Zetta Builds Primary Cloud Storage to Enterprise Specifications. Analyst: Anne MacFarland
|
|
|
- Augusta Morrison
- 10 years ago
- Views:
Transcription
1 Zetta Builds Primary Cloud Storage to Enterprise Specifications THE CLIPPER GROUP NavigatorTM Navigating Information Technology Horizons SM Published Since 1993 Report #TCG October 21, 2009 Zetta Builds Primary Cloud Storage to Enterprise Specifications Analyst: Anne MacFarland Management Summary There are many situations where strength, resilience, and security must be built in, not bolted on afterward, such as bridges and skyscrapers. The basic architecture is determinative future additions will be built around its constraints. Cloud IT infrastructure, and particularly storage clouds, have a similar need for well-thought-out design. Unlike the temporary infrastructures offered by compute clouds (think particularly of the test and development clouds that have seen early success), the value offered by service compute clouds is one of persistence. In the case of enterprise storage clouds, what they store is of high value to both its owners and to potential predators. Commercial use of cloud services mandates an approach of secure multi-tenancy. Therefore, storage clouds are defined not as much by their vastness as by the mesh architectures and control systems that give them their essential character. As a bridge for a multi-state highway (with associated utility conduits) is different from a bridge built for a two-lane back-country road, so storage clouds built for the enterprise information will be different from storage clouds built for consumer use, specific scope, or transitory information. Nonetheless, enterprise cloud storage is undeniably attractive. More organizations, particularly large organizations, are physically distributed and need an elastic, usage-priced infrastructure to meet their dynamic information use needs without affecting other IT systems. Many organizations want to avoid the costs of building, staffing and maintaining a local infrastructure for certain operations. Information, used in the right place at the right time, optimizes most businesses. Zetta, a storage cloud vendor based in Sunnyvale, CA, has approached cloud storage leveraging its distributed computing heritage and storage expertise to meet high expectations. Excluded from their focus, at least for now, are real-time, low-latency operational data (such as data marts and database/inventory clusters), where nanosecond response time is needed. Zetta s focus is on the primary, operational data of an organization's file-oriented applications. Zetta offers a range of protection options to fit the activity, use, and risk profile of the stored information. While backup and offline data recovery are accomplished by the Zetta cloud, Zetta focuses on delivering a more complete and business critical functionality. Early beta customers range from legal firms and social sites to energy, architectural engineering, and media and entertainment organizations. Their demands have focused on scalable primary file services, active archives, and bursts of storage requirements none of which are easy to meet with on-premises storage. Zetta s architecture supports these requirements and more. For more details, please read on. IN THIS ISSUE Architecting for Vastness... 2 Zetta s Storage Cloud Architecture... 2 Allaying Cloud Nightmares with Security, Availability and Integrity... 3 Pricing... 4 Conclusion... 4 The Clipper Group, Inc. - Technology Acquisition Consultants Strategic Advisors 888 Worcester Street Suite 140 Wellesley, Massachusetts U.S.A FAX Visit Clipper at Send comments to [email protected] SM
2 October 21, 2009 The Clipper Group Navigator TM Page 2 Architecting for Vastness Much has been made about the increasing bulk of enterprise information. Much has been made about its wider use. The consequences of both are implacable. Every incident of loss of customer data is intolerable. Inadequacy, tolerable at a smaller scale, will show up as large-scale catastrophes that cannot be hidden. Anomalies in data must be addressed proactively because, in the scale of vast repositories, they become significant. Security must be comprehensive. Authenticity of information must be assured even during the inevitable failure and rebuild of infrastructure elements. The high rate of data growth is expected to continue something that will require a different approach to management as well as to architecture. Yet enterprise clients still want a detailed view of their cloud storage operations this view reveals trends in business operations and the costs of those operations. A simple dashboard with red green and yellow dots will not do. Architecting for secure multi-tenancy ups the ante for each layer of the architecture. As with physical buildings, it is prudent to add door attendants, security checks, not only at the ground floor, but also in the elevator vestibules and at the entrance to individual offices. Zetta s Storage Cloud Architecture Zetta s beta customers demands are instructive. Many saw Zetta as the better alternative to building new storage infrastructure, but they had specific requirements. They needed native file system access. They had multi-threaded applications that required an inherently non-blocking architecture. Even traditional write-intensive operations would generate consequent reads that had to be well supported. Their data was growing daily. 10GbE connectivity was needed to support day-to-day use of cloud resources. To meet these important requirements, Zetta has chosen to use an N+3 paradigm (a scale-out paradigm accessorized with three spares) for all three layers of its architecture, reinsuring the resilience of the infrastructure against multiple failures. The top layer is of virtual machines. The middle layer is of solid-state drives meshed with 10 GbE Connectivity. The bottom layer is SATA. (See Exhibit 1, below.) But, it is the functionality built into these layers that provides Zetta s differentiation. Zetta has considered both the security needed for multi-tenancy, and the availability support needed for data on a vast scale. What Zetta offers its customers is vastly scalable file-based storage. There are no architectural limitations to expanding to blockbased storage and high I/O, says CEO Jeff Truehaft, but Zetta has chosen to focus initially where enterprise storage growth is most problematic, and that is file systems. Protocol Translation Layer Zetta s protocol translation layer is optimized for throughput. It contains nodes that Exhibit 1 Zetta s Tiered Architecture Source: Zetta
