This document is a book of abstracts for knowledge sharing articles from 2009. It begins by congratulating the top three authors of knowledge sharing articles for the year. It then provides a table of contents that lists the article titles in various categories such as backup and recovery, connectivity, content management, and virtualization. The document provides short summaries of the top knowledge sharing articles for the year according to first, second, and third place, as well as best in certain categories. It recognizes the growth of the knowledge sharing program and encourages continued participation and contribution to share knowledge.
EMC Proven Professional Knowledge Sharing 2008 Book of AbstractsEMC
The document discusses how ITIL (IT Infrastructure Library) is becoming the de facto standard for IT service management. ITIL aims to transform how IT services are provided to businesses over the next decade by facilitating the development of consultative infrastructure solutions. While ITIL emphasizes aligning infrastructure to business needs, it does not provide prescriptive remedies for implementation. The author suggests that combining ITIL with EMC's information lifecycle management approach could provide a complete solution for delivering high-quality IT services that optimize people, processes, and products to meet business objectives. In under 3 sentences, this summary captures the key points about ITIL becoming the IT service management standard, its focus on aligning infrastructure to business, and the potential of combining
EMC Proven Professional Knowledge Sharing 2010 Book of AbstractsEMC
This document contains the abstracts from the 2010 EMC Proven Professional Knowledge Sharing competition. It begins with introductions from EMC leaders about the importance of knowledge sharing. The abstracts are then presented in the following categories: Best of Cloud, Best of Skills, Best of Consolidation, and so on for topics like Backup/Recovery, Storage, Virtualization, and more. Each abstract summarizes an article on best practices for that topic in under 3 sentences.
This document provides background information on ResilientAfrica Network (RAN) and the internship program. It describes the objectives of industrial training and RAN's mission to promote resilience in Africa. The internship focused on RAN's Eastern Africa Resilience Innovation Lab (EARILab), which develops technologies and solutions. It involved learning about RAN's communication network, projects, and transforming their website using the Joomla content management system to make it more user-friendly.
The document provides background information on the industrial training program at Makerere University and Uganda Electricity Transmission Company Limited (UETCL). It discusses the objectives of the industrial training program which include providing practical experience and exposure to potential employment opportunities. It then gives an overview of UETCL, outlining its vision, mission, mandate and organizational structure. Specifically, it describes the various departments at UETCL including Operations and Maintenance, Finance, and Human Resources. It notes that the author's 3-month industrial training was conducted at UETCL's Lugogo yard in the Communication section under the Information and Communication Technology Department.
The document discusses EMC ViPR SRM, a software solution for optimizing storage and laying the foundation for software-defined data centers. It provides automated insight and action to help reduce costs, increase agility, and provide a path to the cloud. ViPR SRM provides policy-based storage services, application-to-infrastructure mapping, performance and capacity trend reporting, storage configuration management, SLA reporting, application chargeback, data protection compliance, and utilization optimization.
This document provides information about EMC's ViPR software-defined storage platform, including:
1. ViPR SRM and ViPR Controller help reduce storage costs and increase flexibility by automating storage management and providing a self-service portal.
2. ViPR abstracts physical storage arrays, pools resources, and provides REST APIs and storage services to simplify management of heterogeneous infrastructure.
3. Case studies show how ViPR SRM provides visibility into storage utilization and performance, enabling optimization of resources and ensuring service levels are met.
This document appears to be instructions for an in-class activity where students will:
1) Answer questions about their favorite and least favorite foods and the estimated prices.
2) Analyze a graph about birth rates among different ethnic groups in the US.
3) Take notes on economic concepts like scarcity, choice, opportunity cost, and trade as part of learning how the economy works.
EMC Proven Professional Knowledge Sharing 2008 Book of AbstractsEMC
The document discusses how ITIL (IT Infrastructure Library) is becoming the de facto standard for IT service management. ITIL aims to transform how IT services are provided to businesses over the next decade by facilitating the development of consultative infrastructure solutions. While ITIL emphasizes aligning infrastructure to business needs, it does not provide prescriptive remedies for implementation. The author suggests that combining ITIL with EMC's information lifecycle management approach could provide a complete solution for delivering high-quality IT services that optimize people, processes, and products to meet business objectives. In under 3 sentences, this summary captures the key points about ITIL becoming the IT service management standard, its focus on aligning infrastructure to business, and the potential of combining
EMC Proven Professional Knowledge Sharing 2010 Book of AbstractsEMC
This document contains the abstracts from the 2010 EMC Proven Professional Knowledge Sharing competition. It begins with introductions from EMC leaders about the importance of knowledge sharing. The abstracts are then presented in the following categories: Best of Cloud, Best of Skills, Best of Consolidation, and so on for topics like Backup/Recovery, Storage, Virtualization, and more. Each abstract summarizes an article on best practices for that topic in under 3 sentences.
This document provides background information on ResilientAfrica Network (RAN) and the internship program. It describes the objectives of industrial training and RAN's mission to promote resilience in Africa. The internship focused on RAN's Eastern Africa Resilience Innovation Lab (EARILab), which develops technologies and solutions. It involved learning about RAN's communication network, projects, and transforming their website using the Joomla content management system to make it more user-friendly.
The document provides background information on the industrial training program at Makerere University and Uganda Electricity Transmission Company Limited (UETCL). It discusses the objectives of the industrial training program which include providing practical experience and exposure to potential employment opportunities. It then gives an overview of UETCL, outlining its vision, mission, mandate and organizational structure. Specifically, it describes the various departments at UETCL including Operations and Maintenance, Finance, and Human Resources. It notes that the author's 3-month industrial training was conducted at UETCL's Lugogo yard in the Communication section under the Information and Communication Technology Department.
The document discusses EMC ViPR SRM, a software solution for optimizing storage and laying the foundation for software-defined data centers. It provides automated insight and action to help reduce costs, increase agility, and provide a path to the cloud. ViPR SRM provides policy-based storage services, application-to-infrastructure mapping, performance and capacity trend reporting, storage configuration management, SLA reporting, application chargeback, data protection compliance, and utilization optimization.
This document provides information about EMC's ViPR software-defined storage platform, including:
1. ViPR SRM and ViPR Controller help reduce storage costs and increase flexibility by automating storage management and providing a self-service portal.
2. ViPR abstracts physical storage arrays, pools resources, and provides REST APIs and storage services to simplify management of heterogeneous infrastructure.
3. Case studies show how ViPR SRM provides visibility into storage utilization and performance, enabling optimization of resources and ensuring service levels are met.
This document appears to be instructions for an in-class activity where students will:
1) Answer questions about their favorite and least favorite foods and the estimated prices.
2) Analyze a graph about birth rates among different ethnic groups in the US.
3) Take notes on economic concepts like scarcity, choice, opportunity cost, and trade as part of learning how the economy works.
The document discusses identity and access management challenges for retailers. It outlines security concerns retailers face, including the need to protect customer data and payment card information from cyber criminals. It then describes specific identity challenges retailers deal with related to compliance, access governance, and managing identity lifecycles. The document proposes using RSA Identity Management and Governance solutions to help retailers with access reviews, governing access through policies, and keeping compliant with regulations. Use cases are provided showing how IMG can help with challenges like point of sale monitoring, unowned accounts, seasonal workers, and operational issues.
The document provides an overview of Streamlined Task Orientated Management of Projects (STOMP), a high-level project methodology designed to provide visibility of project processes. It discusses common project phases including planning, design, build, test, and delivery. STOMP sits above detailed methodologies to allow all resources to understand the process. Key aspects covered include the project plan, change control process, and tracking progress against the schedule. The goal is to enable teams to communicate project status easily to management.
Visibility & Security for the Virtualized EnterpriseEMC
Identifying and understanding high-value digital assets in the context of the business is critical in assessing what work-loads to move to the cloud. But doing so is difficult without an effective model to help define and classify these assets. This session presents a down-to-earth methodology for identifying assets and understanding their value that you can apply in critical business decisions.
Objective 1: Understand what to look for when identifying valuable information assets.
After this session you will be able to:
Objective 2: Identify critical steps in the process of identifying and understanding digital assets.
Objective 3: Apply asset value when deciding what digital assets to entrust to the cloud.
Full recording via http://www.brainshark.com/emcworld/vu?pi=zHJzQJGhyzB8sLz0
This document contains snippets of text from various sources discussing economic concepts like market structures, competition, and costs. It includes brief explanations of perfect competition, monopolistic competition, oligopoly, and monopoly market types. Students are asked questions about different markets and perfect competition. Graphs are shown for perfect competition, monopolistic competition, and marginal revenue under monopolistic competition with deadweight loss.
The document contains questions from students in various economics classes about topics related to the economy, such as how politics and the stock market affect the economy, the national debt, taxes, gas prices, and economic conditions in different states and countries.
The document outlines a group assignment where students must create a YouTube video answering questions about government provision of public goods like roads, defense, and street lights. It discusses characteristics of private and public goods, and how free riding poses a challenge for funding public goods. Students are asked to brainstorm goods that are rivaled or non-rivaled in consumption between friends. The document also covers excludability, examples of different types of goods, and sample AP questions about public goods.
Sunsilk - GOG was launched in July 2006 as a partnership between HLL and advertising agencies to market Sunsilk shampoo. It utilized both traditional media spending as well as rural marketing programs. GOG featured forums, blogs, games and a virtual makeover machine to engage its large membership base. HLL conducted launch events in Delhi and Mumbai to promote the GOG website and their CRM strategy, aiming to build the brand over the long term.
This document describes a hybrid cloud management solution that provides:
1. Application management across private and public clouds using a single management point.
2. Role-based access and delegation of access to cloud subscriptions and resources through templates and quota enforcement.
3. Service management capabilities for both cloud consumers and providers including service catalog, request offerings, and support for the cloud consumer.
A Digital Eurovision for European UnionRene Summer
A Digital Eurovision for the European Union – the next step for European Public Service Broadcasting without frontiers. Why and how we must increase the availability of public service broadcasting to the widest Pan-European use.
