SlideShare a Scribd company logo
Storage Strategies at
The University of Iowa
May 12, 2010
Central File Storage
• Individuals: 1-5 GB
• Departments: 1 GB per FTE
Base
Entitlement
• Asynchronous replication to identical
system at remote data center
4 Hour Recovery
Objectives
• < 1 hour of downtime in the past year99.97% Uptime
• 33K of 37K eligible users
89%
Participation
2
The Effect
“One price fits all” network file
storage
Lower-cost network file
storage
Lowest-cost bare server
storage
3
Storage Tiers
High
Performance
Enterprise SAN
Central File
Storage
Low Cost SAN
Target Users Centrally
managed servers
End users or
distributed servers
Distributed
servers
Funding Model Centrally funded Base entitlement,
pay for more
Pay for use
Monthly Price
per Gigabyte
N/A $0.12 – $0.25 $0.03 – $0.14
http://its.uiowa.edu/spa/storage/
4
5
Moving Forward
Interviewed
partners,
peers
Categorized
storage
Analyzing
data
Storage
Services
Roadmap
• 10 peer institutions
• 17 campus units
• 2.7 petabytes of campus storage
6
Campus Storage by Provider
Information
Technology
Services
42%
College of
Engineering
27%
Institute for
Clinical and
Translational
Science
12%
College of Public
Health
8%
UI Libraries
4%
Other
7%
7
Storage by University Mission
Administration &
Overhead
35%
Research
51%
Teaching
11%
Public Service
3%
8
Storage by Access Type
Backup
72%
Online
24%
Archive
4%
9
Issues
Research storage
• Fragmented
• Poor data protection
Backup storage
• Inefficient
• No central service
Archival storage
• Few options
• Shifts to online or
backup storage
10
Cost
Possible Next Steps
Identify and promote research solutions
Build central backup service
Build, promote archival solutions
11
Lessons Learned
Valuable
data
Invaluable
process
Built on
existing
community
12

More Related Content

Similar to Storage Strategies at the University of Iowa

Policy-based Data Management
Policy-based Data Management Policy-based Data Management
Policy-based Data Management
Gary Wilhelm
 
Moore RDAP11 Policy-based Data Management
Moore RDAP11 Policy-based Data ManagementMoore RDAP11 Policy-based Data Management
Moore RDAP11 Policy-based Data Management
ASIS&T
 
DocuFile - Intelligent Migration
DocuFile - Intelligent MigrationDocuFile - Intelligent Migration
DocuFile - Intelligent Migration
DocuLynx
 
RDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the DataRDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the Data
Robin Rice
 
Amazon`s Dynamo
Amazon`s DynamoAmazon`s Dynamo
Amazon`s Dynamo
sarang33
 
Improving RDM through closer integration of electronic lab notebooks and data...
Improving RDM through closer integration of electronic lab notebooks and data...Improving RDM through closer integration of electronic lab notebooks and data...
Improving RDM through closer integration of electronic lab notebooks and data...
rmacneil88
 
Moving Shared Print to the Network Level
Moving Shared Print to the Network LevelMoving Shared Print to the Network Level
Moving Shared Print to the Network Level
Maine_SharedCollections
 
Educause 2015 RDM Maturity
Educause 2015 RDM Maturity Educause 2015 RDM Maturity
Educause 2015 RDM Maturity
ResearchSpace
 
An analysis and characterization of DMPs in NSF proposals from the University...
An analysis and characterization of DMPs in NSF proposals from the University...An analysis and characterization of DMPs in NSF proposals from the University...
An analysis and characterization of DMPs in NSF proposals from the University...
Megan O'Donnell
 
RDAP14: An analysis and characterization of DMPs in NSF proposals from the Un...
RDAP14: An analysis and characterization of DMPs in NSF proposals from the Un...RDAP14: An analysis and characterization of DMPs in NSF proposals from the Un...
RDAP14: An analysis and characterization of DMPs in NSF proposals from the Un...
ASIS&T
 
Leveraging Open Standards for Electronic Communication
Leveraging Open Standards for Electronic CommunicationLeveraging Open Standards for Electronic Communication
Leveraging Open Standards for Electronic Communication
David Shafer
 
Arinda oktaviana 11353204810 vii lokal g
Arinda oktaviana 11353204810   vii lokal gArinda oktaviana 11353204810   vii lokal g
Arinda oktaviana 11353204810 vii lokal g
Arinda oktaviana
 
Chapter 3 Naming in distributed system.pptx
Chapter 3 Naming in distributed system.pptxChapter 3 Naming in distributed system.pptx
Chapter 3 Naming in distributed system.pptx
Tekle12
 
071310 sun d_0930_feldman_stephen
071310 sun d_0930_feldman_stephen071310 sun d_0930_feldman_stephen
071310 sun d_0930_feldman_stephen
Steve Feldman
 
DSpace for Data Revisited
DSpace for Data RevisitedDSpace for Data Revisited
DSpace for Data Revisited
EDINA, University of Edinburgh
 
