Cloud Storage for Cloud Computing
September 2009 Cloud Storage for Cloud Computing This paper is a joint production of the Storage Networking Industry Association and the Open Grid Forum. Copyright 2009 Open Grid Forum, Copyright 2009
Introduction to Network Management
Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function
How To Set Up An Ip Trunk For A Business
Charter Business : White paper SIP Trunking: A new voice in communications service WHITE PAPER With the rise of next-generation technology, business customers have more options than ever from providers
Using HP StoreOnce D2D systems for Microsoft SQL Server backups
Technical white paper Using HP StoreOnce D2D systems for Microsoft SQL Server backups Table of contents Executive summary 2 Introduction 2 Technology overview 2 HP StoreOnce D2D systems key features and
IBM Global Technology Services September 2007. NAS systems scale out to meet growing storage demand.
IBM Global Technology Services September 2007 NAS systems scale out to meet Page 2 Contents 2 Introduction 2 Understanding the traditional NAS role 3 Gaining NAS benefits 4 NAS shortcomings in enterprise
NETWORK ATTACHED STORAGE DIFFERENT FROM TRADITIONAL FILE SERVERS & IMPLEMENTATION OF WINDOWS BASED NAS
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology (IJCET), ENGINEERING ISSN 0976-6367(Print), ISSN 0976 & 6375(Online) TECHNOLOGY Volume 4, Issue (IJCET) 3,
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
QUICK REFERENCE GUIDE: KEY FEATURES AND BENEFITS
QUICK REFERENCE GUIDE: FOR SMALL TO MEDIUM-SIZE BUSINESSES DISK-BASED BACKUP DXi4000 SERIES DEDUPLICATION APPLIANCES Patented data deduplication technology reduces disk requirements by 90% or more Scalable
Secure Backup and Recovery Whitepaper. Securing Data in Backup and Disaster Recovery Sites with Decru DataFort Appliances
Secure Backup and Recovery Whitepaper Securing Data in Backup and Disaster Recovery Sites with Decru DataFort Appliances September 2005 Introduction... 2 Decru DataFort Storage Security Appliances... 2
IBM Tivoli Storage Manager
Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing
Backup Exec 9.1 for Windows Servers. SAN Shared Storage Option
WHITE PAPER Optimized Performance for SAN Environments Backup Exec 9.1 for Windows Servers SAN Shared Storage Option 11/20/2003 1 TABLE OF CONTENTS Executive Summary...3 Product Highlights...3 Approaches
How To Back Up A Computer To A Backup On A Hard Drive On A Microsoft Macbook (Or Ipad) With A Backup From A Flash Drive To A Flash Memory (Or A Flash) On A Flash (Or Macbook) On
Solutions with Open-E Data Storage Software (DSS V6) Software Version: DSS ver. 6.00 up40 Presentation updated: September 2010 Different s opportunities using Open-E DSS The storage market is still growing
Virtualization Support - Real Backups of Virtual Environments
Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in
Reducing Configuration Complexity with Next Gen IoT Networks
Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration
Extreme Networks: Building Cloud-Scale Networks Using Open Fabric Architectures A SOLUTION WHITE PAPER
Extreme Networks: Building Cloud-Scale Networks Using Open Fabric Architectures A SOLUTION WHITE PAPER WHITE PAPER Building Cloud- Scale Networks Abstract TABLE OF CONTENTS Introduction 2 Open Fabric-Based
Big data management with IBM General Parallel File System
Big data management with IBM General Parallel File System Optimize storage management and boost your return on investment Highlights Handles the explosive growth of structured and unstructured data Offers
Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer
ESG Lab Review Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer Abstract: This ESG Lab review documents hands-on testing of consolidated management and automated data
Data Protection Report 2008 Best Practices in Data Backup & Recovery
Data Protection Report 2008 Best Practices in Data Backup & Recovery Prepared for: Executive Summary Data is growing at an incredible rate. As a result, the demands of data protection increase as well.
