SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
DATA CENTER VIRTUALIZATION Q&A

WER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q
 QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and
AND ANSWER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND A
A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and
WER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q

  Data Center Virtualization Q&A
 & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A Q & A QU
STION AND ANSWER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION
  with Erik Q & A QUESTION AND ANSWER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q an
 Q and A Giesa, F5 Networks VP, Product Management & Marketing
 and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A

                                                                           A better practice is to virtualize your server and application
  Q What’s driving the need for data center virtualization?                resources, which is much more cost effective and a better
                                                                           overall architecture. Instead of deploying that very expensive
  A We know thatitifmeans that operationsaare up and running
    organization,
                     business continuity is key objective of an
                                                                           mid-range system, virtualize multiple, low-cost, high-
     24x7. Best practices suggest using geographic redundancy              performance servers with applications and data, so when
     to establish multiple data centers or sites located in                one server goes down, you’re not impacted. This gives you
     different geographic regions, each with replicated                    the opportunity to achieve high availability and performance
     applications and data. Do you need to replicate everything?           without breaking the bank.
     No, not necessarily, just those things that are deemed
     mission critical. Some organizations will feel that the bulk
     of their applications and data are mission critical, whereas
                                                                       Q What do you have to consider to virtualize your data center?
     others will have a smaller subset.                                A A key It starts the answer to this question is the architecture
                                                                         itself.
                                                                                 part of
                                                                                         with the application. Can this application be
                                                                           deployed in a manner that it can be virtualized? Does it
  Q How do you implement geographic redundancy?                            support clustering or are there tools that help it support
                                                                           clustering so that each application instance recognizes
  A You can implementchoose to deploy multiple sites and use
    of ways. You could
                       geographic redundancy in a number
                                                                           state? If that’s the case, that application is a great candidate
     something like Veritas’ Smart Location or EMC’s Replication           for virtualization within the broader context of the
     Storage to duplicate applications and data, which is a                application delivery network framework.
     significant investment.                                                Can the underlying applications be replicated in real time
     Today, most IT folks still build redundant sites as a backup          between redundant sites so that they can resolve requests
     and manually manage data replication and failover to                  at any site at any time, ensuring that the data is current?
     the secondary site when needed. So they have their site               If you can’t replicate the data in real time, there might still
     sitting there inert as an insurance policy, but also as a non-        be an opportunity to virtualize redundant sites if the data
     performing asset. By virtualizing data center resources at            being served doesn’t require up-to-the-minute freshness.
     both sites, you can turn non-performing assets (with the              There are a lot of scenarios where that does makes sense.
     exception of a disaster) into an ongoing available asset that         What day-old data is acceptable? Ultimately, you have
     will function in a distributed scenario to achieve maximum            to look at the underlying application infrastructure to
     reliability and performance regardless of location. For               determine what you can virtualize. The same is true for
     example, in an active-active data center configuration, you            virtualizing connectivity and links.
     could do data replication, upgrades, and maintenance on               You also have to consider the amount of data and
     a more-frequent basis, increasing your overall uptime and             performance during the replication process. In this case,
     time-to-market for services.                                          the primary challenge is not about the bandwidth or link
     There are other benefits to virtualization when you look               capacity. The challenge is how much of that data can
     at the data center itself. Let’s say you need maximum                 be concurrently transferred or put into the pipe while
     availability and high performance for your applications and           eliminating protocol communication overhead. We’ve seen
     data. You can deploy one, very reliable midrange server               customers with OC-3 connectivity between data centers, but
     with RAID and redundant power supplies that cost you half             their replication process only uses a fraction of that pipe.
     a million dollars. However, you’re still going to have a single       They have a lot of data to transfer and it just trickles into
     point of failure because it’s a single system. You could also         the pipe, so replication literally takes days to complete – it’s
     try to achieve those business objectives by throwing very             just not efficient. Fortunately, there are solutions out there
     expensive hardware at it, trusting that all the components            that use symmetrical WAN acceleration to mitigate this
     will keep running.                                                    situation. So replication processes that took days to finish
                                                                           now get completed in hours. That’s a better model and a
                                                                           better use of the underlying infrastructure, which includes
                                                                           available bandwidth.
R Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q an
QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A
ND ANSWER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANS

  DATA CENTER VIRTUALIZATION Q&A



                                                                           What is new is thinking about all the points in the WAN
  Q What are the benefits of data center virtualization?                    and LAN infrastructure where you can realize virtualization
  A From an architecture standpoint, there areapplications. Thets
    to virtualizing your resources that deliver
                                                so many benefi              benefits regardless of where you started out. Consider
                                                                           this – you want your worldwide employees to securely
     savings are profound such as better use of infrastructure,            access your network and applications at any time from any
     99.999% availability, and simplified management – it really            device and from any location. Sometimes sites go down
     boils down to better operational efficiently.                          for maintenance, connectivity reasons, and disasters. If
                                                                           you provide worldwide access, but it’s only available 95%
     With virtualization, there‘s efficiency in the underlying              of the time and it’s under performing 98% of the time,
     hardware requirements. In essence, you need less hardware             you’re not really achieving your goal of worldwide access
     or less expensive hardware to do the same work. You can               24x7. This is where virtualization integrated with access
     get 5 times the performance for a third of the cost when              technologies like SSL VPN comes into play. Virtualization
     you compare a mid-range system to a server farm that cost             of distributed access devices that route users to the best
     you about $3,000 a piece. If I can put 10 of those low-               possible site, which hosts your SSL VPN access control, gives
     cost servers in a virtualized resource pool, I’ve got 5 to 10         them access to applications and network resources without
     times the power of the most powerful mid-range system                 any interruption of service. Routing users to the best
     at a third of the cost. By virtualizing my servers, I not only        available site is completely transparent and doesn’t require
     realize a tremendous cost savings, but I have a much better           updating client software or reconfiguring clients, which we
     architecture for availability and ongoing maintenance. If I           know is fraught with problems. Again, virtualization is a
     need to bring one server down it doesn’t impact the others,           better model. So think about virtualization from a holistic
     and I can gracefully add in and take out systems to support           architectural approach to fully realize its benefits.
     my underlying architecture.

     For things like ongoing maintenance and management,               Q How centerF5 products help organizations virtualize their
                                                                         data
                                                                              does
                                                                                    to leverage the benefits of virtualization?
     there are significant efficiencies to be realized. For
     redundant active-active data centers that are managed by
     an intelligent DNS system, I can very easily bring down one       A When itofcomes to virtualization,up from the applications
                                                                         notion    abstracting the layer
                                                                                                           F5 believes in the
     data center for maintenance without affecting the other
                                                                           and leveraging the network to perform services on the
     data centers or impacting users.
                                                                           applications’ behalf. From this layer, F5 products can
     The benefits of virtualization really runs the gambit                  deliver end-to-end application security, performance, and
     – ongoing maintenance and management, reduction                       availability in the most operationally efficient manner. F5
     of hardware acquisition costs, and better architecture                enables organizations to realize the benefits of virtualization
     for availability, security, and performance. This is why              by giving them the underlying architectural building blocks
     virtualization is really becoming the standard for how you            to create an infrastructure that supports virtualization.
     design your IT resources for the future.
                                                                           Availability
                                                                           You can implement a secondary data site and use the
  Q What stage do data think most businesses are at in their
    quest to reach
                   you
                       center virtualization?
                                                                           BIG-IP Global Traffic Manager to monitor application
                                                                           health to automatically failover to another data center,
                                                                           maintain service interdependencies in a SOA application,
  A For complete data center virtualizationenterprises are
    center virtualization, I would say most
                                            and multi-data                 and automatically route users to the best site. Even if a
                                                                           user’s closest, highest-performing site is unavailable, the
     at about 10-15%. Of course, you’ll have pockets where                 user is transparently routed to another site for the best
     people are virtualizing their application instances using             possible experience.
     things like VMWare or clustering. It’s not across the board.
     But then we see virtualization on the combined server                 Say you have a need for multi-homing, but you have to
     and application level using products like F5’s BIG-IP Local           provide reliable connectivity to your applications for both
     Traffic Manager. Virtualization is pretty much a given in              public (customers) and private (employees) use. The BIG-
     the Web world. At the application server and database                 IP Link Controller monitors your ISP links to automatically
     level, it’s still nascent. There’s still a lot of room to build       route inbound and outbound traffic to the best-performing
     that proven model at the Web tier down in the application             link based on link health, performance, and cost, business
     and data tiers. However, most of our large enterprise                 policy, user location, or topology. To ensure the quality of
     customers already have some form of SAN virtualization in             service for any user regardless of their endpoint, integrated
     production. You also see virtualization principles at work as         Rate Shaping reserves bandwidth for priority applications
     far as connectivity, topology, and access. So virtualization          and compression accelerates the performance of the session
     really isn’t a new concept.                                           over those links.
R Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q an
QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A
ND ANSWER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANS

  DATA CENTER VIRTUALIZATION Q&A




     Although the BIG-IP Local Traffic Manager uses load                      To be productive, mobile workers depend on accessing
     balancing to keep your applications available across                    their critical business applications via the Web. F5’s
     your networked devices, the most common scenario                        WebAccelerator uses an asymmetric deployment to
     is distributing application traffic across an array of                   optimize Web applications for users where you can’t or
     web servers that host standard web traffic, including                    don’t want to deploy an endpoint device. WebAccelerator’s
     e-commerce traffic. The BIG-IP load balances HTTP                        employs unique technologies such as Express Loader and
     connections to the Internet or the company’s intranet web               Express Connect to make inefficient protocols like HTTP
     applications as well as to HTTPS. Using F5’s TMOS full proxy            more efficient, which dramatically improves performance
     architecture, you can apply a virtualization model across               without making changes on the client side or in the
     any type of application whether it’s a SIP, RTSP, TCP, XML              application itself. Again, it’s a better model for achieving
     or UDP-based application. If it’s IP traffic, we can see into            your performance objectives.
     the application stream and apply security, availability, and
     acceleration services.                                              Conclusion
                                                                         When you consider virtualizing your IT resources, you have
     Security                                                            to consider all the critical junctures of your network topology.
     Instead of spending so many cycles, resources, and effort           What is your current environment? Do you have multiple data
     on securing each and every potential vulnerability, why             centers, do you currently multi-home or provision multiple ISP
     not virtualize your IT resources and centralize their               links from different providers? Do you have applications that
     management by defining security policies based on who is             you want or could virtualize? Where are your users coming
     requesting access (client type, endpoint security, integrity of     from, the branch office, overseas, or remotely from the road?
     client, SSL credentials), the type of device requesting access      And are those users private employees, public users, contractors,
     (operating system, firewall, AV), the type of encryption             suppliers, and customers? What devices are they coming from
     (3DES, AES), and what transactions are allowed (what is             to access your applications? Do you want to accelerate and
     authorized by that user’s role), and what is allowed for the        secure application sessions across this wide variety of usage
     application (inputs, characters, links, cookies, etc.) This saves   scenarios? And, of course, what are your business goals,
     a tremendous amount of time, gives you a better security            objectives, and SLAs?
     posture, and improves your auditing capabilities because
     it centralizes these functions. You can do this using the           Enabling you to virtualize your resources is the greatest value
     BIG-IP Local Traffic Manager with the Application Security           of F5’s product strategy. Regardless of where you’re starting
     Manager module and FirePass to not only protect your                out or your constraints, F5 has the solutions that function
     applications and network resources, but also provide secure         as architectural building blocks to virtualize your resources.
     remote access to your resources no matter where your                With F5, you can leverage the benefits of virtualization and
     employees are located.                                              keep your applications secure, fast, and available in the most
                                                                         operationally efficient manner.
     Virtualization also places an additional layer in front of
     hackers. F5’s TMOS full application proxy sits between              About Erik Geisa
     hackers and any BIG-IP device to cloak the IP addresses of          Erik is the Vice President of Product Management and
     your resources. That’s a huge benefit because hackers are            Marketing for F5 Networks, where he is responsible for
     not talking directly to your resources.                             driving product management and marketing strategy for
                                                                         all products families, including BIG-IP, FirePass, TrafficShield,
     Performance                                                         WANJet, WebAccelerator, and iControl. While at F5, Erik
     Although you have no control over public users’ endpoints,          has successfully driven the product interoperability and
     there are things that the BIG-IP can do asymmetrically              integration strategy with key vendors like Oracle, Microsoft,
     to benefit client sessions using technologies like TCP/IP            Siebel Systems, and BEA, leveraging F5’s unique iControl
     optimization, compression, caching, and offloading your              API as an open standard to integrate F5’s products with
     servers to do SSL processing and client authentication.             their enterprise applications. In addition, Erik and his team
                                                                         have driven and launched some of the most innovative and
     You can optimize cross-WAN intra-application                        profitable products for F5 including the award-winning
     communication occurring on the backend and accelerate               BIG-IP platform with the unique TMOS architecture. Prior to F5,
     and optimize those connections by deploying F5’s WANJet             Erik led product management and marketing teams at Holistix,
     end to end. In this way, you can use WANJet to optimize             Inc., a web systems management company, and WRQ, Inc.,
     data replication across data sites, bringing data consistency       where he launched and ran the fastest growing product line in
     much closer to real-time in almost all situations. To               WRQ’s 15 year history.
     significantly reduce the time and bandwidth required to
     synchronize multiple sites, WANJet works with underlying
     technologies such as SAN replication, database log shipping,
     transactional replication, file copies, etc.
D ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A Q & A QUESTION AND ANSW
 R Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q an
QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A
ND ANSWER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANS

  DATA CENTER VIRTUALIZATION Q&A




  About F5
  F5 Networks is the global leader in Application Delivery
  Networking. F5 provides solutions that make applications
  secure, fast, and available for everyone, helping organizations
  get the most out of their investment. By adding intelligence
  and manageability into the network to offload applications,
  F5 optimizes applications and allows them to work faster
  and consume fewer resources. F5’s extensible architecture
  intelligently integrates application optimization, protection
  for the application and the network, and delivers application
  reliability – all on one universal platform. Over 9,000
  organizations and service providers worldwide trust F5 to keep
  their applications running. The company is headquartered
  in Seattle, Washington with offices worldwide. For more
  information, go to www.f5.com.




