JeffHebert 060001UEQ2 Marcações:  ibm tier consolidate storage easy storwiz v7000 disk virtualize 12.139 Visualizações
SSD storage are clear, the cost is often prohibitive. But what if you can target the data that really needs the performance edge at the SSD drives? You could balance the cost against IT performance gains that truly help your business perform. Read this... Full Article at BNET
While the performance advantages of SSD storage are clear, the cost is often prohibitive. But what if you can target the data that really needs the performance edge at the SSD drives? You could balance the cost against IT performance gains that truly help your business perform. Read this brief from Mesabi Group to see how IBM Storwize� V7000 "users now have the tools � with the combination of Storage Tier Advisor and Easy Tier � to be able to plan for and use SSDs appropriately in their distinctive workload environments."
JeffHebert 060001UEQ2 Marcações:  based cloud storage saas block nas file san hds iaas hp paas 7.212 Visualizações
IBM® System Storage™ N series with Operations Manager software offers comprehensive monitoring and management for N series enterprise storage and content delivery environments. Operations Manager is designed to provide alerts, reports, and configuration tools from a central control point, helping you keep your storage and content delivery infrastructure in-line with business requirements for high availability and low total cost of ownership.
We focus especially on Protection Manager, which is designed as an intuitive backup and replication management software for IBM System Storage N series unified storage disk-based data protection environments. The application is designed to support data protection and help increase productivity with automated setup and policy-based management.
This IBM Redbooks® publication demonstrates how Operation Manager manages IBM System Storage N series storage from a single view and remotely from anywhere. Operations Manager can monitor and configure all distributed N series storage systems, N series gateways, and data management services to increase the availability and accessibility of their stored and cached data. Operations Manager can monitor the availability and capacity utilization of all its file systems regardless of where they are physically located. It can also analyze the performance utilization of its storage and content delivery network. It is available on Windows® , Linux® , and Solaris™ .
JeffHebert 060001UEQ2 Marcações:  ssd disk range iaas mid storage enterprise ibm v7000 svc 6.757 Visualizações
“Procedures for replacing or adding nodes to an existing cluster”
Scope and Objectives
The scope of this document is two fold. The first section provides a procedure for replacing existing nodes in a SVC cluster non-disruptively. For example, the current cluster consists of two 2145-8F4 nodes and the desire is to replace them with two 2145-CF8 nodes maintaining the cluster size at two nodes. The second section provides a procedure to add nodes to an existing cluster to expand the cluster to support additional workload. For example, the current cluster consists of two 2145-8G4 nodes and the desire is to grow it to a four node cluster by adding two 2145-CF8 nodes.
The objective of this document is to provide greater detail on the steps required to perform the above procedures then is currently available in the SVC Software Installation and Configuration Guide, SC23-6628, located at www.ibm.com/storage/support/2145. In addition, it provides important information to assist the person performing the procedures to avoid problems while following the various steps.
Section 1: Procedure to replace existing SVC nodes non-disruptively
You can replace SAN Volume Controller 2145-8F2, 2145-8F4, 2145-8G4, and 2145-8A4 nodes with SAN Volume Controller 2145-CF8 nodes in an existing, active cluster without taking an outage on the SVC or on your host applications. In fact you can use this procedure to replace any model node with a different model node as long as the SVC software level supports that particular node model type. For example, you might want to replace a 2145-8F2 node in a test environment with a 2145-8G4 node previously in production that just got replaced by a new 2145-CF8 node.
Note: If you are attempting to replace existing 2145-4F2 nodes with new 2145-CF8 nodes do not use this procedure as you must use the procedure specifically for this sort of upgrade located at the following URL:
This procedure does not require changes to your SAN environment because the new node being installed uses the same worldwide node name (WWNN) as the node you are replacing. Since SVC uses this to generate the unique worldwide port name (WWPN), no SAN zoning or disk controller LUN masking changes are required. READ MORE>
JeffHebert 060001UEQ2 Marcações:  virtualize ssd drive daas storage information hard technology consolidate 6.574 Visualizações
Viewed 19817 times | Community Rating: 3.5
Originating Author: Wikibon Daemon
This paper was written and submitted by NetApp and is being republished with permission.
Flexible Choices to Optimize Performance
November 2008 | WP-7061-1008
Solid state drives (SSDs) based on flash memory are generating a lot of excitement. This enthusiasm is warranted because flash SSDs demonstrate latencies that are at least 10 times lower than the fastest hard disk drives (HDDs), often enabling response times more than 10X faster. For random read workloads, SSDs may deliver the I/O throughput of 30 or more HDDs while consuming significantly less power per disk. The performance of SSDscan reduce the number of fast-spinning hard disk drives you need in a storage system.Fewer disk drives translates into significant savings of power, cooling, and data center space. This performance benefit comes at a premium; flash SSDs are far more expensive per gigabyte of capacity than HDDs. Therefore SSDs are best applied in situations that require the highest performance.
The underlying flash memory technology used by SSDs has many advantages, particularly in comparison to DRAM. In addition to storage persistence, these advantages include higher density, lower power consumption, and lower cost per gigabyte. Because of these unique characteristics, NetApp is focusing on the targeted use of flash memory in storage systems and within your storage infrastructure in ways that can deliver the most performance acceleration for the minimum investment.
We are implementing flash memory solutions using SSDs for persistent storage, and we will also use flash memory directly to create expanded read caching devices. Caching can deliver performance that is comparable to or better than SSDs. Because you can complement a large amount of hard disk capacity with a relatively modest amount of read cache, caching is more cost effective for typical enterprise applications. As a result, more people can benefit from the performance acceleration achievable with flash technology.
You get even more flexibility and value from flash technology by combining it with the NetApp® unified storage architecture, which enables you to leverage your investment in flash memory to simultaneously accelerate multiple applications, whether they use SAN or NAS. Storage efficiency features such as deduplication for primary storage further increase your power, cooling, and space savings.
This white paper is an overview of NetApp’s plan to deliver SSDs (both native and virtualized arrays) plus flash-based read caching and of our ability to further leverage both of these technologies in caching architectures. Selection guidelines are provided to help you choose the right technology to reduce latency and increase your transaction rate while taking into consideration cost versus benefit.
JeffHebert 060001UEQ2 Marcações:  feature storage systems ds8000 enterprise z free 2 Comentários 5.923 Visualizações
JeffHebert 060001UEQ2 Marcações:  storage vm saas iaas daas cloud optimization virtual hard disk 5.888 Visualizações
Cloud security: the grand challenge
In addition to the usual challenges of developing secure IT systems, cloud computing
presents an added level of risk because essential services are often outsourced to a third
party. The externalized aspect of outsourcing makes it harder to maintain data integrity and
privacy, support data and service availability, and demonstrate compliance.
In effect, cloud computing shifts much of the control over data and operations from the client
organization to their cloud providers, much in the same way organizations entrust part of their
IT operations to outsourcing companies. Even basic tasks, such as applying patches and
configuring firewalls, can become the responsibility of the cloud service provider, not the user.
This means that clients must establish trust relationships with their providers and understand
the risk in terms of how these providers implement, deploy, and manage security on their
behalf. This trust but verify relationship between cloud service providers and consumers is
critical because the cloud service consumer is still ultimately responsible for compliance and
protection of their critical data, even if that workload had moved to the cloud. In fact, some
organizations choose private or hybrid models over public clouds because of the risks
associated with outsourcing services.
Other aspects about cloud computing also require a major reassessment of security and risk.
Inside the cloud, it is difficult to physically locate where data is stored. Security processes that
were once visible are now hidden behind layers of abstraction. This lack of visibility can create
a number of security and compliance issues.
In addition, the massive sharing of infrastructure with cloud computing creates a significant
difference between cloud security and security in more traditional IT environments. Users
spanning different corporations and trust levels often interact with the same set of computing
resources. At the same time, workload balancing, changing service level agreements, and
other aspects of today's dynamic IT environments create even more opportunities for
misconfiguration, data compromise, and malicious conduct.
Infrastructure sharing calls for a high degree of standardized and process automation, which
can help improve security by eliminating the risk of operator error and oversight. However, the
risks inherent with a massively shared infrastructure mean that cloud computing models must
still place a strong emphasis on isolation, identity, and compliance.
Cloud computing is available in several service models (and hybrids of these models). Each
presents different levels of responsibility for security management. Figure 1 on page 3 depicts
the different cloud computing models. READ MORE>
JeffHebert 060001UEQ2 Marcações:  reliable technology available real-time storage compression efficient business 5.749 Visualizações
JeffHebert 060001UEQ2 Marcações:  storage disk saas relicable ibm virtual efficient cloud paas 5.683 Visualizações
JeffHebert 060001UEQ2 Marcações:  management paas virtualization iaas information storage cloud data saas 5.682 Visualizações
JeffHebert 060001UEQ2 Marcações:  xiv storage high ssd performance ibm disk availability emc 5.630 Visualizações
The IBM XIV® Storage System demonstrates how storage can simplify management and provisioning, yielding optimizing benefits especially for virtualized server environments. This means that growth in data does not mean growth in complexity. XIV has a virtualized, grid-based architecture that enables self-tuning and self-healing, as well as amazing management with simplicity and low total costs.