This proposal recommends strategies for a new bank entering the Malaysian market. It suggests a location that is strategic, accessible by various transportation, and near other businesses. It also recommends using EMC storage solutions like SAN and CAS technologies for data backup and management. RAID-6 is proposed for its ability to store large amounts of customer data safely while tolerating two simultaneous drive failures. Finally, suitable hot and cold site options are presented to ensure business continuity in case of a disaster.
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
Cloud Computing is the hottest technology in the market these days, used to make storage of huge amounts of data and information easier for organizations. Maintaining servers to store all the information is quite expensive for individual and organizations. Cloud computing allows to store and maintain data on remote servers that are managed by Cloud Service Providers (CSP) like Yahoo and Google. This data can then be accessed through out the globe. But as more and more information of individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. In this paper we discussed security issues and requirements in the Cloud and possible solutions of some the problems. We develop an architecture model for cloud computing to solve the data availability and error correction problem.
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This can lead to data loss due to different causes like
hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud
provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and
outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious
employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on
biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption,
replication and storage of data
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
Cloud Computing is the hottest technology in the market these days, used to make storage of huge amounts of data and information easier for organizations. Maintaining servers to store all the information is quite expensive for individual and organizations. Cloud computing allows to store and maintain data on remote servers that are managed by Cloud Service Providers (CSP) like Yahoo and Google. This data can then be accessed through out the globe. But as more and more information of individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. In this paper we discussed security issues and requirements in the Cloud and possible solutions of some the problems. We develop an architecture model for cloud computing to solve the data availability and error correction problem.
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This can lead to data loss due to different causes like
hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud
provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and
outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious
employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on
biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption,
replication and storage of data
As insurance companies are highly regulated, the use of real data for testing and developmen t may be putting them at risk of non-compliance with international regulations. Research has also found that customer loyalty towards insurance companies is dependent upon the perception that the institution is taking every measure to protect the customers’ personal financial information.This whitepaper explores the various data masking techniques and the best practices of protecting sensitive data.
Implementing data-driven decision support system based on independent educati...IJECEIAES
Decision makers in the educational field always seek new technologies and tools, which provide solid, fast answers that can support decision-making process. They need a platform that utilize the students’ academic data and turn them into knowledge to make the right strategic decisions. In this paper, a roadmap for implementing a data driven decision support system (DSS) is presented based on an educational data mart. The independent data mart is implemented on the students’ degrees in 8 subjects in a private school (AlIskandaria Primary School in Basrah province, Iraq). The DSS implementation roadmap is started from pre-processing paper-based data source and ended with providing three categories of online analytical processing (OLAP) queries (multidimensional OLAP, desktop OLAP and web OLAP). Key performance indicator (KPI) is implemented as an essential part of educational DSS to measure school performance. The static evaluation method shows that the proposed DSS follows the privacy, security and performance aspects with no errors after inspecting the DSS knowledge base. The evaluation shows that the data driven DSS based on independent data mart with KPI, OLAP is one of the best platforms to support short-tolong term academic decisions.
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces
database and application software to the large data centres, where the management of services and data
may not be predictable, where as the conventional solutions, for IT services are under proper logical,
physical and personal controls. This aspect attribute, however comprises different security challenges
which have not been well understood. It concentrates on cloud data storage security which has always been
an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and
efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent
features. Homomorphic token is used for distributed verification of erasure – coded data. By using this
scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and
secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to
traditional solutions, where the IT services are under proper physical, logical and personnel controls,
cloud computing moves the application software and databases to the large data centres, where the data
management and services may not be absolutely truthful. This effective security and performance analysis
describes that the proposed scheme is extremely flexible against malicious data modification, convoluted
failures and server clouding attacks.
