Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Storage & Clustering Community Blog
Showing posts in English
c3lsius | 19 Feb 2013 | 0 comments

The Veritas Operations Manager team is launching a new version middle of this year, and we want you (current or new customers) to try out the beta and give us feedback. Check out the VOM and VOM Advanced 6.0 Technology Preview post on what new features you can expect and how to participate in the beta program.

Also, the VOM Tell Your Story Contest for current VOM or VOM Advanced customers has been extended to April 30, 2013. Share your experience about VOM or VOM Advanced to earn extra Symantec Connect points. Here are the contest details.

AlanTLR | 11 Feb 2013 | 1 comment

My role as a Systems Administrator and storage provisioner often results in requests for additional space, usually from an Oracle database administrator.  This often provides a challenge, as working under a very limited budget we often have to re-allocate resources.  We decided to try out Veritas Operations Manager before looking at Veritas Operations Manager Advanced.  

Using Veritas Operations Manager helps in the monitoring of the disk space and also allows one to view the tablespaces quickly of the databases, so one can tell if there's room for the Database Administrators to adjust the sizes of the tablespaces.  In most of my cases, where there is not more space available on the Oracle's filesystem and all tablespaces are full, I've been able to look at the free space of my other VXVM filesystems and re-allocate from there (Attachment 3, vomimg03...

TonyGriffiths | 01 Feb 2013 | 0 comments

Veritas Storage Foundation and High Availability Solutions (SFHA) 6.0.3 is now available

For AIX , Solaris, Red Hat Enterprise Linux, SUSE Linux and HP-UX

SORT links are below:

Use SORT notifications to receive updates on new patches and documentation.

Cheers

Tony

 

Rank

Product

Release type

Patch name

Release date

1

Veritas Storage Foundation HA 6.0.1

Maintenance Release

sfha-sol11_x64-6.0.3

2013-02-01

...
Kimberley | 29 Jan 2013 | 0 comments

As Fujian Mobile in China rapidly grew from 2 million customers in 2003 to nearly 30 million today, the need for a secure, highly available, and efficient billing system became ever more important. Previous solutions suffered, becoming increasingly slow. It was simply unacceptable. After evaluating its options, Fujian selected Veritas Storage Foundation High Availability for Windows from Symantec. Consequently, Fujian witnessed unprecedented success with the new solution. Results include up to eightfold faster processing, the ability to re-assign 15 IT staff to more valuable tasks, a 50 percent reduction in storage needed for billing and reclaiming more than 10 terabytes. To learn more about how Symantec’s cluster file storage system drastically improved Fujian Mobile’s billing system, follow this link http://bit.ly/V29aY8   

bpascua | 23 Jan 2013 | 0 comments

When we talk about TRIM we aren’t referring to losing a few founds after Christmas, although I could certainly use that. TRIM refers to Solid State Drive and Flash technologies,  which are now becoming more prevalent in Data Centres as well as our consumer world. If you look to buy a laptop these days there is a strong case for opting for a solid state drive to give you faster boot up times and performance. Similarly there are many options in the Enterprise market from true flash arrays like Violin to the PCI accelerator cards like Fusion IO. In order to understand TRIM you need to have an idea of how Flash storage works. SSD’s use NAND memory to store and transfer information in pages.  A collection of pages  makes up a blocks. You cannot delete a page, you can only delete a chunk of pages (block) So when you delete a file it actually just gets marked for deletion and at a later time when enough pages are available they are deleted. This practice slows...

dennis_wenk | 17 Jan 2013 | 0 comments

A principal challenge many enterprises face is identifying exposures to their complex IT infrastructures.   There are considerable business dependencies on this strategic resource and weaknesses within the IT-infrastructure may lead to serious business interruptions.   It is not enough however, to merely identify weaknesses; the impact of those weaknesses must also be clearly understood and quantified.  This is an important point because it is difficult to know how much to invest to strengthen the infrastructure unless there is a sense of the size of the risk to the organization.

IT infrastructures can fail due to a wide range of events.  These events can be as simple as a process failure or as catastrophic as a full system crash.  It is unrealistic and costly to eliminate each and every harmful event; therefore, a priority ranking based on the consequence of the event is very useful.  Ranking the potentially damaging events based on...

dennis_wenk | 17 Jan 2013 | 0 comments

Oh yes you DO need to know Probability! Many of Professional and Thought-Leaders have said that ‘there is no reason to know probabilities to know that a big risk exists’ and that it should be intuitively obvious that losing a datacenter would be very bad.  So then, if the IT-infrastructure risk is so self-intuitive then value does not lie in identifying the most serious risks, these risks are self-evident. The value lies in determining the optimal ‘investment’ to mitigate the most serious risks.  In this context, optimal means to allocate the organization’s resources to those actions that will yield the best overall performance.

So even if these self-intuitive, gut feeling about the risks are right, it is not the most effective way to justify the appropriate level of investment.  The fact, this is the reason that many in IT find it difficult to provide a valid ROI for HA/DR solutions; because they fail to understand the value that...

dennis_wenk | 09 Jan 2013 | 0 comments

A real crisis is happening now and if we really want to reduce losses for our organization then we will need to adjust our focus.  We don’t have to wait for any pandemic or catastrophe to strike; organizations are experiencing losses that range between $35 billion and $500 billion per month.  If these losses are the result of best practices that are intended to protect our organizations from crisis, then some might even consider these regulations and best practices to be gravely dysfunctional.   

Compliance with federal, state, and international privacy and security laws and regulations often is more an interpretive art than an empirical science—and it is frequently a matter for negotiation.  When business metrics are applied to compliance, many companies decide to deploy as little technology or process as possible—or to ignore the governing laws and regulations completely. Every company weighs the cost of...

dennis_wenk | 08 Jan 2013 | 0 comments

Stakeholders are becoming increasingly concerned about accountability and management of operational risks.  Regulations like HIPAA, Sarbanes-Oxley, and Basel II are placing requirements that are more stringent on corporate governance.  More and more high technology is embedded in the operating fabric of the organization and, in many respects, technology is the organization.  Amazon and eBay are outstanding examples of businesses created by and totally dependent on technology.  It is this reliance on technology and escalating dependency on interconnected infrastructures that has elevated the exposure to business interruptions.  These interdependencies ripple through an organization, as well as outside to major stakeholders:  customers, suppliers, lenders, and partners.

Simultaneously, non-conventional threats such as, denial of service, hacking, and September 11th 2001 changed the very nature of operational risk instantaneously and on a...

Mike Reynolds PMM | 07 Jan 2013 | 0 comments

From application recovery to data protection, Symantec provides solutions to help customers keep their business on-line.  One recent event that has everyone thinking and talking about disaster recovery planning is Hurricane Sandy.  We asked a panel of disaster recovery experts from Symantec to discuss best practices and real life examples of disaster recovery strategies that they have seen first hand.  The recording of that webcast entitled "Surviving the Wrath of Sandy: Is your IT organization really ready in the event of a disaster?" is now available on Virtualization Review.  Please register and learn how your peers are approaching disaster recovery planning.