3 October 21, 2009 The Clipper Group Navigator TM Page 3 perform the tasks of protocol translation, volume virtualization, inline data verification, and quality of service management. When storing (writing) data, the Zetta cloud generates a write receipt that is a secure SHA 1 hash. The receipt is created as the write enters the Zetta Virtual Volume, and is persisted perpetually to verify the validity of an ultimate read back of that file, as well as optionally returned to the customer for verification that what was sent by the customer was what was received by Zetta. Along the way, it is used to detect network errors and silent corruption, and to enforce quality of service. Zetta uses Xen virtual machines 2 to allot a VM for each mount point. This gives each customer separation at the access tier a separation and security that are inherited through underlying levels. Zetta is POSIX compatible, so no applications need be changed to use the Zetta cloud. CIFS, NFS, Web DAV, and other protocols are supported natively, avoiding the need for a protocol translation appliance 3 that might be another point of failure. POSIX compatibility also implies a strong consistency model required by most in-use enterprise applications today, and a rarity among existing cloud storage providers. Zetta File System Management Layer Zetta s middle layer is IOPS optimized, using SSDs, and VRAM to minimize latency and media memory for high throughput. It consists of redundant 10GbE-connected SSD servers. The functionality of this layer includes volume management, data protection management, and quality of service continuity. In this layer, Zetta captures file metadata and stores it separately from the data in a very fast, SSD-enabled data store. This data store facilitates file anomaly detection and file recreation from its constituent stored chunks. 4 The middle layer also handles chunk/extent management and chunk/extent hash management. Since security is handled at the protocol 1 SHA stands for Secure Hash Algorithms. Zetta feels that CRC (Cyclical Redundancy Checking) is not good enough for multi-tenancy situations. Cyclic redundancy checks are not secure, but are used often to check for accidental changes in data in transmission. 2 Zetta intends to support other virtual machines in the future. 3 Such an appliance could also introduce locking and file management that do not scale. 4 In the future, this architecture could also support findability actions, like crawling and indexing, which could be accomplished without hitting the stored data. (in motion) and data management (at rest) tiers, the middle tier can use hash codes to check for accidental changes in data, and use Zetta s strong encoding algorithm to repair errors using spare system cycles. Data Chunk Management Layer Zetta s bottom tier is density optimized. This layer handles traditional storage management functions, data validation, and encryptionat-rest of the chunks and extents stored. This granular level of encryption is key to scalable and secure multi-tenancy that still can leverage striping and redundancy to support a variety of qualities of essential service factors (e.g., availability). Think of it as an apartment house with security at entry, private elevators, and a key to your personal spaces. Each storage node is a full computer, not a dumb disk shelf, enabling the encryption-at-rest and data validation functions. The physical storage is SATA. Zetta uses its own RAID 6 N+3 system of striping and extending. The striping is across at least eleven nodes with three parity stripes, so up to three full node failures are survivable. This approach also allows the system to avoid rebuilding an entire file. Sensing corruption at the chunk level is key to a fast, local, and less-expensive chunk rebuild. Rebuild and repair inevitably impact performance, so they should be as local as possible. This resilient, tiered architecture allows Zetta to insure that data, wherever written, is valid well before the read event. It proactively addresses bit-errors and silent corruption problems that are manageable in small, local arrays, but are significant issues in large clouds. The virtualization that is inherent in Zetta s architecture also allows files to be instantly provisioned and quickly grown. Allaying Cloud Nightmares with Security, Availability and Integrity Security pervades the Zetta storage experience end-to-end. For transport to the cloud, Zetta supports protocol-enabled wire-line encryption. Some protocols support this; others do not. To ensure transit security where the protocols available do not support wire-line encryption, Zetta offers support for virtual private circuits with a cross-connect for redundancy or VPNs with SSH. Zetta has developed its own PKI that uses
