SlideShare une entreprise Scribd logo
1  sur  39
Télécharger pour lire hors ligne
Knowledge Sharing
 2009 Book of Abstracts


An EMC Proven Professional Publication
Knowledge Sharing Winners 2008 Awards:
(left to right) Diedrich Ehlerding, Lalit Mohan,   Thank You!
Brian Russell, and Paul Brant with Alok
Shrivastava, Senior Director, EMC Education        For the third consecutive year, we are pleased to congratulate our EMC®
Services; Frank Hauck, Executive Vice
President, Global Marketing and Customer           Proven™ Professional Knowledge Sharing authors. This year’s Book of
Quality; and Tom Clancy, Vice President
EMC Education Services.                            Abstracts demonstrates how the Knowledge Sharing program has grown
                                                   into a powerful forum for sharing ideas among information storage
                                                   professionals. In 2009, Knowledge Sharing articles were downloaded more
                                                   than 104,000 times, underscoring the power of the knowledge sharing
                                                   concept. You may view the 2009 articles and the monthly release of our 2009
                                                   Knowledge Sharing articles at http://education.emc.com/knowledgesharing.

                                                   Our Knowledge Sharing authors also play a leading role in our new EMC Proven
                                                   Professional community. It’s a great place to collaborate with other Proven
                                                   Professionals, ask questions about the program, or share your experiences.
                                                   Visit the community at http://education.emc.com/provencommunity.

                                                   The EMC Proven Professional program had another great year—we recently
                                                   awarded our 39,000th certification. Also, we recently announced publication
                                                   of “Information Storage and Management,” the first technology book from
                                                   EMC. It will be a valuable addition to any IT professional’s reference library.

                                                   Our continuing success is built on the foundation of committed professionals
                                                   who participate, contribute, and share. We thank each of you who participated
                                                   in the 2009 Knowledge Sharing competition.



                                                   Tom Clancy				                               Alok Shrivastava
                                                   Vice President 				                          Senior Director
                                                   EMC Education Services			                    EMC Education Services

                                                                                                                                     3
Table of Contents

    First-Place Knowledge Sharing Article.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 7
                                          .
    Is Cloud Computing the Game Changer Your Company Needs in These Tough Times?
    Bruce Yellin, EMC Corporation


    Second-Place Knowledge Sharing Article. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 8
    Customized Tool for Automated Storage Provisioning
    Ken Guest, A Large Telecommunications Company
    Sejal Joshi, A Large Telecommunications Company


    Third-Place Knowledge Sharing Article. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 9
    Reclaiming SAN Storage—The Good, the Bad, and the Ugly
    Brian Dehn, EMC Corporation


    Best of Content Management. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 10
    Architecting an Enterprise-Wide Document Management Platform
    Jacob Willig, Documentum Consultant


    Best of Tiered Storage. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 11
    Real-Life Application of Disaster Recovery
    Faisal Choudry, Magirus UK Ltd.


    Best of Backup and Recovery. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 12
    Best Practices for Implementing and Administering EMC NetWorker
    Anuj Sharma, Ace Data Devices


    Backup and Recovery
    A Load-Balancing Algorithm for Deploying Backup Media Servers. .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 13
    Krasimir Miloshev, EMC Corporation

    Backing Up Applications with NetWorker Modules . .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 14
    Aaron Kleinsmith, EMC Corporation

    DLm40xx Implementation and Upgrade Guide . .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 15
    Mike Smialek, EMC Corporation

    Implementing Deduplicated Oracle Backups with NetWorker Module for Oracle. .  .  . 16
    Chris Mavromatis, EMC Corporation

    NDMP Localization/Internationalization Support for NetWorker . .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 17
    Jyothi Deranna, EMC Corporation

    Using Disks in Backup Environments and Virtual Tape Library (VTL)
    Implementation Models . .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 18
    Emin Calikli, Gantek Technologies


4   EMC Proven Professional: Knowledge Sharing 2009
Table of Contents (Continued)

             Business Process
             Enterprise Standards and Automation for Storage Integration and Installation
             at Microsoft . .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 19
             Aaron Baldie, EMC Corporation

             Significant Savings are Within Your Reach When You Understand the True Cost
             of Storage. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 20
             Bruce Yellin, EMC Corporation

             The Efficient, Green Data Center. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 21
             Raza Syed, EMC Corporation


             Connectivity
             Best Practices for Deploying Celerra NAS . .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 22
             Ron Nicholl, A Large IT Division

             CLARiiON and FCiP: A Practical Intercontinental DR and HA Solution. .  .  .  .  .  .  .  .  .  .  .  .  . 23
             Jaison K. Jose, EMC Corporation

             Oracle Performance Hit | a SAN Analysis. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 24
             Kofi Ampofo Boadi, JM Family, Inc.

             Preventative Monitoring in the NAS Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
             Robert Wittig, EDS, an HP Company

             Create a Comparative Analysis of an Oracle Database Using Storage
             Architectures NAS and SAN. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 26
             Sergio Hirata, Columbia Storage
             Volnys Borges Bernal, Universidade de São Paulo/LSITec


             Content Management
             Custom Documentum Application Code Review. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 27
             Christopher Harper, EMC Corporation


             Tiered Storage
             Business Continuity Planning for Any Organization. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 28
             Smartha Guha Thakurta, EMC Corporation

             Data Migration Strategy (EMC SRDF via “Swing Frame”). .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 29
             Sejal Joshi, A Large Telecommunications Company
             Ken Guest, A Large Telecommunications Company

             Data Storage Performance—Equating Supply and Demand. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 30
             Lalit Mohan, EMC Corporation

             Integrating Linux and Linux-based Storage Management Software with RAID
             System-based Replication . .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 31
             Diedrich Ehlerding, Fujitsu Technology Solutions


                                                                                                                                                                                                                    5
Table of Contents (Continued)


                 Simplifying/Demystifying EMC TimeFinder Integration with Oracle Flashback.  .  .  .  . 32
                                                                                           .
                 Robert Mosco Jr., EMC Corporation

                 Service-Oriented Architecture (SOA) and Enterprise Architecture (EA). .  .  .  .  .  .  .  .  .  .  .  . 33
                 Charanya Hariharan, Pennsylvania State University
                 Dr. Brian Cameron, Pennsylvania State University

                 SRDF/Star Software Uses and Best Practices. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 34
                 Bill Chilton, EMC Corporation

                 Using EMC ControlCenter File Level Reporting for CIFS Shares .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 35
                                                                               .
                 Chad DeMatteis, EMC Corporation
                 Michael Horvath, Fifth Third Bancorp


                 Virtualization
                 Cloud Computing Services—A New Approach to Naming Conventions. .  .  .  .  .  .  .  .  .  .  .  . 36
                 Laurence A. Huetteman, Technology Business Consultant

                 Leveraging Cloud Computing for Optimized Storage Management . .  .  .  .  .  .  .  .  .  .  .  .  .  . 37
                 Mohammed Hashim, Wipro Technologies
                 Rejaneesh Sasidharan, Wipro Technologies




6                EMC Proven Professional: Knowledge Sharing 2009
Is Cloud Computing the Game Changer Your
                       Company Needs in These Tough Times?
                       Bruce Yellin, EMC Corporation



                                               There have been countless articles written about cloud computing; a Google search will
                                               return millions of hits. Your colleagues discuss it at lunch and vendors bring it up in their
                                               presentations. From the enterprise perspective, it could be the perfect storm of value
                                               propositions—cloud computing drives the cost of IT down, is available on demand, and is
                                               scaleable. Cloud computing could even become a new competitive edge for your company.
                                               Maturing at a rapid pace, it will be the next chapter in data processing. But is it ready for your
                                               company? Can the hype of cloud computing live up to its promise?

                                               I call cloud computing a “game changer” because it is a service, a platform and operating
                                               environment poised to transform the status-quo computing model. Advocates argue it will
“ he emergence of cloud computing and its
 T                                             revolutionize how information will be delivered. It is difficult to find a leading technology
 impact in these tough economic times are      company that isn’t already delivering some type of cloud product or discussing their plans
 the crux of the Knowledge Sharing charter.    for the cloud. Many of us already rely on Yahoo or Google for personal e-mail, upload photos
                                               on Flickr for others to browse, and use Facebook to stay in touch. But when you use these
 As a former computer science teacher,
                                               titles at work, are you met with open arms, or does company policy frown upon their use?
 expanding my awareness of new topics and
 guiding others is my mission—that is how      Cloud computing allows the user to access an application without having to own it, install
 new concepts are shaped.”                     it on a computer, or maintain it. The cloud offers the freedom to access an application from
                                               anywhere a browser can run—desktop, laptop, intelligent phone, etc. It can increase a
               Bruce Yellin, EMC Corporation
                                               company’s processing and storage capacity, and provide services without taking up data
                                               center space. On a personal level, some cloud computing services are free. For the enterprise,
                                               pricing is subscription-based or pay-as-you-go, allowing a company to enhance existing
                                               service or provide new IT functionality without a major investment.

                                               This article examines what cloud computing is, total cost of ownership, privacy/security
                                               impacts, universal access concerns, and hybrid strategies.




                                                                                                                                                7
Customized Tool for Automated Storage
    Provisioning
    Ken Guest, A Large Telecommunications Company
    Sejal Joshi, A Large Telecommunications Company




                         Homegrown tools for storage provisioning automation can improve efficiency and implement
                         a common standard in a multi-vendor storage environment. This enables teams to work more
                         efficiently and eliminates the need for expensive SRM tools that may not meet all business
                         requirements. In the current economic environment, this is even more important as groups
                         are being downsized and budgets cut while storage capacity and fiber switch ports increase
                         at a breakneck speed.

                         In 2009, we provisioned 6.0 PB of enterprise-class SAN-based storage, compared to 4.3 pro-
                         visioned in 2007, a year-to-year increase of 140 percent. Our current environment is growing
                         at a rate of ~100 TB per week. SRM tools do not scale to meet our requirements and service
                         level agreements (SLAs) with this growth rate. Using our custom implementation, we can
                         provision ~50 TB of storage across multiple frames in less than one hour and reduce overall
                         re-work and human error. This includes design validation, LUN creation/masking, and zoning.

                         This article discusses how to use vendor-provided CLI software to create/implement custom-
                         ized provisioning tools. SRM-based provisioning tools are great for organizations with small
                         storage footprints. However, they do not scale in larger and more diverse, enterprise-class,
                         multi-data-center environments due to implementation costs and increased total cost of
                         ownership (TCO).

                         Instead, we can implement a customized provisioning solution with a small data center foot-
                         print and very little additional cost to the company. This article discusses how to implement
                         end-to-end storage provisioning automation using multi-vendor storage/switch platforms.
                         The process includes a centralized ticketing system to track the storage request throughout
                         its lifecycle. This enables the overall storage automation process. The workflow tool tracks
                         approvals and design information, providing the feed to the automation scripts and informa-
                         tion to the system administrator to build the file systems based on the design.

                         Due to central automation, we can guarantee standards across multiple data centers/envi-
                         ronments and easily create standard reports.




8                        EMC Proven Professional: Knowledge Sharing 2009
Reclaiming SAN Storage—The Good, the
                         Bad, and the Ugly
                         Brian Dehn, EMC Corporation




                                                 “My bonus is based on saving $5M worth of storage.”

                                                 “We are cutting the storage budget so you need to reuse capacity.”

                                                 “We cannot purchase additional storage until we increase utilization.”

                                                 Reclaiming storage capacity for reuse reduces IT capital expenditures, increases storage
                                                 utilization, contributes to “green computing” initiatives, and can address each of the issues
“ wrote this article because I realized that
 I                                               above. Proper planning and execution of a storage reclamation effort is key to avoiding prob-
                                                 lems and realizing maximum benefits.
 no material existed that would provide
 storage users with a best-practices meth-       IT professionals, especially storage administrators, usually know how much storage is allo-
 odology for reclaiming storage.”                cated and available for allocation. “Orphaned” storage, or capacity that appears to be used
                                                 but is not, is more difficult to find. We must understand storage configuration states and
 “ he best thing about being a Knowl-
  T                                              the storage configuration hierarchy to find this treasure trove of reclaimable storage. Most
                                                 of the layers in the storage configuration hierarchy include potentially reclaimable capacity.
  edge Sharing author is the amount of
                                                 The level of effort required to reclaim that capacity, however, may not be worth the return on
  knowledge I gained personally as I was
                                                 investment, depending on where it exists. Identifying candidates for reclamation makes it
  researching and writing the article. I think   even more challenging.
  the person who gained the most from
  writing this article was me.”                  This article provides a best-practices “blueprint” for a successful reclamation strategy. The
                                                 following topics are discussed:
                Brian Dehn, EMC Corporation
                                                    • Understanding the storage configuration hierarchy
                                                    • Identifying capacity for potential reclamation
                                                    • Determining whether the benefit is worth the cost
                                                    • Using storage resource management tools to facilitate the effort

                                                 This article will help you achieve storage reclamation objectives (the good), while reducing
                                                 time and cost (the bad), and avoiding significant problems (the ugly).




                                                                                                                                                  9
Architecting an Enterprise-Wide Document
                        Management Platform
                        Jacob Willig, Documentum Consultant




                                                This article presents best practices discovered while implementing EMC Documentum® within
                                                large organizations using a central-platform approach. Documentum is typically implemented
                                                as a dedicated host for document management and storage. The implementation is tailored
                                                to the specific set of functional requirements and does not necessarily consider future expan-
                                                sion into different functional areas across the organization. If the need arises, a new point
                                                solution is often implemented. It, too, is tailored to the new and existing requirements.

                                                This approach fulfills the short-term business need for functionality, but it becomes increas-
“ keep learning as this is very much unex-
 I                                              ingly more expensive to maintain and operate the growing number of point solutions. This
 plored territory. These are exciting times.    minimizes the effectiveness of a content management solution as the overhead costs re-occur
 I never had an article posted in the past,     over time.

 so the prospect of this article being posted
                                                Large organizations adopting an enterprise view of content management, and implementing
 makes me feel very proud. It would be          document management as a strategic platform, are able to host document flows uniformly.
 great if many more people would become         The support team can add a new document flow easily and efficiently as everything in the
 aware of the necessity of implementing         platform is set up generically. This approach, though, will incur additional startup costs to
 document management in a platform-like         enable future, controlled growth.

 architecture.”
                                                This article discusses several of the challenges I faced while implementing document manage-
       Jacob Willig, Documentum Consultant      ment in a platform architecture. I will explain both the challenges and solutions.

                                                Topics include information management, object model, security, workflows, and functional,
                                                application and technical support.




10                                              EMC Proven Professional: Knowledge Sharing 2009
Real-Life Application of Disaster Recovery
Faisal Choudry, Magirus UK Ltd.




                      EMC business continuity (BC) and disaster recovery (DR) offer a myriad of options to protect
                      your data. Organizations sometimes implement them without a thorough analysis of how
                      and when they would use the technologies to recover data if needed. Even if familiar with the
                      technology, procedures can be so arduous that the organization has no chance of meeting
                      their committed recovery point objective (RPO) and recovery time objective (RTO). “State-of-
                      the-art” recovery technologies cannot help if no one knows how to use them.

                      Organizations need procedures to document how to implement their recovery technologies.
                      This is even more important if an external organization did the implementation. What ques-
                      tions should you consider?