                            F5 Networks, Inc.                  F5 Networks                         F5 Networks Ltd.                      F5 Networks
                            Corporate Headquarters             Asia-Pacific                         Europe/Middle-East/Africa             Japan K.K.
                            401 Elliott Avenue West            +65-6533-6103 Voice                 +44 (0) 1932 582 000 Voice            +81-3-5447-3350 Voice
                            Seattle, WA 98119                  +65-6533-6106 Fax                   +44 (0) 1932 582 001 Fax              +81-3-5447-3351 Fax
                            (206) 272-5555 Voice               info.asia@f5.com                    emeainfo@f5.com                       info@f5networks.co.jp
                            (888) 88BIGIP Toll-free
                            (206) 272-5556 Fax
                            www.f5.com
                            info@f5.com



        © 2006 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, FirePass, and iControl are trademarks or registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries.

Contenu connexe

En vedette

Armavir Development Center
Armavir Development CenterArmavir Development Center
Armavir Development CenterGayane Ayvazyan
 
The New Retirement Story in Italy Promo
The New Retirement Story in Italy Promo The New Retirement Story in Italy Promo
The New Retirement Story in Italy Promo Peter de Kuster
 
Ppt Ccmm2012 Vf
Ppt Ccmm2012 VfPpt Ccmm2012 Vf
Ppt Ccmm2012 VfPMalo
 
In reference to our mission
In reference to our missionIn reference to our mission
In reference to our missionJuliet Nasuuna
 
Στην αγορά 3 δράσεις του ΕΤΕΑΝ (1/02/2012)
Στην αγορά 3 δράσεις του ΕΤΕΑΝ (1/02/2012)Στην αγορά 3 δράσεις του ΕΤΕΑΝ (1/02/2012)
Στην αγορά 3 δράσεις του ΕΤΕΑΝ (1/02/2012)GR Ministry of Development
 
#3 rsp success card
#3 rsp success card#3 rsp success card
#3 rsp success cardchanwitcs
 
Nurmamat kyzy aichurok
Nurmamat kyzy aichurokNurmamat kyzy aichurok
Nurmamat kyzy aichurokBakytbek Uulu
 
Big Data Europe 2012 A4 12 P Brochure Screen Spread 2
Big Data Europe 2012 A4 12 P Brochure Screen Spread 2Big Data Europe 2012 A4 12 P Brochure Screen Spread 2
Big Data Europe 2012 A4 12 P Brochure Screen Spread 2zoediggins1986
 
Livestock-Climate Change CRSP Annual Meeting 2011: GSFA/RIVERS Project Update...
Livestock-Climate Change CRSP Annual Meeting 2011: GSFA/RIVERS Project Update...Livestock-Climate Change CRSP Annual Meeting 2011: GSFA/RIVERS Project Update...
Livestock-Climate Change CRSP Annual Meeting 2011: GSFA/RIVERS Project Update...Colorado State University
 
Redes sociales
Redes socialesRedes sociales
Redes socialesingcamilom
 
ஊணம் என்பது உடலில் அல்ல. உள்ளத்தில்தான்...
ஊணம் என்பது உடலில் அல்ல. உள்ளத்தில்தான்...ஊணம் என்பது உடலில் அல்ல. உள்ளத்தில்தான்...
ஊணம் என்பது உடலில் அல்ல. உள்ளத்தில்தான்...In My eYe
 
Presentasi prakerin amelia novriana tentang file sharing dan printer sharing
Presentasi prakerin amelia novriana tentang file sharing dan printer sharingPresentasi prakerin amelia novriana tentang file sharing dan printer sharing
Presentasi prakerin amelia novriana tentang file sharing dan printer sharingamelia novriana
 

En vedette (15)

Armavir Development Center
Armavir Development CenterArmavir Development Center
Armavir Development Center
 
The New Retirement Story in Italy Promo
The New Retirement Story in Italy Promo The New Retirement Story in Italy Promo
The New Retirement Story in Italy Promo
 