This paper aims to initiate a discussion in Europe about the future of mass media in relation to the possibilities that can be achieved through technological development and policy innovation to stimulate the rise of a Pan-European identity across the European Union. By classifying current affairs reporting (news, current affairs and documentaries) produced by/for public service broadcasters (PSB) to fall within the definition of Open Government Data, European policy makers will unlock access to a wealth of European PSB content for European citizens, journalists and new start-ups to access, interact with, aggregate and disseminate. Such policy innovation not only comes with the already acknowledged economic benefits associated with open data and data-driven innovation; it also helps stimulate the creation of a strong Pan-European identity through increased Pan-European access to national stories, news and identity projections.
EMC Proven Professional Knowledge Sharing 2007 Book of AbstractsEMC
This document provides an overview of abstracts submitted for EMC's First Annual Knowledge Sharing Initiative. It lists the winners for best practices, case studies, and topics covered. The compilation includes abstracts on various storage topics like CLARiiON deployment, replication, backup solutions, mainframe storage, and migration strategies. It aims to create a platform for EMC Proven professionals to share experiences and best practices.
This white paper documents the results of EMC IT's transformational journey and describes EMC IT's current overall organizational structure and strategic objectives.
White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...EMC
Migrating from a legacy availability infrastructure for Backup and Recovery
creates challenges in terms of what are the best practices for a new Backup and
Recovery deployment with EMC‘s Oracle databases for Global Data Warehouse
and mission-critical Oracle applications. This white paper will illustrate the
transformation of EMC IT Oracle Backup and Recovery Infrastructure and
highlight how the Data Domain appliance transforms EMC IT Oracle Backup
infrastructure
This document discusses EMC IT's transformation of its Oracle backup and recovery infrastructure from a legacy Virtual Tape Library (VTL) system to a new system utilizing EMC Data Domain appliances. The new infrastructure is 4x cheaper, 8x faster, and provides 10x better backup capabilities compared to the legacy system. It allows EMC IT to reuse its existing backup tools and processes while gaining the benefits of Data Domain deduplication, which increases capacity and backup speed. The transformation delivered significant improvements to EMC IT's ability to meet service level agreements for Oracle database backups and restores.
The document discusses identity and access management challenges for retailers. It outlines security concerns retailers face, including the need to protect customer data and payment card information from cyber criminals. It then describes specific identity challenges retailers deal with related to compliance, access governance, and managing identity lifecycles. The document proposes using RSA Identity Management and Governance solutions to help retailers with access reviews, governing access through policies, and keeping compliant with regulations. Use cases are provided showing how IMG can help with challenges like point of sale monitoring, unowned accounts, seasonal workers, and operational issues.
The document provides an overview of Streamlined Task Orientated Management of Projects (STOMP), a high-level project methodology designed to provide visibility of project processes. It discusses common project phases including planning, design, build, test, and delivery. STOMP sits above detailed methodologies to allow all resources to understand the process. Key aspects covered include the project plan, change control process, and tracking progress against the schedule. The goal is to enable teams to communicate project status easily to management.
Visibility & Security for the Virtualized EnterpriseEMC
Identifying and understanding high-value digital assets in the context of the business is critical in assessing what work-loads to move to the cloud. But doing so is difficult without an effective model to help define and classify these assets. This session presents a down-to-earth methodology for identifying assets and understanding their value that you can apply in critical business decisions.
Objective 1: Understand what to look for when identifying valuable information assets.
After this session you will be able to:
Objective 2: Identify critical steps in the process of identifying and understanding digital assets.
Objective 3: Apply asset value when deciding what digital assets to entrust to the cloud.
Full recording via http://www.brainshark.com/emcworld/vu?pi=zHJzQJGhyzB8sLz0
This document contains snippets of text from various sources discussing economic concepts like market structures, competition, and costs. It includes brief explanations of perfect competition, monopolistic competition, oligopoly, and monopoly market types. Students are asked questions about different markets and perfect competition. Graphs are shown for perfect competition, monopolistic competition, and marginal revenue under monopolistic competition with deadweight loss.
The document contains questions from students in various economics classes about topics related to the economy, such as how politics and the stock market affect the economy, the national debt, taxes, gas prices, and economic conditions in different states and countries.
The document outlines a group assignment where students must create a YouTube video answering questions about government provision of public goods like roads, defense, and street lights. It discusses characteristics of private and public goods, and how free riding poses a challenge for funding public goods. Students are asked to brainstorm goods that are rivaled or non-rivaled in consumption between friends. The document also covers excludability, examples of different types of goods, and sample AP questions about public goods.
Sunsilk - GOG was launched in July 2006 as a partnership between HLL and advertising agencies to market Sunsilk shampoo. It utilized both traditional media spending as well as rural marketing programs. GOG featured forums, blogs, games and a virtual makeover machine to engage its large membership base. HLL conducted launch events in Delhi and Mumbai to promote the GOG website and their CRM strategy, aiming to build the brand over the long term.
This document describes a hybrid cloud management solution that provides:
1. Application management across private and public clouds using a single management point.
2. Role-based access and delegation of access to cloud subscriptions and resources through templates and quota enforcement.
3. Service management capabilities for both cloud consumers and providers including service catalog, request offerings, and support for the cloud consumer.
A Digital Eurovision for European UnionRene Summer
A Digital Eurovision for the European Union – the next step for European Public Service Broadcasting without frontiers. Why and how we must increase the availability of public service broadcasting to the widest Pan-European use.
This paper aims to initiate a discussion in Europe about the future of mass media in relation to the possibilities that can be achieved through technological development and policy innovation to stimulate the rise of a Pan-European identity across the European Union. By classifying current affairs reporting (news, current affairs and documentaries) produced by/for public service broadcasters (PSB) to fall within the definition of Open Government Data, European policy makers will unlock access to a wealth of European PSB content for European citizens, journalists and new start-ups to access, interact with, aggregate and disseminate. Such policy innovation not only comes with the already acknowledged economic benefits associated with open data and data-driven innovation; it also helps stimulate the creation of a strong Pan-European identity through increased Pan-European access to national stories, news and identity projections.
EMC Proven Professional Knowledge Sharing 2007 Book of AbstractsEMC
This document provides an overview of abstracts submitted for EMC's First Annual Knowledge Sharing Initiative. It lists the winners for best practices, case studies, and topics covered. The compilation includes abstracts on various storage topics like CLARiiON deployment, replication, backup solutions, mainframe storage, and migration strategies. It aims to create a platform for EMC Proven professionals to share experiences and best practices.
This white paper documents the results of EMC IT's transformational journey and describes EMC IT's current overall organizational structure and strategic objectives.
White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...EMC
Migrating from a legacy availability infrastructure for Backup and Recovery
creates challenges in terms of what are the best practices for a new Backup and
Recovery deployment with EMC‘s Oracle databases for Global Data Warehouse
and mission-critical Oracle applications. This white paper will illustrate the
transformation of EMC IT Oracle Backup and Recovery Infrastructure and
highlight how the Data Domain appliance transforms EMC IT Oracle Backup
infrastructure
This document discusses EMC IT's transformation of its Oracle backup and recovery infrastructure from a legacy Virtual Tape Library (VTL) system to a new system utilizing EMC Data Domain appliances. The new infrastructure is 4x cheaper, 8x faster, and provides 10x better backup capabilities compared to the legacy system. It allows EMC IT to reuse its existing backup tools and processes while gaining the benefits of Data Domain deduplication, which increases capacity and backup speed. The transformation delivered significant improvements to EMC IT's ability to meet service level agreements for Oracle database backups and restores.
White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ EMC
This White Paper provides a detailed overview of the key features and benefits of EMC Isilon SynclQ software and describes how SyncIQ enables enterprises to flexibly manage and automate data replication between two Isilon clusters. This paper also describes best practices and use cases to maximize the benefits of cluster-to-cluster replication.
This document introduces a reference architecture from Sun Microsystems and Blackboard for optimizing eLearning environments. It describes a performance maturity model with 5 levels for eLearning solutions and notes that most institutions are currently at the lowest, most reactive level. The reference architecture is designed to help institutions advance to higher, more proactive levels through proven, scalable components that can deliver consistently high performance in a cost-effective way. It includes guidance on optimizing the application, database, storage, and management tiers to meet the demanding requirements of mission-critical eLearning systems.
Deploying customizations across microsoft dynamics ax 2012 environments ax2012Prathamesh Joshi
This document discusses best practices for deploying customizations from a source Microsoft Dynamics AX 2012 environment to a target environment. It recommends exporting the entire model store from the source environment to minimize downtime during deployment. It describes initializing the target environment by importing the model store from the source, ensuring the source is ready for export by granting permissions and recompiling, and provides steps for exporting from the source, preparing and importing into the target, and finalizing the deployment.
Emc data domain® boost integration guideArvind Varade
The document provides an integration guide for using EMC NetWorker Version 9.0.x with EMC Data Domain Boost (DD Boost) technology. It covers planning, practices, and configuration information for using DD Boost devices within a NetWorker backup and storage management environment. Key points include:
- DD Boost allows deduplication of backup data on Data Domain storage systems for reduced storage requirements.
- The guide provides roadmaps and procedures for configuring DD Boost devices, policies for backups and cloning, software requirements, restoring data, monitoring and reporting, and upgrading existing DD Boost configurations.
- Details are given on network and hardware requirements, performance considerations, licensing, and best practices for backup retention, data types
EMC IT's Journey to Cloud :
PHASE 2: BUSINESS PRODUCTION
VIRTUAL DESKTOP
Follow EMC’s rollout of Virtual Desktop to empower users and automate desktop management.
White Paper: Object-Storage-as-a-Service and Value-Added Services — EMC Atmos...EMC
This white paper provides guidelines on how to deploy the EMC Atmos products, the Atmos Cloud Delivery Platform, and supporting Atmos technologies to create an Object-Storage-as-a-Service environment.
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applian...EMC
This White Paper explores backing up EMC Greenplum Data Computing Appliance data to Data Domain systems and how to effectively exploit Data DomainTs leading-edge technology.
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMSEMC
EMC IT's Journey to Cloud
PHASE 2: BUSINESS PRODUCTION
BACKUP & RECOVERY SYSTEMS
Discover how EMC uses its next generation deduplication, backup, and archiving.