                         •  hen the implementation ends, can the customer grasp the complexities of the new
                           W
                           technologies and use them if needed?
                         • Can we make these complex solutions easier, especially when organizations don’t
                           
                           have the “luxury” of appointing a full-time disaster recovery team?

                      SMEs and technology professionals face these issues when proposing BC and DR solutions.
                      This article uses a case scenario to examine these questions in relation to a recent real-life
                      solution, one that I proposed and implemented. The solution included multiple sites, using
                      EMC CLARiiON® systems (CX3-10 systems) at each site, EMC MirrorView™/Asynchronous,
                      and EMC SnapView™. ESX™ Servers are the attached hosts, so we implemented Site Recov-
                      ery Manager (SRM) using the recently released SRA adapter for MirrorView/A.

                      The project was successful, but raised interesting afterthoughts, especially regarding end-
                      users’ perceptions and technology expectations. In conclusion, this article will offer advice
                      on how to address these issues.




                                                                                                                      11
Best Practices for Implementing and
     Administering EMC NetWorker
     Anuj Sharma, Ace Data Devices




                          EMC NetWorker® is the fastest performing backup application in the market. Integration with
                          replication and snapshot technologies helps you meet the most aggressive RTO and RPO
                          requirements and transform backup to disk or backup to tape in an off-host, off-hours process.
                          It supports a broad set of operating systems, databases, applications, and topologies.

                          EMC NetWorker’s compatibility with various operating systems, applications, and databases
                          makes it successful in today’s competitive industry. However, it must be implemented properly
                          to get the most out this wonderful product. There are some practices to keep in mind to make
                          the backups and recovery more effective and beneficial for the organization.

                          This article covers the various practices that I performed when implementing and administering
                          EMC NetWorker. They include:

                            • Implementing NetWorker on various operating systems
                            • Making it foolproof in case of NetWorker server disaster
                            • mplementing NetWorker in a bidirectional as well as unidirectional hardware
                              I
                              firewall, including various scenarios (i.e., when some of the clients are in DMZ)
                            • Working with the NetWorker ports
                            • Implementing NetWorker in a cluster
                            • Integrating e-mail alerts with NetWorker
                            • Implementing persistent binding through EMC NetWorker
                            • Integrating EMC Avamar® for deduplication
                            • Probe-based backups




12                        EMC Proven Professional: Knowledge Sharing 2009
A Load-Balancing Algorithm for Deploying
Backup Media Servers
Krasimir Miloshev, EMC Corporation




                     Finding the best backup client’s distribution over designated media servers can be considered
                     part of the general load-balancing problem. Our goal is to distribute the backup client’s data
                     in the best possible way among newly designated media servers responsible for the backup
                     read/write operations.

                     This article suggests a load-balancing approach based on one criterion—the amount of
                     data that must be backed up on each client. It begins by introducing the basic components
                     of backup infrastructures: the master server, clients, media servers, and storage backup
                     devices. It presents two approaches for deploying media servers and provides a structure for
                     decision making.

                     Next, we investigate a load-balancing schema where there are only 10 media backup clients
                     and two media servers. We calculate capacity and learn a load-distribution algorithm. Finally,
                     the article aligns the basic load-balancing algorithm to program implementation. In two easy
                     steps, you’ll be able to implement the algorithm using C or Korn-shell.

                     We can reduce the backup window by balancing the backup load among all the backup media
                     servers. Even when data size is the only criteria we use, we can expect to achieve visible
                     performance improvement and shorter backup windows.




                                                                                                                 13
Backing Up Applications with NetWorker Modules
     Aaron Kleinsmith, EMC Corporation




                          This article describes how to configure EMC NetWorker® to back up a database application.
                          It includes NetWorker’s technical setup to help protect popular databases that relate to
                          released NetWorker modules. Backup administrators who configure and monitor the online
                          database backups through NetWorker benefit most from this article.

                          The article discusses traditional database backup methodologies such as online (hot) back-
                          ups, offline (cold) backups, and transaction log backups. The article describes the backup
                          procedure to capture a consistent copy of an online database and transactions logs from
                          the source disks using the application server resources that manage the primary copy of the
                          database and data.

                          It provides enough technical information to help a storage administrator who manages
                          NetWorker verify and monitor a properly set-up client.

                          This article discusses:

                             • Overview and explanation of NetWorker modules
                             • General concepts and planning applicable to all NetWorker modules
                             •  etWorker configuration settings applicable to all modules and specific settings
                               N
                               and considerations for each NetWorker module within the NetWorker software




14                        EMC Proven Professional: Knowledge Sharing 2009
DLm40xx Implementation and Upgrade Guide
                         Mike Smialek, EMC Corporation




                                              Implementation of a data library for mainframe, DLm40xx series, requires coordination
                                              between multiple system and people resources. They include the mainframe tape library
                                              system, z/OS operating system software, NAS configuration and configuration of the DLm
                                              ACP, and VTE components. EMC Celerra® Replicator V2.0 is also required if replicating data
                                              to another DLm. This Implementation and Upgrade Guide walks through the implementation
                                              process to define the information necessary to configure each component.

                                              This guide is designed for solution architects, implementation specialists, maintenance and
                                              support services personnel, and storage administrators who want to understand how to
                                              implement or upgrade a DLm system. It presents necessary Linux commands and scripts to
“ y idea for this article came from par-
 M                                            allow a mainframe-centric person to do a DLm configuration.
 ticipating on project implementations.
                                              The DLm Implementation and Upgrade Guide addresses several key areas:
 Besides the opportunity to have the
 article published, writing it forces me to     • DLm mainframe checklist to gather current customer tape information
                                                  
 organize many implementation notes and         • Input form to provide required IP addresses and phone numbers
                                                  
 experiences into an orderly layout. Having     • PC software and hardware needed to configure DLm
                                                  
 others benefit from my experience helps        • DLm40xx hardware installation requirements
                                                  
                                                •  /OS updates to tape catalog, HCD, SMS/ACS, MTL, OAM, and Esoterics
                                                  z
 IT services organizations deliver projects
                                                • NAS configuration
                                                  
 efficiently and provides customer TCE.”
                                                • Running DLm Linux scripts to define Tapelibs and NFS mount points
                                                  
              Mike Smialek, EMC Corporation     • Running SCRIPT80 to change permissions
                                                  
                                                • Installing DLm Healthcheck script and mainframe reporting
                                                  
                                                • DLm z/OS utilities
                                                  
                                                • ESCON or FICON CHPID updates
                                                  
                                                •  est and acceptance procedures
                                                  T
                                                • IP replication configuration
                                                  
                                                •  roubleshooting
                                                  T




                                                                                                                                        15
Implementing Deduplicated Oracle Backups
     with NetWorker Module for Oracle
     Chris Mavromatis, EMC Corporation



                          More and more customers are now evaluating the cost benefits of data deduplication. This is
                          partly due to the explosive growth of software deduplication technology (such as EMC Avamar®).

                          EMC NetWorker® Module for Oracle is a mature product, with thousands of customers, that
                          offers a strong backup solution for an Oracle database. The first quarter of 2009 will be the
                          first time that NetWorker Module for Oracle will have deduplication integration for Avamar.
                          This feature empowers users to conduct Oracle deduplication backups and restores via the
                          integrated use of a deduplication storage node (Avamar server). A deduplication backup
                          can be a manual backup initiated within RMAN or a scheduled backup via the NetWorker
                          Management Console scheduler framework.

                          There are a number of differences and additional configuration items that we must consider
                          when deploying NetWorker Module for Oracle 5.0 to perform deduplication backups. This
                          article outlines installation, configuration, pitfalls, and best practices. It provides answers to
                          questions that can help customers better embrace this paradigm shift in backup solutions.

                          This article highlights these considerations and provides guidance for deployment. It is not
                          intended to be a step-by-step guide, nor does it replace the Installation Guide or Release
                          Notes. It does assume a level of knowledge using NetWorker, Avamar, Oracle, and NetWorker
                          Module for Oracle.

                          Sales, systems engineers, support personnel, and customers will benefit from learning how
                          to deploy this solution.




16                        EMC Proven Professional: Knowledge Sharing 2009
NDMP Localization/Internationalization
Support for NetWorker
Jyothi Deranna, EMC Corporation



                     Computer internationalization and localization are important because of the numerous
                     differences that exist among countries, regions, and cultures with respect to language (not
                     only distinct languages but also dialects and other differences within a single language for
                     weights and measures, currency, date and time formats, and more).

                     The EMC NetWorker® NDMP client-connection feature provides NAS with fast, flexible backup
                     and restore of mission-critical data residing on filers. The Network Data Management Protocol
                     (NDMP) is a TCP/IP-based protocol that specifies how network components communicate
                     with one another to move data across the network for backup and recovery. NetWorker with
                     NDMP client connections provides backup and recovery support for more than eight NAS
                     hardware providers. With NetWorker 7.4, the NDMP client is responsible to back up and
                     recover the non-ASCII data from the NAS filers.

                     EMC NetWorker 7.4 is a full-fledged internationalization release; the product is I18N and
                     L10N compatible. Many changes were made in the NDMP client-connection feature to handle
                     non-ASCII characters. NAS vendors each have their own mechanisms to store the non-ASCII
                     characters in their specific filers. NDMP is a single interface that helps NetWorker understand
                     how each vendor is handling non-ASCII data. Using NDMP, NetWorker is able to back up filers’
                     data and store it without data corruption.

                     This article explains how NetWorker backs up and recovers non-ASCII data residing in the NAS
                     filers using the NDMP client-connection feature. It describes how to configure NAS filers for
                     non-ASCII data backup/recovery and explains how the changes are done while configuring a
                     NAS filer as an NDMP client. It offers guidelines to configure filers from different vendors and
                     best practices and troubleshooting tips to avoid data corruption and increase performance.




                                                                                                                    17
Using Disks in Backup Environments and Virtual
                          Tape Library (VTL) Implementation Models
                          Emin Calikli, Gantek Technologies



                                                  Protecting data is vital for availability and business continuity. There are many data protection
                                                  solutions in the IT market. However, they address recovery time objectives (RTO) and recovery
                                                  point objectives (RPO). Recovery time represents the time it takes to restore the data; recovery
                                                  point represents the “data currency” at the backup state. These two concepts are not indepen-
                                                  dent and must be integrated based on company requirements.

                                                  Many organizations are experiencing shrinking backup windows and increasing data loads.
                                                  During a restore from tape, slower recovery operations result in longer production system
                                                  downtime. Companies are seeking faster backup and recovery solutions.

“ used current, real-world data
 I                                                Disks could be a viable solution for meeting fast data recovery requirements. The service
 protection requirements and personal             level agreement (SLA) depends on the application and the customer. It is often difficult
                                                  to meet all SLAs with a single data protection solution. Backup vendors are trying to tailor
 experiences to write my article. Valuable
                                                  their applications to use disks efficiently; this approach requires intelligent development
 data size is increasing day to day and
                                                  processes.
 protection becomes more important and
 critical.”                                       Virtual Tape Library (VTL) could help us reduce or eliminate the following problems:

              Emin Calikli, Gantek Technologies      • Physical tape damage
                                                       
                                                     • Cost of tape drives
                                                       
                                                     • Highly utilized tape drive resources (VTL staging or post processing)
                                                       
                                                     • Backup windows
                                                       
                                                     •  ecurity problems (backup encryption)
                                                       S
                                                  We have to know:
                                                     •  TL implementation methods
                                                       V
                                                     • Differences of disk usage between OLTP applications and backups
                                                       
                                                     • Impacts of block size on throughput and bandwidth
                                                       




18                                                EMC Proven Professional: Knowledge Sharing 2009
Enterprise Standards and Automation for Storage
Integration and Installation at Microsoft
Aaron Baldie, EMC Corporation



                     Microsoft’s most challenging problem is how to keep tens of thousands of servers up to date
                     with drivers and firmware in an environment that is spread across many global data centers.
                     More and more, these data centers are subject to budget and staff cuts. Personnel are
                     becoming less specialized, and in some cases, have no technical training at all other than
                     the ability to power cycle equipment.

                     The EMC account team has worked directly with Microsoft’s IT staff to overcome these
                     challenges and provide standards for drivers, firmware, and complete automation packages
                     that integrate with existing processes to allow for storage connectivity across the enterprise.
                     This allows Microsoft IT staff to rapidly deploy EMC storage to any server globally and manage
                     this storage with a limited, centralized IT staff.

                     To accomplish this, the EMC Support Matrix is refreshed on a six-month cycle to provide a
                     baseline of supported drivers, firmware, and applications, and their compatibility with the
                     OS and hardware. A matrix is published to lock in the revisions so a deployment kit can be
                     created once this standard is established.

                     All drivers are then downloaded to a central location and rolled into an automation package
                     that can be integrated into Microsoft’s own deployment process. Testing is performed for
                     multiple scenarios across all currently supported OS versions for both upgrades from the
                     existing standards and new deployments. Any issues found during this test process are
                     triaged with Microsoft and fixed before the latest versions are released to gold. The local
                     account team accomplishes all of these tasks and owns the project from start to finish.

                     EMC and Microsoft’s strong alignment and rapid deployment of EMC hardware achieves one
                     of the largest ratios of storage to administrator at about 1.5 PB per head count across 150
                     EMC CLARiiON® systems and 10 EMC Symmetrix® DMX™ systems.




                                                                                                                   19
Significant Savings are Within Your Reach when
                         You Understand the True Cost of Storage
                         Bruce Yellin, EMC Corporation



                                                 Do you find yourself struggling with your company’s insatiable craving for more storage? Will
                                                 any of your storage suppliers’ claims of “faster, cheaper, and better” really save your company
                                                 money? How about the stark reality that your dwindling IT budget is causing you sleepless
                                                 nights? Has the time come to expand the outdated, state-of-the-art storage infrastructure you
                                                 leased just three years ago?

                                                 You may be asked to trim capital and operating storage expenses by hundreds of thousands
                                                 of dollars, while simultaneously introducing innovation to your organization. This seemingly
                                                 contradictory set of storage demands also impacts your internal service level agreements.
                                                 Where do you begin? Which concepts will deliver significant short- and long-term savings?
“ nowledge sharing is the basis by which
 K
 we all share our collective expertise to        As a veteran of the storage industry, I have heard questions such as, “How much does a
                                                 gigabyte cost?” or “I don’t have a lot of money to spend” countless times. Neither is the
 benefit others in IT. With cost often being
                                                 right place to start when trying to determine the actual cost of storage, nor how to make your
 part of the storage equation, communicat-
                                                 storage budget go farther.
 ing my technical training in terms of dollars
 and cents turned out to be both fun and         I have also witnessed an explosion of data growth; some pundits claim the rate is as high
 educational.”                                   as 60 percent per year. Whatever the rate, we will have to store more data tomorrow than
                                                 yesterday. In addition, corporate policies and regulations require us to save that data for
                 Bruce Yellin, EMC Corporation
                                                 longer periods of time. That means storage, which translates into more floor space, more
                                                 power, more staff, and more complexity.

                                                 This article explores the challenges facing the IT storage manager and offers insight into
                                                 navigating a course of action to provide budget relief, while offering better services to
                                                 internal and external customers. It explores issues such as frame expansion and future-proof
                                                 architectures, environmental impact, virtualization, deduplication, risk avoidance, stretch-
                                                 ing the lifespan of existing equipment, cost-effective education, required negotiation and
                                                 financial skills, cutting fat from a budget, and much more.