PPT Lecture 1.1 and 1.2(Database concepts and database system architecture) (...
PPT Lecture 1.1 and 1.2(Database concepts and database system architecture) (...PPT Lecture 1.1 and 1.2(Database concepts and database system architecture) (...
PPT Lecture 1.1 and 1.2(Database concepts and database system architecture) (...
AbhiGrover10
 
Best storage engine for MySQL
Best storage engine for MySQLBest storage engine for MySQL
Best storage engine for MySQL
tomflemingh2
 
Integrating an electronic lab notebook with a data repository; American Chemi...
Integrating an electronic lab notebook with a data repository; American Chemi...Integrating an electronic lab notebook with a data repository; American Chemi...
Integrating an electronic lab notebook with a data repository; American Chemi...
rmacneil88
 
Elns and repositories, American Chemical Society, Dallas, March 2014
Elns and repositories, American Chemical Society, Dallas, March 2014Elns and repositories, American Chemical Society, Dallas, March 2014
Elns and repositories, American Chemical Society, Dallas, March 2014
ResearchSpace
 
Adbms 30 data placement
Adbms 30 data placementAdbms 30 data placement
Adbms 30 data placement
Vaibhav Khanna
 

Similar to Storage Strategies at the University of Iowa (20)

Policy-based Data Management
Policy-based Data Management Policy-based Data Management
Policy-based Data Management
 
Moore RDAP11 Policy-based Data Management
Moore RDAP11 Policy-based Data ManagementMoore RDAP11 Policy-based Data Management
Moore RDAP11 Policy-based Data Management
 
DocuFile - Intelligent Migration
DocuFile - Intelligent MigrationDocuFile - Intelligent Migration
DocuFile - Intelligent Migration
 
RDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the DataRDM Roadmap to the Future, or: Lords and Ladies of the Data
RDM Roadmap to the Future, or: Lords and Ladies of the Data
 
Amazon`s Dynamo
Amazon`s DynamoAmazon`s Dynamo
Amazon`s Dynamo
 
Improving RDM through closer integration of electronic lab notebooks and data...
Improving RDM through closer integration of electronic lab notebooks and data...Improving RDM through closer integration of electronic lab notebooks and data...
Improving RDM through closer integration of electronic lab notebooks and data...
 
Moving Shared Print to the Network Level
Moving Shared Print to the Network LevelMoving Shared Print to the Network Level
Moving Shared Print to the Network Level
 
Educause 2015 RDM Maturity
Educause 2015 RDM Maturity Educause 2015 RDM Maturity
Educause 2015 RDM Maturity
 
An analysis and characterization of DMPs in NSF proposals from the University...
An analysis and characterization of DMPs in NSF proposals from the University...An analysis and characterization of DMPs in NSF proposals from the University...
An analysis and characterization of DMPs in NSF proposals from the University...
 
RDAP14: An analysis and characterization of DMPs in NSF proposals from the Un...
RDAP14: An analysis and characterization of DMPs in NSF proposals from the Un...RDAP14: An analysis and characterization of DMPs in NSF proposals from the Un...
RDAP14: An analysis and characterization of DMPs in NSF proposals from the Un...
 
Leveraging Open Standards for Electronic Communication
Leveraging Open Standards for Electronic CommunicationLeveraging Open Standards for Electronic Communication
Leveraging Open Standards for Electronic Communication
 
Arinda oktaviana 11353204810 vii lokal g
Arinda oktaviana 11353204810   vii lokal gArinda oktaviana 11353204810   vii lokal g
Arinda oktaviana 11353204810 vii lokal g
 
Chapter 3 Naming in distributed system.pptx
Chapter 3 Naming in distributed system.pptxChapter 3 Naming in distributed system.pptx
Chapter 3 Naming in distributed system.pptx
 
071310 sun d_0930_feldman_stephen
071310 sun d_0930_feldman_stephen071310 sun d_0930_feldman_stephen
071310 sun d_0930_feldman_stephen
 
DSpace for Data Revisited
DSpace for Data RevisitedDSpace for Data Revisited
DSpace for Data Revisited
 
PPT Lecture 1.1 and 1.2(Database concepts and database system architecture) (...
PPT Lecture 1.1 and 1.2(Database concepts and database system architecture) (...PPT Lecture 1.1 and 1.2(Database concepts and database system architecture) (...
PPT Lecture 1.1 and 1.2(Database concepts and database system architecture) (...
 
Best storage engine for MySQL
Best storage engine for MySQLBest storage engine for MySQL
Best storage engine for MySQL
 
Integrating an electronic lab notebook with a data repository; American Chemi...
Integrating an electronic lab notebook with a data repository; American Chemi...Integrating an electronic lab notebook with a data repository; American Chemi...
Integrating an electronic lab notebook with a data repository; American Chemi...
 
Elns and repositories, American Chemical Society, Dallas, March 2014
Elns and repositories, American Chemical Society, Dallas, March 2014Elns and repositories, American Chemical Society, Dallas, March 2014
Elns and repositories, American Chemical Society, Dallas, March 2014
 
Adbms 30 data placement
Adbms 30 data placementAdbms 30 data placement
Adbms 30 data placement
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

Storage Strategies at the University of Iowa