4 October 21, 2009 The Clipper Group Navigator TM Page 4 standard key management. It is a performanceoriented sub-key system that supports volume rebuilds. For integrity at the chunk level (bottom layer), security must be very granular. This also ensures that encryption at rest will not affect performance, since retrieval is parallelized. Data integrity and availability are similarly assured at every level of the cloud architecture integrity by the write receipt, the availability by the N+3 paradigm, the non-blocking architecture of all layers, and the granularity of rebuilds. This is an architecture built to address risk, not to ignore it. Zetta s cloud solution is a storage architecture built to handle enterprise data loads and enterprise service requirements. It can address the consequences of success as well as assuage worries about insufficiency. System Management Portal Zetta s beta customers have said they want snapshots, native file systems access, and georeplication for disaster recovery. They want a complete detailed view of their data and the events that occur but they want to set policies for expected actions and let the cloud make it so. They want to leverage the cloud-based instant automated rebuild when needed but also want to know when such incidents happen, how long the rebuild will take, and when it is complete. After all, while it may house data belonging to second tier (business critical, as opposed to mission critical) applications, it still is primary data that is important to the enterprise. Zetta s management interface supports this level of detail. There is also a need for disaster recovery remoteness. In its beta stage, remoteness is limited to the Bay Area of California. Soon after launch, Zetta will add sites in southern California, Virginia, and New Jersey to its Santa Clara original site. Two additional sites in central United States will be added in With these expanding cloud sites, Zetta can meet this need now for customers in the US and will meet it for all customers in capacity. These structures meet the needs of small organizations and those with seasonal needs, as well as those looking for a longer-term solution for their CapEx pains. The cost of connectivity to cloud storage is another concern of many cloud customers. Early experience with the efficiency of Zetta s architecture has led to a guarantee that connectivity costs will never be more than 20% of the total cost of Zetta Cloud service, even with adverse use cases, such as high monthly data turnover. Conclusion Zetta throws a whole lot of hardware at the cloud storage challenge but it uses this hardware well to support enterprise-style availability and secure multi-tenancy that are basic requirements for many organizations. What makes their solution affordable is how they have architected their storage cloud for both resilience and very high utilization. If these characteristics suit your organization, Zetta is worth a closer look. SM Pricing The Zetta pricing model is for one base price that will include all features, customer service, and customer support. This price will be $.25/GB/month for 1TB. There are discounts for larger footprint volumes, and for longer-term contracts. Zetta will allow month-to-month usage, with the monthly bills based on net average
5 October 21, 2009 The Clipper Group Navigator TM Page 5 About The Clipper Group, Inc. The Clipper Group, Inc., is an independent consulting firm specializing in acquisition decisions and strategic advice regarding complex, enterprise-class information technologies. Our team of industry professionals averages more than 25 years of real-world experience. A team of staff consultants augments our capabilities, with significant experience across a broad spectrum of applications and environments. The Clipper Group can be reached at and found on the web at About the Author Anne MacFarland is Director of Information Solutions for The Clipper Group. Ms. MacFarland specializes in strategic business solutions offered by enterprise systems, software, and storage vendors, in trends in enterprise systems and networks, and in explaining these trends and the underlying technologies in simple business terms. She joined The Clipper Group after a long career in library systems, business archives, consulting, research, and freelance writing. Ms. MacFarland earned a Bachelor of Arts degree from Cornell University, where she was a College Scholar, and a Masters of Library Science from Southern Connecticut State University. Reach Anne MacFarland via at [email protected] or at Ext (Please dial 128 when you hear the automated attendant.) Regarding Trademarks and Service Marks The Clipper Group Navigator, The Clipper Group Explorer, The Clipper Group Observer, The Clipper Group Captain s Log, The Clipper Group Voyager, Clipper Notes, and clipper.com are trademarks of The Clipper Group, Inc., and the clipper ship drawings, Navigating Information Technology Horizons, and teraproductivity are service marks of The Clipper Group, Inc. The Clipper Group, Inc., reserves all rights regarding its trademarks and service marks. All other trademarks, etc., belong to their respective owners. Disclosure Officers and/or employees of The Clipper Group may own as individuals, directly or indirectly, shares in one or more companies discussed in this bulletin. Company policy prohibits any officer or employee from holding more than one percent of the outstanding shares of any company covered by The Clipper Group. The Clipper Group, Inc., has no such equity holdings. Regarding the Information in this Issue The Clipper Group believes the information included in this report to be accurate. Data has been received from a variety of sources, which we believe to be reliable, including manufacturers, distributors, or users of the products discussed herein. The Clipper Group, Inc., cannot be held responsible for any consequential damages resulting from the application of information or opinions contained in this report.