20                                               EMC Proven Professional: Knowledge Sharing 2009
The Efficient, Green Data Center
Raza Syed, EMC Corporation




                     This article will help you build an efficient, green data center that will yield financial and
                     environmental benefits. Data center power and cooling and virtualization are two key
                     strategies to help you reap these benefits. We discuss power and cooling optimization, as
                     well as virtualization and other related data center technologies that are required to develop
                     and operate an efficient, green data center. This discussion occurs in the context of a
                     virtualization-leveraged data center.

                     Virtualization has been positioned as the core enabler for driving broader efficiencies. It
                     includes server and storage procurement and utilization, information protection (backup and
                     recovery), business continuity and disaster recovery (local and remote replication), infrastruc-
                     ture management, and infrastructure consolidation and automation. This article provides
                     you with a breadth of knowledge about the major data center functions that have a direct or
                     indirect impact on operational and environmental efficiency.

                     Our discussion is not limited to technology, but includes other relevant areas of a data center
                     that are either impacted by or have an impact on the technology infrastructure and IT opera-
                     tions. It identifies major areas of consideration as well as step-by-step guidance about how
                     to implement power and cooling, virtualization, and other related technologies. Designs and
                     architectural drawings for optimization are included.

                     This article consists of three sections:

                        •  ntroduction focuses on financial and environmental impacts of inefficient data
                          I
                          centers and the case for building efficient and green data centers.
                        • Considerations for Building Efficient, Green Data Centers focuses on high-level data
                          
                          center operating environments, IT processes, and technology considerations for data
                          center efficiency.
                        • Implementing an Efficient, Green Data Center focuses on implementation processes,
                          
                          steps, and technologies; and describes designs and architectural drawing in detail.




                                                                                                                  21
Best Practices for Deploying Celerra NAS
                        Ron Nicholl, A Large IT Division




                                                Deploying EMC Celerra® NAS involves many pieces of the IT infrastructure ranging from
                                                backend storage, to network topology, and beyond. Choosing a solid design can make the
                                                difference between mediocre performance and exceeding your customers’ expectations.

                                                NAS solutions are quickly becoming a viable alternative to mitigate the cost of a SAN-based
                                                storage solution. A Celerra NAS solution offers much of the same functionality traditionally
                                                seen on the storage array over IP, including replication, checkpoints, mirroring, and more.
                                                Applying best practices to your design will improve performance and reliability.

                                                This article includes:
“ he process of creating my article helped
 T
                                                   1. How to lay out the backend storage devices
 cement and expand on my knowledge.”
                                                   2.  ow to implement a network configuration that allows for greater flexibility and
                                                      H
                                  Ron Nicholl         reliability
                                                   3. Planning Microsoft Windows domain interaction
                                                   4. Best practices for backing up the Celerra environment
                                                   5. Monitoring the performance of the Celerra solution

                                                There are many components to a successful NAS design. The network topology can be lever-
                                                aged to provide a greater scope of service; the CIFS and NFS clients can be configured for
                                                greater performance and reliability. Implementing best-practices standards can reduce the
                                                customers’ cost of ownership and improve reliability. This article provides a quick reference
                                                to configuring Celerra.




22                                              EMC Proven Professional: Knowledge Sharing 2009
CLARiiON and FCiP: A Practical Intercontinental
DR and HA Solution
Jaison K. Jose, EMC Corporation




                      EMC CLARiiON® offers possibilities that meet almost all the needs of today’s high-demand
                      business. We can easily achieve complex industry requirements when we join this small
                      magic box to other technology. I would like to share an Intercontinental disaster recovery (DR)
                      solution that was achieved with the help of several products, including EMC CLARiiON,
                      MirrorView™/AS, SnapView® Clones, SnapView SnapShots, FCiP, and Vsan.

                      We had to find a solution to implement a primary site in Europe and a disaster recovery site
                      in the U.S. for a customer-facing application of EMC, so it was very important to have a robust
                      solution with a proper DR plan. FCiP was our first choice to manage data movement flawlessly
                      over the Atlantic; we could use Internet connectivity and VPN to create a tunnel between the
                      two sites. We segregated the data replication SAN by separating the ports to a special VSAN
                      extending to the DR site using FCiP.

                      CLARiiON was the obvious choice for this midrange application. The amount of data was
                      huge, but it was not very dynamic. Data availability was the primary concern. How would we
                      connect two sites separated by thousands of miles with a CLARiiON? Our best answer was
                      with MirrorView/AS since the data is sent through the FCiP tunnel to the DR CLARiiON.

                      Then, we needed a backup solution. This environment was hosted in a third-party data
                      hosting facility. A tape-based or external backup option often costs more money. SnapView
                      Clones were our answer. A gold copy of production and DR LUNs were set up to protect
                      against data corruption or data loss caused by human error.

                      MirrorView A/S, SnapView SnapShots, SnapView Clones, FCiP, and Vsan—all of these
                      products’ features are utilized in this unique disaster recovery solution. This not just a
                      concept; it has been implemented and is working in a production environment. I am happy
                      to share it with you.




                                                                                                                   23
Oracle Performance Hit | a SAN Analysis
     Kofi Ampofo Boadi, JM Family, Inc.




                           Performance problems can be avoided or minimized if we design the right disk layout. RAID
                           type definitions for specific components are essential to Oracle’s performance. Not keeping
                           defined components on the same spindles is equally crucial. This article uses a real-life case
                           study to explain Oracle’s components and illustrate the effects of a poorly designed SAN on
                           Oracle’s performance. A hit!

                           Please be aware that the order of the analysis is irrelevant; it is the content that matters.
                           Applications’ performance relies heavily on the SAN. Performance issues can be centric to
                           the host, connectivity device, or the storage array, or a combination. This article elaborates
                           on the effect that the SAN can have on Oracle’s performance with an emphasis on the EMC
                           CLARiiON® storage array. I will touch briefly on the Symmetrix since most of the concepts
                           and analysis in the article apply to the EMC Symmetrix® as well. The items below will be
                           addressed in detail via a case study.

                              1. Define and analyze sequential and random writes and how they impact Oracle’s
                                 
                                 performance design.
                              2. Define the components of Oracle architecture and their importance.
                              3. What are Redo Groups and why are they important to Oracle’s performance?
                              4. Detail each component’s behavior on the SAN and which disk layout best fits for
                                 
                                 optimal performance.
                              5. CLARiiON has a limited performance-tuning ability, it has a non-scalable cache,
                                 
                                 hence which architectural designs do you need to avoid?
                              6. How host-side analysis and hit can contribute to the performance of Oracle.
                              7.  witch-level specifications and alerts that can significantly contribute to the
                                 S
                                 performance of applications.
                              8.  he Case study! This details most of the issues administrators run into and suggests
                                 T
                                 the best resolutions.

                           Performance analysis can be approached in several ways. The key is to use the appropriate
                           performance tools to understand what you are analyzing. Please note that different approach-
                           es may lead to the same result.




24                         EMC Proven Professional: Knowledge Sharing 2009
Preventative Monitoring in the NAS Environment
Robert Wittig, EDS an HP Company




                     The EMC Celerra® actively monitors the environment for warnings and failures. As the NAS
                     environment expands, it becomes increasingly important to assess the current health of each
                     frame and verify that the current configuration fully utilizes redundant Celerra capabilities.
                     Verification, testing, and preventative monitoring are important aspects of maintaining the
                     Celerra’s reliability and availability.

                     Once configured, we must test and monitor the Celerra environment to verify that it will prop-
                     erly handle any faults and continue to provide the services for which it was designed. Testing
                     should not stop once the system is in production; it should continue at regular intervals
                     to ensure continuous functioning if a failure occurs, and to notify the appropriate support
                     personnel in the event of a failure. Finally, we should make non-intrusive checks at regular
                     intervals to verify that regular support activities have not adversely impacted any part of the
                     environment.

                     This article identifies methods and preventative measures to identify configuration issues,
                     verify redundant hardware, and ensure that configured notifications function properly. The
                     objective is to provide the Celerra storage administrator with a set of actions to check the
                     status of a running environment, verify redundant operations, validate the configuration, and
                     confirm that failure notifications are functioning properly.

                     We will examine four parts of the Celerra environment:

                        • Provisioned storage
                        • Redundant data mover configuration
                        • Warning and failure notifications
                        • Celerra Connect Home functionality

                     Finally, this article suggests methods that can be applied to gather these checks into a
                     single automatic process. This process can be regularly executed to provide evidence of the
                     validated configuration and identify potential problems before they impact the availability
                     of the services or of the entire Celerra.




                                                                                                                  25
Create a Comparative Analysis of an Oracle Database
                         Using Storage Architectures NAS and SAN
                         Sergio Hirata, Columbia Storage
                         Volnys Borges Bernal, Universidade de São Paulo/LSITec


                                                Today’s storage architecture market is divided among three large groups: direct-attached
                                                storage (DAS), network-attached storage (NAS), and storage area network (SAN). The stor-
                                                age system, among others, affects any application’s performance. The application’s overall
                                                performance is also affected by the storage network technology, the data storage commu-
                                                nication protocol, and the storage network components. Performance is measured using
                                                response time.

                                                Storage managers have difficulty aligning the application’s needs to the appropriate storage
                                                architecture. Many factors are involved in this decision, including the compatibility between
                                                the host bus adapter, switches, and storage systems, and the latency, cost, and management
“ ´m finishing my Science Computing
 I                                              tasks. Also, storage managers must consider the desired availability level for the application
 Master’s degree and I saw in Knowledge         and achieve the service level agreements (SLAs) negotiated with different departments.
 Sharing an opportunity to publish my work.
                                                Application simulators are an alternative to choose the best data storage technology or archi-
 I used to read a lot of works comparing
                                                tecture. The present work uses a simulator of an order entry application to generate the I/O
 Fibre Channel, iSCSI, and NAS using file       operations at an Oracle database installed on a SAN Fibre Channel and SAN iSCSI and NAS
 system benchmark tools, but a real ap-         with NFS architectures. It´s expected that the results will indicate whether an Oracle database
 plication has different behavior than a file   needs a Fibre Channel infrastructure or an iSCSI pipe has enough throughput to support it.
 system benchmark tool. My idea is to open
                                                This article is a guide to choosing the most accurate storage architecture for an Oracle
 a discussion about a price/performance
                                                application.
 relation for the DBMS-based application in
 some customer scenarios.”
             Sergio Hirata, Columbia Storage




26                                              EMC Proven Professional: Knowledge Sharing 2009
Custom Documentum Application Code Review
Christopher Harper, EMC Corporation




                     An EMC Documentum® consultant typically is the last point of contact when things have gone
                     wrong. Firefighting is the term given for this type of corrective work.

                     These assignments are caused by solutions that are developed by someone with limited
                     knowledge of our systems. This lack of knowledge causes issues both in the design of the
                     application and the way it is implemented. This daunting task typically presents itself as
                     heaps of documentation, one or more DFC/WDK projects containing source code, and a
                     time-boxed schedule that prevents a full review of documentation and code.

                     How should we approach reviewing code written by a third party who doesn’t necessarily
                     conform to the standards you are accustomed to?

                     This article provides basic principles on what to look for and explains some of the common
                     ways that our systems are misused leading to poor performance. I will provide the technical
                     rationale for each instance where we discuss why or why not to use a particular approach.
                     Also, we will discuss corrective measures for each encountered problem. I will present the
                     technical solutions for all of the cases we discuss. The cases are ‘real’ and have been
                     encountered “in the wild.”




                                                                                                                  27
Business Continuity Planning for Any Organization
     Smartha Guha Thakurta, EMC Corporation




                         This article introduces the methodologies to develop a company’s information survival
                         strategy. The goal is to analyze the organization’s critical information assets, do a risk-
                         mitigation analysis and data recovery planning encompassing change management.

                         The overall objective of a business continuity plan is that “in this demanding market, a
                         proactive approach aimed at assuring continuity of business processes and applications
                         amid major and minor disruptions is absolutely essential.”

                         The broad scope of the article includes:
                            • An introduction to business continuity planning
                            • Business continuity planning objectives
                            • Defining disaster and its types with different points of view
                            • Global best practices
                            • Benchmark case study of implementing BCP for an organization
                            • Methodology, barriers, and challenges
                            • Change management and emergency decision making
                            • Recommendations and conclusions

                         After reading this article, you will understand:
                            • The importance of business continuity planning
                            • The benefits and cost savings to stakeholders
                            • The roadmap/project plan developed for the organization
                            • Business process mapping and re-engineering for continuity of operations

                         Methodology and plan of work:
                            • Experiences from professional life
                            • Benchmarking with industry best practices
                            • Research data from global experts
                            • Review with the mentor at regular basis
                            • Findings and knowledge gathering from the field and the organization




28                       EMC Proven Professional: Knowledge Sharing 2009
Data Migration Strategy (SRDF via “Swing Frame”)
Sejal Joshi, A Large Telecommunications Company
Ken Guest, A Large Telecommunications Company




                     Increasing data center power and cooling requirements impact IT infrastructures’ scalability.
                     Storage consolidation provides relief for power and cooling and also reduces total cost of
                     ownership (TCO). Simplifying storage infrastructures and ease of management are the two
                     reasons that businesses use storage consolidation. Businesses have had to scale their stor-
                     age infrastructures to accommodate capacity, performance, and high-availability require-
                     ments due to massive data growth.

                     This article provides guidelines for using storage-based replication (EMC SRDF®) to migrate/
                     consolidate data from multiple storage arrays to just a few. It explains how to migrate data
                     using SRDF from (5670) to (5772) code using a swing frame method (EMC Symmetrix®
                     DMX™-2) running (5671) code. This migration also involved multiple Oracle databases, so
                     maintaining data consistency was critical.

                     We were able to accomplish this task in a very short amount of time. There are advantages
                     and disadvantages of using storage-based or host-based migration methods. The article
                     discusses these and provides guidelines for migrating data from DMX-2 and DMX-3 arrays to
                     DMX-4 using SRDF.




                                                                                                                 29
Data Storage Performance—Equating Supply
                         and Demand
                         Lalit Mohan, EMC Corporation



                                                Individual components, including storage, contribute to the cumulative outcome of
                                                performance. When the storage processing duration is proportionately long, “demand” is
                                                the workload generated by host computer systems, and “supply” is the processing service
                                                provided by the data storage system. The “quality of performance” experienced by the
                                                business relies on how well supply meets demand.

                                                We must match projected demand with capability to supply for selecting and designing
                                                data storage components. The resulting solution would operate at an optimum level, where
                                                demand equals supply. In this article, we apply the demand-supply analogy to build a
                                                universal framework using data storage domain performance characteristics as proxies
“ decided on a topic based on the direct
 I                                              representing demand and supply.
 financial and operational benefit to custom-
                                                This will be done in light of several popular information technology infrastructures, for
 ers and to IT services providers. I wanted
                                                example, messaging, enterprise resource planning, and relational database applications
 to find a way to engage customers more
                                                in an open systems environment, and mainframe host applications in a proprietary
 closely in the current climate of tight IT     environment.
 budgets by trying to get more return on
 investment.”                                   Among the topics discussed are:

                                                  • Relevant terms and definitions
 “ am delighted to see my article
  I                                               • Characteristics of “demand” placed on data storage components
  published! It’s akin to a mother                • “Supply” capability of the data storage component
  looking at her newborn!”                        • Combining demand and supply into the working framework
                                                  • Options for improving performance capability
                Lalit Mohan, EMC Corporation
                                                  • Case scenarios to illustrate key points
                                                  • Recommendations in conclusion
                                                  • Assumptions, impact, and remedy
                                                  • Limitations and improvements
                                                This article helps you better plan and design optimum data storage infrastructures. It helps
                                                you support centralization of business information assets into efficient shared service
                                                centers, a necessity in the current financial climate. This aggregation may enhance the value
                                                of information to management, improving return on investment.




