Video Screencast Help
Storage & Clustering Community Blog
Showing posts in English
Steve_Grimwood | 26 Mar 2013 | 0 comments

As in my series of blogs around Storage Optimization there is a commonality about the recognition of the
"data explosion" conundrum, and how this is a placing an extra burden on an already stretched IT storage team.

I've already covered off how Symantecs Thin Provisioning and Compression technologies can assist with
ever expanding storage paradigm, again its time to change tack again.

Today’s blog will again be targeting space utilization and more specifically Deduplication, assisting 
most organizations  to get the best utilization from their storage at the best price point.
So what Symantec S/W are we talking about? - as ever, Storage Foundation.
Let’s focus on Deduplication and how this can offer space savings and cost reductions.

What is deduplication ?
Simply put, deduplication is identifying a commonality in data, and where this occurs only keeping a single
copy rather...

Steve_Grimwood | 25 Mar 2013 | 0 comments

As in my first blog 'Thin Provisioning - How Symantec Can Help' we recognise the "data explosion" as fact rather
than fable and as before is set to continue for the foreseeable future.  Projected growth rates are inexact
however all are in agreement that data creation and retention is on the rise, placing further demand on an
already stretched IT storage team.

Again most customers I speak with are investigating some form of data/storage optimization. 
Often the largest spend of the IT budget is storage, and of course CSO’s and CTO being tasked with reducing this.
Solutions available vary from something as simple as  migrating data from tier 1 storage to adopting newer
technologies such as, SSD’s, Thin Provisioning, along with known technologies such as  compression, dedupe,
the list goes on….

Today’s blog will be targeting space utilization and more...

Steve_Grimwood | 25 Mar 2013 | 0 comments

Today we recognise the "data explosion" as fact rather than fable  (data explosion - the continued increase in the
amount of digital data created and stored) and is set to continue for the foreseeable future. 
Projected growth rates are inexact and vary between analysts, however all are in agreement that data creation and
retention is on the rise, placing further demand on an already stretched IT storage team.
 
With this in mind most customers I speak with are looking at some form of data/storage optimization. 
Typically the largest part of the IT budget is spent on storage, with CSO’s and CTO being tasked with reducing this.
Solutions available vary from something as simple as  migrating data from tier 1 storage to adopting newer
technologies such as, SSD’s, Thin Provisioning, along with known technologies such as  compression, dedupe,the
list goes on…....

Kimberley | 19 Mar 2013 | 0 comments

Although solid-state continues to be touted as a way to address storage bottlenecks for running performance-intensive applications, enterprises are struggling with how to implement the technology in an optimized manner. Though the benefits of solid-state are great, they cannot be fully realized or accomplished unless paired with enterprise-grade data management software in order to optimize their available capacity, and provide high levels of data protection and continuous application availability. This also helps to cost-effectively make use of available tiers of storage. Symantec’s Veritas Storage Foundation can help alleviate these issues because it increases visibility, is automated, efficiently stores data, and provides dynamic storage tiering. To learn more about how Symantec storage solutions can help your company or organization reap the benefits of solid-state technology, check out this article: http://bit.ly/Y4jiAR...

Corradino Milone | 18 Mar 2013 | 0 comments

 

Point in time copy is a technology that permit to make the copies of a large sets of data a common activity.

Like photographic snapshots capture images of physical action, point in time copy or snapshot are virtual or physical copies of data that capture the state of data set contents at a single instant. Both virtual (copy-on-write) and physical (full-copy) snapshots protect against corruption of data’s content. Additionally, full-copy snapshots can protect against physical destruction. These copies can be used for a backup, a checkpoint to restore the state of an application , data mining, test data and kind of off-host processing. An important peculiarity of these copies is that from the application point of view the copy seems to occur atomically. That means that all the data updates that happens on the original data are applied before or after the point in time copy.

The definition that the Storage Networking Industry Association (SNIA) gives...

bpascua | 14 Mar 2013 | 0 comments

Cloud computing has long been a buzz word in the IT sector. A seemingly fitting definition of cloud is “a model for enabling convenient, on demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. Many organisations have cautiously been dipping their toes in the public cloud market. Many applications can be seamlessly delivered through public clouds which alleviate the need to on premise servers and reduce the capex costs involved with hosting these services on premise.  Public clouds offer the benefit of utilizing someone else’s  infrastructure to run IT workloads on a pay as you go basis thus reducing your capex costs. Private clouds are different since they leverage cloud technology and ultimately reduce overall opex costs and improve business agility. Many organisations particularly in the financial sector simply wont use public clouds for their mission critical...

dennis_wenk | 12 Mar 2013 | 0 comments

Information Technology (IT) is tightly integrated with the business; it has transformed the way we do business.  Nicholas G. Carr points out his seminal Harvard Business Review article IT Doesn’t Matter that the capital investment in IT is significant; “nearly 50% of capital expenditures by American companies and more than $2 trillion a year globally are spent on IT. …no one would dispute that information technology has become the backbone of commerce.  It underpins the operations of individual companies, ties together far-flung supply chains, and, increasingly, links businesses to the customers they serve.  Hardly a dollar or euro changes hands anymore without the aid of computer systems”.   Technology is the fundamental infrastructure for the modern business.

Carr continues with; “Today, an IT disruption can paralyze a company’s ability to make products, deliver its services...

Michael Black | 07 Mar 2013 | 0 comments

 

Hi, all.

We have released a set of articles that contain information about troubleshooting the "failed" disk status, as reported by vxdisk.

Here is the link:

"Failed" or "failed was" is reported by vxdisk
http://www.symantec.com/docs/TECH200618

Since this is a broad topic, the "technote" is actually a set of about a dozen article that have been organized into a logical tree structure, with TECH200618 at its "root."

Let us know what you think!
 

Regards,

Mike

jmartin | 28 Feb 2013 | 0 comments

 

On February 20, 2013, Symantec completed another release of Symantec Operations Readiness Tool (SORT)! With SORT’s focus of improving the total customer experience for Storage Foundation and NetBackup customers, we’ve added the following Storage Foundation High Availability Solutions features and improvements to the website:

  • Support of the Storage Foundation 6.0.2 release

Visit SORT at http://sort.symantec.com to see why thousands of Symantec customers continue to gain value from the site.

 

dennis_wenk | 27 Feb 2013 | 0 comments

The modern organization is highly dependent on information technology, simultaneously and quite unintentionally, information technology has introduced new exposures which have deceptively seeped into every layer of the financial organization.  The likelihood that an organization will experience a catastrophic loss from an IT-service interruption caused by an IT issue is far greater than an interruption coming from some disaster or ‘black swan’ event.  Still, the key to survival is allocating the appropriate amount of resources to the “right” risks; while that may include planning contingencies for a worse-case scenario, to be rational about risk more guidance regarding the investment tradeoffs that mitigate risk.

The “Big Question” is how to optimize scarce resources today, to achieve the greatest reduction in future losses.  The Big Question two components: (1) which risks are the serious ones and...