Survey on securing outsourced storages in cloudeSAT Journals
Abstract Cloud computing is one of the buzzwords of technological developments in the IT industry and service sectors. Widening the social capabilities of servicing for a user on the internet while narrowing the insufficiency to store information and provide facilities locally, computing interests are shifting towards cloud services. Cloud services although contributes to major advantages for servicing also incurs notification to major security issues. The issues and the approaches that can be taken to minimise or even eliminate their effects are discussed in this paper to progress toward more secure storage services on the cloud. Keywords: Cloud computing, Cloud Security, Outsourced Storages, Storage as a Service
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Management Information System
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call: 9971223030
BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE csandit
During genomics life science research, the data volume of whole genomics and life science algorithm is going bigger and bigger, which is calculated as TB, PB or EB etc. The key problem will be how to store and analyze the data with optimized way. This paper demonstrates how Intel Big Data Technology and Architecture help to facilitate and accelerate the genomics life science research in data store and utilization. Intel defines high performance GenomicsDB for variant call data query and Lustre filesystem with Hierarchal Storage Management for genomics data store. Based on these great technology, Intel defines genomics knowledge share and exchange architecture, which is landed and validated in BGI China and Shanghai Children Hospital with very positive feedback. And these big data technology can definitely be scaled to much more genomics life science partners in the world.
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...IJERA Editor
Today’s image capturing technologies are producing High Definitional-scale images which are also heavier on memory, which has prompted many users into cloud storage, cloud computing is an service based technology and one of the cloud service is Data Storage as a Service (DSaaS), two parties are involved in this service the Cloud Service Provider and The User, user stores his vital data onto the cloud via internet example: Dropbox. but a bigger question is on trustiness over the CSP by user as user data is stored remote devices which user has no clue about, in such situation CSP has to create a trust worthiness to the costumer or user, in these paper we addressed the mention insecurity issue with a well defined trusted image Storing and retrieval framework (TISR) using compress sensing methodology.
Know whether cloud based storage or dedicated storage is best for your business IT infrastructure depending on our organization requirements. Check Netmagic’s outlooks.
Optimize data center infrastructure design for efficiency, scalability, reliability with bluechip. Avoid future capacity, power, and cable management pitfalls.
Headquartered in Asia with coverage across the region and beyond, 1cloudstar is a pure-play Cloud Services Provider offering cloud-related consulting and professional services. 1cloudstar brings a deep understanding of what is possible when legacy systems and cloud solutions coexist and we have a clear vision of the digital future toward which this hybrid world is leading us. We combine those insights with our traditional Enterprise IT knowledge to drive innovation and transform complex environments into high-performance engines.
Whether you’re in the early stages of evaluating how the cloud can benefit your business, need guidance on developing a cloud strategy or how to integrate new cloud technology with their existing technology investments, 1cloudstar can leverage the skills and experience gained from many other enterprise cloud projects to ensure you achieve your business objectives.
1cloudstar’s unique strategic approach and engagement model ‘1cloudstar Engage’ combined with it’s cloud infrastructure and application integration skills sets the company apart from traditional technology system integrators. 1cloudstar’s team of consultants can leverage years of technology infrastructure and applications experience along with first hand experience of public, private and hybrid cloud projects to ensure your enterprise journey to cloud is a success.
1cloudstar accelerates the cloud-powered business, helping enterprises achieve real results from cloud applications and platforms.
As insurance companies are highly regulated, the use of real data for testing and developmen t may be putting them at risk of non-compliance with international regulations. Research has also found that customer loyalty towards insurance companies is dependent upon the perception that the institution is taking every measure to protect the customers’ personal financial information.This whitepaper explores the various data masking techniques and the best practices of protecting sensitive data.
Implementing data-driven decision support system based on independent educati...IJECEIAES
Decision makers in the educational field always seek new technologies and tools, which provide solid, fast answers that can support decision-making process. They need a platform that utilize the students’ academic data and turn them into knowledge to make the right strategic decisions. In this paper, a roadmap for implementing a data driven decision support system (DSS) is presented based on an educational data mart. The independent data mart is implemented on the students’ degrees in 8 subjects in a private school (AlIskandaria Primary School in Basrah province, Iraq). The DSS implementation roadmap is started from pre-processing paper-based data source and ended with providing three categories of online analytical processing (OLAP) queries (multidimensional OLAP, desktop OLAP and web OLAP). Key performance indicator (KPI) is implemented as an essential part of educational DSS to measure school performance. The static evaluation method shows that the proposed DSS follows the privacy, security and performance aspects with no errors after inspecting the DSS knowledge base. The evaluation shows that the data driven DSS based on independent data mart with KPI, OLAP is one of the best platforms to support short-tolong term academic decisions.