Network Virtualization and Security with VMware NSX - Business Case White Pap...Błażej Matusik
This document discusses how network virtualization and security solutions from VMware, specifically NSX, can help organizations transform their software-defined data centers to achieve greater speed, agility, and security. It outlines key trends driving adoption of software-defined data centers and hybrid cloud, and how NSX addresses challenges around network limitations, security threats, and manual configuration. Benefits of NSX include micro-segmentation, disaster recovery, self-service clouds, automation, and cost savings.
This document discusses how network virtualization and security solutions from VMware, specifically NSX, can help organizations transform their software-defined data centers to achieve greater speed, agility, and security. It outlines key trends driving adoption of software-defined data centers and hybrid cloud, and how NSX addresses challenges around network limitations, security threats, and manual configuration. Benefits of NSX include micro-segmentation, disaster recovery, self-service clouds, automation, and cost savings.
Business Continuity and Disaster Recovery for Oracle11g Enabled by EMC Symmet...EMC
This white paper describes a data protection and disaster recovery solution for Virtualized Oracle Database 11gOLTP environments, enabled by EMC Symmetrix VMAXe with Enginuity for VMAXe, EMC RecoverPoint, and VMware vCenter Site Recovery Manager. It covers both local data protection and automated failover and failback between remote sites.
The document discusses cloud computing and provides an overview of its key concepts and models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). It also covers public and private clouds as well as the benefits and challenges of cloud computing. The role of grid computing technologies in cloud computing is examined. Details are given on the open-source cloud computing platform Eucalyptus including its architecture, sample setups, and security issues. A comparison is provided of other cloud software such as OpenNebula, Nimbus, CloudStack, and OpenStack. Steps are outlined for installing and configuring Eucalyptus and managing its nodes and images.
The document discusses cloud computing and Eucalyptus, an open-source software for building private and public clouds. It provides an overview of cloud computing models, benefits and challenges. It then describes the architecture and components of Eucalyptus, including the cluster controller, node controller and cloud controller. Sample setup configurations are also discussed. Finally, it compares Eucalyptus to other cloud software like OpenNebula and Nimbus.
Mikel berdufi university_of_camerino_thesisMikel Berdufi
This document discusses trust management in a multicloud computing environment. It begins by providing an overview of cloud computing and single cloud environments, describing deployment models, security and privacy issues, and approaches. It then discusses multi-cloud environments, challenges, benefits, and management software. The concept of trust and trust models are explained. Existing trust management techniques and prototypes are reviewed. The document proposes a trust management system for multiclouds using OpenStack and Jclouds, describing tests performed and the system architecture. It concludes by discussing future work.
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...webhostingguy
This document discusses how EMC NetWorker and its modules can be used with EMC Symmetrix storage arrays to perform backups of Microsoft SQL Server databases using snapshot technologies. It covers snapshot backup and recovery workflows in both homogenous and heterogeneous environments. The document provides information on configuring NetWorker, Symmetrix groups, and NMSQL for backups using PowerSnap snapshots, and describes various recovery options like instant restore, conventional restores, and rollbacks.
A successful data migration process can be used for a one-time migration, or as a standard procedure for future migrations employing a consistent, reliable and repeatable methodology incorporating planning, tool implementation and validation. Dell data migration services can help. This whitepaper explores the Dell storage portfolio, Dell methodologies for migration and the use cases for migrating customers over to Dell Storage.
Similar to EMC Proven Professional Knowledge Sharing 2009 Book of Abstracts (20)
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
CloudBoost is a cloud-enabling solution from EMC
Facilitates secure, automatic, efficient data transfer to private and public clouds for Long-Term Retention (LTR) of backups. Seamlessly extends existing data protection solutions to elastic, resilient, scale-out cloud storage
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
With EMC XtremIO all-flash array, improve
1) your competitive agility with real-time analytics & development
2) your infrastructure agility with elastic provisioning for performance & capacity
3) your TCO with 50% lower capex and opex and double the storage lifecycle.
• Citrix & EMC XtremIO: Better Together
• XtremIO Design Fundamentals for VDI
• Citrix XenDesktop & XtremIO
-- Image Management & Storage
-- Demonstrations
-- XtremIO XenDesktop Integration
EMC XtremIO and Citrix XenDesktop provide an optimized virtual desktop infrastructure solution. XtremIO's all-flash storage delivers high performance, scalability, and predictable low latency required for large VDI deployments. Its agile copy services and data reduction features help reduce storage costs. Joint demonstrations showed XtremIO supporting thousands of desktops with sub-millisecond response times during boot storms and login storms. A unique plug-in streamlines the automated deployment and management of large XenDesktop environments using XtremIO's advanced capabilities.
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
Explore findings from the EMC Forum IT Study and learn how cloud computing, social, mobile, and big data megatrends are shaping IT as a business driver globally.
Reference architecture with MIRANTIS OPENSTACK PLATFORM.The changes that are going on in IT with disruptions from technology, business and culture and so IT to solve the issues has to change from moving from traditional models to broker provider model.
This document summarizes a presentation about scale-out converged solutions for analytics. The presentation covers the history of analytic infrastructure, why scale-out converged solutions are beneficial, an analytic workflow enabled by EMC Isilon storage and Hadoop, test results showing performance benefits, customer use cases, and next steps. It includes an agenda, diagrams demonstrating analytic workflows, performance comparisons, and descriptions of enterprise features provided by using EMC Isilon with Hadoop.
Container-based technology has experienced a recent revival and is becoming adopted at an explosive rate. For those that are new to the conversation, containers offer a way to virtualize an operating system. This virtualization isolates processes, providing limited visibility and resource utilization to each, such that the processes appear to be running on separate machines. In short, allowing more applications to run on a single machine. Here is a brief timeline of key moments in container history.
This white paper provides an overview of EMC's data protection solutions for the data lake - an active repository to manage varied and complex Big Data workloads
This infographic highlights key stats and messages from the analyst report from J.Gold Associates that addresses the growing economic impact of mobile cybercrime and fraud.
Virtualization does not have to be expensive, cause downtime, or require specialized skills. In fact, virtualization can reduce hardware and energy costs by up to 50% and 80% respectively, accelerate provisioning time from weeks to hours, and improve average uptime and business response times. With proper training and resources, virtualization can be easier to manage than physical environments and save over $3,000 per year for each virtualized server workload through server consolidation.
An Intelligence Driven GRC model provides organizations with comprehensive visibility and context across their digital assets, processes, and relationships. It enables prioritization of risks based on their potential business impact and streamlines remediation. By collecting and analyzing data in real time, an Intelligence Driven GRC strategy reveals insights into critical risks and compliance issues and facilitates coordinated responses across security, risk management, and compliance functions.
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
This white paper discusses the results of a CIO UK survey on a“Trust Paradox,” defined as employees and business partners being both the weakest link in an organization’s security as well as trusted agents in achieving the company’s goals.
Emory's 2015 Technology Day conference brought together faculty, staff and students to discuss innovative uses of technology in teaching and research. Attendees learned about new tools and platforms through hands-on workshops and presentations by Emory experts. The conference highlighted how technology is enhancing collaboration and creativity across Emory's campus.
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
This document provides information about data science and big data analytics. It discusses discovering, analyzing, visualizing and presenting data as key activities for data scientists. It also provides a website for further information on a book covering the tools and methods used by data scientists.
Using EMC VNX storage with VMware vSphereTechBookEMC
This document provides an overview of using EMC VNX storage with VMware vSphere. It covers topics such as VNX technology and management tools, installing vSphere on VNX, configuring storage access, provisioning storage, cloning virtual machines, backup and recovery options, data replication solutions, data migration, and monitoring. Configuration steps and best practices are also discussed.
2014 Cybercrime Roundup: The Year of the POS BreachEMC
This RSA fraud report summarizes cybercrime in 2014 and includes the number of phishing attacks globally, top hosting countries for phishing attacks, the financial impact of global fraud losses, and a monthly highlight.
EMC Isilon Best Practices for Hadoop Data StorageEMC
This document provides best practices for setting up and managing HDFS on an EMC Isilon cluster to optimize storage for Hadoop analytics. Key points include:
- An Isilon cluster implements the HDFS protocol and presents every node as both a namenode and datanode for redundancy and load balancing.
- Virtual racks can mimic data locality to optimize performance.
- Enterprise features like SmartPools, deduplication, and InsightIQ help manage and monitor large Hadoop data sets on the Isilon platform.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
Creative Restart 2024: Mike Martin - Finding a way around “no”Taste
Ideas that are good for business and good for the world that we live in, are what I’m passionate about.
Some ideas take a year to make, some take 8 years. I want to share two projects that best illustrate this and why it is never good to stop at “no”.
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
Information and Communication Technology in EducationMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 2)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐈𝐂𝐓 𝐢𝐧 𝐞𝐝𝐮𝐜𝐚𝐭𝐢𝐨𝐧:
Students will be able to explain the role and impact of Information and Communication Technology (ICT) in education. They will understand how ICT tools, such as computers, the internet, and educational software, enhance learning and teaching processes. By exploring various ICT applications, students will recognize how these technologies facilitate access to information, improve communication, support collaboration, and enable personalized learning experiences.
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐫𝐞𝐥𝐢𝐚𝐛𝐥𝐞 𝐬𝐨𝐮𝐫𝐜𝐞𝐬 𝐨𝐧 𝐭𝐡𝐞 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭:
-Students will be able to discuss what constitutes reliable sources on the internet. They will learn to identify key characteristics of trustworthy information, such as credibility, accuracy, and authority. By examining different types of online sources, students will develop skills to evaluate the reliability of websites and content, ensuring they can distinguish between reputable information and misinformation.
How to Setup Default Value for a Field in Odoo 17Celine George
In Odoo, we can set a default value for a field during the creation of a record for a model. We have many methods in odoo for setting a default value to the field.
3. Knowledge Sharing Winners 2008 Awards:
(left to right) Diedrich Ehlerding, Lalit Mohan, Thank You!
Brian Russell, and Paul Brant with Alok
Shrivastava, Senior Director, EMC Education For the third consecutive year, we are pleased to congratulate our EMC®
Services; Frank Hauck, Executive Vice
President, Global Marketing and Customer Proven™ Professional Knowledge Sharing authors. This year’s Book of
Quality; and Tom Clancy, Vice President
EMC Education Services. Abstracts demonstrates how the Knowledge Sharing program has grown
into a powerful forum for sharing ideas among information storage
professionals. In 2009, Knowledge Sharing articles were downloaded more
than 104,000 times, underscoring the power of the knowledge sharing
concept. You may view the 2009 articles and the monthly release of our 2009
Knowledge Sharing articles at http://education.emc.com/knowledgesharing.
Our Knowledge Sharing authors also play a leading role in our new EMC Proven
Professional community. It’s a great place to collaborate with other Proven
Professionals, ask questions about the program, or share your experiences.
Visit the community at http://education.emc.com/provencommunity.
The EMC Proven Professional program had another great year—we recently
awarded our 39,000th certification. Also, we recently announced publication
of “Information Storage and Management,” the first technology book from
EMC. It will be a valuable addition to any IT professional’s reference library.
Our continuing success is built on the foundation of committed professionals
who participate, contribute, and share. We thank each of you who participated
in the 2009 Knowledge Sharing competition.
Tom Clancy Alok Shrivastava
Vice President Senior Director
EMC Education Services EMC Education Services
3
5. Table of Contents (Continued)
Business Process
Enterprise Standards and Automation for Storage Integration and Installation
at Microsoft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Aaron Baldie, EMC Corporation
Significant Savings are Within Your Reach When You Understand the True Cost
of Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Bruce Yellin, EMC Corporation
The Efficient, Green Data Center. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Raza Syed, EMC Corporation
Connectivity
Best Practices for Deploying Celerra NAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Ron Nicholl, A Large IT Division
CLARiiON and FCiP: A Practical Intercontinental DR and HA Solution. . . . . . . . . . . . . . 23
Jaison K. Jose, EMC Corporation
Oracle Performance Hit | a SAN Analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Kofi Ampofo Boadi, JM Family, Inc.
Preventative Monitoring in the NAS Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Robert Wittig, EDS, an HP Company
Create a Comparative Analysis of an Oracle Database Using Storage
Architectures NAS and SAN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Sergio Hirata, Columbia Storage
Volnys Borges Bernal, Universidade de São Paulo/LSITec
Content Management
Custom Documentum Application Code Review. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Christopher Harper, EMC Corporation
Tiered Storage
Business Continuity Planning for Any Organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Smartha Guha Thakurta, EMC Corporation
Data Migration Strategy (EMC SRDF via “Swing Frame”). . . . . . . . . . . . . . . . . . . . . . . . 29
Sejal Joshi, A Large Telecommunications Company
Ken Guest, A Large Telecommunications Company
Data Storage Performance—Equating Supply and Demand. . . . . . . . . . . . . . . . . . . . . . 30
Lalit Mohan, EMC Corporation
Integrating Linux and Linux-based Storage Management Software with RAID
System-based Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Diedrich Ehlerding, Fujitsu Technology Solutions
5
6. Table of Contents (Continued)
Simplifying/Demystifying EMC TimeFinder Integration with Oracle Flashback. . . . . 32
.
Robert Mosco Jr., EMC Corporation
Service-Oriented Architecture (SOA) and Enterprise Architecture (EA). . . . . . . . . . . . . 33
Charanya Hariharan, Pennsylvania State University
Dr. Brian Cameron, Pennsylvania State University
SRDF/Star Software Uses and Best Practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Bill Chilton, EMC Corporation
Using EMC ControlCenter File Level Reporting for CIFS Shares . . . . . . . . . . . . . . . . . . 35
.
Chad DeMatteis, EMC Corporation
Michael Horvath, Fifth Third Bancorp
Virtualization
Cloud Computing Services—A New Approach to Naming Conventions. . . . . . . . . . . . . 36
Laurence A. Huetteman, Technology Business Consultant
Leveraging Cloud Computing for Optimized Storage Management . . . . . . . . . . . . . . . 37
Mohammed Hashim, Wipro Technologies
Rejaneesh Sasidharan, Wipro Technologies
6 EMC Proven Professional: Knowledge Sharing 2009
7. Is Cloud Computing the Game Changer Your
Company Needs in These Tough Times?
Bruce Yellin, EMC Corporation
There have been countless articles written about cloud computing; a Google search will
return millions of hits. Your colleagues discuss it at lunch and vendors bring it up in their
presentations. From the enterprise perspective, it could be the perfect storm of value
propositions—cloud computing drives the cost of IT down, is available on demand, and is
scaleable. Cloud computing could even become a new competitive edge for your company.
Maturing at a rapid pace, it will be the next chapter in data processing. But is it ready for your
company? Can the hype of cloud computing live up to its promise?
I call cloud computing a “game changer” because it is a service, a platform and operating
environment poised to transform the status-quo computing model. Advocates argue it will
“ he emergence of cloud computing and its
T revolutionize how information will be delivered. It is difficult to find a leading technology
impact in these tough economic times are company that isn’t already delivering some type of cloud product or discussing their plans
the crux of the Knowledge Sharing charter. for the cloud. Many of us already rely on Yahoo or Google for personal e-mail, upload photos
on Flickr for others to browse, and use Facebook to stay in touch. But when you use these
As a former computer science teacher,
titles at work, are you met with open arms, or does company policy frown upon their use?
expanding my awareness of new topics and
guiding others is my mission—that is how Cloud computing allows the user to access an application without having to own it, install
new concepts are shaped.” it on a computer, or maintain it. The cloud offers the freedom to access an application from
anywhere a browser can run—desktop, laptop, intelligent phone, etc. It can increase a
Bruce Yellin, EMC Corporation
company’s processing and storage capacity, and provide services without taking up data
center space. On a personal level, some cloud computing services are free. For the enterprise,
pricing is subscription-based or pay-as-you-go, allowing a company to enhance existing
service or provide new IT functionality without a major investment.
This article examines what cloud computing is, total cost of ownership, privacy/security
impacts, universal access concerns, and hybrid strategies.
7
8. Customized Tool for Automated Storage
Provisioning
Ken Guest, A Large Telecommunications Company
Sejal Joshi, A Large Telecommunications Company
Homegrown tools for storage provisioning automation can improve efficiency and implement
a common standard in a multi-vendor storage environment. This enables teams to work more
efficiently and eliminates the need for expensive SRM tools that may not meet all business
requirements. In the current economic environment, this is even more important as groups
are being downsized and budgets cut while storage capacity and fiber switch ports increase
at a breakneck speed.
In 2009, we provisioned 6.0 PB of enterprise-class SAN-based storage, compared to 4.3 pro-
visioned in 2007, a year-to-year increase of 140 percent. Our current environment is growing
at a rate of ~100 TB per week. SRM tools do not scale to meet our requirements and service
level agreements (SLAs) with this growth rate. Using our custom implementation, we can
provision ~50 TB of storage across multiple frames in less than one hour and reduce overall
re-work and human error. This includes design validation, LUN creation/masking, and zoning.
This article discusses how to use vendor-provided CLI software to create/implement custom-
ized provisioning tools. SRM-based provisioning tools are great for organizations with small
storage footprints. However, they do not scale in larger and more diverse, enterprise-class,
multi-data-center environments due to implementation costs and increased total cost of
ownership (TCO).
Instead, we can implement a customized provisioning solution with a small data center foot-
print and very little additional cost to the company. This article discusses how to implement
end-to-end storage provisioning automation using multi-vendor storage/switch platforms.
The process includes a centralized ticketing system to track the storage request throughout
its lifecycle. This enables the overall storage automation process. The workflow tool tracks
approvals and design information, providing the feed to the automation scripts and informa-
tion to the system administrator to build the file systems based on the design.
Due to central automation, we can guarantee standards across multiple data centers/envi-
ronments and easily create standard reports.
8 EMC Proven Professional: Knowledge Sharing 2009
9. Reclaiming SAN Storage—The Good, the
Bad, and the Ugly
Brian Dehn, EMC Corporation
“My bonus is based on saving $5M worth of storage.”
“We are cutting the storage budget so you need to reuse capacity.”
“We cannot purchase additional storage until we increase utilization.”
Reclaiming storage capacity for reuse reduces IT capital expenditures, increases storage
utilization, contributes to “green computing” initiatives, and can address each of the issues
“ wrote this article because I realized that
I above. Proper planning and execution of a storage reclamation effort is key to avoiding prob-
lems and realizing maximum benefits.
no material existed that would provide
storage users with a best-practices meth- IT professionals, especially storage administrators, usually know how much storage is allo-
odology for reclaiming storage.” cated and available for allocation. “Orphaned” storage, or capacity that appears to be used
but is not, is more difficult to find. We must understand storage configuration states and
“ he best thing about being a Knowl-
T the storage configuration hierarchy to find this treasure trove of reclaimable storage. Most
of the layers in the storage configuration hierarchy include potentially reclaimable capacity.
edge Sharing author is the amount of
The level of effort required to reclaim that capacity, however, may not be worth the return on
knowledge I gained personally as I was
investment, depending on where it exists. Identifying candidates for reclamation makes it
researching and writing the article. I think even more challenging.
the person who gained the most from
writing this article was me.” This article provides a best-practices “blueprint” for a successful reclamation strategy. The
following topics are discussed:
Brian Dehn, EMC Corporation
• Understanding the storage configuration hierarchy
• Identifying capacity for potential reclamation
• Determining whether the benefit is worth the cost
• Using storage resource management tools to facilitate the effort
This article will help you achieve storage reclamation objectives (the good), while reducing
time and cost (the bad), and avoiding significant problems (the ugly).
9
10. Architecting an Enterprise-Wide Document
Management Platform
Jacob Willig, Documentum Consultant
This article presents best practices discovered while implementing EMC Documentum® within
large organizations using a central-platform approach. Documentum is typically implemented
as a dedicated host for document management and storage. The implementation is tailored
to the specific set of functional requirements and does not necessarily consider future expan-
sion into different functional areas across the organization. If the need arises, a new point
solution is often implemented. It, too, is tailored to the new and existing requirements.
This approach fulfills the short-term business need for functionality, but it becomes increas-
“ keep learning as this is very much unex-
I ingly more expensive to maintain and operate the growing number of point solutions. This
plored territory. These are exciting times. minimizes the effectiveness of a content management solution as the overhead costs re-occur
I never had an article posted in the past, over time.
so the prospect of this article being posted
Large organizations adopting an enterprise view of content management, and implementing
makes me feel very proud. It would be document management as a strategic platform, are able to host document flows uniformly.
great if many more people would become The support team can add a new document flow easily and efficiently as everything in the
aware of the necessity of implementing platform is set up generically. This approach, though, will incur additional startup costs to
document management in a platform-like enable future, controlled growth.
architecture.”
This article discusses several of the challenges I faced while implementing document manage-
Jacob Willig, Documentum Consultant ment in a platform architecture. I will explain both the challenges and solutions.
Topics include information management, object model, security, workflows, and functional,
application and technical support.
10 EMC Proven Professional: Knowledge Sharing 2009
11. Real-Life Application of Disaster Recovery
Faisal Choudry, Magirus UK Ltd.
EMC business continuity (BC) and disaster recovery (DR) offer a myriad of options to protect
your data. Organizations sometimes implement them without a thorough analysis of how
and when they would use the technologies to recover data if needed. Even if familiar with the
technology, procedures can be so arduous that the organization has no chance of meeting
their committed recovery point objective (RPO) and recovery time objective (RTO). “State-of-
the-art” recovery technologies cannot help if no one knows how to use them.
Organizations need procedures to document how to implement their recovery technologies.
This is even more important if an external organization did the implementation. What ques-
tions should you consider?
• hen the implementation ends, can the customer grasp the complexities of the new
W
technologies and use them if needed?
• Can we make these complex solutions easier, especially when organizations don’t
have the “luxury” of appointing a full-time disaster recovery team?
SMEs and technology professionals face these issues when proposing BC and DR solutions.
This article uses a case scenario to examine these questions in relation to a recent real-life
solution, one that I proposed and implemented. The solution included multiple sites, using
EMC CLARiiON® systems (CX3-10 systems) at each site, EMC MirrorView™/Asynchronous,
and EMC SnapView™. ESX™ Servers are the attached hosts, so we implemented Site Recov-
ery Manager (SRM) using the recently released SRA adapter for MirrorView/A.
The project was successful, but raised interesting afterthoughts, especially regarding end-
users’ perceptions and technology expectations. In conclusion, this article will offer advice
on how to address these issues.
11
12. Best Practices for Implementing and
Administering EMC NetWorker
Anuj Sharma, Ace Data Devices
EMC NetWorker® is the fastest performing backup application in the market. Integration with
replication and snapshot technologies helps you meet the most aggressive RTO and RPO
requirements and transform backup to disk or backup to tape in an off-host, off-hours process.
It supports a broad set of operating systems, databases, applications, and topologies.
EMC NetWorker’s compatibility with various operating systems, applications, and databases
makes it successful in today’s competitive industry. However, it must be implemented properly
to get the most out this wonderful product. There are some practices to keep in mind to make
the backups and recovery more effective and beneficial for the organization.
This article covers the various practices that I performed when implementing and administering
EMC NetWorker. They include:
• Implementing NetWorker on various operating systems
• Making it foolproof in case of NetWorker server disaster
• mplementing NetWorker in a bidirectional as well as unidirectional hardware
I
firewall, including various scenarios (i.e., when some of the clients are in DMZ)
• Working with the NetWorker ports
• Implementing NetWorker in a cluster
• Integrating e-mail alerts with NetWorker
• Implementing persistent binding through EMC NetWorker
• Integrating EMC Avamar® for deduplication
• Probe-based backups
12 EMC Proven Professional: Knowledge Sharing 2009
13. A Load-Balancing Algorithm for Deploying
Backup Media Servers
Krasimir Miloshev, EMC Corporation
Finding the best backup client’s distribution over designated media servers can be considered
part of the general load-balancing problem. Our goal is to distribute the backup client’s data
in the best possible way among newly designated media servers responsible for the backup
read/write operations.
This article suggests a load-balancing approach based on one criterion—the amount of
data that must be backed up on each client. It begins by introducing the basic components
of backup infrastructures: the master server, clients, media servers, and storage backup
devices. It presents two approaches for deploying media servers and provides a structure for
decision making.
Next, we investigate a load-balancing schema where there are only 10 media backup clients
and two media servers. We calculate capacity and learn a load-distribution algorithm. Finally,
the article aligns the basic load-balancing algorithm to program implementation. In two easy
steps, you’ll be able to implement the algorithm using C or Korn-shell.
We can reduce the backup window by balancing the backup load among all the backup media
servers. Even when data size is the only criteria we use, we can expect to achieve visible
performance improvement and shorter backup windows.
13
14. Backing Up Applications with NetWorker Modules
Aaron Kleinsmith, EMC Corporation
This article describes how to configure EMC NetWorker® to back up a database application.
It includes NetWorker’s technical setup to help protect popular databases that relate to
released NetWorker modules. Backup administrators who configure and monitor the online
database backups through NetWorker benefit most from this article.
The article discusses traditional database backup methodologies such as online (hot) back-
ups, offline (cold) backups, and transaction log backups. The article describes the backup
procedure to capture a consistent copy of an online database and transactions logs from
the source disks using the application server resources that manage the primary copy of the
database and data.
It provides enough technical information to help a storage administrator who manages
NetWorker verify and monitor a properly set-up client.
This article discusses:
• Overview and explanation of NetWorker modules
• General concepts and planning applicable to all NetWorker modules
• etWorker configuration settings applicable to all modules and specific settings
N
and considerations for each NetWorker module within the NetWorker software
14 EMC Proven Professional: Knowledge Sharing 2009
15. DLm40xx Implementation and Upgrade Guide
Mike Smialek, EMC Corporation
Implementation of a data library for mainframe, DLm40xx series, requires coordination
between multiple system and people resources. They include the mainframe tape library
system, z/OS operating system software, NAS configuration and configuration of the DLm
ACP, and VTE components. EMC Celerra® Replicator V2.0 is also required if replicating data
to another DLm. This Implementation and Upgrade Guide walks through the implementation
process to define the information necessary to configure each component.
This guide is designed for solution architects, implementation specialists, maintenance and
support services personnel, and storage administrators who want to understand how to
implement or upgrade a DLm system. It presents necessary Linux commands and scripts to
“ y idea for this article came from par-
M allow a mainframe-centric person to do a DLm configuration.
ticipating on project implementations.
The DLm Implementation and Upgrade Guide addresses several key areas:
Besides the opportunity to have the
article published, writing it forces me to • DLm mainframe checklist to gather current customer tape information
organize many implementation notes and • Input form to provide required IP addresses and phone numbers
experiences into an orderly layout. Having • PC software and hardware needed to configure DLm
others benefit from my experience helps • DLm40xx hardware installation requirements
• /OS updates to tape catalog, HCD, SMS/ACS, MTL, OAM, and Esoterics
z
IT services organizations deliver projects
• NAS configuration
efficiently and provides customer TCE.”
• Running DLm Linux scripts to define Tapelibs and NFS mount points
Mike Smialek, EMC Corporation • Running SCRIPT80 to change permissions
• Installing DLm Healthcheck script and mainframe reporting
• DLm z/OS utilities
• ESCON or FICON CHPID updates
• est and acceptance procedures
T
• IP replication configuration
• roubleshooting
T
15
16. Implementing Deduplicated Oracle Backups
with NetWorker Module for Oracle
Chris Mavromatis, EMC Corporation
More and more customers are now evaluating the cost benefits of data deduplication. This is
partly due to the explosive growth of software deduplication technology (such as EMC Avamar®).
EMC NetWorker® Module for Oracle is a mature product, with thousands of customers, that
offers a strong backup solution for an Oracle database. The first quarter of 2009 will be the
first time that NetWorker Module for Oracle will have deduplication integration for Avamar.
This feature empowers users to conduct Oracle deduplication backups and restores via the
integrated use of a deduplication storage node (Avamar server). A deduplication backup
can be a manual backup initiated within RMAN or a scheduled backup via the NetWorker
Management Console scheduler framework.
There are a number of differences and additional configuration items that we must consider
when deploying NetWorker Module for Oracle 5.0 to perform deduplication backups. This
article outlines installation, configuration, pitfalls, and best practices. It provides answers to
questions that can help customers better embrace this paradigm shift in backup solutions.
This article highlights these considerations and provides guidance for deployment. It is not
intended to be a step-by-step guide, nor does it replace the Installation Guide or Release
Notes. It does assume a level of knowledge using NetWorker, Avamar, Oracle, and NetWorker
Module for Oracle.
Sales, systems engineers, support personnel, and customers will benefit from learning how
to deploy this solution.
16 EMC Proven Professional: Knowledge Sharing 2009
17. NDMP Localization/Internationalization
Support for NetWorker
Jyothi Deranna, EMC Corporation
Computer internationalization and localization are important because of the numerous
differences that exist among countries, regions, and cultures with respect to language (not
only distinct languages but also dialects and other differences within a single language for
weights and measures, currency, date and time formats, and more).
The EMC NetWorker® NDMP client-connection feature provides NAS with fast, flexible backup
and restore of mission-critical data residing on filers. The Network Data Management Protocol
(NDMP) is a TCP/IP-based protocol that specifies how network components communicate
with one another to move data across the network for backup and recovery. NetWorker with
NDMP client connections provides backup and recovery support for more than eight NAS
hardware providers. With NetWorker 7.4, the NDMP client is responsible to back up and
recover the non-ASCII data from the NAS filers.
EMC NetWorker 7.4 is a full-fledged internationalization release; the product is I18N and
L10N compatible. Many changes were made in the NDMP client-connection feature to handle
non-ASCII characters. NAS vendors each have their own mechanisms to store the non-ASCII
characters in their specific filers. NDMP is a single interface that helps NetWorker understand
how each vendor is handling non-ASCII data. Using NDMP, NetWorker is able to back up filers’
data and store it without data corruption.
This article explains how NetWorker backs up and recovers non-ASCII data residing in the NAS
filers using the NDMP client-connection feature. It describes how to configure NAS filers for
non-ASCII data backup/recovery and explains how the changes are done while configuring a
NAS filer as an NDMP client. It offers guidelines to configure filers from different vendors and
best practices and troubleshooting tips to avoid data corruption and increase performance.
17
18. Using Disks in Backup Environments and Virtual
Tape Library (VTL) Implementation Models
Emin Calikli, Gantek Technologies
Protecting data is vital for availability and business continuity. There are many data protection
solutions in the IT market. However, they address recovery time objectives (RTO) and recovery
point objectives (RPO). Recovery time represents the time it takes to restore the data; recovery
point represents the “data currency” at the backup state. These two concepts are not indepen-
dent and must be integrated based on company requirements.
Many organizations are experiencing shrinking backup windows and increasing data loads.
During a restore from tape, slower recovery operations result in longer production system
downtime. Companies are seeking faster backup and recovery solutions.
“ used current, real-world data
I Disks could be a viable solution for meeting fast data recovery requirements. The service
protection requirements and personal level agreement (SLA) depends on the application and the customer. It is often difficult
to meet all SLAs with a single data protection solution. Backup vendors are trying to tailor
experiences to write my article. Valuable
their applications to use disks efficiently; this approach requires intelligent development
data size is increasing day to day and
processes.
protection becomes more important and
critical.” Virtual Tape Library (VTL) could help us reduce or eliminate the following problems:
Emin Calikli, Gantek Technologies • Physical tape damage
• Cost of tape drives
• Highly utilized tape drive resources (VTL staging or post processing)
• Backup windows
• ecurity problems (backup encryption)
S
We have to know:
• TL implementation methods
V
• Differences of disk usage between OLTP applications and backups
• Impacts of block size on throughput and bandwidth
18 EMC Proven Professional: Knowledge Sharing 2009
19. Enterprise Standards and Automation for Storage
Integration and Installation at Microsoft
Aaron Baldie, EMC Corporation
Microsoft’s most challenging problem is how to keep tens of thousands of servers up to date
with drivers and firmware in an environment that is spread across many global data centers.
More and more, these data centers are subject to budget and staff cuts. Personnel are
becoming less specialized, and in some cases, have no technical training at all other than
the ability to power cycle equipment.
The EMC account team has worked directly with Microsoft’s IT staff to overcome these
challenges and provide standards for drivers, firmware, and complete automation packages
that integrate with existing processes to allow for storage connectivity across the enterprise.
This allows Microsoft IT staff to rapidly deploy EMC storage to any server globally and manage
this storage with a limited, centralized IT staff.
To accomplish this, the EMC Support Matrix is refreshed on a six-month cycle to provide a
baseline of supported drivers, firmware, and applications, and their compatibility with the
OS and hardware. A matrix is published to lock in the revisions so a deployment kit can be
created once this standard is established.
All drivers are then downloaded to a central location and rolled into an automation package
that can be integrated into Microsoft’s own deployment process. Testing is performed for
multiple scenarios across all currently supported OS versions for both upgrades from the
existing standards and new deployments. Any issues found during this test process are
triaged with Microsoft and fixed before the latest versions are released to gold. The local
account team accomplishes all of these tasks and owns the project from start to finish.
EMC and Microsoft’s strong alignment and rapid deployment of EMC hardware achieves one
of the largest ratios of storage to administrator at about 1.5 PB per head count across 150
EMC CLARiiON® systems and 10 EMC Symmetrix® DMX™ systems.
19
20. Significant Savings are Within Your Reach when
You Understand the True Cost of Storage
Bruce Yellin, EMC Corporation
Do you find yourself struggling with your company’s insatiable craving for more storage? Will
any of your storage suppliers’ claims of “faster, cheaper, and better” really save your company
money? How about the stark reality that your dwindling IT budget is causing you sleepless
nights? Has the time come to expand the outdated, state-of-the-art storage infrastructure you
leased just three years ago?
You may be asked to trim capital and operating storage expenses by hundreds of thousands
of dollars, while simultaneously introducing innovation to your organization. This seemingly
contradictory set of storage demands also impacts your internal service level agreements.
Where do you begin? Which concepts will deliver significant short- and long-term savings?
“ nowledge sharing is the basis by which
K
we all share our collective expertise to As a veteran of the storage industry, I have heard questions such as, “How much does a
gigabyte cost?” or “I don’t have a lot of money to spend” countless times. Neither is the
benefit others in IT. With cost often being
right place to start when trying to determine the actual cost of storage, nor how to make your
part of the storage equation, communicat-
storage budget go farther.
ing my technical training in terms of dollars
and cents turned out to be both fun and I have also witnessed an explosion of data growth; some pundits claim the rate is as high
educational.” as 60 percent per year. Whatever the rate, we will have to store more data tomorrow than
yesterday. In addition, corporate policies and regulations require us to save that data for
Bruce Yellin, EMC Corporation
longer periods of time. That means storage, which translates into more floor space, more
power, more staff, and more complexity.
This article explores the challenges facing the IT storage manager and offers insight into
navigating a course of action to provide budget relief, while offering better services to
internal and external customers. It explores issues such as frame expansion and future-proof
architectures, environmental impact, virtualization, deduplication, risk avoidance, stretch-
ing the lifespan of existing equipment, cost-effective education, required negotiation and
financial skills, cutting fat from a budget, and much more.
20 EMC Proven Professional: Knowledge Sharing 2009
21. The Efficient, Green Data Center
Raza Syed, EMC Corporation
This article will help you build an efficient, green data center that will yield financial and
environmental benefits. Data center power and cooling and virtualization are two key
strategies to help you reap these benefits. We discuss power and cooling optimization, as
well as virtualization and other related data center technologies that are required to develop
and operate an efficient, green data center. This discussion occurs in the context of a
virtualization-leveraged data center.
Virtualization has been positioned as the core enabler for driving broader efficiencies. It
includes server and storage procurement and utilization, information protection (backup and
recovery), business continuity and disaster recovery (local and remote replication), infrastruc-
ture management, and infrastructure consolidation and automation. This article provides
you with a breadth of knowledge about the major data center functions that have a direct or
indirect impact on operational and environmental efficiency.
Our discussion is not limited to technology, but includes other relevant areas of a data center
that are either impacted by or have an impact on the technology infrastructure and IT opera-
tions. It identifies major areas of consideration as well as step-by-step guidance about how
to implement power and cooling, virtualization, and other related technologies. Designs and
architectural drawings for optimization are included.
This article consists of three sections:
• ntroduction focuses on financial and environmental impacts of inefficient data
I
centers and the case for building efficient and green data centers.
• Considerations for Building Efficient, Green Data Centers focuses on high-level data
center operating environments, IT processes, and technology considerations for data
center efficiency.
• Implementing an Efficient, Green Data Center focuses on implementation processes,
steps, and technologies; and describes designs and architectural drawing in detail.
21
22. Best Practices for Deploying Celerra NAS
Ron Nicholl, A Large IT Division
Deploying EMC Celerra® NAS involves many pieces of the IT infrastructure ranging from
backend storage, to network topology, and beyond. Choosing a solid design can make the
difference between mediocre performance and exceeding your customers’ expectations.
NAS solutions are quickly becoming a viable alternative to mitigate the cost of a SAN-based
storage solution. A Celerra NAS solution offers much of the same functionality traditionally
seen on the storage array over IP, including replication, checkpoints, mirroring, and more.
Applying best practices to your design will improve performance and reliability.
This article includes:
“ he process of creating my article helped
T
1. How to lay out the backend storage devices
cement and expand on my knowledge.”
2. ow to implement a network configuration that allows for greater flexibility and
H
Ron Nicholl reliability
3. Planning Microsoft Windows domain interaction
4. Best practices for backing up the Celerra environment
5. Monitoring the performance of the Celerra solution
There are many components to a successful NAS design. The network topology can be lever-
aged to provide a greater scope of service; the CIFS and NFS clients can be configured for
greater performance and reliability. Implementing best-practices standards can reduce the
customers’ cost of ownership and improve reliability. This article provides a quick reference
to configuring Celerra.
22 EMC Proven Professional: Knowledge Sharing 2009
23. CLARiiON and FCiP: A Practical Intercontinental
DR and HA Solution
Jaison K. Jose, EMC Corporation
EMC CLARiiON® offers possibilities that meet almost all the needs of today’s high-demand
business. We can easily achieve complex industry requirements when we join this small
magic box to other technology. I would like to share an Intercontinental disaster recovery (DR)
solution that was achieved with the help of several products, including EMC CLARiiON,
MirrorView™/AS, SnapView® Clones, SnapView SnapShots, FCiP, and Vsan.
We had to find a solution to implement a primary site in Europe and a disaster recovery site
in the U.S. for a customer-facing application of EMC, so it was very important to have a robust
solution with a proper DR plan. FCiP was our first choice to manage data movement flawlessly
over the Atlantic; we could use Internet connectivity and VPN to create a tunnel between the
two sites. We segregated the data replication SAN by separating the ports to a special VSAN
extending to the DR site using FCiP.
CLARiiON was the obvious choice for this midrange application. The amount of data was
huge, but it was not very dynamic. Data availability was the primary concern. How would we
connect two sites separated by thousands of miles with a CLARiiON? Our best answer was
with MirrorView/AS since the data is sent through the FCiP tunnel to the DR CLARiiON.
Then, we needed a backup solution. This environment was hosted in a third-party data
hosting facility. A tape-based or external backup option often costs more money. SnapView
Clones were our answer. A gold copy of production and DR LUNs were set up to protect
against data corruption or data loss caused by human error.
MirrorView A/S, SnapView SnapShots, SnapView Clones, FCiP, and Vsan—all of these
products’ features are utilized in this unique disaster recovery solution. This not just a
concept; it has been implemented and is working in a production environment. I am happy
to share it with you.
23
24. Oracle Performance Hit | a SAN Analysis
Kofi Ampofo Boadi, JM Family, Inc.
Performance problems can be avoided or minimized if we design the right disk layout. RAID
type definitions for specific components are essential to Oracle’s performance. Not keeping
defined components on the same spindles is equally crucial. This article uses a real-life case
study to explain Oracle’s components and illustrate the effects of a poorly designed SAN on
Oracle’s performance. A hit!
Please be aware that the order of the analysis is irrelevant; it is the content that matters.
Applications’ performance relies heavily on the SAN. Performance issues can be centric to
the host, connectivity device, or the storage array, or a combination. This article elaborates
on the effect that the SAN can have on Oracle’s performance with an emphasis on the EMC
CLARiiON® storage array. I will touch briefly on the Symmetrix since most of the concepts
and analysis in the article apply to the EMC Symmetrix® as well. The items below will be
addressed in detail via a case study.
1. Define and analyze sequential and random writes and how they impact Oracle’s
performance design.
2. Define the components of Oracle architecture and their importance.
3. What are Redo Groups and why are they important to Oracle’s performance?
4. Detail each component’s behavior on the SAN and which disk layout best fits for
optimal performance.
5. CLARiiON has a limited performance-tuning ability, it has a non-scalable cache,
hence which architectural designs do you need to avoid?
6. How host-side analysis and hit can contribute to the performance of Oracle.
7. witch-level specifications and alerts that can significantly contribute to the
S
performance of applications.
8. he Case study! This details most of the issues administrators run into and suggests
T
the best resolutions.
Performance analysis can be approached in several ways. The key is to use the appropriate
performance tools to understand what you are analyzing. Please note that different approach-
es may lead to the same result.
24 EMC Proven Professional: Knowledge Sharing 2009
25. Preventative Monitoring in the NAS Environment
Robert Wittig, EDS an HP Company
The EMC Celerra® actively monitors the environment for warnings and failures. As the NAS
environment expands, it becomes increasingly important to assess the current health of each
frame and verify that the current configuration fully utilizes redundant Celerra capabilities.
Verification, testing, and preventative monitoring are important aspects of maintaining the
Celerra’s reliability and availability.
Once configured, we must test and monitor the Celerra environment to verify that it will prop-
erly handle any faults and continue to provide the services for which it was designed. Testing
should not stop once the system is in production; it should continue at regular intervals
to ensure continuous functioning if a failure occurs, and to notify the appropriate support
personnel in the event of a failure. Finally, we should make non-intrusive checks at regular
intervals to verify that regular support activities have not adversely impacted any part of the
environment.
This article identifies methods and preventative measures to identify configuration issues,
verify redundant hardware, and ensure that configured notifications function properly. The
objective is to provide the Celerra storage administrator with a set of actions to check the
status of a running environment, verify redundant operations, validate the configuration, and
confirm that failure notifications are functioning properly.
We will examine four parts of the Celerra environment:
• Provisioned storage
• Redundant data mover configuration
• Warning and failure notifications
• Celerra Connect Home functionality
Finally, this article suggests methods that can be applied to gather these checks into a
single automatic process. This process can be regularly executed to provide evidence of the
validated configuration and identify potential problems before they impact the availability
of the services or of the entire Celerra.
25
26. Create a Comparative Analysis of an Oracle Database
Using Storage Architectures NAS and SAN
Sergio Hirata, Columbia Storage
Volnys Borges Bernal, Universidade de São Paulo/LSITec
Today’s storage architecture market is divided among three large groups: direct-attached
storage (DAS), network-attached storage (NAS), and storage area network (SAN). The stor-
age system, among others, affects any application’s performance. The application’s overall
performance is also affected by the storage network technology, the data storage commu-
nication protocol, and the storage network components. Performance is measured using
response time.
Storage managers have difficulty aligning the application’s needs to the appropriate storage
architecture. Many factors are involved in this decision, including the compatibility between
the host bus adapter, switches, and storage systems, and the latency, cost, and management
“ ´m finishing my Science Computing
I tasks. Also, storage managers must consider the desired availability level for the application
Master’s degree and I saw in Knowledge and achieve the service level agreements (SLAs) negotiated with different departments.
Sharing an opportunity to publish my work.
Application simulators are an alternative to choose the best data storage technology or archi-
I used to read a lot of works comparing
tecture. The present work uses a simulator of an order entry application to generate the I/O
Fibre Channel, iSCSI, and NAS using file operations at an Oracle database installed on a SAN Fibre Channel and SAN iSCSI and NAS
system benchmark tools, but a real ap- with NFS architectures. It´s expected that the results will indicate whether an Oracle database
plication has different behavior than a file needs a Fibre Channel infrastructure or an iSCSI pipe has enough throughput to support it.
system benchmark tool. My idea is to open
This article is a guide to choosing the most accurate storage architecture for an Oracle
a discussion about a price/performance
application.
relation for the DBMS-based application in
some customer scenarios.”
Sergio Hirata, Columbia Storage
26 EMC Proven Professional: Knowledge Sharing 2009
27. Custom Documentum Application Code Review
Christopher Harper, EMC Corporation
An EMC Documentum® consultant typically is the last point of contact when things have gone
wrong. Firefighting is the term given for this type of corrective work.
These assignments are caused by solutions that are developed by someone with limited
knowledge of our systems. This lack of knowledge causes issues both in the design of the
application and the way it is implemented. This daunting task typically presents itself as
heaps of documentation, one or more DFC/WDK projects containing source code, and a
time-boxed schedule that prevents a full review of documentation and code.
How should we approach reviewing code written by a third party who doesn’t necessarily
conform to the standards you are accustomed to?
This article provides basic principles on what to look for and explains some of the common
ways that our systems are misused leading to poor performance. I will provide the technical
rationale for each instance where we discuss why or why not to use a particular approach.
Also, we will discuss corrective measures for each encountered problem. I will present the
technical solutions for all of the cases we discuss. The cases are ‘real’ and have been
encountered “in the wild.”
27
28. Business Continuity Planning for Any Organization
Smartha Guha Thakurta, EMC Corporation
This article introduces the methodologies to develop a company’s information survival
strategy. The goal is to analyze the organization’s critical information assets, do a risk-
mitigation analysis and data recovery planning encompassing change management.
The overall objective of a business continuity plan is that “in this demanding market, a
proactive approach aimed at assuring continuity of business processes and applications
amid major and minor disruptions is absolutely essential.”
The broad scope of the article includes:
• An introduction to business continuity planning
• Business continuity planning objectives
• Defining disaster and its types with different points of view
• Global best practices
• Benchmark case study of implementing BCP for an organization
• Methodology, barriers, and challenges
• Change management and emergency decision making
• Recommendations and conclusions
After reading this article, you will understand:
• The importance of business continuity planning
• The benefits and cost savings to stakeholders
• The roadmap/project plan developed for the organization
• Business process mapping and re-engineering for continuity of operations
Methodology and plan of work:
• Experiences from professional life
• Benchmarking with industry best practices
• Research data from global experts
• Review with the mentor at regular basis
• Findings and knowledge gathering from the field and the organization
28 EMC Proven Professional: Knowledge Sharing 2009
29. Data Migration Strategy (SRDF via “Swing Frame”)
Sejal Joshi, A Large Telecommunications Company
Ken Guest, A Large Telecommunications Company
Increasing data center power and cooling requirements impact IT infrastructures’ scalability.
Storage consolidation provides relief for power and cooling and also reduces total cost of
ownership (TCO). Simplifying storage infrastructures and ease of management are the two
reasons that businesses use storage consolidation. Businesses have had to scale their stor-
age infrastructures to accommodate capacity, performance, and high-availability require-
ments due to massive data growth.
This article provides guidelines for using storage-based replication (EMC SRDF®) to migrate/
consolidate data from multiple storage arrays to just a few. It explains how to migrate data
using SRDF from (5670) to (5772) code using a swing frame method (EMC Symmetrix®
DMX™-2) running (5671) code. This migration also involved multiple Oracle databases, so
maintaining data consistency was critical.
We were able to accomplish this task in a very short amount of time. There are advantages
and disadvantages of using storage-based or host-based migration methods. The article
discusses these and provides guidelines for migrating data from DMX-2 and DMX-3 arrays to
DMX-4 using SRDF.
29
30. Data Storage Performance—Equating Supply
and Demand
Lalit Mohan, EMC Corporation
Individual components, including storage, contribute to the cumulative outcome of
performance. When the storage processing duration is proportionately long, “demand” is
the workload generated by host computer systems, and “supply” is the processing service
provided by the data storage system. The “quality of performance” experienced by the
business relies on how well supply meets demand.
We must match projected demand with capability to supply for selecting and designing
data storage components. The resulting solution would operate at an optimum level, where
demand equals supply. In this article, we apply the demand-supply analogy to build a
universal framework using data storage domain performance characteristics as proxies
“ decided on a topic based on the direct
I representing demand and supply.
financial and operational benefit to custom-
This will be done in light of several popular information technology infrastructures, for
ers and to IT services providers. I wanted
example, messaging, enterprise resource planning, and relational database applications
to find a way to engage customers more
in an open systems environment, and mainframe host applications in a proprietary
closely in the current climate of tight IT environment.
budgets by trying to get more return on
investment.” Among the topics discussed are:
• Relevant terms and definitions
“ am delighted to see my article
I • Characteristics of “demand” placed on data storage components
published! It’s akin to a mother • “Supply” capability of the data storage component
looking at her newborn!” • Combining demand and supply into the working framework
• Options for improving performance capability
Lalit Mohan, EMC Corporation
• Case scenarios to illustrate key points
• Recommendations in conclusion
• Assumptions, impact, and remedy
• Limitations and improvements
This article helps you better plan and design optimum data storage infrastructures. It helps
you support centralization of business information assets into efficient shared service
centers, a necessity in the current financial climate. This aggregation may enhance the value
of information to management, improving return on investment.
30 EMC Proven Professional: Knowledge Sharing 2009
31. Integrating Linux and Linux-based Storage
Management Software with RAID System-
Based Replication
Diedrich Ehlerding, Fujitsu Technology Solutions
All major database and ERP software vendors release their products on Linux. As with other
operating systems, we must replicate using RAID array functionality to meet the demands for
short backup windows, fast restore processes, and fast system copy processes. The legacy
device names that are traditionally used in Linux without any storage management software
are inappropriate for enterprise-class configurations. The main problem is that these name
spaces are not persistent over server reboots. They cannot guarantee that the system will find
its data at the same device node which it saw before the reboot.
This article discusses various naming spaces within Linux—legacy names, device mapper
names, IO multipathing software names, volume management layers, and file system layers.
“ wrote this article because I got involved
I All these layers create their own naming spaces. With RAID system-based replication, we
in a project that needed solutions. I wanted must take care to have the proper name for the replica; in a shared storage configuration,
to contribute some kind of an article we have to provide an identical name on all cluster nodes.
which will hopefully be useful for the EMC
The article reviews naming schemes with respect to persistence and replication issues.
Proven™ Professional community and
anyone else who might read it.” The article discusses software layers:
Diedrich Ehlerding,
• Linux native layers (legacy sd names, device mapper names)
Fujitsu Technology Solutions
• Multipathing drivers: EMC PowerPath® names and Linux native multipath names
• lvm2 as an example of a volume manager
• File system issues (labelled file systems, file system uuids)
And replication or shared storage usage scenarios for:
• Local cluster
• Stretched cluster/disaster recovery configurations
• Off-host backup
• System copy
31
32. Simplifying/Demystifying EMC’s TimeFinder
Integration with Oracle Flashback
Robert Mosco Jr., EMC Corporation
Integrating EMC TimeFinder® business continuity application with Oracle can be a somewhat
tricky endeavor. This article describes Oracle’s Flashback and EMC TimeFinder technologies
and how the two applications can help end users recover data.
Oracle Flashback and EMC TimeFinder are two separate technology applications. Under-
standing them, and then describing their integration for the purpose of recovering data, is
the main goal of this article. I use diagrams and commands to show how both technologies
can recover data. Once you have an understanding of each technology, the article progresses
to an integration phase showing how the two applications can be used to develop a “repair”
and/or a “recovery” plan.
Discussions include point-in-time recovery, Flashback rewind, and recovery time objectives.
The article presents the following:
• Enabling and disabling Oracle Flashback
• Setting up a TimeFinder Oracle business continuity (BC) environment
• Dropping and/or deleting data (to simulate a data corruption situation)
• Recovering or flashing back to a previous point in time
• Developing a recovery or a get-well plan
All of these topics include diagrams and commands with simple explanations to help you
understand the power of both technologies.
32 EMC Proven Professional: Knowledge Sharing 2009
33. Service-Oriented Architecture (SOA) and
Enterprise Architecture (EA)
Charanya Hariharan, Pennsylvania State University
Dr. Brian Cameron, Pennsylvania State University
Most companies are re-evaluating the way they purchase, deploy, manage, and use business
applications due to challenging market conditions, competitive pressures, and new tech-
nologies. Software buyers want applications that leverage existing investments; customers
demand solutions that provide quantifiable performance improvement.
In response, companies must evolve into agile enterprises that can rapidly change direction.
Yet their structures, processes, and systems are often inflexible, rendering them incapable of
rapid change. Adding hardware, software, packages, staff, or outsourcing are not solutions.
This is not a computer problem, it is a business problem.
To address this growing gap between IT and business, companies are adopting an end-to-end
enterprise architecture approach to re-align IT development with business objectives. EA is a
framework that covers all the dimensions of IT architecture for the enterprise; SOA provides
an architectural strategy that uses the concept of “services” as the underlining business-IT
alignment entity.
These forces drive the IT industry to deliver breakthrough technologies, many at the founda-
tion layer. SOAs, specifically, are at the cusp of change. This article focuses on the relation-
ship between EA and SOA and the resulting impact on business. These are the key research
questions in this research:
• Are there any business impacts to marrying EA and SOA?
• How do organizations fit SOA with EA?
• Is it better to adopt either SOA or EA, and not both?
33
34. SRDF/Star Software Uses and Best Practices
Bill Chilton, EMC Corporation
Disaster recovery is becoming more critical as new laws are being passed to protect data,
and legislation mandates extended data-retention policies. Many companies are building
redundant data centers to avoid potential losses. The largest financial institutions are build-
ing three data centers, two located in close proximity with the other in a different region of
the country or in a different country altogether. These companies are managing three data
centers and keeping all the information consistent by deploying EMC SRDF®/Star software.
SRDF/Star is data-replication software that uses synchronous and asynchronous data trans-
fer to maintain consistency in multiple sites. The intent is to provide redundancy so that if
one of the data centers experiences a disaster, the other sites can continue to replicate data
and take over processing immediately. Star is exceptional as a disaster recovery software
program, but what else can you realize with this software and what are the best ways to
deploy it?
The documentation on SRDF/Star explains how the software works and how to install it, but
does not discuss best practices. This article seeks to bridge the gap between installation and
deployment by reviewing:
• Building a test Star
• Load balancing applications across data centers
• Eliminating downtime while working on servers
• Migrating data while staying consistent
• Switching between concurrent and cascading, and back again
• Best practices and troubleshooting hints
34 EMC Proven Professional: Knowledge Sharing 2009
35. Using EMC ControlCenter File Level
Reporting for CIFS Shares
Chad DeMatteis, EMC Corporation
Michael Horvath, Fifth Third Bancorp
It can be a daunting task to gather file and folder statistics and properties from a NAS CIFS
share with deep directory trees. It is especially difficult when you’re using Microsoft Windows
native tools that may have poor enumeration performance. These activities consume a great
deal of time in an environment with tens of thousands of folders and millions of files.
This article discusses how EMC ControlCenter® Network File System Assisted Discovery
feature, introduced in v6.0, can be used to provide EMC Celerra® CIFS administrators with
file- and folder-level reporting, covering UNC FLR configuration considerations and lessons
learned during an EMC ControlCenter deployment. It provides practical examples of how you
can use CIFS FLR reports to quickly determine file age and type distribution, top storage users,
and utilization trending. These reports provide administrators with information to maximize
storage utilization and address CIFS storage consumption issues before they impact end users.
The article addresses the following topics:
• onsiderations and lessons learned during assisted discovery of network file system
C
in an EMC ControlCenter such as domain ID and host agent selection
• teps to configure and schedule data collection policies for network file systems tak-
S
ing into account collection criteria and CIFS folder and file counts
• erformance considerations for CIFS data collection, providing examples of perfor-
P
mance statistics from the Celerra and the host agent server during CIFS scans
• xamples of how EMC StorageScope™ file-level CIFS share reports can be used to
E
show aged and dormant CIFS files for archiving, file type distribution for reclamation,
and top CIFS storage users
35
36. Cloud Computing Services—A New Approach
to Naming Conventions
Laurence A. Huetteman, Technology Business Consultant
It has become increasingly difficult to have meaningful discussions about cloud computing
without a common language. You will see every inconsistency in naming conventions for
cloud technology when searching the topic on the Web; this inconsistency is also present
during consulting or business conversations.
Wikipedia defines cloud computing by using a six-layer stack of components with terms like
client, application, services, platform, etc., with the word “cloud” preceding each component.
Others refer to everything as a service, while others try to map SOA, utility computing, and
grid to cloud computing services. Even EMC’s suite of cloud computing offerings, while
technically impressive, seems to be a loosely coupled group of point solutions with no real
structure or clear naming conventions (Hulk/Maui evolved into Atmos™, Mozy™, Pi, etc.)
that are referred to generically as cloud computing.
Vendors, partners, and customers spend valuable cycles deciding which model to follow
in their discussions, or worse, inventing their own. My article simplifies this process and
applies logic to inconsistent naming conventions by proposing a new naming convention
for cloud computing service offerings. It is easily understood and applied across the broad
spectrum of services. It is intuitive, so it can be easily adopted, and based on a logical
model. If successful, this model will be flexible enough to accommodate the anticipated
growth of this evolving field of technology.
One consistent theme in all cloud computing discussions is the concept of tiering or layers
of services. The thought here is to use an existing scientific classification and to map the
layers to current and potentially future cloud computing components or services. One logical
choice is to leverage the familiar and widely accepted term, cloud, but map the model to
the common atmospheric cloud terminology. This article presents such a model to help you
effectively engage with other IT professionals.
36 EMC Proven Professional: Knowledge Sharing 2009
37. Leveraging Cloud Computing for Optimized
Storage Management
Mohammed Hashim, Wipro Technologies
Rejaneesh Sasidharan, Wipro Technologies
“ MC’s Knowledge Sharing program is
E Cloud computing refers to spreading IT computing resources across Internet cloud boundar-
becoming a new torch bearer to spread ies and offering selective access through consolidated service providers located at strategi-
technical awareness among global profes- cally placed data centers. Generally, users pay for computing capacity on-demand and are
not concerned with the essential technologies or challenges used to achieve the increased
sionals. This is an ideal platform where
and diverse storage scalability, server, and other resource capacity and extensibility.
technologists from diverse backgrounds
contribute tremendously toward widening This article focuses on cloud computing, cloud models, storage, solutions, and comparing
their technical spheres. Besides, this initia- the different setups. It also describes features of storage optimization, security, leveraging
tive exposes the various technical/non- the current IT infrastructure, and the advantages and disadvantages of the model.
technical aspects of newer technologies
The article presents the following:
and product advancements in a concise
and lucid manner.” 1. Overview of SOA, SaaS, distributed, grid, and cloud computing
2. Cloud architecture and applying cloud computing to storage
Mohammed Hashim, Wipro Technologies
3. Cloud models and outlining the cloud storage solution
4. Managing solutions over storage infrastructure with optimal performance
5. Security in the clouds and comparing cloud-based services
“ he knowledge that we acquire today has a
T 6. Advantages and risks of cloud computing
value exactly balanced to our talent to deal 7. Potential future of the cloud
with it. Tomorrow, when we know more,
Many would embrace the ability to immediately increase capacity or add capabilities without
we recall that part of knowledge and use investing in new infrastructure, training new personnel or licensing new software. This article
it better; the EMC Knowledge Sharing pro- is helpful for any engineer who is involved with storage design and management.
gram is a magnificent invention which has
given me an abundance of global technical
astuteness.”
Rejaneesh Sasidharan, Wipro Technologies
37
38. Archiving Cries for a Holistic Architecture
Paul Kingston, Solutions Architect
EMC Corporation, United States
38 EMC Proven Professional: Knowledge Sharing 2009