30                                              EMC Proven Professional: Knowledge Sharing 2009
Integrating Linux and Linux-based Storage
                         Management Software with RAID System-
                         Based Replication
                         Diedrich Ehlerding, Fujitsu Technology Solutions

                                                 All major database and ERP software vendors release their products on Linux. As with other
                                                 operating systems, we must replicate using RAID array functionality to meet the demands for
                                                 short backup windows, fast restore processes, and fast system copy processes. The legacy
                                                 device names that are traditionally used in Linux without any storage management software
                                                 are inappropriate for enterprise-class configurations. The main problem is that these name
                                                 spaces are not persistent over server reboots. They cannot guarantee that the system will find
                                                 its data at the same device node which it saw before the reboot.

                                                 This article discusses various naming spaces within Linux—legacy names, device mapper
                                                 names, IO multipathing software names, volume management layers, and file system layers.
“ wrote this article because I got involved
 I                                               All these layers create their own naming spaces. With RAID system-based replication, we
 in a project that needed solutions. I wanted    must take care to have the proper name for the replica; in a shared storage configuration,
 to contribute some kind of an article           we have to provide an identical name on all cluster nodes.

 which will hopefully be useful for the EMC
                                                 The article reviews naming schemes with respect to persistence and replication issues.
 Proven™ Professional community and
 anyone else who might read it.”                 The article discusses software layers:

                           Diedrich Ehlerding,
                                                   • Linux native layers (legacy sd names, device mapper names)
                 Fujitsu Technology Solutions
                                                   • Multipathing drivers: EMC PowerPath® names and Linux native multipath names
                                                   • lvm2 as an example of a volume manager
                                                   • File system issues (labelled file systems, file system uuids)

                                                 And replication or shared storage usage scenarios for:

                                                   • Local cluster
                                                   • Stretched cluster/disaster recovery configurations
                                                   • Off-host backup
                                                   • System copy




                                                                                                                                             31
Simplifying/Demystifying EMC’s TimeFinder
     Integration with Oracle Flashback
     Robert Mosco Jr., EMC Corporation



                           Integrating EMC TimeFinder® business continuity application with Oracle can be a somewhat
                           tricky endeavor. This article describes Oracle’s Flashback and EMC TimeFinder technologies
                           and how the two applications can help end users recover data.

                           Oracle Flashback and EMC TimeFinder are two separate technology applications. Under-
                           standing them, and then describing their integration for the purpose of recovering data, is
                           the main goal of this article. I use diagrams and commands to show how both technologies
                           can recover data. Once you have an understanding of each technology, the article progresses
                           to an integration phase showing how the two applications can be used to develop a “repair”
                           and/or a “recovery” plan.

                           Discussions include point-in-time recovery, Flashback rewind, and recovery time objectives.
                           The article presents the following:

                             • Enabling and disabling Oracle Flashback
                             • Setting up a TimeFinder Oracle business continuity (BC) environment
                             • Dropping and/or deleting data (to simulate a data corruption situation)
                             • Recovering or flashing back to a previous point in time
                             • Developing a recovery or a get-well plan

                           All of these topics include diagrams and commands with simple explanations to help you
                           understand the power of both technologies.




32                         EMC Proven Professional: Knowledge Sharing 2009
Service-Oriented Architecture (SOA) and
Enterprise Architecture (EA)
Charanya Hariharan, Pennsylvania State University
Dr. Brian Cameron, Pennsylvania State University


                      Most companies are re-evaluating the way they purchase, deploy, manage, and use business
                      applications due to challenging market conditions, competitive pressures, and new tech-
                      nologies. Software buyers want applications that leverage existing investments; customers
                      demand solutions that provide quantifiable performance improvement.

                      In response, companies must evolve into agile enterprises that can rapidly change direction.
                      Yet their structures, processes, and systems are often inflexible, rendering them incapable of
                      rapid change. Adding hardware, software, packages, staff, or outsourcing are not solutions.
                      This is not a computer problem, it is a business problem.

                      To address this growing gap between IT and business, companies are adopting an end-to-end
                      enterprise architecture approach to re-align IT development with business objectives. EA is a
                      framework that covers all the dimensions of IT architecture for the enterprise; SOA provides
                      an architectural strategy that uses the concept of “services” as the underlining business-IT
                      alignment entity.

                      These forces drive the IT industry to deliver breakthrough technologies, many at the founda-
                      tion layer. SOAs, specifically, are at the cusp of change. This article focuses on the relation-
                      ship between EA and SOA and the resulting impact on business. These are the key research
                      questions in this research:

                         • Are there any business impacts to marrying EA and SOA?
                         • How do organizations fit SOA with EA?
                         • Is it better to adopt either SOA or EA, and not both?




                                                                                                                     33
SRDF/Star Software Uses and Best Practices
     Bill Chilton, EMC Corporation




                           Disaster recovery is becoming more critical as new laws are being passed to protect data,
                           and legislation mandates extended data-retention policies. Many companies are building
                           redundant data centers to avoid potential losses. The largest financial institutions are build-
                           ing three data centers, two located in close proximity with the other in a different region of
                           the country or in a different country altogether. These companies are managing three data
                           centers and keeping all the information consistent by deploying EMC SRDF®/Star software.

                           SRDF/Star is data-replication software that uses synchronous and asynchronous data trans-
                           fer to maintain consistency in multiple sites. The intent is to provide redundancy so that if
                           one of the data centers experiences a disaster, the other sites can continue to replicate data
                           and take over processing immediately. Star is exceptional as a disaster recovery software
                           program, but what else can you realize with this software and what are the best ways to
                           deploy it?

                           The documentation on SRDF/Star explains how the software works and how to install it, but
                           does not discuss best practices. This article seeks to bridge the gap between installation and
                           deployment by reviewing:

                              • Building a test Star
                              • Load balancing applications across data centers
                              • Eliminating downtime while working on servers
                              • Migrating data while staying consistent
                              • Switching between concurrent and cascading, and back again
                              • Best practices and troubleshooting hints




34                         EMC Proven Professional: Knowledge Sharing 2009
Using EMC ControlCenter File Level
Reporting for CIFS Shares
Chad DeMatteis, EMC Corporation
Michael Horvath, Fifth Third Bancorp


                      It can be a daunting task to gather file and folder statistics and properties from a NAS CIFS
                      share with deep directory trees. It is especially difficult when you’re using Microsoft Windows
                      native tools that may have poor enumeration performance. These activities consume a great
                      deal of time in an environment with tens of thousands of folders and millions of files.

                      This article discusses how EMC ControlCenter® Network File System Assisted Discovery
                      feature, introduced in v6.0, can be used to provide EMC Celerra® CIFS administrators with
                      file- and folder-level reporting, covering UNC FLR configuration considerations and lessons
                      learned during an EMC ControlCenter deployment. It provides practical examples of how you
                      can use CIFS FLR reports to quickly determine file age and type distribution, top storage users,
                      and utilization trending. These reports provide administrators with information to maximize
                      storage utilization and address CIFS storage consumption issues before they impact end users.

                      The article addresses the following topics:

                         •  onsiderations and lessons learned during assisted discovery of network file system
                           C
                           in an EMC ControlCenter such as domain ID and host agent selection
                         •  teps to configure and schedule data collection policies for network file systems tak-
                           S
                           ing into account collection criteria and CIFS folder and file counts
                         •  erformance considerations for CIFS data collection, providing examples of perfor-
                           P
                           mance statistics from the Celerra and the host agent server during CIFS scans
                         •  xamples of how EMC StorageScope™ file-level CIFS share reports can be used to
                           E
                           show aged and dormant CIFS files for archiving, file type distribution for reclamation,
                           and top CIFS storage users




                                                                                                                     35
Cloud Computing Services—A New Approach
     to Naming Conventions
     Laurence A. Huetteman, Technology Business Consultant



                          It has become increasingly difficult to have meaningful discussions about cloud computing
                          without a common language. You will see every inconsistency in naming conventions for
                          cloud technology when searching the topic on the Web; this inconsistency is also present
                          during consulting or business conversations.

                          Wikipedia defines cloud computing by using a six-layer stack of components with terms like
                          client, application, services, platform, etc., with the word “cloud” preceding each component.
                          Others refer to everything as a service, while others try to map SOA, utility computing, and
                          grid to cloud computing services. Even EMC’s suite of cloud computing offerings, while
                          technically impressive, seems to be a loosely coupled group of point solutions with no real
                          structure or clear naming conventions (Hulk/Maui evolved into Atmos™, Mozy™, Pi, etc.)
                          that are referred to generically as cloud computing.

                          Vendors, partners, and customers spend valuable cycles deciding which model to follow
                          in their discussions, or worse, inventing their own. My article simplifies this process and
                          applies logic to inconsistent naming conventions by proposing a new naming convention
                          for cloud computing service offerings. It is easily understood and applied across the broad
                          spectrum of services. It is intuitive, so it can be easily adopted, and based on a logical
                          model. If successful, this model will be flexible enough to accommodate the anticipated
                          growth of this evolving field of technology.

                          One consistent theme in all cloud computing discussions is the concept of tiering or layers
                          of services. The thought here is to use an existing scientific classification and to map the
                          layers to current and potentially future cloud computing components or services. One logical
                          choice is to leverage the familiar and widely accepted term, cloud, but map the model to
                          the common atmospheric cloud terminology. This article presents such a model to help you
                          effectively engage with other IT professionals.




36                        EMC Proven Professional: Knowledge Sharing 2009
Leveraging Cloud Computing for Optimized
                         Storage Management
                         Mohammed Hashim, Wipro Technologies
                         Rejaneesh Sasidharan, Wipro Technologies


“ MC’s Knowledge Sharing program is
 E                                                Cloud computing refers to spreading IT computing resources across Internet cloud boundar-
 becoming a new torch bearer to spread            ies and offering selective access through consolidated service providers located at strategi-
 technical awareness among global profes-         cally placed data centers. Generally, users pay for computing capacity on-demand and are
                                                  not concerned with the essential technologies or challenges used to achieve the increased
 sionals. This is an ideal platform where
                                                  and diverse storage scalability, server, and other resource capacity and extensibility.
 technologists from diverse backgrounds
 contribute tremendously toward widening          This article focuses on cloud computing, cloud models, storage, solutions, and comparing
 their technical spheres. Besides, this initia-   the different setups. It also describes features of storage optimization, security, leveraging
 tive exposes the various technical/non-          the current IT infrastructure, and the advantages and disadvantages of the model.

 technical aspects of newer technologies
                                                  The article presents the following:
 and product advancements in a concise
 and lucid manner.”                                  1. Overview of SOA, SaaS, distributed, grid, and cloud computing
                                                     2. Cloud architecture and applying cloud computing to storage
    Mohammed Hashim, Wipro Technologies
                                                     3. Cloud models and outlining the cloud storage solution
                                                     4. Managing solutions over storage infrastructure with optimal performance
                                                     5. Security in the clouds and comparing cloud-based services
“ he knowledge that we acquire today has a
 T                                                   6. Advantages and risks of cloud computing
 value exactly balanced to our talent to deal        7. Potential future of the cloud
 with it. Tomorrow, when we know more,
                                                  Many would embrace the ability to immediately increase capacity or add capabilities without
 we recall that part of knowledge and use         investing in new infrastructure, training new personnel or licensing new software. This article
 it better; the EMC Knowledge Sharing pro-        is helpful for any engineer who is involved with storage design and management.
 gram is a magnificent invention which has
 given me an abundance of global technical
 astuteness.”
  Rejaneesh Sasidharan, Wipro Technologies




                                                                                                                                                   37
Archiving Cries for a Holistic Architecture
     Paul Kingston, Solutions Architect
     EMC Corporation, United States




38                          EMC Proven Professional: Knowledge Sharing 2009
Information is your most valuable asset. EMC knows how to make
                                                                                  that asset pay dividends—through integrated hardware, software,
                                                                                  and services. We’ve been doing it for some of the greatest companies
                                                                                  around the globe for almost 30 years—and we can do it for you.

                                                                                  Our reputation for excellence doesn’t end there. Our world-class
                                                                                  education is offered in every corner of the world; and EMC Proven
                                                                                  Professional certification is the leading storage and information
                                                                                  management certification program in the industry. It aligns our
                                                                                  award-winning training with exams, letting you choose a certification
                                                                                  in a variety of areas by role or interest.

                                                                                  Want to learn more? Visit us on the web at http://education.EMC.com.




                                                                                        Contact Us
                                                                                        Online: http://education.EMC.com
                                                                                        E-mail: EdServices@EMC.com
                                                                                        Phone: 1-888-EMC-TRNG (888-362-8764)
                                                                                        International:
                                                                                        EMEA_Education@EMC.com
                                                                                        +44 208 758 6080 (UK)
                                                                                        +49 6196 4728 666 (Germany)
                                                                                        APEducation@EMC.com
                                                                                        +61 3 9212 6859 (ANZ)
                                                                                        +65 6333 6200 (South Asia)
                                                                                        Japan_Education@EMC.com
                                                                                        +81 3 3345 5900 (Japan)
                                                                                        Korea_Education@EMC.com
                                                                                        +82 22125 7503




EMC2, EMC, EMC ControlCenter, EMC Proven, Atmos, Avamar, Celerra, CLARiiON, Documentum, MirrorView, Mozy, NetWorker, PowerPath, SnapSure, SnapView, SRDF, StorageScope, Symmetrix, Symmetrix DMX, TimeFinder, and
where information lives are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. © Copyright 2009
EMC Corporation. All rights reserved. Published in the USA. 05/09 Brochure H2771.5



                                                                                                                                                                                                                              39

Contenu connexe

En vedette

Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
White Paper: DB2 and FAST VP Testing and Best Practices
White Paper: DB2 and FAST VP Testing and Best Practices   White Paper: DB2 and FAST VP Testing and Best Practices
White Paper: DB2 and FAST VP Testing and Best Practices EMC
 
Stomp presentation v1.5.1
Stomp presentation v1.5.1Stomp presentation v1.5.1
Stomp presentation v1.5.1Patrick Cannon
 
Visibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized EnterpriseVisibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized EnterpriseEMC
 
01 monopolistic comp
01 monopolistic comp01 monopolistic comp
01 monopolistic compTravis Klein
 
Econ questions from students
Econ questions from studentsEcon questions from students
Econ questions from studentsTravis Klein
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Fashion & tecnologia
Fashion & tecnologiaFashion & tecnologia
Fashion & tecnologiaSara M
 
Public goods Macro 2014
Public goods Macro 2014Public goods Macro 2014
Public goods Macro 2014Travis Klein
 
Copyright presentation
Copyright presentationCopyright presentation
Copyright presentationloousmith
 
Insaat kursu-catalca
Insaat kursu-catalcaInsaat kursu-catalca
Insaat kursu-catalcasersld54
 
система профориентации и основные её направления
система профориентации и основные её направлениясистема профориентации и основные её направления
система профориентации и основные её направленияТатьяна Глинская
 