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces
database and application software to the large data centres, where the management of services and data
may not be predictable, where as the conventional solutions, for IT services are under proper logical,
physical and personal controls. This aspect attribute, however comprises different security challenges
which have not been well understood. It concentrates on cloud data storage security which has always been
an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and
efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent
features. Homomorphic token is used for distributed verification of erasure – coded data. By using this
scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and
secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to
traditional solutions, where the IT services are under proper physical, logical and personnel controls,
cloud computing moves the application software and databases to the large data centres, where the data
management and services may not be absolutely truthful. This effective security and performance analysis
describes that the proposed scheme is extremely flexible against malicious data modification, convoluted
failures and server clouding attacks.
Survey on securing outsourced storages in cloudeSAT Journals
Abstract Cloud computing is one of the buzzwords of technological developments in the IT industry and service sectors. Widening the social capabilities of servicing for a user on the internet while narrowing the insufficiency to store information and provide facilities locally, computing interests are shifting towards cloud services. Cloud services although contributes to major advantages for servicing also incurs notification to major security issues. The issues and the approaches that can be taken to minimise or even eliminate their effects are discussed in this paper to progress toward more secure storage services on the cloud. Keywords: Cloud computing, Cloud Security, Outsourced Storages, Storage as a Service
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Management Information System
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call: 9971223030
BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE csandit
During genomics life science research, the data volume of whole genomics and life science algorithm is going bigger and bigger, which is calculated as TB, PB or EB etc. The key problem will be how to store and analyze the data with optimized way. This paper demonstrates how Intel Big Data Technology and Architecture help to facilitate and accelerate the genomics life science research in data store and utilization. Intel defines high performance GenomicsDB for variant call data query and Lustre filesystem with Hierarchal Storage Management for genomics data store. Based on these great technology, Intel defines genomics knowledge share and exchange architecture, which is landed and validated in BGI China and Shanghai Children Hospital with very positive feedback. And these big data technology can definitely be scaled to much more genomics life science partners in the world.
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...IJERA Editor
Today’s image capturing technologies are producing High Definitional-scale images which are also heavier on memory, which has prompted many users into cloud storage, cloud computing is an service based technology and one of the cloud service is Data Storage as a Service (DSaaS), two parties are involved in this service the Cloud Service Provider and The User, user stores his vital data onto the cloud via internet example: Dropbox. but a bigger question is on trustiness over the CSP by user as user data is stored remote devices which user has no clue about, in such situation CSP has to create a trust worthiness to the costumer or user, in these paper we addressed the mention insecurity issue with a well defined trusted image Storing and retrieval framework (TISR) using compress sensing methodology.
Know whether cloud based storage or dedicated storage is best for your business IT infrastructure depending on our organization requirements. Check Netmagic’s outlooks.
Optimize data center infrastructure design for efficiency, scalability, reliability with bluechip. Avoid future capacity, power, and cable management pitfalls.
Headquartered in Asia with coverage across the region and beyond, 1cloudstar is a pure-play Cloud Services Provider offering cloud-related consulting and professional services. 1cloudstar brings a deep understanding of what is possible when legacy systems and cloud solutions coexist and we have a clear vision of the digital future toward which this hybrid world is leading us. We combine those insights with our traditional Enterprise IT knowledge to drive innovation and transform complex environments into high-performance engines.
Whether you’re in the early stages of evaluating how the cloud can benefit your business, need guidance on developing a cloud strategy or how to integrate new cloud technology with their existing technology investments, 1cloudstar can leverage the skills and experience gained from many other enterprise cloud projects to ensure you achieve your business objectives.
1cloudstar’s unique strategic approach and engagement model ‘1cloudstar Engage’ combined with it’s cloud infrastructure and application integration skills sets the company apart from traditional technology system integrators. 1cloudstar’s team of consultants can leverage years of technology infrastructure and applications experience along with first hand experience of public, private and hybrid cloud projects to ensure your enterprise journey to cloud is a success.
1cloudstar accelerates the cloud-powered business, helping enterprises achieve real results from cloud applications and platforms.
When it comes to safely storing a business’s customer mailing list, employee archives or a bank’s record of all the transactions taking place on its clients’ accounts, cloud storage has made it all possible for businesses and organizations alike. The need for data storage has grown in recent years, particularly among companies that keep a lot of information about their employees and customers.
Make informed decisions for Data Management strategy by exploring the benefits and considerations of cloud-based and on-prem data warehousing solutions.