VENDOR-AGNOSTIC EXPLANATIONS AND ADVICE FOR THE INFORMATION TECHNOLOGY BUYER. Evaluating Email Archiving Solutions
P Evaluating Email Archiving Solutions Clipper Notes VENDOR-AGNOSTIC EXPLANATIONS AND ADVICE FOR THE INFORMATION TECHNOLOGY BUYER New in 2007 Report #TCG2007048 March 31, 2007 Evaluating Email Archiving
The Design and Implementation of the Zetta Storage Service. October 27, 2009
The Design and Implementation of the Zetta Storage Service October 27, 2009 Zetta s Mission Simplify Enterprise Storage Zetta delivers enterprise-grade storage as a service for IT professionals needing
EMC NetWorker Rounds Out Deduplication Support with EMC Data Domain Boost. Analyst: Michael Fisch
EMC NetWorker Rounds Out Deduplication Support with EMC Data Domain Boost THE CLIPPER GROUP NavigatorTM Published Since 1993 Report #TCG2010046 October 4, 2010 EMC NetWorker Rounds Out Deduplication Support
Ten Reasons Why You Should Consider Enterprise-Class Tape for Open Systems Storage
Ten Reasons Why You Should Consider Enterprise-Class Tape for Open Systems Storage THE CLIPPER GROUP Captain s Log TM Published Since 2001 Report #TCG2010025 July 12, 2011 Ten Reasons Why You Should Consider
Cloud-integrated Storage What & Why
Cloud-integrated Storage What & Why Table of Contents Overview...3 CiS architecture...3 Enterprise-class storage platform...4 Enterprise tier 2 SAN storage...4 Activity-based storage tiering and data ranking...5
Whitepaper. NexentaConnect for VMware Virtual SAN. Full Featured File services for Virtual SAN
Whitepaper NexentaConnect for VMware Virtual SAN Full Featured File services for Virtual SAN Table of Contents Introduction... 1 Next Generation Storage and Compute... 1 VMware Virtual SAN... 2 Highlights
Amazon Cloud Storage Options
Amazon Cloud Storage Options Table of Contents 1. Overview of AWS Storage Options 02 2. Why you should use the AWS Storage 02 3. How to get Data into the AWS.03 4. Types of AWS Storage Options.03 5. Object
Microsoft Windows Server Hyper-V in a Flash
Microsoft Windows Server Hyper-V in a Flash Combine Violin s enterprise-class storage arrays with the ease and flexibility of Windows Storage Server in an integrated solution to achieve higher density,
WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression
WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression Sponsored by: Oracle Steven Scully May 2010 Benjamin Woo IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA
EMC NetWorker Becomes Access Portal for Next-Gen Backup and Recovery
EMC NetWorker Becomes Access Portal for Next-Gen Backup and Recovery THE CLIPPER GROUP NavigatorTM Navigating Information Technology Horizons SM Published Since 1993 Report #TCG200801 January 2, 2008 EMC
EMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
Maxta Storage Platform Enterprise Storage Re-defined
Maxta Storage Platform Enterprise Storage Re-defined WHITE PAPER Software-Defined Data Center The Software-Defined Data Center (SDDC) is a unified data center platform that delivers converged computing,
EMC DATA DOMAIN OPERATING SYSTEM
ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read
Cloud-integrated Enterprise Storage. Cloud-integrated Storage What & Why. Marc Farley
Cloud-integrated Enterprise Storage Cloud-integrated Storage What & Why Marc Farley Table of Contents Overview... 3 CiS architecture... 3 Enterprise-class storage platform... 4 Enterprise tier 2 SAN storage...