Private cloud day session 4 automating and delivering services in your privat...
Private cloud day session 4 automating and delivering services in your privat...Private cloud day session 4 automating and delivering services in your privat...
Private cloud day session 4 automating and delivering services in your privat...Microsoft TechNet - Belgium and Luxembourg
 
A Digital Eurovision for European Union
A Digital Eurovision for European UnionA Digital Eurovision for European Union
A Digital Eurovision for European UnionRene Summer
 
Insaat kursu-tuzla
Insaat kursu-tuzlaInsaat kursu-tuzla
Insaat kursu-tuzlasersld54
 
Insaat kursu-arnavutkoy
Insaat kursu-arnavutkoyInsaat kursu-arnavutkoy
Insaat kursu-arnavutkoysersld54
 
Insaat kursu-mersin
Insaat kursu-mersinInsaat kursu-mersin
Insaat kursu-mersinsersld54
 

En vedette (18)

Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
White Paper: DB2 and FAST VP Testing and Best Practices
White Paper: DB2 and FAST VP Testing and Best Practices   White Paper: DB2 and FAST VP Testing and Best Practices
White Paper: DB2 and FAST VP Testing and Best Practices
 
Stomp presentation v1.5.1
Stomp presentation v1.5.1Stomp presentation v1.5.1
Stomp presentation v1.5.1
 
Visibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized EnterpriseVisibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized Enterprise
 
01 monopolistic comp
01 monopolistic comp01 monopolistic comp
01 monopolistic comp
 
Econ questions from students
Econ questions from studentsEcon questions from students
Econ questions from students
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Fashion & tecnologia
Fashion & tecnologiaFashion & tecnologia
Fashion & tecnologia
 
Public goods Macro 2014
Public goods Macro 2014Public goods Macro 2014
Public goods Macro 2014
 
Copyright presentation
Copyright presentationCopyright presentation
Copyright presentation
 
Sunsilk gog
Sunsilk gogSunsilk gog
Sunsilk gog
 
Insaat kursu-catalca
Insaat kursu-catalcaInsaat kursu-catalca
Insaat kursu-catalca
 
система профориентации и основные её направления
система профориентации и основные её направлениясистема профориентации и основные её направления
система профориентации и основные её направления
 
Private cloud day session 4 automating and delivering services in your privat...
Private cloud day session 4 automating and delivering services in your privat...Private cloud day session 4 automating and delivering services in your privat...
Private cloud day session 4 automating and delivering services in your privat...
 
A Digital Eurovision for European Union
A Digital Eurovision for European UnionA Digital Eurovision for European Union
A Digital Eurovision for European Union
 
Insaat kursu-tuzla
Insaat kursu-tuzlaInsaat kursu-tuzla
Insaat kursu-tuzla
 
Insaat kursu-arnavutkoy
Insaat kursu-arnavutkoyInsaat kursu-arnavutkoy
Insaat kursu-arnavutkoy
 
Insaat kursu-mersin
Insaat kursu-mersinInsaat kursu-mersin
Insaat kursu-mersin
 

Similaire à EMC Proven Professional Knowledge Sharing 2009 Book of Abstracts

EMC Proven Professional Knowledge Sharing 2007 Book of Abstracts
EMC Proven Professional Knowledge Sharing 2007 Book of AbstractsEMC Proven Professional Knowledge Sharing 2007 Book of Abstracts
EMC Proven Professional Knowledge Sharing 2007 Book of AbstractsEMC
 
EMC IT Redefined
EMC IT RedefinedEMC IT Redefined
EMC IT RedefinedEMC
 
White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...
White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...
White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...EMC
 
H10986 emc its-oracle-br-wp
H10986 emc its-oracle-br-wpH10986 emc its-oracle-br-wp
H10986 emc its-oracle-br-wpsmdsamee384
 
White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ
White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ   White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ
White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ EMC
 
Sun blackboardwp10 1_07
Sun blackboardwp10 1_07Sun blackboardwp10 1_07
Sun blackboardwp10 1_07Steve Feldman
 
Deploying customizations across microsoft dynamics ax 2012 environments ax2012
Deploying customizations across microsoft dynamics ax 2012 environments ax2012Deploying customizations across microsoft dynamics ax 2012 environments ax2012
Deploying customizations across microsoft dynamics ax 2012 environments ax2012Prathamesh Joshi
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guideArvind Varade
 
EMC IT's Journey to Cloud : VIRTUAL DESKTOP
EMC IT's Journey to Cloud : VIRTUAL DESKTOPEMC IT's Journey to Cloud : VIRTUAL DESKTOP
EMC IT's Journey to Cloud : VIRTUAL DESKTOPEMC
 
White Paper: Object-Storage-as-a-Service and Value-Added Services — EMC Atmos...
White Paper: Object-Storage-as-a-Service and Value-Added Services — EMC Atmos...White Paper: Object-Storage-as-a-Service and Value-Added Services — EMC Atmos...
White Paper: Object-Storage-as-a-Service and Value-Added Services — EMC Atmos...EMC
 
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applian...
 White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applian... White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applian...
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applian...EMC
 
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMS
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMSEMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMS
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMSEMC
 
Business and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXBusiness and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXAngel Villar Garea
 
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Błażej Matusik
 
Business Continuity and Disaster Recovery for Oracle11g Enabled by EMC Symmet...
Business Continuity and Disaster Recovery for Oracle11g Enabled by EMC Symmet...Business Continuity and Disaster Recovery for Oracle11g Enabled by EMC Symmet...
Business Continuity and Disaster Recovery for Oracle11g Enabled by EMC Symmet...EMC
 
Rapport eucalyptus cloud computing
Rapport eucalyptus cloud computingRapport eucalyptus cloud computing
Rapport eucalyptus cloud computingBilal ZIANE
 
Rapport eucalyptus cloud computing
Rapport eucalyptus cloud computingRapport eucalyptus cloud computing
Rapport eucalyptus cloud computingBilal ZIANE
 
Mikel berdufi university_of_camerino_thesis
Mikel berdufi university_of_camerino_thesisMikel berdufi university_of_camerino_thesis
Mikel berdufi university_of_camerino_thesisMikel Berdufi
 
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...webhostingguy
 
Dell Data Migration A Technical White Paper
Dell Data Migration  A Technical White PaperDell Data Migration  A Technical White Paper
Dell Data Migration A Technical White Papernomanc
 

Similaire à EMC Proven Professional Knowledge Sharing 2009 Book of Abstracts (20)

EMC Proven Professional Knowledge Sharing 2007 Book of Abstracts
EMC Proven Professional Knowledge Sharing 2007 Book of AbstractsEMC Proven Professional Knowledge Sharing 2007 Book of Abstracts
EMC Proven Professional Knowledge Sharing 2007 Book of Abstracts
 
EMC IT Redefined
EMC IT RedefinedEMC IT Redefined
EMC IT Redefined
 
White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...
White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...
White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...
 
H10986 emc its-oracle-br-wp
H10986 emc its-oracle-br-wpH10986 emc its-oracle-br-wp
H10986 emc its-oracle-br-wp
 
White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ
White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ   White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ
White Paper: Best Practices for Data Replication with EMC Isilon SyncIQ
 
Sun blackboardwp10 1_07
Sun blackboardwp10 1_07Sun blackboardwp10 1_07
Sun blackboardwp10 1_07
 
Deploying customizations across microsoft dynamics ax 2012 environments ax2012
Deploying customizations across microsoft dynamics ax 2012 environments ax2012Deploying customizations across microsoft dynamics ax 2012 environments ax2012
Deploying customizations across microsoft dynamics ax 2012 environments ax2012
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guide
 
EMC IT's Journey to Cloud : VIRTUAL DESKTOP
EMC IT's Journey to Cloud : VIRTUAL DESKTOPEMC IT's Journey to Cloud : VIRTUAL DESKTOP
EMC IT's Journey to Cloud : VIRTUAL DESKTOP
 
White Paper: Object-Storage-as-a-Service and Value-Added Services — EMC Atmos...
White Paper: Object-Storage-as-a-Service and Value-Added Services — EMC Atmos...White Paper: Object-Storage-as-a-Service and Value-Added Services — EMC Atmos...
White Paper: Object-Storage-as-a-Service and Value-Added Services — EMC Atmos...
 
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applian...
 White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applian... White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applian...
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applian...
 
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMS
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMSEMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMS
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMS
 
Business and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXBusiness and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSX
 
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...
 
Business Continuity and Disaster Recovery for Oracle11g Enabled by EMC Symmet...
Business Continuity and Disaster Recovery for Oracle11g Enabled by EMC Symmet...Business Continuity and Disaster Recovery for Oracle11g Enabled by EMC Symmet...
Business Continuity and Disaster Recovery for Oracle11g Enabled by EMC Symmet...
 
Rapport eucalyptus cloud computing
Rapport eucalyptus cloud computingRapport eucalyptus cloud computing
Rapport eucalyptus cloud computing
 
Rapport eucalyptus cloud computing
Rapport eucalyptus cloud computingRapport eucalyptus cloud computing
Rapport eucalyptus cloud computing
 
Mikel berdufi university_of_camerino_thesis
Mikel berdufi university_of_camerino_thesisMikel berdufi university_of_camerino_thesis
Mikel berdufi university_of_camerino_thesis
 
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
 
Dell Data Migration A Technical White Paper
Dell Data Migration  A Technical White PaperDell Data Migration  A Technical White Paper
Dell Data Migration A Technical White Paper
 

Plus de EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS BreachEMC
 
EMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data StorageEMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data StorageEMC
 

Plus de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
 
EMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data StorageEMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data Storage
 

Dernier

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Dernier (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

