Direct Attached Storage DAS Whitepapers and Ebooks
DAS has always been the backbone of server storage, and the initial file sharing storage environment developed by the industry. A DAS configuration consists of ‘N’ drives connected inside your server, typically to a SCSI controller. In fact, the hard drive inside your PC or laptop is DAS. DAS is reliable, inexpensive, high performing, and the simplest form of storage. On a server level, a server with sufficient DAS storage can run a network sharing protocol (NFS or CIFS) and a DAS based server can also be a file server. On the downside, a DAS storage tends to create storage silos, where it can become common to have uneven allocations of storage across servers.
-
Storage Chargeback: Critical Metrics and Real-world ExamplesA leading provider of tools and services to the health care industry was looking to implement automated chargeback reports with aggregation of tiered storage usage across multiple business units and applications. When the company's storage administrators attempted to create this system in-house, their productivity took a huge hit and they discovered the task was too challenging, as well. Read this case study to learn how this company was able to increase storage utilization, reduce storage consumption, and accelerate administrator productivity with a unique automated storage chargeback system solution.
-
Outthink the Threat. How data-stealing malware is thwarting enterprise securityIn the last few years, the Internet security environment has changed dramatically. Gone are the days when endpoint solutions and pattern file deployments were good enough to protect businesses. Today, data-stealing malware circumvents industry-standard enterprise security solutions by exploiting their weaknesses with sophisticated methods of attack that evolve rapidly and make use of multiple modalities. The cyber criminals behind data-stealing malware are smart and getting smarter, and they are after one thing: confidential, sensitive data they can turn into profit. They get it by: The results are not just lost data, but downtime, reduced productivity, costly clean up, and -- perhaps most important -- immediate and sometimes lasting damage to a company's reputation. Customer loyalty can plummet. And exposure to litigation threatens ongoing damage. While data-stealing malware becomes even more sophisticated, security professionals scramble to keep up, because industry-standard, endpoint antivirus solutions are falling short. Clearly, it's time for a new kind of protection, for security that gets to threats before they get to you. Simply put, it's time to rethink your enterprise security. In this eBook, Trend Micro - WPF gives an overview of data-stealing malware, discusses its ability to evade traditional security solutions, and presents a new approach to your business and your reputation.
-
Outthink the threat eBookIn the last few years, the Internet security environment has changed dramatically. Gone are the days when endpoint solutions and pattern file deployments were good enough to protect businesses. Today, data-stealing malware circumvents industry-standard enterprise security solutions by exploiting their weaknesses with sophisticated methods of attack that evolve rapidly and make use of multiple modalities. The cyber criminals behind data-stealing malware are smart and getting smarter, and they are after one thing: confidential, sensitive data they can turn into profit. They get it by: The results are not just lost data, but downtime, reduced productivity, costly clean up, and -- perhaps most important -- immediate and sometimes lasting damage to a company's reputation. Customer loyalty can plummet. And exposure to litigation threatens ongoing damage. While data-stealing malware becomes even more sophisticated, security professionals scramble to keep up, because industry-standard, endpoint antivirus solutions are falling short. Clearly, it's time for a new kind of protection, for security that gets to threats before they get to you. Simply put, it's time to rethink your enterprise security. In this eBook, Trend Micro - WPF gives an overview of data-stealing malware, discusses its ability to evade traditional security solutions, and presents a new approach to your business and your reputation.
-
The Important Role of Storage for Success in Business Continuance: Driving Data Availability Up & CoVirtually every organization understands that its successful operation depends on the continuous availability of its applications. Most companies rely on internal applications--ranging from enterprise resource planning to payroll systems--to keep the wheels of their enterprise turning. They also depend on external-facing applications for everything from selling products to their customers to automating the supply chain with suppliers and partners. The failure of any of these mission-critical applications could be catastrophic to a business. The causes of downtime are numerous. Top-of-mind causes include fire and natural disasters such as floods, tornadoes, and hurricanes. More unexpected are causes such as power and cooling failures. But even more unforeseen are the failures that aren't thought of as true disasters: A fire in another part of the building can cause smoke and water damage in the best-protected data center. Human errors such as the faulty configuration of a switch or accidental discharge of fire-suppression material can also cause downtime. When a failure occurs, its scope can range from a system to a rack, from a room to a floor, and from a building to an entire site. A comprehensive business continuity solution includes not only the capacity to resume operations after a major but also the capacity to remain online during minor disruptions.