How To Make A Backup System More Efficient
Identifying the Hidden Risk of Data De-duplication: How the HYDRAstor Solution Proactively Solves the Problem October, 2006 Introduction Data de-duplication has recently gained significant industry attention,
Object Storage: Out of the Shadows and into the Spotlight
Technology Insight Paper Object Storage: Out of the Shadows and into the Spotlight By John Webster December 12, 2012 Enabling you to make the best technology decisions Object Storage: Out of the Shadows
INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT
INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT UNPRECEDENTED OBSERVABILITY, COST-SAVING PERFORMANCE ACCELERATION, AND SUPERIOR DATA PROTECTION KEY FEATURES Unprecedented observability
Kaminario K2 All-Flash Array
Kaminario K2 All-Flash Array The Kaminario K2 all-flash storage array delivers predictable performance, cost, scale, resiliency and simplicity so organizations can handle ever-changing and unforeseen business
A Virtual Filer for VMware s Virtual SAN A Maginatics and VMware Joint Partner Brief
A Virtual Filer for VMware s Virtual SAN A Maginatics and VMware Joint Partner Brief With the massive growth of unstructured data in today s enterprise environments, storage IT administrators are constantly
June 2009. Blade.org 2009 ALL RIGHTS RESERVED
Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION A DIABLO WHITE PAPER AUGUST 2014 Ricky Trigalo Director of Business Development Virtualization, Diablo Technologies
Object Storage: A Growing Opportunity for Service Providers. White Paper. Prepared for: 2012 Neovise, LLC. All Rights Reserved.
Object Storage: A Growing Opportunity for Service Providers Prepared for: White Paper 2012 Neovise, LLC. All Rights Reserved. Introduction For service providers, the rise of cloud computing is both a threat
Long term retention and archiving the challenges and the solution
Long term retention and archiving the challenges and the solution NAME: Yoel Ben-Ari TITLE: VP Business Development, GH Israel 1 Archive Before Backup EMC recommended practice 2 1 Backup/recovery process
Designing a Cloud Storage System
Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes
StorReduce Technical White Paper Cloud-based Data Deduplication
StorReduce Technical White Paper Cloud-based Data Deduplication See also at storreduce.com/docs StorReduce Quick Start Guide StorReduce FAQ StorReduce Solution Brief, and StorReduce Blog at storreduce.com/blog
Introduction to NetApp Infinite Volume
Technical Report Introduction to NetApp Infinite Volume Sandra Moulton, Reena Gupta, NetApp April 2013 TR-4037 Summary This document provides an overview of NetApp Infinite Volume, a new innovation in
Business white paper. environments. The top 5 challenges and solutions for backup and recovery
Business white paper Protecting missioncritical application environments The top 5 challenges and solutions for backup and recovery Table of contents 3 Executive summary 3 Key facts about mission-critical
StarWind Virtual SAN for Microsoft SOFS
StarWind Virtual SAN for Microsoft SOFS Cutting down SMB and ROBO virtualization cost by using less hardware with Microsoft Scale-Out File Server (SOFS) By Greg Schulz Founder and Senior Advisory Analyst
MaxDeploy Ready. Hyper- Converged Virtualization Solution. With SanDisk Fusion iomemory products
MaxDeploy Ready Hyper- Converged Virtualization Solution With SanDisk Fusion iomemory products MaxDeploy Ready products are configured and tested for support with Maxta software- defined storage and with
Taking Linux File and Storage Systems into the Future. Ric Wheeler Director Kernel File and Storage Team Red Hat, Incorporated
Taking Linux File and Storage Systems into the Future Ric Wheeler Director Kernel File and Storage Team Red Hat, Incorporated 1 Overview Going Bigger Going Faster Support for New Hardware Current Areas
Nutanix Tech Note. Configuration Best Practices for Nutanix Storage with VMware vsphere
Nutanix Tech Note Configuration Best Practices for Nutanix Storage with VMware vsphere Nutanix Virtual Computing Platform is engineered from the ground up to provide enterprise-grade availability for critical
High Availability with Windows Server 2012 Release Candidate
High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions
EMC CLOUDARRAY PRODUCT DESCRIPTION GUIDE
EMC CLOUDARRAY PRODUCT DESCRIPTION GUIDE INTRODUCTION IT organizations today grapple with two critical data storage challenges: the exponential growth of data and an increasing need to keep more data for
Identifying the Hidden Risk of Data Deduplication: How the HYDRAstor TM Solution Proactively Solves the Problem
Identifying the Hidden Risk of Data Deduplication: How the HYDRAstor TM Solution Proactively Solves the Problem Advanced Storage Products Group Table of Contents 1 - Introduction 2 Data Deduplication 3
Achieving Real-Time Business Solutions Using Graph Database Technology and High Performance Networks
WHITE PAPER July 2014 Achieving Real-Time Business Solutions Using Graph Database Technology and High Performance Networks Contents Executive Summary...2 Background...3 InfiniteGraph...3 High Performance
White Paper Storage for Big Data and Analytics Challenges
White Paper Storage for Big Data and Analytics Challenges Abstract Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10
Evaluation of Enterprise Data Protection using SEP Software
Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &
Introduction to Gluster. Versions 3.0.x
Introduction to Gluster Versions 3.0.x Table of Contents Table of Contents... 2 Overview... 3 Gluster File System... 3 Gluster Storage Platform... 3 No metadata with the Elastic Hash Algorithm... 4 A Gluster
Copyright 2011, Storage Strategies Now, Inc. All Rights Reserved.