Ppt Ccmm2012 Vf
Ppt Ccmm2012 VfPpt Ccmm2012 Vf
Ppt Ccmm2012 Vf
 
In reference to our mission
In reference to our missionIn reference to our mission
In reference to our mission
 
Στην αγορά 3 δράσεις του ΕΤΕΑΝ (1/02/2012)
Στην αγορά 3 δράσεις του ΕΤΕΑΝ (1/02/2012)Στην αγορά 3 δράσεις του ΕΤΕΑΝ (1/02/2012)
Στην αγορά 3 δράσεις του ΕΤΕΑΝ (1/02/2012)
 
#3 rsp success card
#3 rsp success card#3 rsp success card
#3 rsp success card
 
Nurmamat kyzy aichurok
Nurmamat kyzy aichurokNurmamat kyzy aichurok
Nurmamat kyzy aichurok
 
Hadware
HadwareHadware
Hadware
 
4. foro smf
4. foro smf4. foro smf
4. foro smf
 
Big Data Europe 2012 A4 12 P Brochure Screen Spread 2
Big Data Europe 2012 A4 12 P Brochure Screen Spread 2Big Data Europe 2012 A4 12 P Brochure Screen Spread 2
Big Data Europe 2012 A4 12 P Brochure Screen Spread 2
 
Livestock-Climate Change CRSP Annual Meeting 2011: GSFA/RIVERS Project Update...
Livestock-Climate Change CRSP Annual Meeting 2011: GSFA/RIVERS Project Update...Livestock-Climate Change CRSP Annual Meeting 2011: GSFA/RIVERS Project Update...
Livestock-Climate Change CRSP Annual Meeting 2011: GSFA/RIVERS Project Update...
 
our cotton dress material
our cotton dress materialour cotton dress material
our cotton dress material
 
Redes sociales
Redes socialesRedes sociales
Redes sociales
 
ஊணம் என்பது உடலில் அல்ல. உள்ளத்தில்தான்...
ஊணம் என்பது உடலில் அல்ல. உள்ளத்தில்தான்...ஊணம் என்பது உடலில் அல்ல. உள்ளத்தில்தான்...
ஊணம் என்பது உடலில் அல்ல. உள்ளத்தில்தான்...
 
Presentasi prakerin amelia novriana tentang file sharing dan printer sharing
Presentasi prakerin amelia novriana tentang file sharing dan printer sharingPresentasi prakerin amelia novriana tentang file sharing dan printer sharing
Presentasi prakerin amelia novriana tentang file sharing dan printer sharing
 

Dernier

Sector 105, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 105, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 105, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 105, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Q4-W4-SCIENCE-5 power point presentation
Q4-W4-SCIENCE-5 power point presentationQ4-W4-SCIENCE-5 power point presentation
Q4-W4-SCIENCE-5 power point presentationZenSeloveres
 
call girls in Dakshinpuri (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Dakshinpuri  (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️call girls in Dakshinpuri  (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Dakshinpuri (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...BarusRa
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...Pooja Nehwal
 
Hire 💕 8617697112 Meerut Call Girls Service Call Girls Agency
Hire 💕 8617697112 Meerut Call Girls Service Call Girls AgencyHire 💕 8617697112 Meerut Call Girls Service Call Girls Agency
Hire 💕 8617697112 Meerut Call Girls Service Call Girls AgencyNitya salvi
 
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...amitlee9823
 
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
DESIGN THINKING in architecture- Introduction
DESIGN THINKING in architecture- IntroductionDESIGN THINKING in architecture- Introduction
DESIGN THINKING in architecture- Introductionsivagami49
 
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...Delhi Call girls
 
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.Nitya salvi
 
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...amitlee9823
 
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...Call Girls in Nagpur High Profile
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Availabledollysharma2066
 
RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...amitlee9823
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfParomita Roy
 

Dernier (20)

Sector 105, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 105, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 105, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 105, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman MuscatAbortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
 
Q4-W4-SCIENCE-5 power point presentation
Q4-W4-SCIENCE-5 power point presentationQ4-W4-SCIENCE-5 power point presentation
Q4-W4-SCIENCE-5 power point presentation
 
call girls in Dakshinpuri (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Dakshinpuri  (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️call girls in Dakshinpuri  (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Dakshinpuri (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
 
Hire 💕 8617697112 Meerut Call Girls Service Call Girls Agency
Hire 💕 8617697112 Meerut Call Girls Service Call Girls AgencyHire 💕 8617697112 Meerut Call Girls Service Call Girls Agency
Hire 💕 8617697112 Meerut Call Girls Service Call Girls Agency
 