-
Rethinking Server Virtualization: Breaking Performance & Manageability BarriersServer virtualization is an ever more important tool for reducing cost, increasing availability, and enhancing business agility . But for many organizations, the savings that come from server consolidation are the primary reason for server virtualization . Many of virtualization's additional benefits--including built-in, cost-effective high availability (HA) and disaster recovery (DR)--require external shared storage with a comprehensive feature set to support HA and DR . Unfortunately, it is all too easy to spend the savings from server virtualization on inefficient storage systems . Because they overcome many of the cost and management limitations of traditional SANs, iSCSI SANs are becoming the preferred choice to support virtualized environments . Server virtualization is an ever more important tool for reducing cost, increasing availability, and enhancing business agility . But for many organizations, the savings that come from server consolidation are the primary reason for server virtualization . Many of virtualization's additional benefits--including built-in, cost-effective high availability (HA) and disaster recovery (DR)--require external shared storage with a comprehensive feature set to support HA and DR . Unfortunately, it is all too easy to spend the savings from server virtualization on inefficient storage systems . Because they overcome many of the cost and limitations of traditional SANs, iSCSI SANs are becoming the preferred choice to support virtualized environments .
-
Evaluator Group HP D2D Product Line AnalysisThe HP D2D product line was first announced in early 2007, providing both disk to disk and VTL backup. In June 2010, the product line was updated to include StoreOnce, HP Labs developed inline data deduplication, along with a number of other enhancements. The D2D product line is positioned for entry level, remote office, and midrange disk based backup target, supporting a number of interfaces and protocols. The HP D2D is based on internally developed technology including StoreOnce deduplication from HP Labs and leverages HP's converged hardware and software portfolio.
-
The Business Value of HP-UX 11iIn Gartner's 2010 trends report, Daryl Plummer, managing vice president and chief Gartner fellow indicates that "For many organizations, the economic and budgetary challenges of 2009 drove important changes in the general governance of IT investment decisions, accelerating the trend toward greater accountability and transparency. According to Daryl "With a strong emphasis on business-case justifications, chief financial officers (CFOs) assumed a more active role. Although most organizations enter 2010 preparing for a return to growth, this financial oversight is unlikely to be lifted anytime soon. For IT leaders, greater fluency in the language of business has become a requirement."1 This white paper is designed to provide the initial basis for exploring the financial advantages of HP-UX 11i versus other platform alternatives, and empower organizations to consider all costs and benefits to help make better investment decisions. Utilizing TCO allows the decision makers to look beyond just the initial purchase price of the hardware and software assets, which historically has accounted for less than 30% of owning and operating typical server solutions, but is increasing with lower operating costs and improved business impact. TCO analysis can help IT make better business decisions by considering the total lifecycle costs and business of a proposed solution.
-
COMPARING HP-UX 11i v3 AND LINUX FOR HOSTING CRITICAL WORKLOADSThis white paper presents a technical comparison of HP-UX 11i v3, Red Hat Enterprise Linux 5 (RHEL 5), and SUSE Linux Enterprise Server 11 (SLES 11) operating systems, focusing on their functional capabilities in terms of scalability, virtualization, reliability, and security. In each of these areas, the paper identifies some critical technical requirements, describes the significance of these requirements in current customer environments, and then shows how well HP-UX 11i v3 meets these requirements compared to the Linux systems. . Red Hat Enterprise Linux 5 and Novell SUSE Linux Enterprise Server 11 offer a full set of capabilities related to virtualization, security, and clustering for the Linux platform, narrowing the technical gap with leading UNIX systems and raising questions with users whether Linux systems are ready to take on the majority of UNIX workloads. However, UNIX remains one of the most trusted platforms in the industry, having proven its ability to support robust operations for decades. Moreover, UNIX continues to evolve as well, increasingly offering functions that were formerly only available for mainframes. Many users still view UNIX as the platform of choice for hosting critical workloads that demand the highest levels of reliability and security. Indeed, HP-UX still some technical advantages over Linux, which will be discussed in detail throughout this paper.