Likewise Storage Services provides OEM NAS developers with file services and security Linux and Unix appliances can provide full file, identity and security services for Windows clients By James E. Bagley
THE EMC ISILON STORY. Big Data In The Enterprise. Copyright 2012 EMC Corporation. All rights reserved.
THE EMC ISILON STORY Big Data In The Enterprise 2012 1 Big Data In The Enterprise Isilon Overview Isilon Technology Summary 2 What is Big Data? 3 The Big Data Challenge File Shares 90 and Archives 80 Bioinformatics
Scale out NAS on the outside, Object storage on the inside
Exablox Company and Business Update Douglas Brockett, CEO Launched April 2013 (Founded 2010) OneBlox - scale-out storage for the enterprise - converged storage for primary and backup / archival data OneSystem
Microsoft Windows Server in a Flash
Microsoft Windows Server in a Flash Combine Violin s enterprise-class storage with the ease and flexibility of Windows Storage Server in an integrated solution so you can achieve higher performance and
Got Files? Get Cloud!
I D C V E N D O R S P O T L I G H T Got Files? Get Cloud! November 2010 Adapted from State of File-Based Storage Use in Organizations by Richard Villars, IDC #221138 Sponsored by F5 Networks The explosion
FLASH 15 MINUTE GUIDE DELIVER MORE VALUE AT LOWER COST WITH XTREMIO ALL- FLASH ARRAY Unparal eled performance with in- line data services al the time
FLASH 15 MINUTE GUIDE DELIVER MORE VALUE AT LOWER COST WITH XTREMIO ALL- FLASH ARRAY Unparalleled performance with in- line data services all the time OVERVIEW Opportunities to truly innovate are rare.
Trends in Enterprise Backup Deduplication
Trends in Enterprise Backup Deduplication Shankar Balasubramanian Architect, EMC 1 Outline Protection Storage Deduplication Basics CPU-centric Deduplication: SISL (Stream-Informed Segment Layout) Data
Running Highly Available, High Performance Databases in a SAN-Free Environment
TECHNICAL BRIEF:........................................ Running Highly Available, High Performance Databases in a SAN-Free Environment Who should read this paper Architects, application owners and database
High Performance Server SAN using Micron M500DC SSDs and Sanbolic Software
High Performance Server SAN using Micron M500DC SSDs and Sanbolic Software White Paper Overview The Micron M500DC SSD was designed after months of close work with major data center service providers and
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...
THE SUMMARY. ARKSERIES - pg. 3. ULTRASERIES - pg. 5. EXTREMESERIES - pg. 9
PRODUCT CATALOG THE SUMMARY ARKSERIES - pg. 3 ULTRASERIES - pg. 5 EXTREMESERIES - pg. 9 ARK SERIES THE HIGH DENSITY STORAGE FOR ARCHIVE AND BACKUP Unlimited scalability Painless Disaster Recovery The ARK
EMC IRODS RESOURCE DRIVERS
EMC IRODS RESOURCE DRIVERS PATRICK COMBES: PRINCIPAL SOLUTION ARCHITECT, LIFE SCIENCES 1 QUICK AGENDA Intro to Isilon (~2 hours) Isilon resource driver Intro to ECS (~1.5 hours) ECS Resource driver Possibilities
Big data Devices Apps
Trends driving IT pressures Cloud Big data Devices Apps Devices: Info Workers Will Erase Boundary Between enterprise And Consumer Technologies. Forrester Research. August 30, 2012 Apps: Gartner: Predicts
ZADARA STORAGE. Managed, hybrid storage EXECUTIVE SUMMARY. Research Brief
ZADARA STORAGE Managed, hybrid storage Research Brief EXECUTIVE SUMMARY In 2013, Neuralytix first documented Zadara s rise to prominence in the then, fledgling integrated on-premise and in-cloud storage
Deploying Affordable, High Performance Hybrid Flash Storage for Clustered SQL Server
Deploying Affordable, High Performance Hybrid Flash Storage for Clustered SQL Server Flash storage adoption has increased in recent years, as organizations have deployed it to support business applications.