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
 
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
DESIGN THINKING in architecture- Introduction
DESIGN THINKING in architecture- IntroductionDESIGN THINKING in architecture- Introduction
DESIGN THINKING in architecture- Introduction
 
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
 
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
 
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
 
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
 
RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
 

Dc virtualization-wp

  • 1. DATA CENTER VIRTUALIZATION Q&A WER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and AND ANSWER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND A A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and WER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q Data Center Virtualization Q&A & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A Q & A QU STION AND ANSWER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION with Erik Q & A QUESTION AND ANSWER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q an Q and A Giesa, F5 Networks VP, Product Management & Marketing and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A A better practice is to virtualize your server and application Q What’s driving the need for data center virtualization? resources, which is much more cost effective and a better overall architecture. Instead of deploying that very expensive A We know thatitifmeans that operationsaare up and running organization, business continuity is key objective of an mid-range system, virtualize multiple, low-cost, high- 24x7. Best practices suggest using geographic redundancy performance servers with applications and data, so when to establish multiple data centers or sites located in one server goes down, you’re not impacted. This gives you different geographic regions, each with replicated the opportunity to achieve high availability and performance applications and data. Do you need to replicate everything? without breaking the bank. No, not necessarily, just those things that are deemed mission critical. Some organizations will feel that the bulk of their applications and data are mission critical, whereas Q What do you have to consider to virtualize your data center? others will have a smaller subset. A A key It starts the answer to this question is the architecture itself. part of with the application. Can this application be deployed in a manner that it can be virtualized? Does it Q How do you implement geographic redundancy? support clustering or are there tools that help it support clustering so that each application instance recognizes A You can implementchoose to deploy multiple sites and use of ways. You could geographic redundancy in a number state? If that’s the case, that application is a great candidate something like Veritas’ Smart Location or EMC’s Replication for virtualization within the broader context of the Storage to duplicate applications and data, which is a application delivery network framework. significant investment. Can the underlying applications be replicated in real time Today, most IT folks still build redundant sites as a backup between redundant sites so that they can resolve requests and manually manage data replication and failover to at any site at any time, ensuring that the data is current? the secondary site when needed. So they have their site If you can’t replicate the data in real time, there might still sitting there inert as an insurance policy, but also as a non- be an opportunity to virtualize redundant sites if the data performing asset. By virtualizing data center resources at being served doesn’t require up-to-the-minute freshness. both sites, you can turn non-performing assets (with the There are a lot of scenarios where that does makes sense. exception of a disaster) into an ongoing available asset that What day-old data is acceptable? Ultimately, you have will function in a distributed scenario to achieve maximum to look at the underlying application infrastructure to reliability and performance regardless of location. For determine what you can virtualize. The same is true for example, in an active-active data center configuration, you virtualizing connectivity and links. could do data replication, upgrades, and maintenance on You also have to consider the amount of data and a more-frequent basis, increasing your overall uptime and performance during the replication process. In this case, time-to-market for services. the primary challenge is not about the bandwidth or link There are other benefits to virtualization when you look capacity. The challenge is how much of that data can at the data center itself. Let’s say you need maximum be concurrently transferred or put into the pipe while availability and high performance for your applications and eliminating protocol communication overhead. We’ve seen data. You can deploy one, very reliable midrange server customers with OC-3 connectivity between data centers, but with RAID and redundant power supplies that cost you half their replication process only uses a fraction of that pipe. a million dollars. However, you’re still going to have a single They have a lot of data to transfer and it just trickles into point of failure because it’s a single system. You could also the pipe, so replication literally takes days to complete – it’s try to achieve those business objectives by throwing very just not efficient. Fortunately, there are solutions out there expensive hardware at it, trusting that all the components that use symmetrical WAN acceleration to mitigate this will keep running. situation. So replication processes that took days to finish now get completed in hours. That’s a better model and a better use of the underlying infrastructure, which includes available bandwidth.
