Virtualizationreview.Com the 2013 Virtualization Review Reader’S Choice Awards & Ultimate Buyer’S Guide
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Google Is a Strong Performer in Enterprise Public Cloud Platforms Excerpted from the Forrester Wave™: Enterprise Public Cloud Platforms, Q4 2014 by John R
FOR CIOS DECEMBER 29, 2014 Google Is A Strong Performer In Enterprise Public Cloud Platforms Excerpted From The Forrester Wave™: Enterprise Public Cloud Platforms, Q4 2014 by John R. Rymer and James Staten with Peter Burris, Christopher Mines, and Dominique Whittaker GOOGLE, NOW A FULL-SERVICE PLATFORM, IS RUNNING TO CATCH THE LEADERS Since our last analysis, Google has made significant improvements to its cloud platform — adding an IaaS service, innovated with new big data solutions (based on its homegrown dremel architecture), and added partners. Google is popular among web developers — we estimate that it has between 10,000 and 99,000 customers. But Google Cloud Platform lacks several key certifications, monitoring and security controls, and application services important to CIOs and provided by AWS and Microsoft.1 Google has also been slow to position its cloud platform as the home for applications that want to leverage the broad set of Google services such as Android, AdSense, Search, Maps, and so many other technologies. Look for that to be a key focus in 2015, and for a faster cadence of new features. Forrester Wave™: Enterprise Public Cloud Forrester Wave™: Enterprise Public Cloud Platforms For CIOs, Q4 ‘14 Platforms For Rapid Developers, Q4 ‘14 Risky Strong Risky Strong Bets Contenders Performers Leaders Bets Contenders Performers Leaders Strong Strong Amazon Web Services MIOsoft Microsoft Salesforce Cordys* Mendix MIOsoft Salesforce (Q2 2013) OutSystems OutSystems Google Mendix Acquia Current Rackspace* IBM Current offering (Q2 2013) offering Cordys* (Q2 2013) Engine Yard Acquia CenturyLink Google, with a Forrester score of 2.35, is a Strong Performer in this Dimension Data GoGrid Forrester Wave. -
Building a Cloud-Enabled File Storage Infrastructure
F5 White Paper Building a Cloud-Enabled File Storage Infrastructure A cloud-enabled infrastructure can help your organization seamlessly integrate cloud storage and maximize cost savings, while also offering significant benefits to your traditional file storage environments. by Renny Shen Product Marketing Manager White Paper Building a Cloud-Enabled File Storage Infrastructure Contents Introduction 3 What Makes a Cloud? 3 Types of Cloud Storage 4 What Makes Cloud Storage Different? 4 Accessing Files Remotely over the Network 5 Accessing Files on Object-Based Storage 5 Unique Cost Structure 6 Where Clouds Make Sense 7 Fitting the Cloud into a Tiered Storage Framework 7 Expanding the Parameters for Tiering with the Cloud 8 Defining Cloud-Enabled 9 Integrating Different Types of Storage 10 Non-Disruptive File Migration 11 Automated Storage Tiering 11 Benefits of a Cloud-Enabled Infrastructure 12 Reduced Storage Costs 12 Reduced Backup Times and Costs 13 Reduced Operational Costs 13 The F5 Cloud Storage Model 13 Creating a Private Cloud 15 Conclusion 18 2 White Paper Building a Cloud-Enabled File Storage Infrastructure Introduction Cloud storage offers enterprise organizations the opportunity to bring constantly rising file storage costs and management burden under control. By moving appropriate types of files to the cloud, organizations can reduce not only the amount of storage capacity that they need to purchase, but also the operational overhead involved in managing it. In addition, the cloud enables storage capacity to be increased on demand, while charging organizations only for the amount of storage that is actually utilized. Cloud storage will bring many changes to the way enterprises manage storage. -
D1.5 Final Business Models