EMC Proven Professional Knowledge Sharing 2009 Book of Abstracts

  • 1. Knowledge Sharing 2009 Book of Abstracts An EMC Proven Professional Publication
  • 2.
  • 3. Knowledge Sharing Winners 2008 Awards: (left to right) Diedrich Ehlerding, Lalit Mohan, Thank You! Brian Russell, and Paul Brant with Alok Shrivastava, Senior Director, EMC Education For the third consecutive year, we are pleased to congratulate our EMC® Services; Frank Hauck, Executive Vice President, Global Marketing and Customer Proven™ Professional Knowledge Sharing authors. This year’s Book of Quality; and Tom Clancy, Vice President EMC Education Services. Abstracts demonstrates how the Knowledge Sharing program has grown into a powerful forum for sharing ideas among information storage professionals. In 2009, Knowledge Sharing articles were downloaded more than 104,000 times, underscoring the power of the knowledge sharing concept. You may view the 2009 articles and the monthly release of our 2009 Knowledge Sharing articles at http://education.emc.com/knowledgesharing. Our Knowledge Sharing authors also play a leading role in our new EMC Proven Professional community. It’s a great place to collaborate with other Proven Professionals, ask questions about the program, or share your experiences. Visit the community at http://education.emc.com/provencommunity. The EMC Proven Professional program had another great year—we recently awarded our 39,000th certification. Also, we recently announced publication of “Information Storage and Management,” the first technology book from EMC. It will be a valuable addition to any IT professional’s reference library. Our continuing success is built on the foundation of committed professionals who participate, contribute, and share. We thank each of you who participated in the 2009 Knowledge Sharing competition. Tom Clancy Alok Shrivastava Vice President Senior Director EMC Education Services EMC Education Services 3
  • 4. Table of Contents First-Place Knowledge Sharing Article. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 . Is Cloud Computing the Game Changer Your Company Needs in These Tough Times? Bruce Yellin, EMC Corporation Second-Place Knowledge Sharing Article. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Customized Tool for Automated Storage Provisioning Ken Guest, A Large Telecommunications Company Sejal Joshi, A Large Telecommunications Company Third-Place Knowledge Sharing Article. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Reclaiming SAN Storage—The Good, the Bad, and the Ugly Brian Dehn, EMC Corporation Best of Content Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Architecting an Enterprise-Wide Document Management Platform Jacob Willig, Documentum Consultant Best of Tiered Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Real-Life Application of Disaster Recovery Faisal Choudry, Magirus UK Ltd. Best of Backup and Recovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Best Practices for Implementing and Administering EMC NetWorker Anuj Sharma, Ace Data Devices Backup and Recovery A Load-Balancing Algorithm for Deploying Backup Media Servers. . . . . . . . . . . . . . . . 13 Krasimir Miloshev, EMC Corporation Backing Up Applications with NetWorker Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Aaron Kleinsmith, EMC Corporation DLm40xx Implementation and Upgrade Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Mike Smialek, EMC Corporation Implementing Deduplicated Oracle Backups with NetWorker Module for Oracle. . . . 16 Chris Mavromatis, EMC Corporation NDMP Localization/Internationalization Support for NetWorker . . . . . . . . . . . . . . . . . 17 Jyothi Deranna, EMC Corporation Using Disks in Backup Environments and Virtual Tape Library (VTL) Implementation Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Emin Calikli, Gantek Technologies 4 EMC Proven Professional: Knowledge Sharing 2009
  • 5. Table of Contents (Continued) Business Process Enterprise Standards and Automation for Storage Integration and Installation at Microsoft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Aaron Baldie, EMC Corporation Significant Savings are Within Your Reach When You Understand the True Cost of Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Bruce Yellin, EMC Corporation The Efficient, Green Data Center. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Raza Syed, EMC Corporation Connectivity Best Practices for Deploying Celerra NAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Ron Nicholl, A Large IT Division CLARiiON and FCiP: A Practical Intercontinental DR and HA Solution. . . . . . . . . . . . . . 23 Jaison K. Jose, EMC Corporation Oracle Performance Hit | a SAN Analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Kofi Ampofo Boadi, JM Family, Inc. Preventative Monitoring in the NAS Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Robert Wittig, EDS, an HP Company Create a Comparative Analysis of an Oracle Database Using Storage Architectures NAS and SAN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Sergio Hirata, Columbia Storage Volnys Borges Bernal, Universidade de São Paulo/LSITec Content Management Custom Documentum Application Code Review. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Christopher Harper, EMC Corporation Tiered Storage Business Continuity Planning for Any Organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Smartha Guha Thakurta, EMC Corporation Data Migration Strategy (EMC SRDF via “Swing Frame”). . . . . . . . . . . . . . . . . . . . . . . . 29 Sejal Joshi, A Large Telecommunications Company Ken Guest, A Large Telecommunications Company Data Storage Performance—Equating Supply and Demand. . . . . . . . . . . . . . . . . . . . . . 30 Lalit Mohan, EMC Corporation Integrating Linux and Linux-based Storage Management Software with RAID System-based Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Diedrich Ehlerding, Fujitsu Technology Solutions 5
  • 6. Table of Contents (Continued) Simplifying/Demystifying EMC TimeFinder Integration with Oracle Flashback. . . . . 32 . Robert Mosco Jr., EMC Corporation Service-Oriented Architecture (SOA) and Enterprise Architecture (EA). . . . . . . . . . . . . 33 Charanya Hariharan, Pennsylvania State University Dr. Brian Cameron, Pennsylvania State University SRDF/Star Software Uses and Best Practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Bill Chilton, EMC Corporation Using EMC ControlCenter File Level Reporting for CIFS Shares . . . . . . . . . . . . . . . . . . 35 . Chad DeMatteis, EMC Corporation Michael Horvath, Fifth Third Bancorp Virtualization Cloud Computing Services—A New Approach to Naming Conventions. . . . . . . . . . . . . 36 Laurence A. Huetteman, Technology Business Consultant Leveraging Cloud Computing for Optimized Storage Management . . . . . . . . . . . . . . . 37 Mohammed Hashim, Wipro Technologies Rejaneesh Sasidharan, Wipro Technologies 6 EMC Proven Professional: Knowledge Sharing 2009
  • 7. Is Cloud Computing the Game Changer Your Company Needs in These Tough Times? Bruce Yellin, EMC Corporation There have been countless articles written about cloud computing; a Google search will return millions of hits. Your colleagues discuss it at lunch and vendors bring it up in their presentations. From the enterprise perspective, it could be the perfect storm of value propositions—cloud computing drives the cost of IT down, is available on demand, and is scaleable. Cloud computing could even become a new competitive edge for your company. Maturing at a rapid pace, it will be the next chapter in data processing. But is it ready for your company? Can the hype of cloud computing live up to its promise? I call cloud computing a “game changer” because it is a service, a platform and operating environment poised to transform the status-quo computing model. Advocates argue it will “ he emergence of cloud computing and its T revolutionize how information will be delivered. It is difficult to find a leading technology impact in these tough economic times are company that isn’t already delivering some type of cloud product or discussing their plans the crux of the Knowledge Sharing charter. for the cloud. Many of us already rely on Yahoo or Google for personal e-mail, upload photos on Flickr for others to browse, and use Facebook to stay in touch. But when you use these As a former computer science teacher, titles at work, are you met with open arms, or does company policy frown upon their use? expanding my awareness of new topics and guiding others is my mission—that is how Cloud computing allows the user to access an application without having to own it, install new concepts are shaped.” it on a computer, or maintain it. The cloud offers the freedom to access an application from anywhere a browser can run—desktop, laptop, intelligent phone, etc. It can increase a Bruce Yellin, EMC Corporation company’s processing and storage capacity, and provide services without taking up data center space. On a personal level, some cloud computing services are free. For the enterprise, pricing is subscription-based or pay-as-you-go, allowing a company to enhance existing service or provide new IT functionality without a major investment. This article examines what cloud computing is, total cost of ownership, privacy/security impacts, universal access concerns, and hybrid strategies. 7
  • 8. Customized Tool for Automated Storage Provisioning Ken Guest, A Large Telecommunications Company Sejal Joshi, A Large Telecommunications Company Homegrown tools for storage provisioning automation can improve efficiency and implement a common standard in a multi-vendor storage environment. This enables teams to work more efficiently and eliminates the need for expensive SRM tools that may not meet all business requirements. In the current economic environment, this is even more important as groups are being downsized and budgets cut while storage capacity and fiber switch ports increase at a breakneck speed. In 2009, we provisioned 6.0 PB of enterprise-class SAN-based storage, compared to 4.3 pro- visioned in 2007, a year-to-year increase of 140 percent. Our current environment is growing at a rate of ~100 TB per week. SRM tools do not scale to meet our requirements and service level agreements (SLAs) with this growth rate. Using our custom implementation, we can provision ~50 TB of storage across multiple frames in less than one hour and reduce overall re-work and human error. This includes design validation, LUN creation/masking, and zoning. This article discusses how to use vendor-provided CLI software to create/implement custom- ized provisioning tools. SRM-based provisioning tools are great for organizations with small storage footprints. However, they do not scale in larger and more diverse, enterprise-class, multi-data-center environments due to implementation costs and increased total cost of ownership (TCO). Instead, we can implement a customized provisioning solution with a small data center foot- print and very little additional cost to the company. This article discusses how to implement end-to-end storage provisioning automation using multi-vendor storage/switch platforms. The process includes a centralized ticketing system to track the storage request throughout its lifecycle. This enables the overall storage automation process. The workflow tool tracks approvals and design information, providing the feed to the automation scripts and informa- tion to the system administrator to build the file systems based on the design. Due to central automation, we can guarantee standards across multiple data centers/envi- ronments and easily create standard reports. 8 EMC Proven Professional: Knowledge Sharing 2009
  • 9. Reclaiming SAN Storage—The Good, the Bad, and the Ugly Brian Dehn, EMC Corporation “My bonus is based on saving $5M worth of storage.” “We are cutting the storage budget so you need to reuse capacity.” “We cannot purchase additional storage until we increase utilization.” Reclaiming storage capacity for reuse reduces IT capital expenditures, increases storage utilization, contributes to “green computing” initiatives, and can address each of the issues “ wrote this article because I realized that I above. Proper planning and execution of a storage reclamation effort is key to avoiding prob- lems and realizing maximum benefits. no material existed that would provide storage users with a best-practices meth- IT professionals, especially storage administrators, usually know how much storage is allo- odology for reclaiming storage.” cated and available for allocation. “Orphaned” storage, or capacity that appears to be used but is not, is more difficult to find. We must understand storage configuration states and “ he best thing about being a Knowl- T the storage configuration hierarchy to find this treasure trove of reclaimable storage. Most of the layers in the storage configuration hierarchy include potentially reclaimable capacity. edge Sharing author is the amount of The level of effort required to reclaim that capacity, however, may not be worth the return on knowledge I gained personally as I was investment, depending on where it exists. Identifying candidates for reclamation makes it researching and writing the article. I think even more challenging. the person who gained the most from writing this article was me.” This article provides a best-practices “blueprint” for a successful reclamation strategy. The following topics are discussed: Brian Dehn, EMC Corporation • Understanding the storage configuration hierarchy • Identifying capacity for potential reclamation • Determining whether the benefit is worth the cost • Using storage resource management tools to facilitate the effort This article will help you achieve storage reclamation objectives (the good), while reducing time and cost (the bad), and avoiding significant problems (the ugly). 9
  • 10. Architecting an Enterprise-Wide Document Management Platform Jacob Willig, Documentum Consultant This article presents best practices discovered while implementing EMC Documentum® within large organizations using a central-platform approach. Documentum is typically implemented as a dedicated host for document management and storage. The implementation is tailored to the specific set of functional requirements and does not necessarily consider future expan- sion into different functional areas across the organization. If the need arises, a new point solution is often implemented. It, too, is tailored to the new and existing requirements. This approach fulfills the short-term business need for functionality, but it becomes increas- “ keep learning as this is very much unex- I ingly more expensive to maintain and operate the growing number of point solutions. This plored territory. These are exciting times. minimizes the effectiveness of a content management solution as the overhead costs re-occur I never had an article posted in the past, over time. so the prospect of this article being posted Large organizations adopting an enterprise view of content management, and implementing makes me feel very proud. It would be document management as a strategic platform, are able to host document flows uniformly. great if many more people would become The support team can add a new document flow easily and efficiently as everything in the aware of the necessity of implementing platform is set up generically. This approach, though, will incur additional startup costs to document management in a platform-like enable future, controlled growth. architecture.” This article discusses several of the challenges I faced while implementing document manage- Jacob Willig, Documentum Consultant ment in a platform architecture. I will explain both the challenges and solutions. Topics include information management, object model, security, workflows, and functional, application and technical support. 10 EMC Proven Professional: Knowledge Sharing 2009
  • 11. Real-Life Application of Disaster Recovery Faisal Choudry, Magirus UK Ltd. EMC business continuity (BC) and disaster recovery (DR) offer a myriad of options to protect your data. Organizations sometimes implement them without a thorough analysis of how and when they would use the technologies to recover data if needed. Even if familiar with the technology, procedures can be so arduous that the organization has no chance of meeting their committed recovery point objective (RPO) and recovery time objective (RTO). “State-of- the-art” recovery technologies cannot help if no one knows how to use them. Organizations need procedures to document how to implement their recovery technologies. This is even more important if an external organization did the implementation. What ques- tions should you consider? • hen the implementation ends, can the customer grasp the complexities of the new W technologies and use them if needed? • Can we make these complex solutions easier, especially when organizations don’t have the “luxury” of appointing a full-time disaster recovery team? SMEs and technology professionals face these issues when proposing BC and DR solutions. This article uses a case scenario to examine these questions in relation to a recent real-life solution, one that I proposed and implemented. The solution included multiple sites, using EMC CLARiiON® systems (CX3-10 systems) at each site, EMC MirrorView™/Asynchronous, and EMC SnapView™. ESX™ Servers are the attached hosts, so we implemented Site Recov- ery Manager (SRM) using the recently released SRA adapter for MirrorView/A. The project was successful, but raised interesting afterthoughts, especially regarding end- users’ perceptions and technology expectations. In conclusion, this article will offer advice on how to address these issues. 11
  • 12. Best Practices for Implementing and Administering EMC NetWorker Anuj Sharma, Ace Data Devices EMC NetWorker® is the fastest performing backup application in the market. Integration with replication and snapshot technologies helps you meet the most aggressive RTO and RPO requirements and transform backup to disk or backup to tape in an off-host, off-hours process. It supports a broad set of operating systems, databases, applications, and topologies. EMC NetWorker’s compatibility with various operating systems, applications, and databases makes it successful in today’s competitive industry. However, it must be implemented properly to get the most out this wonderful product. There are some practices to keep in mind to make the backups and recovery more effective and beneficial for the organization. This article covers the various practices that I performed when implementing and administering EMC NetWorker. They include: • Implementing NetWorker on various operating systems • Making it foolproof in case of NetWorker server disaster • mplementing NetWorker in a bidirectional as well as unidirectional hardware I firewall, including various scenarios (i.e., when some of the clients are in DMZ) • Working with the NetWorker ports • Implementing NetWorker in a cluster • Integrating e-mail alerts with NetWorker • Implementing persistent binding through EMC NetWorker • Integrating EMC Avamar® for deduplication • Probe-based backups 12 EMC Proven Professional: Knowledge Sharing 2009
  • 13. A Load-Balancing Algorithm for Deploying Backup Media Servers Krasimir Miloshev, EMC Corporation Finding the best backup client’s distribution over designated media servers can be considered part of the general load-balancing problem. Our goal is to distribute the backup client’s data in the best possible way among newly designated media servers responsible for the backup read/write operations. This article suggests a load-balancing approach based on one criterion—the amount of data that must be backed up on each client. It begins by introducing the basic components of backup infrastructures: the master server, clients, media servers, and storage backup devices. It presents two approaches for deploying media servers and provides a structure for decision making. Next, we investigate a load-balancing schema where there are only 10 media backup clients and two media servers. We calculate capacity and learn a load-distribution algorithm. Finally, the article aligns the basic load-balancing algorithm to program implementation. In two easy steps, you’ll be able to implement the algorithm using C or Korn-shell. We can reduce the backup window by balancing the backup load among all the backup media servers. Even when data size is the only criteria we use, we can expect to achieve visible performance improvement and shorter backup windows. 13
  • 14. Backing Up Applications with NetWorker Modules Aaron Kleinsmith, EMC Corporation This article describes how to configure EMC NetWorker® to back up a database application. It includes NetWorker’s technical setup to help protect popular databases that relate to released NetWorker modules. Backup administrators who configure and monitor the online database backups through NetWorker benefit most from this article. The article discusses traditional database backup methodologies such as online (hot) back- ups, offline (cold) backups, and transaction log backups. The article describes the backup procedure to capture a consistent copy of an online database and transactions logs from the source disks using the application server resources that manage the primary copy of the database and data. It provides enough technical information to help a storage administrator who manages NetWorker verify and monitor a properly set-up client. This article discusses: • Overview and explanation of NetWorker modules • General concepts and planning applicable to all NetWorker modules • etWorker configuration settings applicable to all modules and specific settings N and considerations for each NetWorker module within the NetWorker software 14 EMC Proven Professional: Knowledge Sharing 2009