  • 2. R Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q an QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A ND ANSWER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANS DATA CENTER VIRTUALIZATION Q&A What is new is thinking about all the points in the WAN Q What are the benefits of data center virtualization? and LAN infrastructure where you can realize virtualization A From an architecture standpoint, there areapplications. Thets to virtualizing your resources that deliver so many benefi benefits regardless of where you started out. Consider this – you want your worldwide employees to securely savings are profound such as better use of infrastructure, access your network and applications at any time from any 99.999% availability, and simplified management – it really device and from any location. Sometimes sites go down boils down to better operational efficiently. for maintenance, connectivity reasons, and disasters. If you provide worldwide access, but it’s only available 95% With virtualization, there‘s efficiency in the underlying of the time and it’s under performing 98% of the time, hardware requirements. In essence, you need less hardware you’re not really achieving your goal of worldwide access or less expensive hardware to do the same work. You can 24x7. This is where virtualization integrated with access get 5 times the performance for a third of the cost when technologies like SSL VPN comes into play. Virtualization you compare a mid-range system to a server farm that cost of distributed access devices that route users to the best you about $3,000 a piece. If I can put 10 of those low- possible site, which hosts your SSL VPN access control, gives cost servers in a virtualized resource pool, I’ve got 5 to 10 them access to applications and network resources without times the power of the most powerful mid-range system any interruption of service. Routing users to the best at a third of the cost. By virtualizing my servers, I not only available site is completely transparent and doesn’t require realize a tremendous cost savings, but I have a much better updating client software or reconfiguring clients, which we architecture for availability and ongoing maintenance. If I know is fraught with problems. Again, virtualization is a need to bring one server down it doesn’t impact the others, better model. So think about virtualization from a holistic and I can gracefully add in and take out systems to support architectural approach to fully realize its benefits. my underlying architecture. For things like ongoing maintenance and management, Q How centerF5 products help organizations virtualize their data does to leverage the benefits of virtualization? there are significant efficiencies to be realized. For redundant active-active data centers that are managed by an intelligent DNS system, I can very easily bring down one A When itofcomes to virtualization,up from the applications notion abstracting the layer F5 believes in the data center for maintenance without affecting the other and leveraging the network to perform services on the data centers or impacting users. applications’ behalf. From this layer, F5 products can The benefits of virtualization really runs the gambit deliver end-to-end application security, performance, and – ongoing maintenance and management, reduction availability in the most operationally efficient manner. F5 of hardware acquisition costs, and better architecture enables organizations to realize the benefits of virtualization for availability, security, and performance. This is why by giving them the underlying architectural building blocks virtualization is really becoming the standard for how you to create an infrastructure that supports virtualization. design your IT resources for the future. Availability You can implement a secondary data site and use the Q What stage do data think most businesses are at in their quest to reach you center virtualization? BIG-IP Global Traffic Manager to monitor application health to automatically failover to another data center, maintain service interdependencies in a SOA application, A For complete data center virtualizationenterprises are center virtualization, I would say most and multi-data and automatically route users to the best site. Even if a user’s closest, highest-performing site is unavailable, the at about 10-15%. Of course, you’ll have pockets where user is transparently routed to another site for the best people are virtualizing their application instances using possible experience. things like VMWare or clustering. It’s not across the board. But then we see virtualization on the combined server Say you have a need for multi-homing, but you have to and application level using products like F5’s BIG-IP Local provide reliable connectivity to your applications for both Traffic Manager. Virtualization is pretty much a given in public (customers) and private (employees) use. The BIG- the Web world. At the application server and database IP Link Controller monitors your ISP links to automatically level, it’s still nascent. There’s still a lot of room to build route inbound and outbound traffic to the best-performing that proven model at the Web tier down in the application link based on link health, performance, and cost, business and data tiers. However, most of our large enterprise policy, user location, or topology. To ensure the quality of customers already have some form of SAN virtualization in service for any user regardless of their endpoint, integrated production. You also see virtualization principles at work as Rate Shaping reserves bandwidth for priority applications far as connectivity, topology, and access. So virtualization and compression accelerates the performance of the session really isn’t a new concept. over those links.
  • 3. R Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q an QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A ND ANSWER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANS DATA CENTER VIRTUALIZATION Q&A Although the BIG-IP Local Traffic Manager uses load To be productive, mobile workers depend on accessing balancing to keep your applications available across their critical business applications via the Web. F5’s your networked devices, the most common scenario WebAccelerator uses an asymmetric deployment to is distributing application traffic across an array of optimize Web applications for users where you can’t or web servers that host standard web traffic, including don’t want to deploy an endpoint device. WebAccelerator’s e-commerce traffic. The BIG-IP load balances HTTP employs unique technologies such as Express Loader and connections to the Internet or the company’s intranet web Express Connect to make inefficient protocols like HTTP applications as well as to HTTPS. Using F5’s TMOS full proxy more efficient, which dramatically improves performance