ITEA 2 Project 10014 EASI-CLOUDS - Extended Architecture and Service Infrastructure for Cloud-Aware Software Deliverable D1.5 – Final Business Models for EASI-CLOUDS Task 1.3: Business model(s) for the EASI-CLOUDS eco-system Editor: Atos, Gearshift Security public Version 1.0 Melanie Jekal, Alexander Krebs, Markku Authors Nurmela, Juhana Peltonen, Florian Röhr, Jan-Frédéric Plogmeier, Jörn Altmann, (alphabetically) Maurice Gagnaire, Mario Lopez-Ramos Pages 95 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Abstract The purpose of the business working group within the EASI-CLOUDS project is to investigate the commercial potential of the EASI-CLOUDS platform, and the brokerage and federation- based business models that it would help to enable. Our described approach is both ‘top down’ and ‘bottom up’; we begin by summarizing existing studies on the cloud market, and review how the EASI-CLOUDS project partners are positioned on the cloud value chain. We review emerging trends, concepts, business models and value drivers in the cloud market, and present results from a survey targeted at top cloud bloggers and cloud professionals. We then review how the EASI-CLOUDS infrastructure components create value both directly and by facilitating brokerage and federation. We then examine how cloud market opportunities can be grasped through different business models. Specifically, we examine value creation and value capture in different generic business models that may benefit from the EASI-CLOUDS infrastructure. We conclude by providing recommendations on how the different EASI-CLOUDS demonstrators may be commercialized through different business models. © EASI-CLOUDS Consortium. 2 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Table of contents Table of contents ........................................................................................................................... -
Assuredsan 3004 Series FRU Installation and Replacement Guide for Firmware Release GL200 Or Later
AssuredSAN 3004 Series FRU Installation and Replacement Guide For firmware release GL200 or later Abstract This document describes removal and installation of field-replaceable units for Dot Hill AssuredSAN 3004 Series controller enclosures, and is intended for use by storage system administrators familiar with servers and computer networks, network administration, storage system installation and configuration, storage area network management, and relevant protocols. P/N 83-00006724-13-01 Revision A October 2014 Copyright © 2014 Dot Hill Systems Corp. All rights reserved. Dot Hill Systems Corp., Dot Hill, the Dot Hill logo, AssuredSAN, AssuredSnap, AssuredCopy, AssuredRemote, R/Evolution, and the R/Evolution logo are trademarks of Dot Hill Systems Corp. All other trademarks and registered trademarks are proprietary to their respective owners. The material in this document is for information only and is subject to change without notice. While reasonable efforts have been made in the preparation of this document to assure its accuracy, changes in the product design can be made without reservation and without notification to its users. Contents About this guide. 7 Overview. 7 AssuredSAN 3004 Series enclosure user interfaces . 7 Intended audience . 7 Prerequisites. 7 Related documentation . 8 Document conventions and symbols . 8 1 FRUs . 10 Available FRUs. 10 Storage enclosure overview . 10 FRUs addressing 24-drive enclosures . 11 Enclosure bezel for 24-drive model . 14 FRUs addressing 12-drive enclosures . 15 Enclosure bezel for 12-drive model . 18 2 Procedures . 19 Electrostatic discharge. 19 Preventing electrostatic discharge . 19 Grounding methods to prevent electrostatic discharge . 19 Replacing chassis FRU components . 20 Replacing a controller module or expansion module . -
Dot Hill Systems Corp
DOT HILL SYSTEMS CORP FORM 10-K (Annual Report) Filed 03/10/09 for the Period Ending 12/31/08 Address 2200 FARADAY AVENUE SUITE 100 CARLSBAD, CA 92008 Telephone 760-931-5500 CIK 0001042783 Symbol HILL SIC Code 3572 - Computer Storage Devices Industry Computer Storage Devices Sector Technology Fiscal Year 12/31 http://www.edgar-online.com © Copyright 2009, EDGAR Online, Inc. All Rights Reserved. Distribution and use of this document restricted under EDGAR Online, Inc. Terms of Use. Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the Fiscal Year Ended December 31, 2008 or TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the Transition Period From to Commission file number 1-13317 DOT HILL SYSTEMS CORP. (Exact name of registrant as specified in its charter) Delaware 13 -3460176 (State of Incorporation) (I.R.S. Employer Identification No.) 2200 Faraday Ave, Suite 100 Carlsbad, CA 92008 (Address of principal executive offices) (Zip Code) Registrant’s telephone number, including area code: (760) 931-5500 Securities registered pursuant to Section 12(b) of the Act: Title of Each Class Name of Each Exchange on Which Registered Common stock, $0.001 par value The Nasdaq Stock Market Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. -
Bluesky: a Cloud-Backed File System for the Enterprise
BlueSky: A Cloud-Backed File System for the Enterprise Michael Vrable,∗ Stefan Savage, and Geoffrey M. Voelker Department of Computer Science and Engineering University of California, San Diego Abstract There are also substantive technical challenges to overcome, as the design points for traditional client- We present BlueSky, a network file system backed by server applications (e.g., file systems, databases, etc.) cloud storage. BlueSky stores data persistently in a cloud frequently do not mesh well with the services offered storage provider such as Amazon S3 or Windows Azure, by cloud providers. In particular, many such applica- allowing users to take advantage of the reliability and tions are designed to be bandwidth-hungry and latency- large storage capacity of cloud providers and avoid the sensitive (a reasonable design in a LAN environment), need for dedicated server hardware. Clients access the while the remote nature of cloud service naturally in- storage through a proxy running on-site, which caches creases latency and the cost of bandwidth. Moreover, data to provide lower-latency responses and additional while cloud services typically export simple interfaces opportunities for optimization. We describe some of the to abstract resources (e.g., “put file” for Amazon’s S3), optimizations which are necessary to achieve good per- traditional server protocols can encapsulate significantly formance and low cost, including a log-structured design more functionality. Thus, until such applications are re- and a secure in-cloud log cleaner. BlueSky supports mul- designed, much of the latent potential for outsourcing tiple protocols—both NFS and CIFS—and is portable to computing and storage services remains untapped. -
Acronis Backup 12.5
Acronis Backup 12.5 BEST PRACTICES Revision: 12/12/2019 Table of contents 1 Introduction ....................................................................................................................5 2 Acronis Backup components and architecture ..................................................................5 2.1 Resource usage calculator ......................................................................................................... 8 2.2 Licensing .................................................................................................................................... 9 2.2.1 Policy ................................................................................................................................................................ 9 2.2.2 License Server ................................................................................................................................................ 10 2.2.3 Using Standard and Advanced on one Management Server ..................................................................... 10 3 Single and isolated machines.......................................................................................... 11 3.1 Preparing for deployment .......................................................................................................11 3.1.1 Software requirements for single and isolated machines ......................................................................... 11 3.1.2 Hardware requirements and sizing ............................................................................................................. -
AWS Storage Gateway Fred Hutch - Partly Cloudy Conference
AWS Storage Gateway Fred Hutch - Partly Cloudy Conference Jeff Bartley | Storage Solutions Architect | [email protected] October 25th, 2018 © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Enabling a spectrum of hybrid use cases Analytics | File Services | Production Tiering | Data Processing Data Distribution | Backup | DR | Archive | Migration Amazon Amazon Amazon Amazon Amazon Amazon AWS Amazon EMR Athena S3 Glacier EBS EC2 Lambda CloudFront AWS Storage Gateway Enterprise Data Centers Remote Offices Research Sites Small-Medium Businesses Multimedia content File servers Databases App. servers Devices Users Backup servers © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Storage Gateway Family Hybrid storage service enabling applications to seamlessly use AWS storage File Gateway Store and access objects in Amazon S3 from file-based applications with local caching Volume Gateway Block storage on-premises backed by cloud storage with local caching, EBS