  • 15. DLm40xx Implementation and Upgrade Guide Mike Smialek, EMC Corporation Implementation of a data library for mainframe, DLm40xx series, requires coordination between multiple system and people resources. They include the mainframe tape library system, z/OS operating system software, NAS configuration and configuration of the DLm ACP, and VTE components. EMC Celerra® Replicator V2.0 is also required if replicating data to another DLm. This Implementation and Upgrade Guide walks through the implementation process to define the information necessary to configure each component. This guide is designed for solution architects, implementation specialists, maintenance and support services personnel, and storage administrators who want to understand how to implement or upgrade a DLm system. It presents necessary Linux commands and scripts to “ y idea for this article came from par- M allow a mainframe-centric person to do a DLm configuration. ticipating on project implementations. The DLm Implementation and Upgrade Guide addresses several key areas: Besides the opportunity to have the article published, writing it forces me to • DLm mainframe checklist to gather current customer tape information organize many implementation notes and • Input form to provide required IP addresses and phone numbers experiences into an orderly layout. Having • PC software and hardware needed to configure DLm others benefit from my experience helps • DLm40xx hardware installation requirements • /OS updates to tape catalog, HCD, SMS/ACS, MTL, OAM, and Esoterics z IT services organizations deliver projects • NAS configuration efficiently and provides customer TCE.” • Running DLm Linux scripts to define Tapelibs and NFS mount points Mike Smialek, EMC Corporation • Running SCRIPT80 to change permissions • Installing DLm Healthcheck script and mainframe reporting • DLm z/OS utilities • ESCON or FICON CHPID updates • est and acceptance procedures T • IP replication configuration • roubleshooting T 15
  • 16. Implementing Deduplicated Oracle Backups with NetWorker Module for Oracle Chris Mavromatis, EMC Corporation More and more customers are now evaluating the cost benefits of data deduplication. This is partly due to the explosive growth of software deduplication technology (such as EMC Avamar®). EMC NetWorker® Module for Oracle is a mature product, with thousands of customers, that offers a strong backup solution for an Oracle database. The first quarter of 2009 will be the first time that NetWorker Module for Oracle will have deduplication integration for Avamar. This feature empowers users to conduct Oracle deduplication backups and restores via the integrated use of a deduplication storage node (Avamar server). A deduplication backup can be a manual backup initiated within RMAN or a scheduled backup via the NetWorker Management Console scheduler framework. There are a number of differences and additional configuration items that we must consider when deploying NetWorker Module for Oracle 5.0 to perform deduplication backups. This article outlines installation, configuration, pitfalls, and best practices. It provides answers to questions that can help customers better embrace this paradigm shift in backup solutions. This article highlights these considerations and provides guidance for deployment. It is not intended to be a step-by-step guide, nor does it replace the Installation Guide or Release Notes. It does assume a level of knowledge using NetWorker, Avamar, Oracle, and NetWorker Module for Oracle. Sales, systems engineers, support personnel, and customers will benefit from learning how to deploy this solution. 16 EMC Proven Professional: Knowledge Sharing 2009
  • 17. NDMP Localization/Internationalization Support for NetWorker Jyothi Deranna, EMC Corporation Computer internationalization and localization are important because of the numerous differences that exist among countries, regions, and cultures with respect to language (not only distinct languages but also dialects and other differences within a single language for weights and measures, currency, date and time formats, and more). The EMC NetWorker® NDMP client-connection feature provides NAS with fast, flexible backup and restore of mission-critical data residing on filers. The Network Data Management Protocol (NDMP) is a TCP/IP-based protocol that specifies how network components communicate with one another to move data across the network for backup and recovery. NetWorker with NDMP client connections provides backup and recovery support for more than eight NAS hardware providers. With NetWorker 7.4, the NDMP client is responsible to back up and recover the non-ASCII data from the NAS filers. EMC NetWorker 7.4 is a full-fledged internationalization release; the product is I18N and L10N compatible. Many changes were made in the NDMP client-connection feature to handle non-ASCII characters. NAS vendors each have their own mechanisms to store the non-ASCII characters in their specific filers. NDMP is a single interface that helps NetWorker understand how each vendor is handling non-ASCII data. Using NDMP, NetWorker is able to back up filers’ data and store it without data corruption. This article explains how NetWorker backs up and recovers non-ASCII data residing in the NAS filers using the NDMP client-connection feature. It describes how to configure NAS filers for non-ASCII data backup/recovery and explains how the changes are done while configuring a NAS filer as an NDMP client. It offers guidelines to configure filers from different vendors and best practices and troubleshooting tips to avoid data corruption and increase performance. 17
  • 18. Using Disks in Backup Environments and Virtual Tape Library (VTL) Implementation Models Emin Calikli, Gantek Technologies Protecting data is vital for availability and business continuity. There are many data protection solutions in the IT market. However, they address recovery time objectives (RTO) and recovery point objectives (RPO). Recovery time represents the time it takes to restore the data; recovery point represents the “data currency” at the backup state. These two concepts are not indepen- dent and must be integrated based on company requirements. Many organizations are experiencing shrinking backup windows and increasing data loads. During a restore from tape, slower recovery operations result in longer production system downtime. Companies are seeking faster backup and recovery solutions. “ used current, real-world data I Disks could be a viable solution for meeting fast data recovery requirements. The service protection requirements and personal level agreement (SLA) depends on the application and the customer. It is often difficult to meet all SLAs with a single data protection solution. Backup vendors are trying to tailor experiences to write my article. Valuable their applications to use disks efficiently; this approach requires intelligent development data size is increasing day to day and processes. protection becomes more important and critical.” Virtual Tape Library (VTL) could help us reduce or eliminate the following problems: Emin Calikli, Gantek Technologies • Physical tape damage • Cost of tape drives • Highly utilized tape drive resources (VTL staging or post processing) • Backup windows • ecurity problems (backup encryption) S We have to know: • TL implementation methods V • Differences of disk usage between OLTP applications and backups • Impacts of block size on throughput and bandwidth 18 EMC Proven Professional: Knowledge Sharing 2009
  • 19. Enterprise Standards and Automation for Storage Integration and Installation at Microsoft Aaron Baldie, EMC Corporation Microsoft’s most challenging problem is how to keep tens of thousands of servers up to date with drivers and firmware in an environment that is spread across many global data centers. More and more, these data centers are subject to budget and staff cuts. Personnel are becoming less specialized, and in some cases, have no technical training at all other than the ability to power cycle equipment. The EMC account team has worked directly with Microsoft’s IT staff to overcome these challenges and provide standards for drivers, firmware, and complete automation packages that integrate with existing processes to allow for storage connectivity across the enterprise. This allows Microsoft IT staff to rapidly deploy EMC storage to any server globally and manage this storage with a limited, centralized IT staff. To accomplish this, the EMC Support Matrix is refreshed on a six-month cycle to provide a baseline of supported drivers, firmware, and applications, and their compatibility with the OS and hardware. A matrix is published to lock in the revisions so a deployment kit can be created once this standard is established. All drivers are then downloaded to a central location and rolled into an automation package that can be integrated into Microsoft’s own deployment process. Testing is performed for multiple scenarios across all currently supported OS versions for both upgrades from the existing standards and new deployments. Any issues found during this test process are triaged with Microsoft and fixed before the latest versions are released to gold. The local account team accomplishes all of these tasks and owns the project from start to finish. EMC and Microsoft’s strong alignment and rapid deployment of EMC hardware achieves one of the largest ratios of storage to administrator at about 1.5 PB per head count across 150 EMC CLARiiON® systems and 10 EMC Symmetrix® DMX™ systems. 19
  • 20. Significant Savings are Within Your Reach when You Understand the True Cost of Storage Bruce Yellin, EMC Corporation Do you find yourself struggling with your company’s insatiable craving for more storage? Will any of your storage suppliers’ claims of “faster, cheaper, and better” really save your company money? How about the stark reality that your dwindling IT budget is causing you sleepless nights? Has the time come to expand the outdated, state-of-the-art storage infrastructure you leased just three years ago? You may be asked to trim capital and operating storage expenses by hundreds of thousands of dollars, while simultaneously introducing innovation to your organization. This seemingly contradictory set of storage demands also impacts your internal service level agreements. Where do you begin? Which concepts will deliver significant short- and long-term savings? “ nowledge sharing is the basis by which K we all share our collective expertise to As a veteran of the storage industry, I have heard questions such as, “How much does a gigabyte cost?” or “I don’t have a lot of money to spend” countless times. Neither is the benefit others in IT. With cost often being right place to start when trying to determine the actual cost of storage, nor how to make your part of the storage equation, communicat- storage budget go farther. ing my technical training in terms of dollars and cents turned out to be both fun and I have also witnessed an explosion of data growth; some pundits claim the rate is as high educational.” as 60 percent per year. Whatever the rate, we will have to store more data tomorrow than yesterday. In addition, corporate policies and regulations require us to save that data for Bruce Yellin, EMC Corporation longer periods of time. That means storage, which translates into more floor space, more power, more staff, and more complexity. This article explores the challenges facing the IT storage manager and offers insight into navigating a course of action to provide budget relief, while offering better services to internal and external customers. It explores issues such as frame expansion and future-proof architectures, environmental impact, virtualization, deduplication, risk avoidance, stretch- ing the lifespan of existing equipment, cost-effective education, required negotiation and financial skills, cutting fat from a budget, and much more. 20 EMC Proven Professional: Knowledge Sharing 2009
  • 21. The Efficient, Green Data Center Raza Syed, EMC Corporation This article will help you build an efficient, green data center that will yield financial and environmental benefits. Data center power and cooling and virtualization are two key strategies to help you reap these benefits. We discuss power and cooling optimization, as well as virtualization and other related data center technologies that are required to develop and operate an efficient, green data center. This discussion occurs in the context of a virtualization-leveraged data center. Virtualization has been positioned as the core enabler for driving broader efficiencies. It includes server and storage procurement and utilization, information protection (backup and recovery), business continuity and disaster recovery (local and remote replication), infrastruc- ture management, and infrastructure consolidation and automation. This article provides you with a breadth of knowledge about the major data center functions that have a direct or indirect impact on operational and environmental efficiency. Our discussion is not limited to technology, but includes other relevant areas of a data center that are either impacted by or have an impact on the technology infrastructure and IT opera- tions. It identifies major areas of consideration as well as step-by-step guidance about how to implement power and cooling, virtualization, and other related technologies. Designs and architectural drawings for optimization are included. This article consists of three sections: • ntroduction focuses on financial and environmental impacts of inefficient data I centers and the case for building efficient and green data centers. • Considerations for Building Efficient, Green Data Centers focuses on high-level data center operating environments, IT processes, and technology considerations for data center efficiency. • Implementing an Efficient, Green Data Center focuses on implementation processes, steps, and technologies; and describes designs and architectural drawing in detail. 21
  • 22. Best Practices for Deploying Celerra NAS Ron Nicholl, A Large IT Division Deploying EMC Celerra® NAS involves many pieces of the IT infrastructure ranging from backend storage, to network topology, and beyond. Choosing a solid design can make the difference between mediocre performance and exceeding your customers’ expectations. NAS solutions are quickly becoming a viable alternative to mitigate the cost of a SAN-based storage solution. A Celerra NAS solution offers much of the same functionality traditionally seen on the storage array over IP, including replication, checkpoints, mirroring, and more. Applying best practices to your design will improve performance and reliability. This article includes: “ he process of creating my article helped T 1. How to lay out the backend storage devices cement and expand on my knowledge.” 2. ow to implement a network configuration that allows for greater flexibility and H Ron Nicholl reliability 3. Planning Microsoft Windows domain interaction 4. Best practices for backing up the Celerra environment 5. Monitoring the performance of the Celerra solution There are many components to a successful NAS design. The network topology can be lever- aged to provide a greater scope of service; the CIFS and NFS clients can be configured for greater performance and reliability. Implementing best-practices standards can reduce the customers’ cost of ownership and improve reliability. This article provides a quick reference to configuring Celerra. 22 EMC Proven Professional: Knowledge Sharing 2009
  • 23. CLARiiON and FCiP: A Practical Intercontinental DR and HA Solution Jaison K. Jose, EMC Corporation EMC CLARiiON® offers possibilities that meet almost all the needs of today’s high-demand business. We can easily achieve complex industry requirements when we join this small magic box to other technology. I would like to share an Intercontinental disaster recovery (DR) solution that was achieved with the help of several products, including EMC CLARiiON, MirrorView™/AS, SnapView® Clones, SnapView SnapShots, FCiP, and Vsan. We had to find a solution to implement a primary site in Europe and a disaster recovery site in the U.S. for a customer-facing application of EMC, so it was very important to have a robust solution with a proper DR plan. FCiP was our first choice to manage data movement flawlessly over the Atlantic; we could use Internet connectivity and VPN to create a tunnel between the two sites. We segregated the data replication SAN by separating the ports to a special VSAN extending to the DR site using FCiP. CLARiiON was the obvious choice for this midrange application. The amount of data was huge, but it was not very dynamic. Data availability was the primary concern. How would we connect two sites separated by thousands of miles with a CLARiiON? Our best answer was with MirrorView/AS since the data is sent through the FCiP tunnel to the DR CLARiiON. Then, we needed a backup solution. This environment was hosted in a third-party data hosting facility. A tape-based or external backup option often costs more money. SnapView Clones were our answer. A gold copy of production and DR LUNs were set up to protect against data corruption or data loss caused by human error. MirrorView A/S, SnapView SnapShots, SnapView Clones, FCiP, and Vsan—all of these products’ features are utilized in this unique disaster recovery solution. This not just a concept; it has been implemented and is working in a production environment. I am happy to share it with you. 23
  • 24. Oracle Performance Hit | a SAN Analysis Kofi Ampofo Boadi, JM Family, Inc. Performance problems can be avoided or minimized if we design the right disk layout. RAID type definitions for specific components are essential to Oracle’s performance. Not keeping defined components on the same spindles is equally crucial. This article uses a real-life case study to explain Oracle’s components and illustrate the effects of a poorly designed SAN on Oracle’s performance. A hit! Please be aware that the order of the analysis is irrelevant; it is the content that matters. Applications’ performance relies heavily on the SAN. Performance issues can be centric to the host, connectivity device, or the storage array, or a combination. This article elaborates on the effect that the SAN can have on Oracle’s performance with an emphasis on the EMC CLARiiON® storage array. I will touch briefly on the Symmetrix since most of the concepts and analysis in the article apply to the EMC Symmetrix® as well. The items below will be addressed in detail via a case study. 1. Define and analyze sequential and random writes and how they impact Oracle’s performance design. 2. Define the components of Oracle architecture and their importance. 3. What are Redo Groups and why are they important to Oracle’s performance? 4. Detail each component’s behavior on the SAN and which disk layout best fits for optimal performance. 5. CLARiiON has a limited performance-tuning ability, it has a non-scalable cache, hence which architectural designs do you need to avoid? 6. How host-side analysis and hit can contribute to the performance of Oracle. 7. witch-level specifications and alerts that can significantly contribute to the S performance of applications. 8. he Case study! This details most of the issues administrators run into and suggests T the best resolutions. Performance analysis can be approached in several ways. The key is to use the appropriate performance tools to understand what you are analyzing. Please note that different approach- es may lead to the same result. 24 EMC Proven Professional: Knowledge Sharing 2009
  • 25. Preventative Monitoring in the NAS Environment Robert Wittig, EDS an HP Company The EMC Celerra® actively monitors the environment for warnings and failures. As the NAS environment expands, it becomes increasingly important to assess the current health of each frame and verify that the current configuration fully utilizes redundant Celerra capabilities. Verification, testing, and preventative monitoring are important aspects of maintaining the Celerra’s reliability and availability. Once configured, we must test and monitor the Celerra environment to verify that it will prop- erly handle any faults and continue to provide the services for which it was designed. Testing should not stop once the system is in production; it should continue at regular intervals to ensure continuous functioning if a failure occurs, and to notify the appropriate support personnel in the event of a failure. Finally, we should make non-intrusive checks at regular intervals to verify that regular support activities have not adversely impacted any part of the environment. This article identifies methods and preventative measures to identify configuration issues, verify redundant hardware, and ensure that configured notifications function properly. The objective is to provide the Celerra storage administrator with a set of actions to check the status of a running environment, verify redundant operations, validate the configuration, and confirm that failure notifications are functioning properly. We will examine four parts of the Celerra environment: • Provisioned storage • Redundant data mover configuration • Warning and failure notifications • Celerra Connect Home functionality Finally, this article suggests methods that can be applied to gather these checks into a single automatic process. This process can be regularly executed to provide evidence of the validated configuration and identify potential problems before they impact the availability of the services or of the entire Celerra. 25
