Video Screencast Help
Storage & Clustering Community Blog
Showing posts tagged with Storage Foundation
Showing posts in English
bpascua | 14 Mar 2013 | 0 comments

Cloud computing has long been a buzz word in the IT sector. A seemingly fitting definition of cloud is “a model for enabling convenient, on demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. Many organisations have cautiously been dipping their toes in the public cloud market. Many applications can be seamlessly delivered through public clouds which alleviate the need to on premise servers and reduce the capex costs involved with hosting these services on premise.  Public clouds offer the benefit of utilizing someone else’s  infrastructure to run IT workloads on a pay as you go basis thus reducing your capex costs. Private clouds are different since they leverage cloud technology and ultimately reduce overall opex costs and improve business agility. Many organisations particularly in the financial sector simply wont use public clouds for their mission critical...

Michael Black | 07 Mar 2013 | 0 comments

 

Hi, all.

We have released a set of articles that contain information about troubleshooting the "failed" disk status, as reported by vxdisk.

Here is the link:

"Failed" or "failed was" is reported by vxdisk
http://www.symantec.com/docs/TECH200618

Since this is a broad topic, the "technote" is actually a set of about a dozen article that have been organized into a logical tree structure, with TECH200618 at its "root."

Let us know what you think!
 

Regards,

Mike

dennis_wenk | 27 Feb 2013 | 0 comments

The modern organization is highly dependent on information technology, simultaneously and quite unintentionally, information technology has introduced new exposures which have deceptively seeped into every layer of the financial organization.  The likelihood that an organization will experience a catastrophic loss from an IT-service interruption caused by an IT issue is far greater than an interruption coming from some disaster or ‘black swan’ event.  Still, the key to survival is allocating the appropriate amount of resources to the “right” risks; while that may include planning contingencies for a worse-case scenario, to be rational about risk more guidance regarding the investment tradeoffs that mitigate risk.

The “Big Question” is how to optimize scarce resources today, to achieve the greatest reduction in future losses.  The Big Question two components: (1) which risks are the serious ones and...

c3lsius | 19 Feb 2013 | 0 comments

The Veritas Operations Manager team is launching a new version middle of this year, and we want you (current or new customers) to try out the beta and give us feedback. Check out the VOM and VOM Advanced 6.0 Technology Preview post on what new features you can expect and how to participate in the beta program.

Also, the VOM Tell Your Story Contest for current VOM or VOM Advanced customers has been extended to April 30, 2013. Share your experience about VOM or VOM Advanced to earn extra Symantec Connect points. Here are the contest details.

TonyGriffiths | 01 Feb 2013 | 0 comments

Veritas Storage Foundation and High Availability Solutions (SFHA) 6.0.3 is now available

For AIX , Solaris, Red Hat Enterprise Linux, SUSE Linux and HP-UX

SORT links are below:

 

Use SORT notifications to receive updates on new patches and documentation.

 

Cheers

Tony

 

 

 

 

 

Rank

Product

Release type

Patch name

Release date

1

Veritas Storage Foundation HA 6.0.1

Maintenance Release

...

bpascua | 23 Jan 2013 | 0 comments

When we talk about TRIM we aren’t referring to losing a few founds after Christmas, although I could certainly use that. TRIM refers to Solid State Drive and Flash technologies,  which are now becoming more prevalent in Data Centres as well as our consumer world. If you look to buy a laptop these days there is a strong case for opting for a solid state drive to give you faster boot up times and performance. Similarly there are many options in the Enterprise market from true flash arrays like Violin to the PCI accelerator cards like Fusion IO. In order to understand TRIM you need to have an idea of how Flash storage works. SSD’s use NAND memory to store and transfer information in pages.  A collection of pages  makes up a blocks. You cannot delete a page, you can only delete a chunk of pages (block) So when you delete a file it actually just gets marked for deletion and at a later time when enough pages are available they are deleted. This practice slows...

dennis_wenk | 18 Dec 2012 | 0 comments

Operational risk is everywhere in the business environment, every decision has its share of uncertainty.  Nothing is a sure thing, yet we when we make important decision we certainly want to “keep the odds in our favor”.  I have often heard the terms like ‘risk appetite’, ‘risk tolerance’, or ‘risk aversion’ used in reference to making forward-looking choices about operational risk as if we can rationally and effectively manage risk based on our subjective feelings.  These terms, however, provide little guidance and position risk-management in the domain of oracles and soothsayers.  Business is not a game of chance based on our subjective ‘feelings’ regarding operational risk. 

The stakes are too high relative to operational risk to leave it to subjective guesses or ‘gut’...

dennis_wenk | 13 Dec 2012 | 0 comments

Data is the foundation of information; information leads to knowledge, and knowledge is power.  There can be little disagreement that data then has value.  Digital data has become the new world currency and protecting these valuable assets is a central concern of business continuity management.   Data loss, data unavailability and data corruption will all have an adverse economic impact the organization.  Not only do we need to ensure that data is usable and available but we also need to ensure that it is protected from unauthorized use.  While protecting digital data doesn’t sound particularly challenging; it typically begins with a simple task, make an extra copy.  Making and managing these extra copies, however, remains one of the most common pain points for any organization.        

There are three fundamental aspects of data protection that lead to increasing complexities.

  1. ...
dennis_wenk | 10 Dec 2012 | 0 comments

Difficult economic conditions lead to fiscal belt tightening, however, the ever-increasing demand for data continues; accelerating the requirement for hardware to manage the data.  Big data and its appetite for hardware become prominent line items which appear like ripe, low hanging fruit to many cost-cutters.  Buying low priced, ‘good enough’ or mediocre equipment starts to emerge as an opportunity to reduce a burgeoning budgetary item.  Price of the hardware however, is only one part of the total cost equation.

Low-cost gear costs less not just because of limited functionality; it is lower cost because a number of engineering short cuts are taken during manufacturing.  For example, using lower-tolerance components that have higher failure-rates or removing redundant components are common ways to reduce production cost.   These short-cuts, however, negatively impact overall reliability and increase the failure rate....