architecture, you can apply a virtualization model across without making changes on the client side or in the any type of application whether it’s a SIP, RTSP, TCP, XML application itself. Again, it’s a better model for achieving or UDP-based application. If it’s IP traffic, we can see into your performance objectives. the application stream and apply security, availability, and acceleration services. Conclusion When you consider virtualizing your IT resources, you have Security to consider all the critical junctures of your network topology. Instead of spending so many cycles, resources, and effort What is your current environment? Do you have multiple data on securing each and every potential vulnerability, why centers, do you currently multi-home or provision multiple ISP not virtualize your IT resources and centralize their links from different providers? Do you have applications that management by defining security policies based on who is you want or could virtualize? Where are your users coming requesting access (client type, endpoint security, integrity of from, the branch office, overseas, or remotely from the road? client, SSL credentials), the type of device requesting access And are those users private employees, public users, contractors, (operating system, firewall, AV), the type of encryption suppliers, and customers? What devices are they coming from (3DES, AES), and what transactions are allowed (what is to access your applications? Do you want to accelerate and authorized by that user’s role), and what is allowed for the secure application sessions across this wide variety of usage application (inputs, characters, links, cookies, etc.) This saves scenarios? And, of course, what are your business goals, a tremendous amount of time, gives you a better security objectives, and SLAs? posture, and improves your auditing capabilities because it centralizes these functions. You can do this using the Enabling you to virtualize your resources is the greatest value BIG-IP Local Traffic Manager with the Application Security of F5’s product strategy. Regardless of where you’re starting Manager module and FirePass to not only protect your out or your constraints, F5 has the solutions that function applications and network resources, but also provide secure as architectural building blocks to virtualize your resources. remote access to your resources no matter where your With F5, you can leverage the benefits of virtualization and employees are located. keep your applications secure, fast, and available in the most operationally efficient manner. Virtualization also places an additional layer in front of hackers. F5’s TMOS full application proxy sits between About Erik Geisa hackers and any BIG-IP device to cloak the IP addresses of Erik is the Vice President of Product Management and your resources. That’s a huge benefit because hackers are Marketing for F5 Networks, where he is responsible for not talking directly to your resources. driving product management and marketing strategy for all products families, including BIG-IP, FirePass, TrafficShield, Performance WANJet, WebAccelerator, and iControl. While at F5, Erik Although you have no control over public users’ endpoints, has successfully driven the product interoperability and there are things that the BIG-IP can do asymmetrically integration strategy with key vendors like Oracle, Microsoft, to benefit client sessions using technologies like TCP/IP Siebel Systems, and BEA, leveraging F5’s unique iControl optimization, compression, caching, and offloading your API as an open standard to integrate F5’s products with servers to do SSL processing and client authentication. their enterprise applications. In addition, Erik and his team have driven and launched some of the most innovative and You can optimize cross-WAN intra-application profitable products for F5 including the award-winning communication occurring on the backend and accelerate BIG-IP platform with the unique TMOS architecture. Prior to F5, and optimize those connections by deploying F5’s WANJet Erik led product management and marketing teams at Holistix, end to end. In this way, you can use WANJet to optimize Inc., a web systems management company, and WRQ, Inc., data replication across data sites, bringing data consistency where he launched and ran the fastest growing product line in much closer to real-time in almost all situations. To WRQ’s 15 year history. significantly reduce the time and bandwidth required to synchronize multiple sites, WANJet works with underlying technologies such as SAN replication, database log shipping, transactional replication, file copies, etc.
  • 4. D ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A Q & A QUESTION AND ANSW R Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q an QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A ND ANSWER Q and A Q & A QUESTION AND ANSWER Q and A Q & A Q and A Q & A QUESTION AND ANS DATA CENTER VIRTUALIZATION Q&A About F5 F5 Networks is the global leader in Application Delivery Networking. F5 provides solutions that make applications secure, fast, and available for everyone, helping organizations get the most out of their investment. By adding intelligence and manageability into the network to offload applications, F5 optimizes applications and allows them to work faster and consume fewer resources. F5’s extensible architecture intelligently integrates application optimization, protection for the application and the network, and delivers application reliability – all on one universal platform. Over 9,000 organizations and service providers worldwide trust F5 to keep their applications running. The company is headquartered in Seattle, Washington with offices worldwide. For more information, go to www.f5.com. F5 Networks, Inc. F5 Networks F5 Networks Ltd. F5 Networks Corporate Headquarters Asia-Pacific Europe/Middle-East/Africa Japan K.K. 401 Elliott Avenue West +65-6533-6103 Voice +44 (0) 1932 582 000 Voice +81-3-5447-3350 Voice Seattle, WA 98119 +65-6533-6106 Fax +44 (0) 1932 582 001 Fax +81-3-5447-3351 Fax (206) 272-5555 Voice info.asia@f5.com emeainfo@f5.com info@f5networks.co.jp (888) 88BIGIP Toll-free (206) 272-5556 Fax www.f5.com info@f5.com © 2006 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, FirePass, and iControl are trademarks or registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries.