A successful data migration process can be used for a one-time migration, or as a standard procedure for future migrations employing a consistent, reliable and repeatable methodology incorporating planning, tool implementation and validation. Dell data migration services can help. This whitepaper explores the Dell storage portfolio, Dell methodologies for migration and the use cases for migrating customers over to Dell Storage.
Creating a VMware Software-Defined Data Center Reference Architecture EMC
This reference architecture describes an implementation of a software-defined data center (SDDC) using VMware vCloud® Suite Enterprise 5.8, VMware NSXTM for vSphere® 6.1, VMware IT Business Management SuiteTM Standard Edition 1.1, and VMware vCenterTM Log InsightTM 2.0 to create an SDDC. This SDDC implementation is based on real-world scenarios, user workloads, and infrastructure system configurations. The configuration uses industry-standard servers, IP-based storage, and 10-Gigabit Ethernet (10GbE) networking to support a scalable and redundant architecture.
An overview of the solution and the logical architecture as well as results of the tested physical implementation are provided. Consult with your VMware representative as to how to modify the architecture to suit your business needs.
Plesk is a hosting automation solution that manages third-party software like web servers, FTP servers, DNS servers, databases, and more. It provides control panels for hosting providers, resellers, and customers to easily manage websites, email, and other hosting services. Plesk's user account hierarchy includes client accounts for resellers, domain administrator accounts for individual websites, and email user accounts. This allows resellers to host sites and provide hosting services to their own customers.
The document introduces a comprehensive lifecycle management plan for BlackBerry that takes an integrated project methodology approach based on the ITIL framework. The plan covers all phases of the IT asset lifecycle - acquisition, deployment, management, and retirement. It addresses key areas like availability management, change management, and incident management to ensure optimal performance of the BlackBerry environment throughout the lifecycle.
This document is the user guide for Crystal Reports 8.5. It contains 7 chapters that introduce the user to Crystal Reports and guide them through installing, learning the basics of, and designing reports with the software. Key features covered include web reporting capabilities, new functions for customizing reports, and an improved development environment. The guide provides tutorials for both new and advanced users to get started creating sample reports with the included data.
The VMware Cloud Infrastructure Architecture Case Study Series was developed to provide an understanding of the various components of the VMware Cloud Infrastructure Suite. The goal is to explain how these components can be used in specific scenarios, which are based on real-world customer examples and therefore contain real-world requirements and constraints. The VMware Cloud Infrastructure Suite consists of five technologies that together expand the capabilities and value that customers can realize from a virtualized infrastructure. This case study focuses on vSphere 5.0 and vShield App 5.0
This document provides a client's guide for Plesk 8.1 for Windows. It begins with preface information for who should read the guide and documentation conventions. The guide then covers getting started with Plesk, including logging in, becoming familiar with the interface, and changing contact/password information. It also summarizes customizing the control panel, viewing resource allotments and hosting features, implementing hosting plans using domain templates, and managing hosting accounts.
Plesk is a hosting automation solution that simplifies setup and management of user accounts, websites, and email for hosting providers. It manages common software components like web servers, FTP servers, DNS servers, databases, and more. Plesk's user account hierarchy includes client accounts for resellers, domain administrator accounts, and email user accounts. Client accounts can host multiple sites and resell hosting, while domain administrators are limited to one site. Plesk comes preconfigured to immediately start serving customers after installation.
This document discusses considerations for business managers regarding the total cost of ownership of SOA gateways. It covers factors like cost of implementation, which can be impacted by a gateway's deployability across hardware, software, and virtual form factors, as well as its extensibility through SDKs and standards support. The cost of ongoing operation is also discussed, including manageability, scalability, reliability, and costs associated with updating and upgrading gateways over time. Layer 7 Technologies is highlighted as offering multiple deployment options and a focus on avoiding vendor lock-in.
Creating a VMware Software-Defined Data Center Reference Architecture EMC
This reference architecture describes an implementation of a software-defined data center (SDDC) using VMware vCloud® Suite Enterprise 5.8, VMware NSXTM for vSphere® 6.1, VMware IT Business Management SuiteTM Standard Edition 1.1, and VMware vCenterTM Log InsightTM 2.0 to create an SDDC. This SDDC implementation is based on real-world scenarios, user workloads, and infrastructure system configurations. The configuration uses industry-standard servers, IP-based storage, and 10-Gigabit Ethernet (10GbE) networking to support a scalable and redundant architecture.
An overview of the solution and the logical architecture as well as results of the tested physical implementation are provided. Consult with your VMware representative as to how to modify the architecture to suit your business needs.
Plesk is a hosting automation solution that manages third-party software like web servers, FTP servers, DNS servers, databases, and more. It provides control panels for hosting providers, resellers, and customers to easily manage websites, email, and other hosting services. Plesk's user account hierarchy includes client accounts for resellers, domain administrator accounts for individual websites, and email user accounts. This allows resellers to host sites and provide hosting services to their own customers.
The document introduces a comprehensive lifecycle management plan for BlackBerry that takes an integrated project methodology approach based on the ITIL framework. The plan covers all phases of the IT asset lifecycle - acquisition, deployment, management, and retirement. It addresses key areas like availability management, change management, and incident management to ensure optimal performance of the BlackBerry environment throughout the lifecycle.
This document is the user guide for Crystal Reports 8.5. It contains 7 chapters that introduce the user to Crystal Reports and guide them through installing, learning the basics of, and designing reports with the software. Key features covered include web reporting capabilities, new functions for customizing reports, and an improved development environment. The guide provides tutorials for both new and advanced users to get started creating sample reports with the included data.
The VMware Cloud Infrastructure Architecture Case Study Series was developed to provide an understanding of the various components of the VMware Cloud Infrastructure Suite. The goal is to explain how these components can be used in specific scenarios, which are based on real-world customer examples and therefore contain real-world requirements and constraints. The VMware Cloud Infrastructure Suite consists of five technologies that together expand the capabilities and value that customers can realize from a virtualized infrastructure. This case study focuses on vSphere 5.0 and vShield App 5.0
This document provides a client's guide for Plesk 8.1 for Windows. It begins with preface information for who should read the guide and documentation conventions. The guide then covers getting started with Plesk, including logging in, becoming familiar with the interface, and changing contact/password information. It also summarizes customizing the control panel, viewing resource allotments and hosting features, implementing hosting plans using domain templates, and managing hosting accounts.
Plesk is a hosting automation solution that simplifies setup and management of user accounts, websites, and email for hosting providers. It manages common software components like web servers, FTP servers, DNS servers, databases, and more. Plesk's user account hierarchy includes client accounts for resellers, domain administrator accounts, and email user accounts. Client accounts can host multiple sites and resell hosting, while domain administrators are limited to one site. Plesk comes preconfigured to immediately start serving customers after installation.
This document discusses considerations for business managers regarding the total cost of ownership of SOA gateways. It covers factors like cost of implementation, which can be impacted by a gateway's deployability across hardware, software, and virtual form factors, as well as its extensibility through SDKs and standards support. The cost of ongoing operation is also discussed, including manageability, scalability, reliability, and costs associated with updating and upgrading gateways over time. Layer 7 Technologies is highlighted as offering multiple deployment options and a focus on avoiding vendor lock-in.
This document provides an implementation guide for Oracle iProcurement Release 11i. It begins with an overview of the key capabilities of Oracle iProcurement in procurement processes like catalog management, shopping, checkout, requisition tracking and management, and desktop receiving. It then covers necessary setup steps in Oracle Applications including prerequisites, security, workflows, customizations, and profile options. The document aims to help implement and configure Oracle iProcurement for a given organization.
The document provides an overview of the Clearspan enterprise solutions guide, which is intended to advise implementers about deploying centralized voice services architectures in enterprises. It describes Clearspan as an enhanced unified communications system allowing enterprises to offer advanced communications applications over a VoIP network. Key aspects of Clearspan covered include its scalability, support for single or multi-site deployments, use of open standards, and integrated suite of communications applications.
This document provides a summary of 100 tips and tricks for advanced business reporting in Microsoft Excel. It begins with an overview of the Excel interface and navigation basics. It then provides tips organized under tabs like Home, ranging from formatting text to inserting dates to converting values. The tips aim to help users work more efficiently in Excel for reporting and data analysis.
In business today, meet the requirement of around-the-clock availability has become more
important. SAP customers keep their systems running 24x7, 365 days a year to ensure
business continuity, to avoid business interruptions, and to reduce revenue loss. To accomplish
this goal, enterprises need efficient and robust business backbones. In addition, the IT
infrastructure must be flexible and agile enough to support customers in their rapidly changing
environments. One of the biggest challenges is to continuously manage and analyze vast
amounts of data and to cope with the increasing complexity of a suitable IT infrastructure.
Good news from the Worldwide Consulting Desktop & Apps (DnA) team! We’ve just finished updating theVirtual Desktop Handbook for XenDesktop 7, StoreFront 2.0 and XenServer 6.2.
The Virtual Desktop Handbook is an architect’s guide to desktop virtualization. It provides you with the methodology, experience and best practices you need to successfully design your own desktop virtualization solution.
Updates in this release include:
Resource requirements for Windows 8 and Server 2012
XD controller sizing
XenDesktop 7 policy guidelines
Database sizing for XenDesktop 7
SQL 2012 chapter
StoreFront 2.0 chapter
32-bit or 64-bit desktop OS guidance
Desktop group & StoreFront integration
In addition, we’ve also included a Citrix policy quick reference spreadsheet so that you can quickly identify default, baseline and template settings from XenDesktop 5 / XenApp 6 all the way up to XenDesktop 7. Thanks go out to Michael Havens, Maria Chang and Uzair Ali for creating this great reference spreadsheet.
I hope you find this handbook useful during your next desktop virtualization project.
And we’re not done yet, future updates will include:
Bandwidth
Hyper-V 2012
PVS 7
User data
And more …
The Virtual Desktop Handbook is not the only resource to guide you through your desktop virtualization journey. Citrix also provides Project Accelerator; an interactive online tool creating customized sizing and design recommendations based on the methodology, best practices and expert advice identified within this handbook.
You can still reach the XenDesktop 5 handbook using the old URL – CTX136546
Andy Baker – Architect
Worldwide Consulting
Desktop & Apps Team
http://blogs.citrix.com/2013/10/10/new-xendesktop-7-handbook-published/
This document provides an overview of robust data synchronization with IBM Tivoli Directory Integrator. It discusses business drivers for data synchronization and different architectural approaches. It also describes the components of Tivoli Directory Integrator, including AssemblyLines, Connectors, Parsers and other elements. Finally, it covers best practices for designing, implementing, administering and monitoring an enterprise data synchronization solution with Tivoli Directory Integrator.
This document provides an overview of upgrading from Windows 2000 to Windows Server 2003. It discusses choosing the best edition of Windows Server 2003 based on equivalent Windows 2000 editions. It also covers verifying system requirements and hardware compatibility. Additional topics include deciding between upgrade, clean installation, or migration and considerations for Active Directory, applications, and server roles.
The document provides tips and tricks for advanced business reporting in Microsoft Excel. It discusses the Excel interface and various functions and features like PivotTables, sorting, conditional formatting, and formulas. It also provides a history of spreadsheets and details of Excel version updates. The tips are intended to help users work more efficiently and effectively in Excel for business reporting and decision making.
This document provides code conventions for writing Java code, including recommendations for file names, file organization within source code files, indentation, comments, declarations, statements, white space, naming conventions, and programming practices. It aims to improve code readability and maintainability. The conventions are based on the Java Language Specification from Sun Microsystems and aim to make the code as well-organized and clean as possible.
This document provides style guidelines for formatting Java code, including recommendations for file names, file organization within source code files, indentation, comments, declarations, statements, whitespace, naming conventions, and programming practices. It aims to improve code readability and maintainability. The guidelines cover topics like using consistent suffixes for source (.java) and bytecode (.class) files, placing import statements before class declarations, using block comments for documentation, and aligning closing braces vertically.
This document provides information about ComponentOne GridView for ASP.NET AJAX, including:
- What's new in recent versions from 2010 to 2009.
- How to install, set up, and deploy the GridView control in ASP.NET applications.
- An overview of key features like editing, grouping, paging and more.
- Instructions for a quick start on binding data and customizing the GridView.
- Details on the design-time support and property builder.
- How to change visual styles, customize appearance, and use keyboard navigation.
This document provides information about supplemental packs and the XenServer Development Kit (DDK) for XenServer 6.1.0. It describes how to build and install supplemental packs to add new drivers and other packages. The DDK is a virtual machine that allows developers to build and test supplemental packs. Guidelines are provided around kernel modules, upgrades, uninstallation, versioning, and testing to ensure packs work properly with XenServer.
This document provides an overview and instructions for using WebHost Manager, a control panel for managing web hosting servers and accounts. It describes how to install and log into WebHost Manager, configure server settings like backups and quotas, and manage user accounts including creating, modifying, suspending, and deleting accounts. The document is organized into sections covering installation, server setup, support, backups, reboots, status checks, and account functions.
This document discusses how network virtualization and security solutions from VMware, specifically NSX, can help organizations transform their software-defined data centers to achieve greater speed, agility, and security. It outlines key trends driving adoption of software-defined data centers and hybrid cloud, and how NSX addresses challenges around network limitations, security threats, and manual configuration. Benefits of NSX include micro-segmentation, disaster recovery, self-service clouds, automation, and cost savings.
Network Virtualization and Security with VMware NSX - Business Case White Pap...Błażej Matusik
This document discusses how network virtualization and security solutions from VMware, specifically NSX, can help organizations transform their software-defined data centers to achieve greater speed, agility, and security. It outlines key trends driving adoption of software-defined data centers and hybrid cloud, and how NSX addresses challenges around network limitations, security threats, and manual configuration. Benefits of NSX include micro-segmentation, disaster recovery, self-service clouds, automation, and cost savings.
This document describes the software architecture design for ProjectPlace. It outlines a three-tier architecture with modules for the client applet, server, logger, common room, project room, and plugins. The document scope is the architecture design and product scope is ProjectPlace. It provides high-level descriptions of each module and their inputs/outputs.
This document provides copyright information and instructions for correctly citing the SAS 9.1.3 Foundation Configuration Guide for z/OS. It notes that no part of the publication may be reproduced without permission and lists the copyright owner. The document also contains a table of contents that outlines what is covered in each chapter of the Configuration Guide.
The document is a report on unstructured data and the enterprise from Second Quarter 2012. It contains:
1) Various text formats like documents, emails, and web pages make up the largest portion of unstructured data in enterprises. Many firms are implementing projects to extract useful information from large amounts of email data.
2) Content management systems help enterprises manage and obtain information from unstructured text documents using metadata to enhance search and reporting.
3) The report discusses how capturing and managing unstructured data through techniques like metadata, taxonomy creation, and text analytics can provide competitive advantages for firms.
This document provides a guide for organizations to create a Customer Engagement Metric (CEM) to measure customer health and engagement. It discusses why organizations need a CEM, outlines a three-step process to build a CEM including defining metric categories and weights. It also provides examples and formulas for calculating and using a CEM. The author then describes their company ACL's CEM called ICE which has provided insights into engagement drivers. The guide aims to foster discussion around best practices for measuring customer success.
This document is the user guide for MicroSim Schematics version 8. It includes an overview of the software, instructions for getting started with drawing schematics, using the design manager to organize files, and details on using the schematic editor interface. The guide covers the main components of schematic designs, navigating the main window, menus, toolbars, and keyboard shortcuts. It aims to help new users learn the basics of creating and simulating schematic designs.
CONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOSJohnson Liu
This white paper discusses how the Junos operating system provides continuous system operations and high availability. It achieves this through modular software architecture, separation of routing and forwarding planes, graceful restart protocols, nonstop active routing, unified in-service software upgrades, automation tools, and built-in diagnostics. The paper focuses on minimizing network downtime from both planned and unplanned outages.
White Paper: Gigya's Information Security and Data Privacy PracticesGigya
The document discusses Gigya's information security and data privacy practices, including their infrastructure, data security, compliance, and privacy measures. It describes Gigya's state-of-the-art hosting in five regional data centers, data security measures like ISO 27001 certification and successful SOC2 Type 2 audits, compliance with various regulations and social network policies, and privacy features such as permission-based social login and user data controls.
This document provides an implementation guide for Oracle iProcurement Release 11i. It begins with an overview of the key capabilities of Oracle iProcurement in procurement processes like catalog management, shopping, checkout, requisition tracking and management, and desktop receiving. It then covers necessary setup steps in Oracle Applications including prerequisites, security, workflows, customizations, and profile options. The document aims to help implement and configure Oracle iProcurement for a given organization.
The document provides an overview of the Clearspan enterprise solutions guide, which is intended to advise implementers about deploying centralized voice services architectures in enterprises. It describes Clearspan as an enhanced unified communications system allowing enterprises to offer advanced communications applications over a VoIP network. Key aspects of Clearspan covered include its scalability, support for single or multi-site deployments, use of open standards, and integrated suite of communications applications.
This document provides a summary of 100 tips and tricks for advanced business reporting in Microsoft Excel. It begins with an overview of the Excel interface and navigation basics. It then provides tips organized under tabs like Home, ranging from formatting text to inserting dates to converting values. The tips aim to help users work more efficiently in Excel for reporting and data analysis.
In business today, meet the requirement of around-the-clock availability has become more
important. SAP customers keep their systems running 24x7, 365 days a year to ensure
business continuity, to avoid business interruptions, and to reduce revenue loss. To accomplish
this goal, enterprises need efficient and robust business backbones. In addition, the IT
infrastructure must be flexible and agile enough to support customers in their rapidly changing
environments. One of the biggest challenges is to continuously manage and analyze vast
amounts of data and to cope with the increasing complexity of a suitable IT infrastructure.
Good news from the Worldwide Consulting Desktop & Apps (DnA) team! We’ve just finished updating theVirtual Desktop Handbook for XenDesktop 7, StoreFront 2.0 and XenServer 6.2.
The Virtual Desktop Handbook is an architect’s guide to desktop virtualization. It provides you with the methodology, experience and best practices you need to successfully design your own desktop virtualization solution.
Updates in this release include:
Resource requirements for Windows 8 and Server 2012
XD controller sizing
XenDesktop 7 policy guidelines
Database sizing for XenDesktop 7
SQL 2012 chapter
StoreFront 2.0 chapter
32-bit or 64-bit desktop OS guidance
Desktop group & StoreFront integration
In addition, we’ve also included a Citrix policy quick reference spreadsheet so that you can quickly identify default, baseline and template settings from XenDesktop 5 / XenApp 6 all the way up to XenDesktop 7. Thanks go out to Michael Havens, Maria Chang and Uzair Ali for creating this great reference spreadsheet.
I hope you find this handbook useful during your next desktop virtualization project.
And we’re not done yet, future updates will include:
Bandwidth
Hyper-V 2012
PVS 7
User data
And more …
The Virtual Desktop Handbook is not the only resource to guide you through your desktop virtualization journey. Citrix also provides Project Accelerator; an interactive online tool creating customized sizing and design recommendations based on the methodology, best practices and expert advice identified within this handbook.
You can still reach the XenDesktop 5 handbook using the old URL – CTX136546
Andy Baker – Architect
Worldwide Consulting
Desktop & Apps Team
http://blogs.citrix.com/2013/10/10/new-xendesktop-7-handbook-published/
This document provides an overview of robust data synchronization with IBM Tivoli Directory Integrator. It discusses business drivers for data synchronization and different architectural approaches. It also describes the components of Tivoli Directory Integrator, including AssemblyLines, Connectors, Parsers and other elements. Finally, it covers best practices for designing, implementing, administering and monitoring an enterprise data synchronization solution with Tivoli Directory Integrator.
This document provides an overview of upgrading from Windows 2000 to Windows Server 2003. It discusses choosing the best edition of Windows Server 2003 based on equivalent Windows 2000 editions. It also covers verifying system requirements and hardware compatibility. Additional topics include deciding between upgrade, clean installation, or migration and considerations for Active Directory, applications, and server roles.
The document provides tips and tricks for advanced business reporting in Microsoft Excel. It discusses the Excel interface and various functions and features like PivotTables, sorting, conditional formatting, and formulas. It also provides a history of spreadsheets and details of Excel version updates. The tips are intended to help users work more efficiently and effectively in Excel for business reporting and decision making.
This document provides code conventions for writing Java code, including recommendations for file names, file organization within source code files, indentation, comments, declarations, statements, white space, naming conventions, and programming practices. It aims to improve code readability and maintainability. The conventions are based on the Java Language Specification from Sun Microsystems and aim to make the code as well-organized and clean as possible.
This document provides style guidelines for formatting Java code, including recommendations for file names, file organization within source code files, indentation, comments, declarations, statements, whitespace, naming conventions, and programming practices. It aims to improve code readability and maintainability. The guidelines cover topics like using consistent suffixes for source (.java) and bytecode (.class) files, placing import statements before class declarations, using block comments for documentation, and aligning closing braces vertically.
This document provides information about ComponentOne GridView for ASP.NET AJAX, including:
- What's new in recent versions from 2010 to 2009.
- How to install, set up, and deploy the GridView control in ASP.NET applications.
- An overview of key features like editing, grouping, paging and more.
- Instructions for a quick start on binding data and customizing the GridView.
- Details on the design-time support and property builder.
- How to change visual styles, customize appearance, and use keyboard navigation.
This document provides information about supplemental packs and the XenServer Development Kit (DDK) for XenServer 6.1.0. It describes how to build and install supplemental packs to add new drivers and other packages. The DDK is a virtual machine that allows developers to build and test supplemental packs. Guidelines are provided around kernel modules, upgrades, uninstallation, versioning, and testing to ensure packs work properly with XenServer.
This document provides an overview and instructions for using WebHost Manager, a control panel for managing web hosting servers and accounts. It describes how to install and log into WebHost Manager, configure server settings like backups and quotas, and manage user accounts including creating, modifying, suspending, and deleting accounts. The document is organized into sections covering installation, server setup, support, backups, reboots, status checks, and account functions.
This document discusses how network virtualization and security solutions from VMware, specifically NSX, can help organizations transform their software-defined data centers to achieve greater speed, agility, and security. It outlines key trends driving adoption of software-defined data centers and hybrid cloud, and how NSX addresses challenges around network limitations, security threats, and manual configuration. Benefits of NSX include micro-segmentation, disaster recovery, self-service clouds, automation, and cost savings.
Network Virtualization and Security with VMware NSX - Business Case White Pap...Błażej Matusik
This document discusses how network virtualization and security solutions from VMware, specifically NSX, can help organizations transform their software-defined data centers to achieve greater speed, agility, and security. It outlines key trends driving adoption of software-defined data centers and hybrid cloud, and how NSX addresses challenges around network limitations, security threats, and manual configuration. Benefits of NSX include micro-segmentation, disaster recovery, self-service clouds, automation, and cost savings.
This document describes the software architecture design for ProjectPlace. It outlines a three-tier architecture with modules for the client applet, server, logger, common room, project room, and plugins. The document scope is the architecture design and product scope is ProjectPlace. It provides high-level descriptions of each module and their inputs/outputs.
This document provides copyright information and instructions for correctly citing the SAS 9.1.3 Foundation Configuration Guide for z/OS. It notes that no part of the publication may be reproduced without permission and lists the copyright owner. The document also contains a table of contents that outlines what is covered in each chapter of the Configuration Guide.
The document is a report on unstructured data and the enterprise from Second Quarter 2012. It contains:
1) Various text formats like documents, emails, and web pages make up the largest portion of unstructured data in enterprises. Many firms are implementing projects to extract useful information from large amounts of email data.
2) Content management systems help enterprises manage and obtain information from unstructured text documents using metadata to enhance search and reporting.
3) The report discusses how capturing and managing unstructured data through techniques like metadata, taxonomy creation, and text analytics can provide competitive advantages for firms.
This document provides a guide for organizations to create a Customer Engagement Metric (CEM) to measure customer health and engagement. It discusses why organizations need a CEM, outlines a three-step process to build a CEM including defining metric categories and weights. It also provides examples and formulas for calculating and using a CEM. The author then describes their company ACL's CEM called ICE which has provided insights into engagement drivers. The guide aims to foster discussion around best practices for measuring customer success.
This document is the user guide for MicroSim Schematics version 8. It includes an overview of the software, instructions for getting started with drawing schematics, using the design manager to organize files, and details on using the schematic editor interface. The guide covers the main components of schematic designs, navigating the main window, menus, toolbars, and keyboard shortcuts. It aims to help new users learn the basics of creating and simulating schematic designs.
CONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOSJohnson Liu
This white paper discusses how the Junos operating system provides continuous system operations and high availability. It achieves this through modular software architecture, separation of routing and forwarding planes, graceful restart protocols, nonstop active routing, unified in-service software upgrades, automation tools, and built-in diagnostics. The paper focuses on minimizing network downtime from both planned and unplanned outages.
White Paper: Gigya's Information Security and Data Privacy PracticesGigya
The document discusses Gigya's information security and data privacy practices, including their infrastructure, data security, compliance, and privacy measures. It describes Gigya's state-of-the-art hosting in five regional data centers, data security measures like ISO 27001 certification and successful SOC2 Type 2 audits, compliance with various regulations and social network policies, and privacy features such as permission-based social login and user data controls.
This document provides an overview and getting started guide for AutoCAD Civil 3D 2009:
- It describes how to install AutoCAD Civil 3D 2009 on a single computer or network. It also highlights new features in the 2009 release related to project management, survey, pipe networks, labels, surfaces, grading, alignments, profiles, corridors, mass haul, Google Earth integration, and hydraulics/hydrology.
- It provides an overview of sample data, tutorials, guides, and training materials that are included to help users learn how to use AutoCAD Civil 3D 2009.
- It introduces the object-based design approach in AutoCAD Civil 3D 2009 and describes tools for object management, editing,
White Paper - Salesforce's Unique Approach to Retail ExecutionCarey Wong
The document discusses Salesforce's unique approach to retail execution. It notes that retail execution needs vary greatly between companies and divisions due to different business processes, requirements, rules and strategies. Traditional out-of-the-box solutions cannot adequately address this variability. Salesforce addresses this challenge through a flexible platform that allows for custom configurations, a large partner ecosystem that provides pre-configured solutions, and leveraging new technologies to enable rapid innovation.
This document discusses various architectural approaches and techniques for improving the availability and robustness of integration solutions built with Tivoli Directory Integrator 7.0. It describes potential sources of failures, such as network issues, problems with data sources or targets, unexpected data, and runtime environment troubles. It then provides recommendations for handling failures proactively through approaches like redundant systems, message queues, monitoring, and change data capture. The goal is to design integration flows that can withstand component failures and continue operating smoothly.
This document discusses strategies for improving the robustness and availability of Tivoli Directory Integrator 7.0 solutions. Potential sources of failures that could impact solutions are identified as the network, data sources/targets, runtime environments, and unexpected data. The document then recommends various architectural patterns that can be implemented using Tivoli Directory Integrator to increase availability, such as duplication, external job scheduling, message queues, and monitoring systems. It also provides guidance on error handling, failover configurations, change data capture, and general best practices for designing and implementing robust Tivoli Directory Integrator solutions.
The document discusses new features in VMware vCloud Director 1.5 that help improve agility, simplify management, and enable hybrid cloud deployments. Key features include fast provisioning using linked clones, support for third-party distributed switches, custom guest properties for vApps, improved messaging and APIs, integration with VMware vShield for security services, and support for vSphere 5.0. The new capabilities help customers accelerate application delivery, simplify operations, and build secure hybrid cloud infrastructures.
This document provides help and documentation for SAP Cloud Integration for data services. It includes information on initial setup such as enabling licenses and creating projects. It also describes key concepts like datastores, tasks, processes and available actions. Specific datastore types and their properties are defined. Guidelines are provided for importing metadata, viewing data, and enabling secure network communications for SAP BW datastores.
Windows_Server_2016_Virtualization White Paper By VeeamKesavan Munuswamy
This document discusses the history and new features of virtualization technologies in Microsoft Windows Server 2016, including Hyper-V, Nano Server, and Windows Containers. It covers the evolution of virtualization support from early products like Windows Virtual PC to the current Hyper-V and container capabilities in Windows Server 2016. The document also summarizes several key new features in Windows Server 2016 like Resilient File System, production checkpoints for Hyper-V, and PowerShell Direct functionality.
The document provides an overview of running SAP solutions on IBM eX5 systems. It discusses SAP architecture and applications, considerations for sizing an IBM solution for SAP including methodology and resources. It also covers hardware and software considerations for implementing SAP such as virtualization, high availability, and scaling. Finally, it describes IBM System x, BladeCenter, and storage offerings that are suitable for running SAP solutions.
This white paper discusses Seamless MPLS, an architecture that uses MPLS in access networks for benefits like scalability and flexibility. Key aspects include using MPLS Transport Pseudowires to connect network components across regions, with a control plane that scales through hierarchical BGP routing. The goal is a unified MPLS network from core to edge to simplify service delivery.
This document provides an overview of the CRISP-DM (Cross-Industry Standard Process for Data Mining) methodology for conducting data mining projects. It discusses the 6 phases of CRISP-DM: business understanding, data understanding, data preparation, modeling, evaluation, and deployment. For each phase, it provides descriptions of tasks and activities, along with examples from an e-retail use case. It is intended to help users structure data mining projects according to the standard CRISP-DM framework.
This white paper discusses eliminating database downtime when upgrading or migrating from Oracle 8i or 9i to Oracle 10g or 11g. It presents a solution using GoldenGate software for transactional data management and Oracle's Cross Platform Transportable Tablespace feature. The solution allows a rolling upgrade/migration without taking the database offline by using a clone database, synchronizing transactions between databases, and conducting partial or phased migrations while providing continuous availability.
This document provides help and documentation for SAP Cloud Integration for data services. It includes information on initial setup such as enabling licenses, creating projects, and moving data. It also describes datastores for connecting to different data sources, how to create and run tasks and processes, and available actions for tasks and processes. The document is a comprehensive guide for getting started with and using SAP Cloud Integration for data services.
The document describes the Concorde Platform, which consists of various technology solutions to help financial professionals manage their business. It includes solutions for client relationship management (Redtail CRM), document management (Docupace), portfolio management (Albridge), and more. Users can access all applications through the Concorde web portal Vision. The document provides contact information for support and training on each individual technology solution that makes up the Concorde Platform.
Similar to Dell Data Migration A Technical White Paper (20)
1. Methodologies for Data Migration
to Dell Fluid Data Architecture
A Dell Technical White Paper
Executive summary
The dictionary entry for “challenging” could very well The impact of explosive data growth is felt at every level
describe enterprise storage migrations. Complex and often of the enterprise. Typically, data migrations and storage
problematic, data migrations challenge even the most provisioning are manual processes that consume IT resources
seasoned IT administrators with narrow downtime windows, while disrupting users and applications. Backups take
risk of data loss, business-critical application availability, 24/7 increasing amounts of time to complete, and they are more
user access requirements, and other factors. IT departments costly to maintain. Utilization rates vary dramatically, as some
may not have the needed skill set or may not want to spend storage arrays or file servers run out of capacity while unused
valuable resources migrating data. In addition, data centers capacity languishes on others. Users and applications are
may support multiple operating systems like Microsoft® statically mapped to physical devices, creating configuration
Windows®, UNIX® and Linux® technology, while the storage challenges whenever changes occur in the environment.
ecosystem may also include hardware from more than one And many traditional storage infrastructures (from mergers
vendor. Inflexibility of traditional storage infrastructures can and acquisitions) have evolved haphazardly without a solid
complicate matters even further. strategy for consolidating.
3. Dell data migration best practices: Dell has evolved from a storage
reseller to a storage innovator. We did it by starting fresh, building
the right storage architecture without the burden of legacy
intellectual property (IP), and designing solutions based on what
customers truly wanted.