  • 26. Create a Comparative Analysis of an Oracle Database Using Storage Architectures NAS and SAN Sergio Hirata, Columbia Storage Volnys Borges Bernal, Universidade de São Paulo/LSITec Today’s storage architecture market is divided among three large groups: direct-attached storage (DAS), network-attached storage (NAS), and storage area network (SAN). The stor- age system, among others, affects any application’s performance. The application’s overall performance is also affected by the storage network technology, the data storage commu- nication protocol, and the storage network components. Performance is measured using response time. Storage managers have difficulty aligning the application’s needs to the appropriate storage architecture. Many factors are involved in this decision, including the compatibility between the host bus adapter, switches, and storage systems, and the latency, cost, and management “ ´m finishing my Science Computing I tasks. Also, storage managers must consider the desired availability level for the application Master’s degree and I saw in Knowledge and achieve the service level agreements (SLAs) negotiated with different departments. Sharing an opportunity to publish my work. Application simulators are an alternative to choose the best data storage technology or archi- I used to read a lot of works comparing tecture. The present work uses a simulator of an order entry application to generate the I/O Fibre Channel, iSCSI, and NAS using file operations at an Oracle database installed on a SAN Fibre Channel and SAN iSCSI and NAS system benchmark tools, but a real ap- with NFS architectures. It´s expected that the results will indicate whether an Oracle database plication has different behavior than a file needs a Fibre Channel infrastructure or an iSCSI pipe has enough throughput to support it. system benchmark tool. My idea is to open This article is a guide to choosing the most accurate storage architecture for an Oracle a discussion about a price/performance application. relation for the DBMS-based application in some customer scenarios.” Sergio Hirata, Columbia Storage 26 EMC Proven Professional: Knowledge Sharing 2009
  • 27. Custom Documentum Application Code Review Christopher Harper, EMC Corporation An EMC Documentum® consultant typically is the last point of contact when things have gone wrong. Firefighting is the term given for this type of corrective work. These assignments are caused by solutions that are developed by someone with limited knowledge of our systems. This lack of knowledge causes issues both in the design of the application and the way it is implemented. This daunting task typically presents itself as heaps of documentation, one or more DFC/WDK projects containing source code, and a time-boxed schedule that prevents a full review of documentation and code. How should we approach reviewing code written by a third party who doesn’t necessarily conform to the standards you are accustomed to? This article provides basic principles on what to look for and explains some of the common ways that our systems are misused leading to poor performance. I will provide the technical rationale for each instance where we discuss why or why not to use a particular approach. Also, we will discuss corrective measures for each encountered problem. I will present the technical solutions for all of the cases we discuss. The cases are ‘real’ and have been encountered “in the wild.” 27
  • 28. Business Continuity Planning for Any Organization Smartha Guha Thakurta, EMC Corporation This article introduces the methodologies to develop a company’s information survival strategy. The goal is to analyze the organization’s critical information assets, do a risk- mitigation analysis and data recovery planning encompassing change management. The overall objective of a business continuity plan is that “in this demanding market, a proactive approach aimed at assuring continuity of business processes and applications amid major and minor disruptions is absolutely essential.” The broad scope of the article includes: • An introduction to business continuity planning • Business continuity planning objectives • Defining disaster and its types with different points of view • Global best practices • Benchmark case study of implementing BCP for an organization • Methodology, barriers, and challenges • Change management and emergency decision making • Recommendations and conclusions After reading this article, you will understand: • The importance of business continuity planning • The benefits and cost savings to stakeholders • The roadmap/project plan developed for the organization • Business process mapping and re-engineering for continuity of operations Methodology and plan of work: • Experiences from professional life • Benchmarking with industry best practices • Research data from global experts • Review with the mentor at regular basis • Findings and knowledge gathering from the field and the organization 28 EMC Proven Professional: Knowledge Sharing 2009
  • 29. Data Migration Strategy (SRDF via “Swing Frame”) Sejal Joshi, A Large Telecommunications Company Ken Guest, A Large Telecommunications Company Increasing data center power and cooling requirements impact IT infrastructures’ scalability. Storage consolidation provides relief for power and cooling and also reduces total cost of ownership (TCO). Simplifying storage infrastructures and ease of management are the two reasons that businesses use storage consolidation. Businesses have had to scale their stor- age infrastructures to accommodate capacity, performance, and high-availability require- ments due to massive data growth. This article provides guidelines for using storage-based replication (EMC SRDF®) to migrate/ consolidate data from multiple storage arrays to just a few. It explains how to migrate data using SRDF from (5670) to (5772) code using a swing frame method (EMC Symmetrix® DMX™-2) running (5671) code. This migration also involved multiple Oracle databases, so maintaining data consistency was critical. We were able to accomplish this task in a very short amount of time. There are advantages and disadvantages of using storage-based or host-based migration methods. The article discusses these and provides guidelines for migrating data from DMX-2 and DMX-3 arrays to DMX-4 using SRDF. 29
  • 30. Data Storage Performance—Equating Supply and Demand Lalit Mohan, EMC Corporation Individual components, including storage, contribute to the cumulative outcome of performance. When the storage processing duration is proportionately long, “demand” is the workload generated by host computer systems, and “supply” is the processing service provided by the data storage system. The “quality of performance” experienced by the business relies on how well supply meets demand. We must match projected demand with capability to supply for selecting and designing data storage components. The resulting solution would operate at an optimum level, where demand equals supply. In this article, we apply the demand-supply analogy to build a universal framework using data storage domain performance characteristics as proxies “ decided on a topic based on the direct I representing demand and supply. financial and operational benefit to custom- This will be done in light of several popular information technology infrastructures, for ers and to IT services providers. I wanted example, messaging, enterprise resource planning, and relational database applications to find a way to engage customers more in an open systems environment, and mainframe host applications in a proprietary closely in the current climate of tight IT environment. budgets by trying to get more return on investment.” Among the topics discussed are: • Relevant terms and definitions “ am delighted to see my article I • Characteristics of “demand” placed on data storage components published! It’s akin to a mother • “Supply” capability of the data storage component looking at her newborn!” • Combining demand and supply into the working framework • Options for improving performance capability Lalit Mohan, EMC Corporation • Case scenarios to illustrate key points • Recommendations in conclusion • Assumptions, impact, and remedy • Limitations and improvements This article helps you better plan and design optimum data storage infrastructures. It helps you support centralization of business information assets into efficient shared service centers, a necessity in the current financial climate. This aggregation may enhance the value of information to management, improving return on investment. 30 EMC Proven Professional: Knowledge Sharing 2009
  • 31. Integrating Linux and Linux-based Storage Management Software with RAID System- Based Replication Diedrich Ehlerding, Fujitsu Technology Solutions All major database and ERP software vendors release their products on Linux. As with other operating systems, we must replicate using RAID array functionality to meet the demands for short backup windows, fast restore processes, and fast system copy processes. The legacy device names that are traditionally used in Linux without any storage management software are inappropriate for enterprise-class configurations. The main problem is that these name spaces are not persistent over server reboots. They cannot guarantee that the system will find its data at the same device node which it saw before the reboot. This article discusses various naming spaces within Linux—legacy names, device mapper names, IO multipathing software names, volume management layers, and file system layers. “ wrote this article because I got involved I All these layers create their own naming spaces. With RAID system-based replication, we in a project that needed solutions. I wanted must take care to have the proper name for the replica; in a shared storage configuration, to contribute some kind of an article we have to provide an identical name on all cluster nodes. which will hopefully be useful for the EMC The article reviews naming schemes with respect to persistence and replication issues. Proven™ Professional community and anyone else who might read it.” The article discusses software layers: Diedrich Ehlerding, • Linux native layers (legacy sd names, device mapper names) Fujitsu Technology Solutions • Multipathing drivers: EMC PowerPath® names and Linux native multipath names • lvm2 as an example of a volume manager • File system issues (labelled file systems, file system uuids) And replication or shared storage usage scenarios for: • Local cluster • Stretched cluster/disaster recovery configurations • Off-host backup • System copy 31
  • 32. Simplifying/Demystifying EMC’s TimeFinder Integration with Oracle Flashback Robert Mosco Jr., EMC Corporation Integrating EMC TimeFinder® business continuity application with Oracle can be a somewhat tricky endeavor. This article describes Oracle’s Flashback and EMC TimeFinder technologies and how the two applications can help end users recover data. Oracle Flashback and EMC TimeFinder are two separate technology applications. Under- standing them, and then describing their integration for the purpose of recovering data, is the main goal of this article. I use diagrams and commands to show how both technologies can recover data. Once you have an understanding of each technology, the article progresses to an integration phase showing how the two applications can be used to develop a “repair” and/or a “recovery” plan. Discussions include point-in-time recovery, Flashback rewind, and recovery time objectives. The article presents the following: • Enabling and disabling Oracle Flashback • Setting up a TimeFinder Oracle business continuity (BC) environment • Dropping and/or deleting data (to simulate a data corruption situation) • Recovering or flashing back to a previous point in time • Developing a recovery or a get-well plan All of these topics include diagrams and commands with simple explanations to help you understand the power of both technologies. 32 EMC Proven Professional: Knowledge Sharing 2009
  • 33. Service-Oriented Architecture (SOA) and Enterprise Architecture (EA) Charanya Hariharan, Pennsylvania State University Dr. Brian Cameron, Pennsylvania State University Most companies are re-evaluating the way they purchase, deploy, manage, and use business applications due to challenging market conditions, competitive pressures, and new tech- nologies. Software buyers want applications that leverage existing investments; customers demand solutions that provide quantifiable performance improvement. In response, companies must evolve into agile enterprises that can rapidly change direction. Yet their structures, processes, and systems are often inflexible, rendering them incapable of rapid change. Adding hardware, software, packages, staff, or outsourcing are not solutions. This is not a computer problem, it is a business problem. To address this growing gap between IT and business, companies are adopting an end-to-end enterprise architecture approach to re-align IT development with business objectives. EA is a framework that covers all the dimensions of IT architecture for the enterprise; SOA provides an architectural strategy that uses the concept of “services” as the underlining business-IT alignment entity. These forces drive the IT industry to deliver breakthrough technologies, many at the founda- tion layer. SOAs, specifically, are at the cusp of change. This article focuses on the relation- ship between EA and SOA and the resulting impact on business. These are the key research questions in this research: • Are there any business impacts to marrying EA and SOA? • How do organizations fit SOA with EA? • Is it better to adopt either SOA or EA, and not both? 33
  • 34. SRDF/Star Software Uses and Best Practices Bill Chilton, EMC Corporation Disaster recovery is becoming more critical as new laws are being passed to protect data, and legislation mandates extended data-retention policies. Many companies are building redundant data centers to avoid potential losses. The largest financial institutions are build- ing three data centers, two located in close proximity with the other in a different region of the country or in a different country altogether. These companies are managing three data centers and keeping all the information consistent by deploying EMC SRDF®/Star software. SRDF/Star is data-replication software that uses synchronous and asynchronous data trans- fer to maintain consistency in multiple sites. The intent is to provide redundancy so that if one of the data centers experiences a disaster, the other sites can continue to replicate data and take over processing immediately. Star is exceptional as a disaster recovery software program, but what else can you realize with this software and what are the best ways to deploy it? The documentation on SRDF/Star explains how the software works and how to install it, but does not discuss best practices. This article seeks to bridge the gap between installation and deployment by reviewing: • Building a test Star • Load balancing applications across data centers • Eliminating downtime while working on servers • Migrating data while staying consistent • Switching between concurrent and cascading, and back again • Best practices and troubleshooting hints 34 EMC Proven Professional: Knowledge Sharing 2009
  • 35. Using EMC ControlCenter File Level Reporting for CIFS Shares Chad DeMatteis, EMC Corporation Michael Horvath, Fifth Third Bancorp It can be a daunting task to gather file and folder statistics and properties from a NAS CIFS share with deep directory trees. It is especially difficult when you’re using Microsoft Windows native tools that may have poor enumeration performance. These activities consume a great deal of time in an environment with tens of thousands of folders and millions of files. This article discusses how EMC ControlCenter® Network File System Assisted Discovery feature, introduced in v6.0, can be used to provide EMC Celerra® CIFS administrators with file- and folder-level reporting, covering UNC FLR configuration considerations and lessons learned during an EMC ControlCenter deployment. It provides practical examples of how you can use CIFS FLR reports to quickly determine file age and type distribution, top storage users, and utilization trending. These reports provide administrators with information to maximize storage utilization and address CIFS storage consumption issues before they impact end users. The article addresses the following topics: • onsiderations and lessons learned during assisted discovery of network file system C in an EMC ControlCenter such as domain ID and host agent selection • teps to configure and schedule data collection policies for network file systems tak- S ing into account collection criteria and CIFS folder and file counts • erformance considerations for CIFS data collection, providing examples of perfor- P mance statistics from the Celerra and the host agent server during CIFS scans • xamples of how EMC StorageScope™ file-level CIFS share reports can be used to E show aged and dormant CIFS files for archiving, file type distribution for reclamation, and top CIFS storage users 35
  • 36. Cloud Computing Services—A New Approach to Naming Conventions Laurence A. Huetteman, Technology Business Consultant It has become increasingly difficult to have meaningful discussions about cloud computing without a common language. You will see every inconsistency in naming conventions for cloud technology when searching the topic on the Web; this inconsistency is also present during consulting or business conversations. Wikipedia defines cloud computing by using a six-layer stack of components with terms like client, application, services, platform, etc., with the word “cloud” preceding each component. Others refer to everything as a service, while others try to map SOA, utility computing, and grid to cloud computing services. Even EMC’s suite of cloud computing offerings, while technically impressive, seems to be a loosely coupled group of point solutions with no real structure or clear naming conventions (Hulk/Maui evolved into Atmos™, Mozy™, Pi, etc.) that are referred to generically as cloud computing. Vendors, partners, and customers spend valuable cycles deciding which model to follow in their discussions, or worse, inventing their own. My article simplifies this process and applies logic to inconsistent naming conventions by proposing a new naming convention for cloud computing service offerings. It is easily understood and applied across the broad spectrum of services. It is intuitive, so it can be easily adopted, and based on a logical model. If successful, this model will be flexible enough to accommodate the anticipated growth of this evolving field of technology. One consistent theme in all cloud computing discussions is the concept of tiering or layers of services. The thought here is to use an existing scientific classification and to map the layers to current and potentially future cloud computing components or services. One logical choice is to leverage the familiar and widely accepted term, cloud, but map the model to the common atmospheric cloud terminology. This article presents such a model to help you effectively engage with other IT professionals. 36 EMC Proven Professional: Knowledge Sharing 2009
  • 37. Leveraging Cloud Computing for Optimized Storage Management Mohammed Hashim, Wipro Technologies Rejaneesh Sasidharan, Wipro Technologies “ MC’s Knowledge Sharing program is E Cloud computing refers to spreading IT computing resources across Internet cloud boundar- becoming a new torch bearer to spread ies and offering selective access through consolidated service providers located at strategi- technical awareness among global profes- cally placed data centers. Generally, users pay for computing capacity on-demand and are not concerned with the essential technologies or challenges used to achieve the increased sionals. This is an ideal platform where and diverse storage scalability, server, and other resource capacity and extensibility. technologists from diverse backgrounds contribute tremendously toward widening This article focuses on cloud computing, cloud models, storage, solutions, and comparing their technical spheres. Besides, this initia- the different setups. It also describes features of storage optimization, security, leveraging tive exposes the various technical/non- the current IT infrastructure, and the advantages and disadvantages of the model. technical aspects of newer technologies The article presents the following: and product advancements in a concise and lucid manner.” 1. Overview of SOA, SaaS, distributed, grid, and cloud computing 2. Cloud architecture and applying cloud computing to storage Mohammed Hashim, Wipro Technologies 3. Cloud models and outlining the cloud storage solution 4. Managing solutions over storage infrastructure with optimal performance 5. Security in the clouds and comparing cloud-based services “ he knowledge that we acquire today has a T 6. Advantages and risks of cloud computing value exactly balanced to our talent to deal 7. Potential future of the cloud with it. Tomorrow, when we know more, Many would embrace the ability to immediately increase capacity or add capabilities without we recall that part of knowledge and use investing in new infrastructure, training new personnel or licensing new software. This article it better; the EMC Knowledge Sharing pro- is helpful for any engineer who is involved with storage design and management. gram is a magnificent invention which has given me an abundance of global technical astuteness.” Rejaneesh Sasidharan, Wipro Technologies 37
  • 38. Archiving Cries for a Holistic Architecture Paul Kingston, Solutions Architect EMC Corporation, United States 38 EMC Proven Professional: Knowledge Sharing 2009
  • 39. Information is your most valuable asset. EMC knows how to make that asset pay dividends—through integrated hardware, software, and services. We’ve been doing it for some of the greatest companies around the globe for almost 30 years—and we can do it for you. Our reputation for excellence doesn’t end there. Our world-class education is offered in every corner of the world; and EMC Proven Professional certification is the leading storage and information management certification program in the industry. It aligns our award-winning training with exams, letting you choose a certification in a variety of areas by role or interest. Want to learn more? Visit us on the web at http://education.EMC.com. Contact Us Online: http://education.EMC.com E-mail: EdServices@EMC.com Phone: 1-888-EMC-TRNG (888-362-8764) International: EMEA_Education@EMC.com +44 208 758 6080 (UK) +49 6196 4728 666 (Germany) APEducation@EMC.com +61 3 9212 6859 (ANZ) +65 6333 6200 (South Asia) Japan_Education@EMC.com +81 3 3345 5900 (Japan) Korea_Education@EMC.com +82 22125 7503 EMC2, EMC, EMC ControlCenter, EMC Proven, Atmos, Avamar, Celerra, CLARiiON, Documentum, MirrorView, Mozy, NetWorker, PowerPath, SnapSure, SnapView, SRDF, StorageScope, Symmetrix, Symmetrix DMX, TimeFinder, and where information lives are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. © Copyright 2009 EMC Corporation. All rights reserved. Published in the USA. 05/09 Brochure H2771.5 39