For the retail and hospitality industries, managing applications and infrastructure at remote sites is a tough job. Typically, these sites have applications that are run at the location and a few key applications that need to be always running. For a restaurant, it may be point-of-sale and order scheduling. For a hotel, it may be reservations and door lock systems. If applications like these have an outage, the
site is out of business leading to lost sales and poor customer satisfaction.
Companies have tried running key applications in the “cloud” or in corporate data centers, but if there is a problem at the data center or in the WAN connecting the remote sites
to the application, then a lot of sites are affected, instead of a few. So, companies in these industries are increasingly looking at keeping applications running on-site. DataCore Virtual SAN has an automated, turnkey deployment and provides centralized storage management for lots of remote sites. It is integrated with Microsoft System Center which means existing Microsoft management tools can be used to oversee and manage remote sites from a central location. DataCore Virtual SAN includes a comprehensive PowerShell
scripting interface with over 250 documented cmdlets and software deployment wizards to automate and deploy with little manual intervention. In addition, DataCore Virtual SAN has extensive instrumentation making it simple to centrally monitor system storage behavior and performance at remote sites.
Possibly the most important aspect for managing many
remote sites is the reliability of DataCore Virtual SAN. It
is based on a 10th generation Software-defined Storage
platform deployed at over 10,000 customer sites. It is a
proven product, which eliminate storage as a failure point.
Pros And Cons Of Cloud-Based Security Solutions.pptxMetaorange
Computer, network, and, more generally, data security have a growing subfield in Cloud Computing security, often known as cloud-based security. It, too, protects separate groups within a population by encrypting data in a structured hierarchy. There are significant risks and impediments to using cloud services, even though there are solid reasons for their use.
Securing Your Future: Cloud-Based Data Protection SolutionsMaryJWilliams2
Explore the essential strategies for safeguarding your data with cloud-based protection solutions. This comprehensive guide delves into the benefits of using cloud services for data security, including enhanced scalability, reliability, and disaster recovery capabilities. Learn about the latest trends, best practices, and how to effectively implement cloud-based data protection to ensure your data is secure, accessible, and recoverable. To Know more: https://stonefly.com/white-papers/cloud-based-data-protection-strategies/
Securing the Future: A Guide to Cloud-Based Data ProtectionMaryJWilliams2
In an era where data breaches and cyber threats are increasingly common, cloud-based data protection emerges as a critical pillar for safeguarding digital assets. This article offers an in-depth exploration of cloud-based data protection strategies, tools, and best practices. Discover how leveraging the cloud can enhance your organization's data security posture, ensure business continuity, and provide scalability to meet future demands. To Know more: https://stonefly.com/white-papers/cloud-based-data-protection-strategies/
The speed and productivity benefits of high-performance cloud computing are well documented. For numerically large engineering simulations, a flexible cloud environment typically delivers faster run times, allowing engineers to solve complex problems quickly ― and launch products more rapidly. The world's leading product development teams are already leveraging high-performance computing (HPC) resources, yet many of them remain uncertain about the costs of replacing on-premises hardware and software with cloud hosting.
To clear up the confusion and demonstrate that the cloud delivers a total cost of ownership that is lower than on-premises computing, Ansys has published “A Break in the Clouds: The Cost Benefits of Ansys Cloud.” The white paper illustrates how Ansys Cloud delivers all the speed and efficiency that customers expect from HPC in the cloud ― along with Ansys’ software ― at a cost lower than an on-premises approach.
Due by 11316 9pm PSTGiven the pieces of information provided i.docxsagarlesley
Due by 11/3/16 9pm PST
Given the pieces of information provided in Documents 1 and 2. Write a project value statement
Here is the project idea that I have chosen to go with
Look into migrating data to the cloud for a Financial Company called Sinah Financial Holdings, LLC along with building a new infrastructure for the expansion of the company.
Business Problem Statement:
Sinah Financial Holdings LLC., a thriving company has decided that the time to expand has come. With just one present location in XYZ city, growth in its industry is limited therefore the opening of branch locations in various cities has become its number one project. The firm’s current infrastructure is very small in size, only capable of supporting a small size office. The company does not currently have WAN and VPN technologies, only a local LAN through the major local ISP is in use. All backups are stored onsite with tape copies sent to a cold off site location. The databases with all financial information are stored in the local server with only one system administrator performing all major database tasks. This means for such expansion there is a need to replace or upgrade the current infrastructure to include hardware, software, and other applications. With the expansion planning, various technical problems have been identified, primary the storage and backup state for the sensitive data found within the locally managed servers and databases. Additionally security with access to such sensitive information has lacked for way too long; with this in mind more secured heighten methods are desired. Across all industries the momentum is building up to move applications to cloud computing, this is especially true for industries that retain sensitive information such as our firm. Pressure to improve efficiency, store data more securely, and cut cost has made moving an on premises infrastructure to a cloud feasible option, however the types of cloud services that are available and their characteristics (private/public/hybrid; SaaS/PaaaS) lead to unwanted disasters.
High-Level Functional Requirements:
Financial data is one of the most protected types of digital content, finding ways to store, secure and manage such in this ever changing world of computing is a challenge. Sinah Financial Holdings LLC., through a series of stakeholder meetings has identify the need to grow and significantly improve elements of its financial company through the use of current technology as well as the introduction of new solutions that comply with federal regulatory and compliance specifications. For this company’s expansion to be successful the addition of various geographically dispersed branches will require a large and fast LAN/WAN network to be accessed internally by the staff via the intranet and access from the outside by client(s) via a secure web interface. VPN capabilities for traveling and visiting staff should provide a secure connection to internal resources once auth ...
Visualization of Computer Forensics Analysis on Digital EvidenceMuhd Mu'izuddin
- This is my first article, its for my Final Year Project for Bachelor's of Computer Science (Systems and Networking)
- It also will be uploaded into CyberSecurity Malaysia E-Bulletin for 2017
1. STORAGE TECHNOLOGY
CSNB 393
Section 01
GROUP ASSIGNMENT 2
Lecturer: Mr. Md Nabil Bin Ahmad Zawawi
Fahmy Khawarizmy Bin Zainan SN097085
Muhammad Mu’izuddin Bin Muhsinon SN097083
Nor Hisyam Bin Mohd Johan SN097086
2. INTRODUCTION
This proposal aim to convince our team to be as a consultant for a new bank that is trying to
enter Malaysian market. We need to ensure that the bank are on strategic location for them to
set up their main office in Malaysia. We should provide reason why that location is the best
and what make it suitable. The surroundings are very important and the advantage of the chosen
location.
We also need to give suggestion on Storage Area Network (SAN) technology, Content Address
Storage (CAS) technology and Storage Virtualization if any to be used for that bank.
We need to consider what RAID level are suitable to be used and should be implemented by
the bank. Considering the price and safety of the bank.
Bank should have backup and recovery if anything happen, so or team need to ensure the best
location for the hot site and the cold site. It must have good infrastructure nad
telecomunications facilities.
4. Why we choose this location
The location for the new bank to set setup is very strategic. There are a lot of parking
space where bank customer can easily park their car. The parking space also are walking
distance from the bank.
Lots of Public Transport in front of the Bank. Examples: Taxi, Bus.
There is a lot of road access to the bank.
Police station is just around 5 minutes away from the bank. If anything happened Police
can arrived with-in 5 minutes.
There is also a Car Showroom nearby the location of the new bank. If the car agent
want to make a loan with the new bank, it just a walking distance.
There are not a lot of Bank nearby the location. With start up the new bank, it can make
attract local people at the location.
There is also a mosque located nearby the new bank location. In Friday if the workers
want to go to Friday’s prayer, is just walking distance for the location of the new bank.
5. QUESTION 2
Suggestions on SAN technology, CAS technology and storage virtualization (if any) to be used
by their banks.
SAN Technology
EMC2 (Computer Data Storage Company)
EMC is a leading provider of IT storage hardware solutions to promote data backup and
recovery and accelerate the journey to cloud computing.
Simplify the purchase, implementation, and use of EMC backup and archive software while
lowering costs and protecting investments. This suite includes EMC Avamar, EMC
NetWorker, EMC Data Domain Boost for Enterprise Applications, EMC SourceOne, and EMC
Data Protection Advisor, with both an EMC MozyEnterprise cloud option and/or Syncplicity
hybrid cloud option for backup.
CAS Technology
ECM (Enterprise Content Management)
A formalized means of organizing and storing an organization's documents, and other content,
that relate to the organization's processes. The term encompasses strategies, methods, and tools
used throughout the lifecycle of the content.