EMC XTREMIO EXECUTIVE OVERVIEW
EMC XTREMIO EXECUTIVE OVERVIEW COMPANY BACKGROUND XtremIO develops enterprise data storage systems based completely on random access media such as flash solid-state drives (SSDs). By leveraging the underlying
Promise of Low-Latency Stable Storage for Enterprise Solutions
Promise of Low-Latency Stable Storage for Enterprise Solutions Janet Wu Principal Software Engineer Oracle [email protected] Santa Clara, CA 1 Latency Sensitive Applications Sample Real-Time Use Cases
Understanding Enterprise NAS
Anjan Dave, Principal Storage Engineer LSI Corporation Author: Anjan Dave, Principal Storage Engineer, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA
Getting performance & scalability on standard platforms, the Object vs Block storage debate. Copyright 2013 MPSTOR LTD. All rights reserved.
Getting performance & scalability on standard platforms, the Object vs Block storage debate 1 December Webinar Session Getting performance & scalability on standard platforms, the Object vs Block storage
IBM ELASTIC STORAGE SEAN LEE
IBM ELASTIC STORAGE SEAN LEE Solution Architect Platform Computing Division IBM Greater China Group Agenda Challenges in Data Management What is IBM Elastic Storage Key Features Elastic Storage Server
Implementing Multi-Tenanted Storage for Service Providers with Cloudian HyperStore. The Challenge SOLUTION GUIDE
Implementing Multi-Tenanted Storage for Service Providers with Cloudian HyperStore COST EFFECTIVE SCALABLE STORAGE PLATFORM FOR CLOUD STORAGE SERVICES SOLUTION GUIDE The Challenge Service providers (MSPs/ISPs/ASPs)
EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE: MEETING NEEDS FOR LONG-TERM RETENTION OF BACKUP DATA ON EMC DATA DOMAIN SYSTEMS
SOLUTION PROFILE EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE: MEETING NEEDS FOR LONG-TERM RETENTION OF BACKUP DATA ON EMC DATA DOMAIN SYSTEMS MAY 2012 Backups are essential for short-term data recovery
NavigatorTM. Deploying Data Protection the Dell Way Dedupe Your Data on the Fly IN THIS ISSUE
Deploying Data Protection the Dell Way - Dedupe Your Data on the Fly THE CLIPPER GROUP NavigatorTM Published Since 1993 Report #TCG2013020 October 18, 2013 Deploying Data Protection the Dell Way Dedupe
ENABLING GLOBAL HADOOP WITH EMC ELASTIC CLOUD STORAGE
ENABLING GLOBAL HADOOP WITH EMC ELASTIC CLOUD STORAGE Hadoop Storage-as-a-Service ABSTRACT This White Paper illustrates how EMC Elastic Cloud Storage (ECS ) can be used to streamline the Hadoop data analytics
Direct NFS - Design considerations for next-gen NAS appliances optimized for database workloads Akshay Shah Gurmeet Goindi Oracle
Direct NFS - Design considerations for next-gen NAS appliances optimized for database workloads Akshay Shah Gurmeet Goindi Oracle Agenda Introduction Database Architecture Direct NFS Client NFS Server
MaxDeploy Hyper- Converged Reference Architecture Solution Brief
MaxDeploy Hyper- Converged Reference Architecture Solution Brief MaxDeploy Reference Architecture solutions are configured and tested for support with Maxta software- defined storage and with industry
Cloud Optimize Your IT
Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release
Data Deduplication: An Essential Component of your Data Protection Strategy
WHITE PAPER: THE EVOLUTION OF DATA DEDUPLICATION Data Deduplication: An Essential Component of your Data Protection Strategy JULY 2010 Andy Brewerton CA TECHNOLOGIES RECOVERY MANAGEMENT AND DATA MODELLING
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com
Parallels Cloud Storage White Paper Performance Benchmark Results www.parallels.com Table of Contents Executive Summary... 3 Architecture Overview... 3 Key Features... 4 No Special Hardware Requirements...