It wasn’t just about data growth; Storage portfolio
customers need to know how they Enterprise data volumes continue to
could respond to growth and constant grow exponentially while IT budgets
change. They wanted to shift their focus continue to shrink. Dell helps customers
from keeping the lights on to future tackle these challenges by standardizing
strategy — from operation to innovation. IT infrastructures, simplifying operations
With this in mind, Dell services put and automating processes. Efficiencies
together a comprehensive data gained through virtualization,
migration strategy to help customers automation and consolidation will help
migrate from their legacy storage to the your business prepare for future growth
Dell Fluid Data™ architecture. while saving time and resources.
Dell Services has a stable, proven Dell can help you:
process for performing data migrations • Optimize the computer, processor,
backed by a wide range of capabilities networking and storage resources
and technologies. This means we can already in your IT infrastructure
adapt to any customer environment • Increase overall utilization by
while maintaining the integrity of best- eliminating isolated or stranded
practice implementation. Whether resources
you’re moving accessible data off- • Reduce total cost of ownership (TCO)
hours, business-critical data during a through standard-based solutions,
tight maintenance window, or need simplified operations, virtualized
minimal disruption for a mission-critical storage and seamless scalability
environment, Dell Services has the right • Improve IT performance
solution for the right value. Backed by
the experience of thousands of global Dell’s Fluid Data™ architecture,
customer engagements, Dell Services for comprised of Dell™ Compellent™, Dell
planning, migrating and validating data EqualLogic™ and Dell PowerVault™
migrations can help you simplify your storage solutions — as well as other
move to the storage platform that’s right Dell storage tools and utilities — can
for your business. help organizations of any size realize
the full value of their IT investments. It
This whitepaper describes Dell’s can also protect vital enterprise data,
expertise in data migration across a ensuring high business continuity while
range of technologies and use cases. maintaining flexibility and scalability.
3
4. Dell Compellent PowerVault SANs PowerVault™ NX3500
Dell PowerVault iSCSI and Fibre Channel
arrays are the ideal SAN solution for
Utilizes Dell™ Fluid File System and the
entry-level storage consolidation
PowerVault SAN back end for Internet
requiring high availability, high
SCSI (iSCSI), CIFS and NFS access to
performance and business continuity
block and file data — enabling a single
without sacrificing ease of use and
file share to scale up to the capacity
reliability. Designed for flexibility, the
of the SAN array deployment. With
newest PowerVault SANs support
PowerVault™ NX3500, you can help
a range of drive types, enclosures
prevent the data silos and server sprawl
and RAID levels — all within a single
caused by an increasing amount of
Dell Compellent Storage Center delivers array. With high-speed iSCSI and Fibre
data (email, video, MP3 user home
an all-in-one storage solution that Channel interfaces, PowerVault arrays
directories). Start small and still enjoy
always puts data in the right place at provide multigenerational/multiprotocol
the value of high performance, unified
the right time for the right cost — and single management interface and
storage. And as your storage needs
dynamically adapts to meet changing support.
grow, you can dynamically add or
business needs.
modify block and file capacity without
Network Attached Storage (NAS)
disrupting existing applications and
Dell Compellent storage controllers are
storage systems.
also designed to deliver high availability.
Redundant and hot-swappable power
supplies and cooling fans help ensure
nonstop operation when problems
arise. These controllers also offer the Grow block and file capacity non-
flexibility to meet changing enterprise disruptively with the EqualLogic™
requirements. Customers can select FS7500, the only scale-out unified
either one or two controllers per SAN, storage architecture optimized for
and then use Fibre Channel, FCoE midsize and smaller deployments. The
and/or iSCSI connections to servers, Dell EqualLogic FS7500 adds network-
including the latest iSCSI and FCoE attached storage (NAS) capability to the
interconnects. The controllers connect EqualLogic product line to provide a
to any open-system servers without the high performance, scalable and unified
need for dedicated agents. storage solution. The FS7500 is powered
by the Dell Fluid File System (Dell Fluid
EqualLogic FS), Dell’s high-performance, clustered,
and network-accessible file system. Dual
active-active controllers, redundant
power supplies and fans, and battery-
backed cache make the FS7500 an ideal
Dell EqualLogic™ arrays are virtualized solution for NAS deployments requiring
iSCSI SANs that combine intelligence high availability and reliability.
and automation with fault tolerance to
provide simplified administration, rapid
deployment, enterprise performance,
reliability and scalability. EqualLogic is
an excellent choice for performance
and capacity-intensive applications.
The virtualized, modular EqualLogic
architecture allows IT managers to
purchase only the storage they need,
when they need it.
4
5. If you’re thinking about new storage solutions and complexities around data migration,
consider the following key factors and how Dell Data Migration consultants can help:
Key migration factors
Key factors Description Dell capabilities
Performance Balances network bandwidth A diverse toolset where
and system overhead with migration can be throttled
migration performance accordingly to strike a
metrics balance of migration speed
and application/network
performance
Heterogeneous Deploys the right migration A holistic vendor-agnostic
hardware and OS tools that minimize multi- migration solution that spans
vendor restrictions in complex multiple OS and supports
environments numerous storage platforms
Application Identifies and manages A choice of offline or online
downtime varying degrees of application migration depending on the
criticality and acceptable customer requirements
levels of downtime
Scalability Factors local and global data Appliance- or software-based
growth into terabyte and solutions that can be used for
petabyte migrations routine migrations in the data
center
Data migration methodology
A successful data migration process can be used for a one-time migration, or as
a standard procedure for future migrations employing a consistent, reliable and
repeatable methodology incorporating planning, tool implementation and validation.
The chart below shows a typical data migration workflow that can be used as a
reference.
Dell data migration game plan
Pre-production
Planning Migration Validation Cutover
Testing
Ÿ Define migration Ÿ Setup testing Ÿ Setup final Ÿ Collect Ÿ Move
goal migration migration migration application to
Ÿ Define migration environment environment statistics the target
requirement Ÿ Validate HW/SW Ÿ Install migration Ÿ Verify the storage
Ÿ Understand and migration software completion of environmen
business impact tools Ÿ Perform the migration based on
Ÿ Data Collection Ÿ Perform migration based Ÿ Validate cutover plan
Ÿ Define HW/SW migration testing on plan application Ÿ Create final
and tools based on plan functionality report
Ÿ Create migration Ÿ Collect and Ÿ Create migration Ÿ Run the new
plan validate data report environment
Ÿ Update final during the
migration plan defined time
frame
Ÿ Retire the
previous
environment
5
6. Planning • Hardware vs. Software: Some
Planning is critical for a successful migration tools require plugging the
data migration. Dell Migration Services appliance into the environment, while
considers the following factors when others are based on OS filter drivers.
evaluating a data migration project: We offer a wide range of choices for
migration use cases
Business impact • License: Cost of the license to be
The impact should be clearly explained considered
to stakeholders so they have the
appropriate expectations. Below are Migration project plan
some factors to be considered in this Once the aforementioned factors are
process: defined and agreed upon, the Dell
• Online or offline methodology planning team documents all the
• Applications impacted discoveries and planning steps in the
• Workload distribution between master migration project plan. This plan
customer and Dell evolves as the project progresses.
