OPEN DATA CENTER ALLIANCE MASTER USAGE Model: Scale-Out Storage Rev. 1.0

Size: px
Start display at page:

Download "OPEN DATA CENTER ALLIANCE MASTER USAGE Model: Scale-Out Storage Rev. 1.0"

Transcription

1 OPEN DATA CENTER ALLIANCE MASTER USAGE Model: Scale-Out Storage Rev. 1.0

2 Table of Contents Legal Notice...3 Executive Summary...4 Purpose...5 Understanding the Scale-Out Storage Model...6 Common Scale-Out Architectures/Patterns...6 Management...7 Taxonomy...7 Usage Scenario Mapping...8 Contributors The following individuals from the Infrastructure Work Group contributed to the contents of this document: David Casper, UBS Jason Davidson, EMC Karl Kohlmoos, HDS Freeman Ratnam, Intel IT Jeff Sedayao, Intel IT Aaron Sullivan, Rackspace Terry Yoshii, Intel IT Usage Scenarios...9 Usage Scenario 1 Request more on-demand cloud storage...9 Usage Scenario 2 Increase the capacity of the network-attached storage system for a network mount-point...9 Usage Scenario 3 Increase the performance of the direct-attached storage system for an in-memory database...10 Usage Scenario 4 Scale-out with multi-protocol support for heterogeneous workloads...10 Lifecycle Model...11 On-Demand Storage Capacity Cycle Model (Consumer Perspective)...11 Scale-Out Storage Capacity (Direct- or Network-Attached) Cycle Model...11 Scale-Out with Multi-Protocol Support for Heterogeneous Workloads Cycle Model...12 Usage Requirements...13 RFP Requirements...15 Summary of Required Industry Actions

3 Legal Notice This Open Data Center Alliance SM Master Usage Model: Scale-Out Storage Rev. 1.0 document is proprietary to the Open Data Center Alliance (the Alliance ) and/or its successors and assigns. NOTICE TO USERS WHO ARE NOT OPEN DATA CENTER ALLIANCE PARTICIPANTS: Non-Alliance Participants are only granted the right to review, and make reference to or cite this document. Any such references or citations to this document must give the Alliance full attribution and must acknowledge the Alliance s copyright in this document. The proper copyright notice is as follows: 2013 Open Data Center Alliance, Inc. ALL RIGHTS RESERVED. Such users are not permitted to revise, alter, modify, make any derivatives of, or otherwise amend this document in any way without the prior express written permission of the Alliance. NOTICE TO USERS WHO ARE OPEN DATA CENTER ALLIANCE PARTICIPANTS: Use of this document by Alliance Participants is subject to the Alliance s bylaws and its other policies and procedures. NOTICE TO USERS GENERALLY: Users of this document should not reference any initial or recommended methodology, metric, requirements, criteria, or other content that may be contained in this document or in any other document distributed by the Alliance ( Initial Models ) in any way that implies the user and/or its products or services are in compliance with, or have undergone any testing or certification to demonstrate compliance with, any of these Initial Models. The contents of this document are intended for informational purposes only. Any proposals, recommendations or other content contained in this document, including, without limitation, the scope or content of any methodology, metric, requirements, or other criteria disclosed in this document (collectively, Criteria ), does not constitute an endorsement or recommendation by Alliance of such Criteria and does not mean that the Alliance will in the future develop any certification or compliance or testing programs to verify any future implementation or compliance with any of the Criteria. LEGAL DISCLAIMER: THIS DOCUMENT AND THE INFORMATION CONTAINED HEREIN IS PROVIDED ON AN AS IS BASIS. TO THE MAXIMUM EXTENT PERMITTED BY LICABLE LAW, THE ALLIANCE (ALONG WITH THE CONTRIBUTORS TO THIS DOCUMENT) HEREBY DISCLAIM ALL REPRESENTATIONS, WARRANTIES AND/OR COVENANTS, EITHER EXPRESS OR IMPLIED, STATUTORY OR AT COMMON LAW, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPE, TITLE, VALIDITY, AND/ OR NONINFRINGEMENT. THE INFORMATION CONTAINED IN THIS DOCUMENT IS FOR INFORMATIONAL PURPES ONLY AND THE ALLIANCE MAKES NO REPRESENTATIONS, WARRANTIES AND/OR COVENANTS AS TO THE RESULTS THAT MAY BE OBTAINED FROM THE USE OF, OR RELIANCE ON, ANY INFORMATION SET FORTH IN THIS DOCUMENT, OR AS TO THE ACCURACY OR RELIABILITY OF SUCH INFORMATION. EXCEPT AS OTHERWISE EXPRESSLY SET FORTH HEREIN, NOTHING CONTAINED IN THIS DOCUMENT SHALL BE DEEMED AS GRANTING YOU ANY KIND OF LICENSE IN THE DOCUMENT, OR ANY OF ITS CONTENTS, EITHER EXPRESSLY OR IMPLIEDLY, OR TO ANY INTELLECTUAL PROPERTY OWNED OR CONTROLLED BY THE ALLIANCE, INCLUDING, WITHOUT LIMITATION, ANY TRADEMARKS OF THE ALLIANCE. TRADEMARKS: OPEN CENTER DATA ALLIANCE SM, ODCA SM, and the OPEN DATA CENTER ALLIANCE logo are trade names, trademarks, and/or service marks (collectively Marks ) owned by Open Data Center Alliance, Inc. and all rights are reserved therein. Unauthorized use is strictly prohibited. This document does not grant any user of this document any rights to use any of the ODCA s Marks. All other service marks, trademarks and trade names reference herein are those of their respective owners. 3

4 OPEN DATA CENTER ALLIANCE MASTER USAGE Model: Scale-Out Storage Rev. 1.0 Executive Summary This Scale-Out Storage Usage Model extends the ODCA Compute Infrastructure as a Service (CIaaS) Master Usage Model 1 and specifies the common usage patterns and requirements for CIaaS storage, which have typically used a scale-out approach. Essentially, a scale-out storage system is designed so that adding more capacity or increasing performance is relatively easy, efficient, and non-disruptive. Enterprises that contend with steadily increasing data demands can adopt a just-in-time supply-chain approach useful in scenarios where it is difficult to predict upcoming storage needs. Instead of purchasing additional storage in anticipation of near-term needs, a scale-out storage system can easily increase storage capacity as needed. Similarly, when storage needs decrease, the system can scalein to reduce required capacity. Most importantly, a good scale-out architecture helps to prevent scenarios in which large enterprise systems encounter growth barriers that cause expensive re-architecting and/or rebuilding when an existing system is outgrown. Given the tremendous volumes of data handled in large-scale Internet services, companies such as Google and Facebook have come to rely on the capabilities of scale-out storage technology. Scale-out storage systems are often implemented as object- and file-based systems. These systems present a unified namespace, appearing as one high-capacity repository to store billions of files or objects. Additionally, it is expected that many other core values of storage systems such as data retention, data protection, backup, failover, and elimination of single point of failures (SPoFs) should also scale with the solution. Scale-out storage effectively meets the requirements for cloud-storage providers and software-as-a-service (SaaS) providers. A hallmark of cloud-computing technology is the perception of infinite resources. Consumers can quickly gain access to whatever level of resources is needed. Having a well-designed scale-out storage system helps to enable storage providers to efficiently offer this type of service flexibility

5 Purpose This usage model describes typical usage scenarios for scale-out storage and their corresponding requirements in order to foster industry consistency. For the storage consumer in the cloud-storage scenario, the highest-level requirement is that the perception of infinite storage resources be met. That is, the consumer can purchase as much storage as desired on-demand. It is equally important from the storage consumer perspective that they be able to order such storage from one or multiple providers in a consistent manner and also have the ability to easily move their data across providers. (Note that this usage model focuses on only scale-out storage; other ODCA usage models address service brokering as well as interoperability and portability. 2 ) The most common business driver from the consumer perspective for cloud-based scale-out storage is: On-demand capacity at service-level agreement performance. The ability to store as much content as required and never having to deal with actual low-level storage scaling, such as capacity planning, architecting, and engineering. Typical uses of such storage are for image repositories, content delivery, and business continuity. For the storage provider, the highest-level requirement is that the storage must be simple, efficient, and non-disruptive to scale storage in and out. 3 The two most common high-level business drivers from the provider perspective for scale-out storage include: Scale-Out Network-Attached Storage. 4 Network drives dedicated or shared that can efficiently grow (or shrink) without encountering architecturally disruptive growth barriers. Some common usages for such storage include typical read/write network shares, WORM 5 archiving/compliance, databases, and backup/data recovery. Scale-Out Direct-Attached Storage. 6 Like network-attached storage, the requirement is to be able to efficiently grow (or shrink) without encountering architecturally disruptive growth barriers. Some common usages for such storage include in-memory databases, single or clustered file systems, and caches. 2 The specific details of service brokering are covered in the ODCA Service Orchestration Master Usage Model. 3 This scenario applies to cloud-storage providers as well as to traditional enterprise IT storage providers. 4 IP-based (that is, the common assumption is that scaling LUNs/FC and so on is typically less suited to true scale-out operations). 5 write once, read many (WORM). 6 May include DRAM, host-based solid-state drives, non-volatile memory, and so on. The particular medium is an implementation detail; the conceptual model is agnostic. 5

6 Understanding the Scale-Out Storage Model While it is not the goal of this usage model to define and describe scale-out storage, a quick high-level description of what is meant by scaleout storage is provided as follows: Figure 1 illustrates the concept of scale-out storage as compared to scale-up storage. In order to scale to accommodate increased performance demands, scale-up storage adds more disk drives and s to deal with increasing user demand. In scale-out storage implementations, additional storage nodes are used to increase capacity. Scaling Up Storage Scaling Out Storage Storage Node Storage Node Storage Node Storage Node Storage Node Storage Node Storage Node Scale Up Scale Out Figure 1. Scale-out storage compared to scale-up storage. Common Scale-Out Architectures/Patterns The following scale-out architectures and patterns are commonly found, and scale-out designs should consider and support each: SAN array fronting multiple network-attached storage heads Shared-disk clustered file system Shared-nothing cluster Cross-node RAID Erasure coding Mirroring Low-latency, high-iops Hybrid; that is, any combination of one or more of the above 6

7 Management The following aspects need to be considered when designing scale-out storage systems: Absence of fixed or static control nodes Software aspects of scale-out Hardware aspects of scale-out Capacity scale-out Performance scale-out I/O scale-out Rapid, simple, dynamic/automated, and non-disruptive Unified namespace and volume Abstracted, dynamic virtual storage pools Control and interconnect plane aspects of scale-out Data plane aspects of scale-out Integration with CIaaS/virtualization Sustaining engineering API and programmability Synergies with SDN and software-defined storage 7 Taxonomy Table 1 lists the standard terms and definitions used in this document. Table 1. Terms and definitions. Actor Control Node Namespace Node Scale-Out Scale-Up Storage Consumer Storage Provider Sustaining Engineering Description One or more nodes that (dynamically) implements the control plane of a storage system. A storage presentation layer construct used to facilitate a consistent and normalized means to represent or de-reference storage location or content. A unit of storage compute or capacity that can be added or removed easily from a storage system. Typically involves adding more nodes to increase performance or capacity. Typically involves making individual nodes larger (or replacing them with larger nodes) to increase performance or capacity. A person or organization that is using storage services. Typically agnostic to underlying scale-out storage architectures. An organization providing storage services. Typically directly concerned with design, implementation, and operational details of scale-out storage. Applying patches, vulnerability updates, firmware updates, and so on to a scale-out storage system in a dynamic manner that does not disrupt the storage consumer. 7 The storage must contemplate network virtualization. This is, in essence, a virtualized SAN. Generally, network virtualization is an IP-over-IP scheme where a mesh of point-topoint tunnels for a bottom substrate of any-to-any connectivity. An end-user provisions a virtual network and is issued a subnet. Each time they attach a guest/vm (or any other end-point) they are issued an IP address via dhcp and behind the scenes a MAC that represents their virtual Ethernet device. There is an ARP Proxy function that intercepts all ARP requests, effectively shimming in between layers 2 and 3. We want to do the same thing for storage networking. Instead of an end-user, a storage administrator provisions a virtual storage network and is issued a subnet. They then attach storage nodes to this subnet to form a horizontally scaled, back-end storage tier. Subsequently, end users will provision virtual block devices. This approach implies a volume manager residing between the virtual block device that the end user attaches their guest/vm to and the underlying virtual Ethernet device attached to the virtual storage network. This volume manager is integrated with a software virtual switch (that is, an OpenVSwitch). 7

8 Usage Scenario Mapping Usage scenarios can be identified for each of the purposes identified in the Purpose section. One or more usage scenarios may apply to the purpose within a perspective. The following are the described usage scenarios. Usage scenario 1. Request more on-demand cloud storage. Usage scenario 2. Increase the capacity of the network-attached storage system for a network mount-point. Usage scenario 3. Increase the performance of the direct-attached storage system for an in-memory database. Usage scenario 4. Scale out the storage environment (both performance and capacity) for intensive workloads such as Apache Hadoop. Table 2 describe the usage scenarios and associated business drivers. Table 3 lists the actors associated with scale-out storage. Table 2. Usage scenarios and business drivers. Business Driver On-Demand Capacity Scale-Out Network-Attached Scenarios Scale-Out Direct-Attached Scenarios Scale-Out with Multi-Protocol Support for Heterogeneous Workloads Usage Scenario(s) 1 - Request more on-demand cloud storage. 2 - Increase the capacity of the network-attached storage system for a network mount-point. 3 - Increase the performance of the direct-attached storage system for an in-memory database. 4 - Scale out the storage environment (both performance and capacity) for heterogeneous workloads such as the Hadoop Distributed File System combined with the Common Internet File System. Table 3. Actors associated with scale-out storage. Actor Scale-out Block Storage Scale-out File Storage Scale-out Object Storage Images Yes Application Images Yes Application Data Yes Yes Databases Yes Temp Data Yes Yes Log Data Yes Yes Content Caching Yes Yes Yes Active Content Repository Yes Yes Content Sharing Yes Content Distribution Yes Yes Archiving Repository Yes Yes Backup Repository Yes Yes Image Repository Yes Yes Bulk Content Repository Yes Yes 8

9 Usage Scenarios Usage Scenario 1 Request more on-demand cloud storage Assumptions The cloud provider implements the Open Data Center Alliance Service Catalog Usage Model. 8 The consumer already has an existing account and storage capacity. The provider has made available an on-demand storage capacity request mechanism, such as a web-portal or API. Success Scenario 1 Upon consumer request, the provider can increase the total available storage capacity without disrupting any existing consumer storage and in time to accommodate additional consumer demand. Failure Condition 1 The provider does not disrupt any existing consumer storage but is not able to increase its supply and is unable to fulfill new consumer storage requests. Failure Condition 2 The provider is able to increase its supply, but inadvertently disrupts existing consumer storage. Usage Scenario 2 Increase the capacity of the network-attached storage system for a network mount-point Assumptions An abstraction layer, such as a global namespace or clustered file system, is in place. The consumer already has network-attached storage mounted in one or more systems. The provider has a capacity management system in place that triggers a manual or automated workflow to increase capacity. Success Scenario 1 Upon a trigger for additional capacity, the provider can increase the total available storage capacity without disrupting any existing consumer storage; that is, no mount points needs to be re-mounted and no mounts points are disrupted during the capacity increase. Failure Condition 1 The provider does not disrupt any existing consumer storage but is not able to increase its supply and is unable to fulfill new consumer storage requests. Failure Condition 2 The provider is able to increase its supply but inadvertently disrupts existing consumer storage

10 Usage Scenario 3 Increase the performance of the direct-attached storage system for an in-memory database Assumptions The consumer already has a running in-memory database (distributed across multiple hosts). The provider has a capacity management system in place that triggers a manual or automated workflow to increase performance. The database system has the ability to take advantage of additional resource nodes and spread the workload dynamically. Success Scenario 1 Upon a trigger for additional performance, the provider can increase the total available storage I/O performance without disrupting any part of the in-memory database. Failure Condition 1 The provider does not disrupt the in-memory database but is not able to add nodes and therefore is not able to scale I/O performance as required. Failure Condition 2 The provider is able to add nodes but inadvertently disrupts the in-memory database. Usage Scenario 4 Scale-out with multi-protocol support for heterogeneous workloads Assumptions An abstraction layer, such as a global namespace and clustered file system, is in place. The provider has a capacity management system in place that triggers a manual or automated workflow to increase capacity. The provider has a capacity management system in place that triggers a manual or automated workflow to increase performance. The consumer already has network-attached storage mounted in one or more systems. The consumer already has a policy in place to support multiprotocol access to data, for example reusing content from a mounted area via another common protocol, such as the Hadoop Distributed File System (HDFS), for processing. Success scenario 1 When a consumer requests a second protocol to perform additional work on data, such as analytics, the scale-out storage solution will be able to fulfill this request without making redundant copies of the source data while scaling out both storage and performance needs to meet the analytical job. Upon completion it will return back to the lower performance and capacity environment. Failure condition 1 The consumer storage is duplicated into an Nth environment to support Nth protocols. 10

11 Lifecycle Model On-Demand Storage Capacity Cycle Model (Consumer Perspective) The general theme of the lifecycle is that storage capacity can be non-disruptively increased or decreased on demand at any point in time. Figure 2 demonstrates the basic scenario. Note that the analogous scenario for scaling I/O performance in and out would follow a similar lifecycle. Initial Provision Capacity N1 Request more capacity Capacity N2 Request less capacity Request less capacity Figure 2. On-demand storage capacity lifecyle. Request more capacity Capacity N3 Capacity N4 Capacity N5 Scale-Out Storage Capacity (Direct- or Network-Attached) Cycle Model The general theme of the lifecycle is that storage capacity and/or IO can be non-disruptively increased or decreased without disrupting the existing storage usage. Whether it be direct-attached (host-based) or network-attached, the concept is that additional nodes can be efficiently and non-disruptively added. Figure 3 demonstrates the basic scenario. Capacity N 1 State consumer using existing capacity Capacity N 1 State no disruption to existing capacity Capacity N 1 State consumer using added capacity Storage Consumer Request More Capacity On-Demand New Capacity Achieved Storage Provider Provides On-Demand Capacity Request Mechanism Add Additional Storage Node(s) Provides Non-disruptive dynamic use of additional nodes Storage Infrastructure Storage Node1 Storage Node1 Storage Node3 Storage Node2 Storage Node2 Storage Node4 Figure 3. Scale-out storage capacity lifecyle. 11

12 Scale-Out with Multi-Protocol Support for Heterogeneous Workloads Cycle Model The scenario has three distinct roles: service provider admin, tenant admin, and data scientist. In this scenario the tenant admin has data stored with a service provider and needs to scale performance and capacity of their storage system to meet a data scientist s request to utilize multi-protocol support to complete an analytics process. At the end of this scenario the system needs to return to the scale-in situation with lower performance and capacity needs. As shown in Figure 4, in a non-scale storage solution there would be many copies of the same data replicated during the analytical job. In a scale solution there would be a single source of data used in all scenarios. Example workloads: Video surveillance files collected to a network share over Common Internet File System are duplicated into a HDFS area to support map-reduce jobs of web indexing, data mining, log file analysis, and machine learning. Hadoop as a Service Portal Hypervisor Server Hadoop Cluster Data Scientist Hypervisor Server Master Node Group 4.1 Hypervisor Server Create storage pool Load data into storage pool Create cluster Run analytics tasks Coordinate tasks Read/write data Retrieve data from storage pool Tear down cluster Release storage pool Worker Node Group Shared HDFS Storage Figure 4. Non-scale versus scaled storage solution. 12

13 Usage Requirements The features in Table 4 are derived from the usage scenarios and lifecycle models in the previous sections and align with the ODCA Standard Units of Measure for IaaS. 9 For this usage model, it is not intended that all of the features in a given column must be supported as a group. In practice, a given cloud service provider solution combines different service levels for different elements. For example, all Bronze performance feature requirements must first be met before combining features from any other performance level. For instance, Gold security features can be combined with Bronze. Table 5 lists the service capabilities of a feature. Table 6 lists the common scale-out architectures and patterns for each service level. Table 7 defines the terms used in Table 6. Table 4. Service levels. Bronze Silver Gold Platinum Application Basic Enterprise equivalent Critical market or business sector equivalent Military or safety-critical equivalent Security As per ODCA Provider Assurance Usage Model 10 Formal Documentation Online documentation for all service interfaces, GUIs, and command lines API Interface Standard Manual or programmatic API services in cloud provider s choice of standard Programmatic API services in cloud provider s choice of standard Programmatic API services in recognized industry standard, consistent with ODCA concepts 11 Programmatic API services in recognized industry standard, consistent with ODCA concepts 12 Capacity Scale-Out Time 13 Business day 4 hours Near-time Real-time Performance Scale-Out Time Business day 4 hours Near-time Real-time Node-Failure Recovery Point Objective 1 hour Immediate Immediate Immediate Sustaining Engineering Scheduled periodic maintenance windows Emergency maintenance downtime only Zero downtime Zero downtime Table 5. Service capabilities. Must Have High Desired Feature would give value to the customer in a way that they feel would tightly influence their purchasing decision. Without this feature, it would gate the use of the product or service in the customer s environment. Feature would be used by much of the customers environment or would be highly useful to the customer. Without this feature it may gate the use of the product or service in the customer s environment. Feature desired to be in final product; does not gate shipment and will most likely not have a direct gate on the use of the product or service in the customer s environment, but would be seen as a nice to have Same as SNIA Cloud Data Management Interface standard metadata. See 12 Ibid. 13 The service levels shown are for traditional enterprise storage SLAs. True cloud on-demand would require near- or real-time. 13

14 Table 6. Common Scale-Out Architectures/Patterns Bronze Silver Gold Platinum Storage Tiers High High High Must Have Data Protection Levels Desired Desired High Must Have Quota Enforcement High High High Must Have Monitor Usage and Performance Statistics with API Desired High High Must Have Federated Identity Management High High Must Have Must Have Pin Tenants to Nodes Desired High High Must Have De-dupe Desired Desired High Must Have Supports Data Compression Desired Desired High Must Have Data Aging Policy Desired High High Must Have Vulnerability Assessments and Reporting Desired Desired High Must Have Governance, Risk, and Compliance Desired High High Must Have Table 7. Definitions. Storage Tiers Data Protection Levels Quota Enforcement Monitor Usage and Performance Statistics w/api Federated Identity Management Pin Tenants to Nodes De-dupe Data Aging Policy Vulnerability Assessments and Reporting Governance, Risk, and Compliance Ability to assign storage pools or tiers based on performance, data is moved between tiers by policy. Data protection capabilities at file or individual object level (ability to set number of replicas and tolerate x number of disk or server failures). Ability to set, enforce, and react to quotas by tenant or group, scaling the storage system to respond to quotas as needed. Ability to monitor and report storage array components (such as arrays, LUN, capacity, configuration) for their usage and performance capabilities through APIs. A common set of policies, practices and protocols in place to manage the identity and trust into users and devices across organizations; for example, Lightweight Directory Access Protocol or Active Directory. Ability to pin a tenant to a specific node of a cluster while supporting scale out. Each tenant can have its own authentication protocols. De-duplication of data across data arrays, with negligible impact to performance. Ability to specify policies and procedures for infrequently accessed data, often moving older data into lower-cost storage. Assessment of storage controller and networking switches for known vulnerabilities. Audit level capabilities for definition, monitoring, and reporting of corporate and regulatory policies associated with specific tenants or applications. 14

15 Open Data Center Alliance: ODCA Scale-Out Storage Usage Model Rev. 1.0 RFP Requirements The following are the requirements the Alliance suggests should be included in requests for proposal (RFP) to storage providers to confirm that proposed solutions support virtual machine Interoperability and consistency among management solutions. The RFP questions are distilled from the parameters and models identified in the usage model and represent a conceptual evaluation base, instead of a specific technology analysis. The questions are intended to enable potential cloud subscribers to assist them in becoming aware of all of the relevant dimensions that they should consider in their evaluation of a proposed cloud service. These conceptual areas may lead to a potential cloud subscriber extending the questions with specific ones that pertain to their own organizations requirements. The conceptual RFP questions for the Scale-Out Storage usage model are as follows: ODCA Principle Requirement. Is the solution open? Does it work on multiple virtual and non-virtual infrastructure platforms? Is it standardsbased? Describe how the solution meets this principle and clarify any limitations it has in meeting these goals. ODCA Scale-Out Storage Usage Model Rev Is the solution able to keep time in sync across nodes while adding, removing, or replacing nodes for scale out/in? ODCA Scale-Out Storage Usage Model Rev Is the solution able to auto-recover from adding or removing nodes? Will the system auto-sense when a node has been added, removed, or replaced and automatically recover the data integrity? Does this trigger a rebalance or other intensive operation that will impact performance? ODCA Scale-Out Storage Usage Model Rev Is the solution able to dynamically detect new storage resources and add them with minimal disruption to the available resource pool? ODCA Scale-Out Storage Usage Model Rev Does the software storage presentation layer for all storage products sufficiently abstract storage clients from growth and shrinkage in the underlying storage resources? ODCA Scale-Out Storage Usage Model Rev Is the solution able to dynamically scale capacity, performance, and I/O? ODCA Scale-Out Storage Usage Model Rev Does the solution provide single-plane-of-glass management framework for storage systems deployed across a variety of physical storage topologies including multiple vendor environments, at single or multiple locations? ODCA Scale-Out Storage Usage Model Rev Does the solution enable separate data into different tiers based on service-level agreement and performance (IOPS) requirements? The solution should enable data movement between tiers seamlessly to adjust for dynamic performance requirements and technology refreshes. ODCA Scale-Out Storage Usage Model Rev Does the solution enable an online view of used and available storage capacity specific to each tenant? ODCA Scale-Out Storage Usage Model Rev Does the solution provide integrated storage platform for block and file access? The entire infrastructure should be managed by a common management interface. Click here for an online assistant, Proposed Engine Assistant Tool (PEAT), 14 to help you detail your RFP requirements. Summary of Required Industry Actions To give guidance on how to create and deploy solutions that are open, multi-vendor, and interoperable, the Alliance has identified specific areas where it suggests there should be open specifications, formal or de facto standards, or common IP-free implementations. Where the Alliance has a specific recommendation on the specification, standard or open implementation, it is called out in this usage model. In other cases, we plan to work with the industry to evaluate and recommend specifications in future releases of this document. The following industry actions are required to refine this usage model: 1. The ODCA needs to engage with SNIA to align this usage model with the SNIA s scale-out storage specification efforts

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1 sm Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1 Open Data Center Alliance Usage: Virtual Machine (VM) Interoperability in a Hybrid Cloud

More information

OPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS

OPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS OPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS Version Date Editor Description of Change 1.0 27 Aug 2014 Security WG Initial release Contributors Christophe Gévaudan UBS Tino Hirschmann

More information

OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0

OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0 sm OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0 SM Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Assumptions... 5 SaaS Interoperability

More information

OPEN DATA CENTER ALLIANCE Usage Model: Guide to Interoperability Across Clouds

OPEN DATA CENTER ALLIANCE Usage Model: Guide to Interoperability Across Clouds sm OPEN DATA CENTER ALLIANCE Usage Model: Guide to Interoperability Across Clouds SM Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Overview... 5 Interoperability... 6 Service

More information

Cloud Tech Solution at T-Systems International Cloud Integration Center

Cloud Tech Solution at T-Systems International Cloud Integration Center Cloud Tech Solution at T-Systems International Cloud Integration Center Executive Overview In 2009 T-Systems identified that in order for the organizational processes/products/services incorporating use

More information

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 sm Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Related Usage Models... 5 Reference Framework...

More information

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service Open Data Center Alliance, Inc. 3855 SW 153 rd Dr. Beaverton, OR 97003 USA Phone +1 503-619-2368 Fax: +1 503-644-6708 Email:

More information

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY sm Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY 1 Legal Notice This Open Data Center Alliance SM Usage: VM Interoperability is proprietary to the Open Data Center Alliance, Inc.

More information

OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY

OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY 2014 TABLE OF CONTENTS 3 Legal Notice 5 Executive Summary 5 ODCA Members Respond to Survey on Data Center Practices and Plans 6 Methodology 6 Growth in

More information

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 sm Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Reference Framework... 5 Applicability... 6 Related Usage Models...

More information

Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0

Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0 sm Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Reference Framework... 5 Context... 6 Applicability...

More information

Open Data Center Alliance Usage: Cloud Based Identity Provisioning Rev. 1.0

Open Data Center Alliance Usage: Cloud Based Identity Provisioning Rev. 1.0 sm Open Data Center Alliance Usage: Cloud Based Identity Provisioning Rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Reference Framework... 5 Applicability... 6 Related

More information

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS

More information

OPEN DATA CENTER ALLIANCE USAGE: Data Security Rev. 1.0

OPEN DATA CENTER ALLIANCE USAGE: Data Security Rev. 1.0 OPEN DATA CENTER ALLIANCE USAGE: Data Security Rev. 1.0 Table of Contents Legal Notice...3 Executive Summary...4 Purpose...5 Reference Framework...5 Taxonomy...5 Usage Scenarios...6 Usage Scenario Transfer

More information

OPEN DATA CENTER ALLIANCE USAGE MODEL: Provider Assurance Rev. 2.0

OPEN DATA CENTER ALLIANCE USAGE MODEL: Provider Assurance Rev. 2.0 OPEN DATA CENTER ALLIANCE USAGE MODEL: Provider Assurance Rev. 2.0 Table of Contents Legal Notice...3 Executive Summary...4 Purpose...5 Taxonomy...6 Usage Model Diagram...6 Usage Model Details...6 Usage

More information

Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0

Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0 sm Open Data Center Alliance Usage: Identity Interoperability Guide rev. 1.0 Open Data Center Alliance Usage: Identity Interoperability Guide Rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary...

More information

Big data management with IBM General Parallel File System

Big data management with IBM General Parallel File System Big data management with IBM General Parallel File System Optimize storage management and boost your return on investment Highlights Handles the explosive growth of structured and unstructured data Offers

More information

Cloud Infrastructure Foundation. Building a Flexible, Reliable and Automated Cloud with a Unified Computing Fabric from Egenera

Cloud Infrastructure Foundation. Building a Flexible, Reliable and Automated Cloud with a Unified Computing Fabric from Egenera Cloud Infrastructure Foundation Building a Flexible, Reliable and Automated Cloud with a Unified Computing Fabric from Egenera Executive Summary At its heart, cloud computing is a new operational and business

More information

Introduction to NetApp Infinite Volume

Introduction to NetApp Infinite Volume Technical Report Introduction to NetApp Infinite Volume Sandra Moulton, Reena Gupta, NetApp April 2013 TR-4037 Summary This document provides an overview of NetApp Infinite Volume, a new innovation in

More information

Storage Multi-Tenancy for Cloud Computing. Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member

Storage Multi-Tenancy for Cloud Computing. Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member March, 2010 Table of Contents Introduction...1 What is Multi-Tenancy?...2 Storage Multi-Tenancy...2 Enabling Cloud-Based Data Management CDMI...3

More information

OPEN DATA CENTER ALLIANCE USAGE MODEL: Cloud Maturity Model Rev. 2.0

OPEN DATA CENTER ALLIANCE USAGE MODEL: Cloud Maturity Model Rev. 2.0 OPEN DATA CENTER ALLIANCE USAGE MODEL: Cloud Maturity Model Rev. 2.0 Table of Contents Legal Notice...3 Executive Summary...4 Overview of the Cloud Maturity Model...5 Description of the Cloud Maturity

More information

Open Data Center Alliance Usage: SERVICE CATALOG

Open Data Center Alliance Usage: SERVICE CATALOG sm Open Data Center Alliance Usage: SERVICE CATALOG Legal Notice This Open Data Center Alliance SM Usage: Service Catalog is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS WHO ARE NOT

More information

BIG DATA-AS-A-SERVICE

BIG DATA-AS-A-SERVICE White Paper BIG DATA-AS-A-SERVICE What Big Data is about What service providers can do with Big Data What EMC can do to help EMC Solutions Group Abstract This white paper looks at what service providers

More information

Simple. Extensible. Open.

Simple. Extensible. Open. White Paper Simple. Extensible. Open. Unleash the Value of Data with EMC ViPR Global Data Services Abstract The following paper opens with the evolution of enterprise storage infrastructure in the era

More information

Cisco Secure Network Container: Multi-Tenant Cloud Computing

Cisco Secure Network Container: Multi-Tenant Cloud Computing Cisco Secure Network Container: Multi-Tenant Cloud Computing What You Will Learn Cloud services are forecast to grow dramatically in the next 5 years, providing a range of features and cost benefits for

More information

OPEN DATA CENTER ALLIANCE USAGE MODEL: Cloud Infrastructure Rev. 1.0

OPEN DATA CENTER ALLIANCE USAGE MODEL: Cloud Infrastructure Rev. 1.0 OPEN DATA CENTER ALLIANCE USAGE MODEL: Cloud Infrastructure Rev. 1.0 Table of Contents Legal Notice...3 Executive Summary...4 Definitions...5 Purpose and Audience...5 Scope and Assumptions...5 Commonalities

More information

MICROSOFT CLOUD REFERENCE ARCHITECTURE: FOUNDATION

MICROSOFT CLOUD REFERENCE ARCHITECTURE: FOUNDATION Reference Architecture Guide MICROSOFT CLOUD REFERENCE ARCHITECTURE: FOUNDATION EMC VNX, EMC VMAX, EMC ViPR, and EMC VPLEX Microsoft Windows Hyper-V, Microsoft Windows Azure Pack, and Microsoft System

More information

EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise

EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise ESSENTIALS Easy-to-use, single volume, single file system architecture Highly scalable with

More information

MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS

MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS VCE Word Template Table of Contents www.vce.com MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS January 2012 VCE Authors: Changbin Gong: Lead Solution Architect Michael

More information

Oracle Reference Architecture and Oracle Cloud

Oracle Reference Architecture and Oracle Cloud Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended

More information

Restoration Technologies. Mike Fishman / EMC Corp.

Restoration Technologies. Mike Fishman / EMC Corp. Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

Business white paper. environments. The top 5 challenges and solutions for backup and recovery

Business white paper. environments. The top 5 challenges and solutions for backup and recovery Business white paper Protecting missioncritical application environments The top 5 challenges and solutions for backup and recovery Table of contents 3 Executive summary 3 Key facts about mission-critical

More information

REDEFINE SIMPLICITY TOP REASONS: EMC VSPEX BLUE FOR VIRTUALIZED ENVIRONMENTS

REDEFINE SIMPLICITY TOP REASONS: EMC VSPEX BLUE FOR VIRTUALIZED ENVIRONMENTS REDEFINE SIMPLICITY AGILE. SCALABLE. TRUSTED. TOP REASONS: EMC VSPEX BLUE FOR VIRTUALIZED ENVIRONMENTS Redefine Simplicity: Agile, Scalable and Trusted. Mid-market and Enterprise customers as well as Managed

More information

OPTIMIZING PRIMARY STORAGE WHITE PAPER FILE ARCHIVING SOLUTIONS FROM QSTAR AND CLOUDIAN

OPTIMIZING PRIMARY STORAGE WHITE PAPER FILE ARCHIVING SOLUTIONS FROM QSTAR AND CLOUDIAN OPTIMIZING PRIMARY STORAGE WHITE PAPER FILE ARCHIVING SOLUTIONS FROM QSTAR AND CLOUDIAN CONTENTS EXECUTIVE SUMMARY The Challenges of Data Growth SOLUTION OVERVIEW 3 SOLUTION COMPONENTS 4 Cloudian HyperStore

More information

Realizing the True Potential of Software-Defined Storage

Realizing the True Potential of Software-Defined Storage Realizing the True Potential of Software-Defined Storage Who should read this paper Technology leaders, architects, and application owners who are looking at transforming their organization s storage infrastructure

More information

Planning the Migration of Enterprise Applications to the Cloud

Planning the Migration of Enterprise Applications to the Cloud Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction

More information

OPEN DATA CENTER ALLIANCE USAGE MODEL: Input/Output (I/O) Controls Rev. 2.1

OPEN DATA CENTER ALLIANCE USAGE MODEL: Input/Output (I/O) Controls Rev. 2.1 OPEN DATA CENTER ALLIANCE USAGE MODEL: Input/Output (I/O) Controls Rev. 2.1 Table of Contents Legal Notice...3 Executive Summary...4 Purpose...5 Taxonomy...5 Methods of Controlling I/O...6 Provisioning

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

journey to a hybrid cloud

journey to a hybrid cloud journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience

More information

Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008

Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Best Practices Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Installation and Configuration Guide 2010 LSI Corporation August 13, 2010

More information

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All

More information

agility made possible

agility made possible SOLUTION BRIEF CA Technologies and NetApp Integrated Service Automation Across the Data Center can you automate the provisioning and management of both virtual and physical resources across your data center

More information

Trends in Application Recovery. Andreas Schwegmann, HP

Trends in Application Recovery. Andreas Schwegmann, HP Andreas Schwegmann, HP SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations

More information

2011 FileTek, Inc. All rights reserved. 1 QUESTION

2011 FileTek, Inc. All rights reserved. 1 QUESTION 2011 FileTek, Inc. All rights reserved. 1 QUESTION 2011 FileTek, Inc. All rights reserved. 2 HSM - ILM - >>> 2011 FileTek, Inc. All rights reserved. 3 W.O.R.S.E. HOW MANY YEARS 2011 FileTek, Inc. All rights

More information

Service-Oriented Cloud Automation. White Paper

Service-Oriented Cloud Automation. White Paper Service-Oriented Cloud Automation Executive Summary A service-oriented experience starts with an intuitive selfservice IT storefront that enforces process standards while delivering ease and empowerment

More information

Software-Defined Storage: What it Means for the IT Practitioner WHITE PAPER

Software-Defined Storage: What it Means for the IT Practitioner WHITE PAPER What it Means for the IT Practitioner WHITE PAPER Extending the Power of Virtualization to Storage Server virtualization has changed the way IT runs data centers across the world. According to Gartner,

More information

MODERNIZING THE DISPERSED ENTERPRISE WITH CLOUD STORAGE GATEWAYS AND OBJECT STORAGE

MODERNIZING THE DISPERSED ENTERPRISE WITH CLOUD STORAGE GATEWAYS AND OBJECT STORAGE MODERNIZING THE DISPERSED ENTERPRISE WITH CLOUD STORAGE GATEWAYS AND OBJECT STORAGE ABSTRACT To reduce the cost and complexity of Remote Office Branch Office IT, many firms are centralizing applications

More information

MaxDeploy Hyper- Converged Reference Architecture Solution Brief

MaxDeploy Hyper- Converged Reference Architecture Solution Brief MaxDeploy Hyper- Converged Reference Architecture Solution Brief MaxDeploy Reference Architecture solutions are configured and tested for support with Maxta software- defined storage and with industry

More information

ENABLING GLOBAL HADOOP WITH EMC ELASTIC CLOUD STORAGE

ENABLING GLOBAL HADOOP WITH EMC ELASTIC CLOUD STORAGE ENABLING GLOBAL HADOOP WITH EMC ELASTIC CLOUD STORAGE Hadoop Storage-as-a-Service ABSTRACT This White Paper illustrates how EMC Elastic Cloud Storage (ECS ) can be used to streamline the Hadoop data analytics

More information

HiTech. White Paper. Storage-as-a-Service. SAN and NAS Reference Architectures leveraging Private Cloud Storage

HiTech. White Paper. Storage-as-a-Service. SAN and NAS Reference Architectures leveraging Private Cloud Storage HiTech White Paper -as-a-service SAN and NAS Reference Architectures leveraging Private Cloud About the Author Ankur Srivastava Ankur Srivastava is a Solution Architect working with the Hi Tech Industry

More information

EMC MID-RANGE STORAGE AND THE MICROSOFT SQL SERVER I/O RELIABILITY PROGRAM

EMC MID-RANGE STORAGE AND THE MICROSOFT SQL SERVER I/O RELIABILITY PROGRAM White Paper EMC MID-RANGE STORAGE AND THE MICROSOFT SQL SERVER I/O RELIABILITY PROGRAM Abstract This white paper explains the integration of EMC Mid-range Storage arrays with the Microsoft SQL Server I/O

More information

Taking control of the virtual image lifecycle process

Taking control of the virtual image lifecycle process IBM Software Thought Leadership White Paper March 2012 Taking control of the virtual image lifecycle process Putting virtual images to work for you 2 Taking control of the virtual image lifecycle process

More information

The Definitive Guide to Cloud Acceleration

The Definitive Guide to Cloud Acceleration The Definitive Guide to Cloud Acceleration Dan Sullivan sponsored by Chapter 5: Architecture of Clouds and Content Delivery... 80 Public Cloud Providers and Virtualized IT Infrastructure... 80 Essential

More information

NetApp Big Content Solutions: Agile Infrastructure for Big Data

NetApp Big Content Solutions: Agile Infrastructure for Big Data White Paper NetApp Big Content Solutions: Agile Infrastructure for Big Data Ingo Fuchs, NetApp April 2012 WP-7161 Executive Summary Enterprises are entering a new era of scale, in which the amount of data

More information

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication

More information

RUBRIK CONVERGED DATA MANAGEMENT. Technology Overview & How It Works

RUBRIK CONVERGED DATA MANAGEMENT. Technology Overview & How It Works RUBRIK CONVERGED DATA MANAGEMENT Technology Overview & How It Works What We Solve Instantaneous application recovery and data delivery remain elusive challenges for any IT organization. Businesses demand

More information

Open Data Center Alliance Usage Model: Long Distance Workload Migration REV. 1.0

Open Data Center Alliance Usage Model: Long Distance Workload Migration REV. 1.0 sm Open Data Center Alliance Usage Model: Long Distance Workload Migration REV. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Taxonomy... 5 Assumptions... 6 Long Distance

More information

IBM Global Technology Services November 2009. Successfully implementing a private storage cloud to help reduce total cost of ownership

IBM Global Technology Services November 2009. Successfully implementing a private storage cloud to help reduce total cost of ownership IBM Global Technology Services November 2009 Successfully implementing a private storage cloud to help reduce total cost of ownership Page 2 Contents 2 Executive summary 3 What is a storage cloud? 3 A

More information

EMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers

EMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers EMC VPLEX FAMILY Continuous Availability and Data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is

More information

EMC: The Virtual Data Center

EMC: The Virtual Data Center EMC: The Virtual Data Center Dejan Živanovi EMC Technology Solution Group Sr. Technology Consultant High-End platforms & Business Continuity 1 Business Challenges Data growing at 70% annually 80% are files

More information

Manage rapid NAS data growth while reducing storage footprint and costs

Manage rapid NAS data growth while reducing storage footprint and costs IBM Systems and Technology White Paper System Storage Manage rapid NAS data growth while reducing storage footprint and costs IBM Random Access Compression Engine operates in real time without performance

More information

Confidence in the Cloud Five Ways to Capitalize with Symantec

Confidence in the Cloud Five Ways to Capitalize with Symantec Five Ways to Capitalize with Symantec Solution Brief: Confidence in the Cloud Confidence in the Cloud Contents Overview...............................................................................................

More information

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is

More information

Effective Storage Management for Cloud Computing

Effective Storage Management for Cloud Computing IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations

More information

next generation architecture created to safeguard in virtual & physical environments to deliver comprehensive UNIFIED DATA PROTECTION SOLUTION BRIEF

next generation architecture created to safeguard in virtual & physical environments to deliver comprehensive UNIFIED DATA PROTECTION SOLUTION BRIEF next generation architecture created to safeguard in virtual & physical environments to deliver comprehensive UNIFIED DATA PROTECTION SOLUTION BRIEF CA arcserve UDP Fueled by data growth and technology

More information

WHITE PAPER. Software Defined Storage Hydrates the Cloud

WHITE PAPER. Software Defined Storage Hydrates the Cloud WHITE PAPER Software Defined Storage Hydrates the Cloud Table of Contents Overview... 2 NexentaStor (Block & File Storage)... 4 Software Defined Data Centers (SDDC)... 5 OpenStack... 5 CloudStack... 6

More information

CompTIA Cloud+ 9318; 5 Days, Instructor-led

CompTIA Cloud+ 9318; 5 Days, Instructor-led CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,

More information

Improving IT Operational Efficiency with a VMware vsphere Private Cloud on Lenovo Servers and Lenovo Storage SAN S3200

Improving IT Operational Efficiency with a VMware vsphere Private Cloud on Lenovo Servers and Lenovo Storage SAN S3200 Improving IT Operational Efficiency with a VMware vsphere Private Cloud on Lenovo Servers and Lenovo Storage SAN S3200 Most organizations routinely utilize a server virtualization infrastructure to benefit

More information

Intel Service Assurance Administrator. Product Overview

Intel Service Assurance Administrator. Product Overview Intel Service Assurance Administrator Product Overview Running Enterprise Workloads in the Cloud Enterprise IT wants to Start a private cloud initiative to service internal enterprise customers Find an

More information

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Agenda ADP Cloud Vision and Requirements Introduction to SUSE Cloud Overview Whats New VMWare intergration HyperV intergration ADP

More information

Object Storage: Out of the Shadows and into the Spotlight

Object Storage: Out of the Shadows and into the Spotlight Technology Insight Paper Object Storage: Out of the Shadows and into the Spotlight By John Webster December 12, 2012 Enabling you to make the best technology decisions Object Storage: Out of the Shadows

More information

WHITEPAPER. A Technical Perspective on the Talena Data Availability Management Solution

WHITEPAPER. A Technical Perspective on the Talena Data Availability Management Solution WHITEPAPER A Technical Perspective on the Talena Data Availability Management Solution BIG DATA TECHNOLOGY LANDSCAPE Over the past decade, the emergence of social media, mobile, and cloud technologies

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

IT Infrastructure Services. White Paper. Utilizing Software Defined Network to Ensure Agility in IT Service Delivery

IT Infrastructure Services. White Paper. Utilizing Software Defined Network to Ensure Agility in IT Service Delivery IT Infrastructure Services White Paper Utilizing Software Defined Network to Ensure Agility in IT Service Delivery About the Author Siddhesh Rane Siddhesh Rane is a Technical Architect and part of the

More information

HADOOP SOLUTION USING EMC ISILON AND CLOUDERA ENTERPRISE Efficient, Flexible In-Place Hadoop Analytics

HADOOP SOLUTION USING EMC ISILON AND CLOUDERA ENTERPRISE Efficient, Flexible In-Place Hadoop Analytics HADOOP SOLUTION USING EMC ISILON AND CLOUDERA ENTERPRISE Efficient, Flexible In-Place Hadoop Analytics ESSENTIALS EMC ISILON Use the industry's first and only scale-out NAS solution with native Hadoop

More information

Scaling up to Production

Scaling up to Production 1 Scaling up to Production Overview Productionize then Scale Building Production Systems Scaling Production Systems Use Case: Scaling a Production Galaxy Instance Infrastructure Advice 2 PRODUCTIONIZE

More information

How To Build An Operating Software For The Enterprise

How To Build An Operating Software For The Enterprise Intel Information Technology Cloud Computing October 2009 Architecting Software as a for the Enterprise Executive Overview The reference architecture provides a proven template solution that Intel SaaS

More information

Configuring Celerra for Security Information Management with Network Intelligence s envision

Configuring Celerra for Security Information Management with Network Intelligence s envision Configuring Celerra for Security Information Management with Best Practices Planning Abstract appliance is used to monitor log information from any device on the network to determine how that device is

More information

Frequently Asked Questions: EMC ViPR Software- Defined Storage Software-Defined Storage

Frequently Asked Questions: EMC ViPR Software- Defined Storage Software-Defined Storage Frequently Asked Questions: EMC ViPR Software- Defined Storage Software-Defined Storage Table of Contents What's New? Platform Questions Customer Benefits Fit with Other EMC Products What's New? What is

More information

LEVERAGE VBLOCK SYSTEMS FOR Esri s ArcGIS SYSTEM

LEVERAGE VBLOCK SYSTEMS FOR Esri s ArcGIS SYSTEM Leverage Vblock Systems for Esri's ArcGIS System Table of Contents www.vce.com LEVERAGE VBLOCK SYSTEMS FOR Esri s ArcGIS SYSTEM August 2012 1 Contents Executive summary...3 The challenge...3 The solution...3

More information

SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX

SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX White Paper SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX Abstract This white paper explains the benefits to the extended enterprise of the on-

More information

ENTERPRISE VIRTUALIZATION ONE PLATFORM FOR ALL DATA

ENTERPRISE VIRTUALIZATION ONE PLATFORM FOR ALL DATA ENTERPRISE VIRTUALIZATION ONE PLATFORM FOR ALL DATA ENTERPRISE VIRTUALIZATION ONE PLATFORM FOR ALL DATA SUMMARY ONE PLATFORM FOR ALL DATA WOULD YOU LIKE TO SAVE 20% TO 30% ON YOUR STORAGE SPEND? We can

More information

I D C T E C H N O L O G Y S P O T L I G H T. T i m e t o S c ale Out, Not Scale Up

I D C T E C H N O L O G Y S P O T L I G H T. T i m e t o S c ale Out, Not Scale Up I D C T E C H N O L O G Y S P O T L I G H T M a naging the Explosion of Enterprise Data: T i m e t o S c ale Out, Not Scale Up July 2014 Adapted from Scale-Out Meets Virtualization by Ashish Nadkarni,

More information

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013 Intel IT Cloud 2013 and Beyond Name Title Month, Day 2013 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel and the

More information

EMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst

EMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst White Paper EMC s Enterprise Hadoop Solution Isilon Scale-out NAS and Greenplum HD By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst February 2012 This ESG White Paper was commissioned

More information

All-Flash Arrays Weren t Built for Dynamic Environments. Here s Why... This whitepaper is based on content originally posted at www.frankdenneman.

All-Flash Arrays Weren t Built for Dynamic Environments. Here s Why... This whitepaper is based on content originally posted at www.frankdenneman. WHITE PAPER All-Flash Arrays Weren t Built for Dynamic Environments. Here s Why... This whitepaper is based on content originally posted at www.frankdenneman.nl 1 Monolithic shared storage architectures

More information

Implementing Software- Defined Security with CloudPassage Halo

Implementing Software- Defined Security with CloudPassage Halo WHITE PAPER Implementing Software- Defined Security with CloudPassage Halo Introduction... 2 Implementing Software-Defined Security w/cloudpassage Halo... 3 Abstraction... 3 Automation... 4 Orchestration...

More information

OPEN DATA CENTER ALLIANCE White Paper: Procurement of Cloud Services

OPEN DATA CENTER ALLIANCE White Paper: Procurement of Cloud Services OPEN DATA CENTER ALLIANCE White Paper: Procurement of Cloud Services Table of Contents Legal Notice...3 Executive Summary...4 Changes to the Traditional Procurement Process...5 Traditional Procurement

More information

Cloud File Services: October 1, 2014

Cloud File Services: October 1, 2014 Cloud File Services: SMB/CIFS and TITLE NFS in the Cloud PRESENTATION GOES HERE October 1, 2014 Webcast Presenters David Fair, SNIA ESF Business Development Chair - Intel John Reed Product Manager, Windows

More information

Hitachi Cloud Service for Content Archiving. Delivered by Hitachi Data Systems

Hitachi Cloud Service for Content Archiving. Delivered by Hitachi Data Systems SOLUTION PROFILE Hitachi Cloud Service for Content Archiving, Delivered by Hitachi Data Systems Improve Efficiencies in Archiving of File and Content in the Enterprise Bridging enterprise IT infrastructure

More information

IBM Global Technology Services September 2007. NAS systems scale out to meet growing storage demand.

IBM Global Technology Services September 2007. NAS systems scale out to meet growing storage demand. IBM Global Technology Services September 2007 NAS systems scale out to meet Page 2 Contents 2 Introduction 2 Understanding the traditional NAS role 3 Gaining NAS benefits 4 NAS shortcomings in enterprise

More information

Unparalleled demands on storage shift IT expectations for managed storage services. April 2015 TBR

Unparalleled demands on storage shift IT expectations for managed storage services. April 2015 TBR Unparalleled demands on storage shift IT expectations for managed storage services April 2015 TBR T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C. Contents Data center evolution and its impact on

More information

DEDICATED NETWORKS FOR IP STORAGE

DEDICATED NETWORKS FOR IP STORAGE DEDICATED NETWORKS FOR IP STORAGE ABSTRACT This white paper examines EMC and VMware best practices for deploying dedicated IP storage networks in medium to large-scale data centers. In addition, it explores

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

INTEGRATING CLOUD ORCHESTRATION WITH EMC SYMMETRIX VMAX CLOUD EDITION REST APIs

INTEGRATING CLOUD ORCHESTRATION WITH EMC SYMMETRIX VMAX CLOUD EDITION REST APIs White Paper INTEGRATING CLOUD ORCHESTRATION WITH EMC SYMMETRIX VMAX CLOUD EDITION REST APIs Provisioning storage using EMC Symmetrix VMAX Cloud Edition Using REST APIs for integration with VMware vcloud

More information

Leveraging the Cloud for Data Protection and Disaster Recovery

Leveraging the Cloud for Data Protection and Disaster Recovery WHITE PAPER: Leveraging the Cloud for Data Protection and Disaster Recovery Leveraging the Cloud for Data Protection and Disaster Recovery Bennett Klein DATA MANAGEMENT CUSTOMER SOLUTIONS MARCH 2012 Table

More information

EMC Disk Library with EMC Data Domain Deployment Scenario

EMC Disk Library with EMC Data Domain Deployment Scenario EMC Disk Library with EMC Data Domain Deployment Scenario Best Practices Planning Abstract This white paper is an overview of the EMC Disk Library with EMC Data Domain deduplication storage system deployment

More information

Hedvig Distributed Storage Platform with Cisco UCS

Hedvig Distributed Storage Platform with Cisco UCS REFERENCE ARCHITECTURE 1 Hedvig Distributed Storage Platform with Cisco UCS Solution Overview and Reference Architecture Elastic Scale to petabytes of data Start with as few as two nodes and scale to thousands.

More information

Helping MSPs protect Data Center resources

Helping MSPs protect Data Center resources Helping MSPs protect Data Center resources Due to shrinking IT staffing and budgets, many IT organizations are turning to Service Providers for hosting of business-critical systems and applications (i.e.

More information