Is Hyperconverged Cost-Competitive with the Cloud?
Economic Insight Paper Is Hyperconverged Cost-Competitive with the Cloud? An Evaluator Group TCO Analysis Comparing AWS and SimpliVity By Eric Slack, Sr. Analyst January 2016 Enabling you to make the best
5 Ways to Ensure Data Availability
5 Ways to Ensure Data Availability Practical advice to make sure your data stays available no matter what Data availability is the lifeblood of your organization. It is critical for the business and customer
EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers
EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is
MICROSOFT EXCHANGE 2003. best practices BEST PRACTICES - DATA STORAGE SETUP
MICROSOFT EXCHANGE 2003 best practices BEST PRACTICES - DATA STORAGE SETUP TABLE OF CONTENTS E-mail has become a business critical communication tool 3 Build a disaster recovery solution with VSS and Data
StoneFly SCVM TM for ESXi
StoneFly TM for ESXi Add StoneFly Storage Concentrator Virtual Machine () to your VMware ESXi Server and the possibilities are endless! Reduce your CapEx and OpEx by optimized utilization of servers and
Software Defined Storage @ Microsoft. PRESENTATION TITLE GOES HERE Siddhartha Roy Cloud + Enterprise Division Microsoft Corporation
Software Defined @ Microsoft PRESENTATION TITLE GOES HERE Siddhartha Roy Cloud + Enterprise Division Microsoft Corporation Lessons Learned operating large cloud properties Industry trends Cloud scale services
Leveraging Public Cloud for Affordable VMware Disaster Recovery & Business Continuity
White Paper White Paper Managing Public Cloud Computing in the Enterprise Leveraging Public Cloud for Affordable VMware Disaster Recovery & Business Continuity A Quick Start Guide By Edward Haletky Principal
FAS6200 Cluster Delivers Exceptional Block I/O Performance with Low Latency
FAS6200 Cluster Delivers Exceptional Block I/O Performance with Low Latency Dimitris Krekoukias Systems Engineer NetApp Data ONTAP 8 software operating in Cluster-Mode is the industry's only unified, scale-out
How To Use The Hitachi Content Archive Platform
O V E R V I E W Hitachi Content Archive Platform An Active Archive Solution Hitachi Data Systems Hitachi Content Archive Platform An Active Archive Solution As companies strive to better manage information
UniFS A True Global File System
UniFS A True Global File System Introduction The traditional means to protect file data by making copies, combined with the need to provide access to shared data from multiple locations, has created an
Total Cost of Ownership Analysis
Total Cost of Ownership Analysis Abstract A total cost of ownership (TCO) analysis can measure the cost of acquiring and operating a new technology solution against a current installation. In the late
I D C V E N D O R S P O T L I G H T
I D C V E N D O R S P O T L I G H T S t o r a g e T rends: Delive r i n g M a n a g e m ent and I n t e l l i g e n c e T h r o u g h C l o u d S e r vi c es April 2013 Adapted from IDC's Worldwide Storage
We look beyond IT. Cloud Offerings
Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking
3Gen Data Deduplication Technical
3Gen Data Deduplication Technical Discussion NOTICE: This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change without notice and
NEXSAN NST STORAGE FOR THE VIRTUAL DESKTOP
NST STORAGE FOR THE VIRTUAL DESKTOP Nexsan s innovative product, the NST5000, is a hybrid storage system with unified protocols and highly dense storage for a combination of great performance, low cost,
High Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
EMC RecoverPoint and VMware Managing Data Replication and Recovery the Easy Way. Analyst: Michael Fisch
EMC RecoverPoint and VMware Managing Data Replication and Recovery the Easy Way THE CLIPPER GROUP NavigatorTM Published Since 1993 Report #TCG2010005 February 27, 2010 EMC RecoverPoint and VMware Managing
Solution Overview. Business Continuity with ReadyNAS
Business Continuity with ReadyNAS What is ReadyNAS? ReadyNAS is a family of network storage solutions for small and medium businesses, workgroups, and remote/home offices. ReadyNAS delivers unified storage
VMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