• Backup of data to be migrated in place
• Required staging of storage / Proof of concept (POC)
hardware POC is a significant first step in the
overall execution process as it helps
Data collection set up the baseline for the migration
Understanding the existing environment project. It establishes an initial test plan
is key to successful planning. The to validate the co-operative migration
following information should be plan between the customer and Dell
collected: Migration Services. Once the POC is
• Server information (OS version, successfully completed, Dell Migration
applications, firmware, drivers, etc.) Services and the customer agree on
• Storage environment (topology, data the viability of the validation and the
size, performance, etc.) execution of the migration project plan
• Data classification & tiering of apps to begins.
define priority
• Existing issues Validation
• Users and business segments involved Once data is fully migrated to the
target, migration validation takes place.
Migration tools identification Validation is one of the most important
Dell Migration Services uses multiple post-migration tasks and includes the
tools during the process. To select the following areas:
Note:
right tools, we consider the following • Data completeness: All data defined
For a fee, Dell Migration Services also
factors: for migration on the source are
provides consulting services to assess
the customer migration environment. • Performance: This refers to the speed migrated to the target environment
of the migration — a combination • Data integrity: The data itself, as well
of the tool’s software architecture, all data attributes, dependencies,
migration bandwidth, source/target security, etc. are successfully migrated
capabilities, application performance, • Data functionality: migrated data is
etc. mapped to the right application and
• Online or offline: Depending on functions correctly and as expected
customer requirements, we choose
tools that offer migration while the Cutover (Deployment)
LUNs are either online or offline Typically, legacy environments remain
• Roll-back capability: Software that running until extensive validation is
may provide the capability to roll back performed on the new storage. Once
data in case the migration runs into validation is complete, customer is
any issues cutover to the new storage.
6
7. Data Migration Expertise: Dell experts have migrated petabytes
of data worldwide ranging from SAN, NAS and file systems
marketed by a variety of vendors. Our Data Migration Services
practice takes the burden of migration responsibilities off your
shoulders and puts it in the capable hands of expert storage
migration consultants.
We have the experience and proven vary depending on the environment,
methodologies to deal with any migration performance is roughly
complexities your particular migration 500GB/hr. Currently, Thin Import only
may present. works over fibre channel, which means
the source array and destination CML
Dell consultants can help with: array must have fibre channel FE ports.
The current or planned host connectivity
Block level
method can be different, but the import
process can only be performed over
FC array-based migration
fibre channel.
Thin Import is a built-in feature of
Storage Center on Compellent arrays.
Host-based migration
Data from external storage arrays, which
Array-based migration solutions do not
are typically thick-provisioned, can be
solve all data migration scenarios. In
migrated to thin-provisioned volumes
some cases, host-based tools, which
on the Compellent drive. No additional
are OS specific, are an effective way to
licenses are required.
migrate data. Dell Migration Services
The Thin Import process works at
have verified and tested the following
a block-level, using synchronous
tools for multiple OS environments.
replication to import the data. All
Each host-based tool has stipulations
blocks are read on the source LUN
and limitations around migrating data.
and then written to the destination
Dell Migration consultants will discuss
volume on the Compellent with blocks
the details of each solution with your
consisting of all zeroes being omitted.
team during the planning phase.
The result is a thin-provisioned volume
on the Compellent. Although it can Note:
For security reasons, Thin Import is
primarily an offline activity.
Zoning for Thin Import
Fabric A Fabric B
CLARiiON SPA0, CML Controller 1 Port 1 CLARiiON SPB0, CML Controller 1 Port 2
CLARiiON SPB1, CML Controller 1 Port 1 CLARiiON SPA1, CML Controller 1 Port 2
CLARiiON SPA0, CML Controller 2 Port 1 CLARiiON SPB0, CML Controller 2 Port 2
CLARiiON SPB1, CML Controller 2 Port 1 CLARiiON SPA1, CML Controller 2 Port 2
Important
1. This is an example only - actual ports on source and destination arrays may vary
2. Do NOT just configure and enable these zones - follow step-by-step instructions or data loss may occur.
Fig 1: Sample FC connectivity of Dell CML array with a third-party array
7
8. VMware or virtual. The image of the source
Migrating from legacy storage vendors contains the server’s system state (the
has never been easier for customers server’s configured operating system
running VMware Enterprise and and applications) and all of the source
Enterprise Plus editions with the built- server’s data.
in tool called Storage vMotion. Storage
vMotion eliminates the need for service The Double-Take ‘Move’ function
disruptions with live, automated uses data replication to allow users to
migration of virtual machine disk files continue accessing and changing data
from legacy storage to a new Dell during the migration. As changes are
destination. Non-disruptive migration made on the source, replication updates
of virtual machine disk files to different the image of the source stored on the
classes of storage enables cost-effective target in real time. Double-Take Move
management of virtual machine disks does not replicate the entire file, only
based on usage and priority policies as the file changes. When you’re ready
part of a strategy for tiered storage. to cutover to the new server/storage,
Double-Take Move then applies the
source system state and after a reboot,
Virtual Machines
makes the source available on what was
App App App the target server hardware.