-
HP-UX Data Center Operating Environment and Integrity Server Blades for the Mission Critical Data CenterHP BladeSystem Matrix with HP-UX is a robust platform for enterprise applications. It supports missioncritical UNIX for back end high availability as well as cost-efficient P roLiant server blades for complementary workloads. The flexibility of the management, virtualization and provisioning reduce deployment costs and simplify resou rce reconfiguration. Solid integration with storage and network infrastru cture from HP and other vend ors make it an ideal first step to take advantage of HP Converged Infrastructure. Today, the term "mission-critical" covers an ever-increasing set of data center workloads. As organizations evaluate options for their next generation infrastructu re, there are many reasons to look at new options. Current mission-critical infrastructure is frequently based on commercial UNIX environments deployed on la rge, expensive RISC servers clustered for high availability or disaster recovery. These environments are costly to deploy and manage, but up until there have been no good alternatives. Now, mission-critical capability can now be achieved in a more space efficient and flexible form factor � the blade chassis. HP has recently announced the BladeSystem Matrix with HP-UX, which leverages HP leadership in systems management, server blade design, and operating systems to p rovide a resilient infrastructure well suited to the data center.
-
HP-UX 11i V3: ENGINEERED FOR CRITICAL WORKLOADSThis white paper presents a technical comparison of HP-UX 11i v3, AIX 6.1, and Solaris 10 UNIX operating systems, focusing on their functional capabilities in terms of virtualization, reliability, and security. In each of these areas, the paper identifies some critical technical requirements, describes the significance of these requirements in current customer environments, and then shows how well HP-UX 11i v3 meets these requirements compared to the other UNIX systems. HP-UX, AIX, and Solaris all offer very strong functionality today, with each leading in one area or another. But HP-UX stands out for its balance. It does not lag its competitors in any one area, and it breaks out with leading functionality in several areas valued by business users. One particular area of strength for HP-UX is the unique level of integration between virtualization, workload management, and high availability (HA) / disaster recovery in HP Insight Dynamics � VSE. The combination of HP-UX and Insight Dynamics � VSE gives customers the full benefit of virtualization in a highly available environment. In the newest version of HP-UX, online migration of Integrity Virtual Machines is up to two times faster than the previous release, and encryption is supported for live migration sensitive workloads.
-
UNIX: Compelling Value And Bright FutureMuch has been written about the continued migration of -UNIX workloads to other operating systems, potentially giving the impression that the market for UNIX technology is rapidly disappearing. A more considered look reveals a very different reality: The overall market for UNIX systems is declining at a very slow rate, weighted by declines in revenues from one key vendor in the second half of the decade, while other UNIX vendors have reported modest upticks in revenue.While Linux shipments may be growing at a more rapid rate, there remains a substantial group of enterprises that continue to use UNIX, and their motivations and behavior have not been the focus of any substantial body of published research.
Top White Papers
-
File Sharing and Collaboration Leads to Security Gaps in Financial Services Firms
Financial services organizations, including banks, brokers, insurance, and wealth management advisors, are subject to a number of regulations to govern data security, making these institutions subject to a great deal of scrutiny over their cybersecurity efforts. This regulatory scrutiny makes data breaches particularly costly. Data breaches can come from any number of sources, including mistakes from well-intended employees, rogue employees, and international crime organizations. Read this executive brief to discover the benefits of secure file-sharing and collaboration applications that help financial services organizations better protect their unstructured data and avoid costly breaches.
-
3 Network Monitoring Fails and How to Avoid Them
Learn the best practices that high-performing IT teams use to avoid the 3 most common network monitoring fails. Some IT teams unknowingly implement processes and systems that lead to common monitoring fails. In this whitepaper, based on research from Enterprise Management Associates, you will learn: What processes and systems can lead to network monitoring fails The best practices used by high performance IT teams to avoid these fails How research shows that more tools aren't the best approach