ECM aims to make the management of corporate information easier through simplifying
storage, security, version control, process routing, and retention. The benefits to an
organization include improved efficiency, better control, and reduced costs. For example, many
banks have converted to storing copies of old checks within ECM systems as opposed to the
older method of keeping physical checks in massive paper warehouses. Under the old system,
a customer request for a copy of a check might take weeks, as the bank employees had to
contact the warehouse where the right box, file, and check, would need to be located. The check
would then need to be pulled, a copy made and mailed to the bank where it would finally be
mailed to the customer. With an ECM system in place, the bank employee simply queries the
system for the customer’s account number and the number of the requested check. When the
image of the check appears on screen, the bank is able to mail it immediately to the customer,
usually while the customer is still on the phone.
6. Storage Virtualization
OpenStack
OpenStack software controls large pools of compute, storage, and networking resources
throughout a data center, managed through a dashboard or via the OpenStack API. OpenStack
works with popular enterprise and open source technologies making it ideal for heterogeneous
infrastructure.
Hundreds of the world’s largest brands rely on OpenStack to run their businesses every day,
reducing costs and helping them move faster. OpenStack has a strong ecosystem, and users
seeking commercial support can choose from different OpenStack-powered products and
services in the Market place.
The software is built by a thriving community of developers, in collaboration with users, and
is designed in the open at our Summits.
7. QUESTION 3
The suitable RAID level that should be implemented by the bank is RAID-6. This is because
RAID-6 gives more usable capacity the more disks you add. Since RAID-6 comprises four
disks, only 50% of that space is available as usable capacity, but the proportion of usable space
increases as you add more drives. The bank has a lot of customers, then it will need RAID-6
provide large storage to store a lot of information about the customers.
RAID 6 uses two independent parity schemes that maintain array integrity. Figure A represents
RAID 6.
Figure A
The grey blocks are the parity bits, but the two parity algorithms exist separately on their
blocks. RAID 6 has more overhead in terms of usable storage compared to the raw amount, as
well as a more complex RAID controller algorithm.
The price is a little bit high compared with RAID-5 and RAID-3 because it has better
performance and store large data. I do not think that it would be a problem to the bank since
the bank is one of the big company. Implementing RAID 6 is also more expensive because of
the two extra disks required for parity. RAID 6 requires more processing power. RAID 6 makes
two parity calculations for each write operation, so it's slower to write than most other RAID
levels. It would be a problem to the bank since the bank is one of the big company.
The data safety for RAID-6 is it provide striping with dual parity. Data is striped across several
physical drives and dual parity is used to store and recover data. It tolerates the failure of two
drives in an array, providing better fault tolerance than other RAID. Dual parity protects against
data loss if second HDD fails. Furthermore, Bank need long data retention periods, such as
archiving or disk-based backup.
8. QUESTION 4
Hot Site
-> In Data Center or building that have partial duplicate for a primary IT operation, including
complete computer systems and near-real-time backups for systems, applications and data.
-> Typically are duplicates of existing data centers.
-> Commercial disaster recovery service that allows a business to continue computer and
network operations in the event of a computer or equipment disaster. For example, if an
enterprise's data centerbecomes inoperable, that enterprise can move all data processing
operations to a hot site. A hot site has all the equipment needed for the enterprise to continue
operation, including office space and furniture, telephone jacks and computer equipment.
Example of Hot Site
9. Hot Site in Cyberjaya
Cold Site
-> Open space in Data Center or simply empty buildings that are wired for power,
communications.
-> Similar type of disaster recovery service that provides office space, but the customer
provides and installs all the equipment needed to continue operations. A cold site is less
expensive, but it takes longer to get an enterprise in full operation after the disaster.
-> Typically, a business has an annual contract with a company that offers hot and cold site
services with a monthly service charge. Some disaster recovery services offerbackup services
so that all company data is available regardless of whether a hot site or cold site is used. If an
enterprise must use a hot or cold site, there are usually daily fees and other incidental fees in
addition to the basic service charge.
11. CONCLUSION
Lastly, the technology that have been used to startup the company are suitable. The location
gain benefit for the new bank and have many advantages.
The steps that have been taken are realy well managed. The RAID level are important, and the
recovery system use the best software have provided.
This bank can be able to compete with the current bank.