OS OS OS
Migrating data to a new storage array
often provides a good opportunity to
migrate or upgrade to the latest Dell
ESX Server
PowerEdge™ server platforms as well
(see Figure 3). Double-Take software
includes tools such as Full-Server
Failover (FFO) for server migrations
that remove Windows hardware driver
dependencies, enabling administrators
to migrate entire systems — including
the system identifier (SID), registry,
system files and applications — through
a GUI while those systems are still
Storage VMotion running (see Figure 3). Once the
synchronization is complete, you
can shift the new server and storage
Fig. 2: Sample Storage vMotion platforms into production.
connectivity of Dell storage array
with a third-party array
Windows
Server
Delivered on the Windows platform, Dell Migration
Migration Services uses Double-Take as Dell PowerEdge 2650 Dell PowerEdge R900
with Microsoft Exchange with Microsoft
the solution of choice for a majority of and Double-Take software Exchange and
customers. Double-Take software
Double-Take is a comprehensive Data
workload migration solution that allows Migration
TM
Production Dell EqualLogic
an entire server, known as a source, to Dell/EMC Cx300 PS Series
be moved by mirroring an image of Fibre Channel SAN iSCSI SAN
that source to the target. The source Fig. 3: Sample Double-Take use cases:
and target servers can be physical Server or array migration
8
9. LVM Symantec volume manager
LVM is disk management functionality One of the most widely used volume
built into many UNIX/Linux platforms. managers in the industry today is
Each OS has its own nuance around VxVM from Symantec, which is part
provisioning disks within LVM but one of the Storage Foundation Suite.
common denominator among them is Symantec Volume Manager (VxVM)
that it provides an abstraction level layer is an online storage management
between the OS and disks — whether tool that provides a logical volume
it’s local, on a DAS, or SAN. From a data management layer, which overcomes
migration standpoint, a typical LVM the physical restrictions of hardware disk
process involves setting up a mirror of devices by spanning volumes across
the data on the legacy storage volumes multiple spindles. Through the support
to the new volumes. The next step is to of RAID redundancy techniques (in
synchronize the new volumes. Once data migration’s case RAID 1), VxVM
the sync is complete, the mirror can be enables migration of volumes across
broken at cutover. This usually involves heterogeneous storage arrays.
detaching the source volumes. Some Mirroring can be set up with the aid of
volume management software includes the VxVM GUI called VMSA or through
commands to automate this process. command line. Dell Migration Services
With close to no downtime, mirroring is strongly recommends using command
a great way to migrate data over to Dell line for mirror-based migration since it
storage. offers more control over what is being
executed behind the scenes. A known
Veritas Volume Manager
limitation of Symantec Volume Manager
Solaris AIX Linux HP-UX is that RAID 5 volumes are inferior
candidates for VxVM-based migrations
and other tools must be explored to
accomplish the task.
Solaris
Solaris Volume Manager provides
mirror functionality across arrays. To
administer Solaris Volume management,
use the GUI (called Solaris Management
Console) or the command line.
AIX
Note:
Source Array: Target Array: AIX LVM is built into the OS and
For simplicity and standardization, LUN
Dell|EMC Compellent leveraged for cross-platform storage is considered an array level object,
Fig. 4: LVM-based array migrations are migrations as long as the source disks while volume is an LVM term.
OS specific are under the control of the LVM. Multiple LUNs can constitute a volume.
9
10. HP-UX appliance provides multi-protocol
Mirror/UX, a licensed product from (iSCSI, FC) block level and synchronous
HP, provides the functionality to mirror mirroring across heterogeneous
volumes and can be extremely useful storage. It also supports a diverse mix
for data migrations with a stipulation of operating systems, which makes
that the source volumes are not striped migration seamless and pain free for
within the logical volume. The output the customers since no downtime
below illustrates a scenario that would is required for the duration of the
not allow for LVM-based migration. migration.
hp5:/home/noman# lvdisplay -v /dev/ There are two downtime windows
vg5/mirror_1 | more required, however: one upon insertion
--- Logical volumes --- of the appliance, and the second upon
LV Name /dev/vg5/mirror_1 cutover to the Dell storage.
VG Name /dev/vg5
LV Permission read/write
LV Status available/syncd
Mirror copies 0
Consistency Recovery MWC
Schedule striped
LV Size (Mbytes) 1008
Current LE 252
Allocated PE 252
Stripes 3
Stripe Size (Kbytes) 128 Original
IO path
Source
Array
Bad block on Change IO
path to NSS
Allocation strict Activate
Mirror
IO Timeout (Seconds) default
FalconStar NSS
Additionally, the source and target disks
must be part of the same volume group 1. Prepare Zoning for indirect access
Target 2. Move IO path: Downtime (Reboot)
to proceed with a data migration. Array 3. Activate Mirror while online
4. Change Mirrorrole while online
5. Remove mirror while online
Linux
Fig. 5: A simplified NSS Gateway
Linux LVM is built into the OS and
solution from FalconStor
leveraged for cross-platform storage Software would entail this setup
migrations as long as the source disks
are under the control of the LVM. If
LVM is not implemented, Double-Take Backup and recovery
is another choice for supported file One of the most traditional methods of
systems. performing data migration is backing
up the data to disk or tape, setting
Appliance-based migration up new storage and restoring to the
Dell Migration Services has partnered new storage. This is also the most
with FalconStor Software where time consuming way to migrate data
previously mentioned tools and because of the downtime required for
use cases may not fit the customer the duration of the backup, and then
high performance data migration another downtime needed for restore.
requirements. Using NSS Gateway This is usually considered a method of
Appliance Software, which runs on a last resort for migrating data.
two-node Dell R710 cluster server, Dell
can migrate any existing third-party
SAN storage over to Dell storage with
minimal downtime. The HA FalconStor
10
11. File level CIFS
Dell Migration Services has partnered
NAS with Quest Software for CIFS/Windows-
NAS, or file data migration, involves based data migrations. The Quest
creating a copy of the data and moving Secure Copy technology enables Dell
it from one array/file server to another Services to offer fast, proven enterprise-
with little disruption to the production class data migration. This host-based
environment. The optimal data data migration software eases the
migration tools for NAS not only migrate pain often associated with typical NAS
the data and the directory structure but migrations. The first sync between
also the file attributes and the ACLs over source and target can be online, and
to the target storage. Typical migration the I/O operation can continue to the
use cases around NAS include: source array. For a final sync, however,
• Consolidating multiple Windows the I/O operation must to be ceased.
servers onto a common platform to
reduce server sprawl NOTE: This final sync can take up to 20%
• Consolidating multiple UNIX-based of the first sync time and requires total
exports (from multiple UNIX hosts) downtime on the source array shares
onto a common platform being migrated. If an array has a NAS
• Creating a cross-platform file appliance attached and additional hosts,
sharing (Windows and UNIX servers) those additional hosts do not need to
environment that scales beyond come down to migrate shares on the
the limit of traditional File Shares NAS appliance.
(Windows) and UNIX-based exports
rsync
Dell Migration Services offers tools for Long established in the UNIX world,
CIFS- and NFS-based migrations. rsync is an open source OS- and
storage-agnostic tool that remains a top
choice among storage administrators.
NAS: NFS amd CIFS Dell uses this powerful OS built-in utility
Windows Systems UNIX Systems for all NFS-based migrations.
Ethernet CIFS NFS
Fig. 6: A typical NAS migration involves
CIFS & NFS
11