snapshots, and clones Tape Gateway Drop-in replacement for physical tape infrastructure backed by cloud storage with local caching © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Storage Gateway Family Files Amazon S3 (NFS or SMB) AWS Storage Gateway Amazon EBS Volumes snapshots (iSCSI) HTTPS Gateway Service Amazon Glacier Tapes AWS Identity and Access (iSCSI VTL) AWS CloudTrail Management (IAM) Amazon AWS Key Management Service Customer Premises CloudWatch (AWS KMS) Gateway provides applications Native storage in AWS • Protocol conversion and device emulation • Objects in S3 (file) • Caching (read-through / write-back) • Snapshots in EBS (volume) • Optimized data transfer • Archives in Glacier (tape) © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. -
2X Server Based Computing Leitfaden
2X Server Based Computing Leitfaden Stellt Strategien zur Umsetzung von Server Basierendem Computing vor Dieser kurze Leitfaden zum Server Basierendem Computing beschreibt Wege IT Netzwerke so zu optimieren das Hardware-, Energie- und Administrationskosten gesenkt werden koennen . Alle in diesem Dokument angegebenen Informationen können ohne vorherige Ankündigung geändert werden. In Beispielen verwendete Firmen, Namen und Daten sind, sofern nicht anders angegeben, rein fiktiv. Ohne vorherige ausdrückliche und schriftliche Zustimmung von 2X Software Ltd. darf dieses Dokument weder ganz noch teilweise in irgendeiner Form, sei es elektronisch oder mechanisch, oder zu irgendeinem Zweck reproduziert oder übertragen werden. 2X ApplicationServer und 2X LoadBalancer sind von 2X Software Ltd. urheberrechtlich geschützt. ©1999- 2006 2X Software Ltd. Alle Rechte vorbehalten. 2X Server Based Computing Leitfaden 2 VORTEILE DES SERVER-BASIERTEN COMPUTING MIT 2X....................................................... 2 EINSATZ EINES EINZELNEN TERMINAL-SERVERS .................................................................... 3 EINSATZ VON ZWEI TERMINAL-SERVERN................................................................................... 4 LASTVERTEILUNG ZWISCHEN CITRIX-SERVERN....................................................................... 5 DIREKTER VERBINDUNGSMODUS ............................................................................................... 6 INSATZ EINES GATEWAYS (REGULÄRER/SSL-GATEWAY-MODUS)........................................ -
Hybrid Cloud Storage Products
Build aHybridStorageCloud services and possible pitfalls. This guide can help you make thosedecisions. services make pitfalls.Thisguidecanhelpyou andpossible products, ontheavailable choicesandeducate themselves tomake require users data bothofthesemethodsstoring ofusingthecloudforstorage; common way couldbecomethemost Combining publiccloudservices andon-premisesstorage VIRTUALIZATION CLOUD APPLICATION DEVELOPMENT NETWORKING STORAGE ARCHITECTURE DATA CENTER MANAGEMENT BUSINEss INTELLIGENCE/APPLICATIONS DISASTER RECOVERY/COMPLIANCE SECURITY S MOD HYBRID CLOUD 4 PROS A HYBRID CLOUD 3 S HYBRID CLOUD 2 NoT EDITor’s 1 Guide An Essential TILL HASW TORAG N E D CO PRODU E N E AK S SP C TS OTS E L EDITor’S NOTE 1 Building the Bridge: Making Hybrid Clouds a Reality IT managers who want to take advantage of com- awareness and bandwidth issues are among the items Home petitive cloud pricing, and the promise of elasticity that will factor into the decision process. While pub- that comes with public clouds, will almost always be- lic cloud storage brings the potential for big savings, it Editor’s Note gin their journey to the cloud with a hybrid model. A also presents latency problems; private cloud storage hybrid cloud model is not only the most likely start- is limited to private data centers and it requires the IT Hybrid Cloud ing point for an organization, but it is also often the manager to guarantee scalability at a time when unprec- Storage Products framework they decide on as a lasting strategy. That’s edented volumes of unstructured data are produced. because it allows a combination of on-site cloud storage this Essential Guide to building a hybrid storage cloud Hybrid Cloud Pros and Cons and public cloud storage to accommodate varying needs offers sophisticated analysis, discusses hybrid cloud throughout an organization for data access and speed of storage models for various needs, and answers key Hybrid Cloud Model delivery. -
It's That Time
December 2014 / January 2015 | Vol. 8 No. 1 VirtualizationReview.com 2015 READERS CHOICE AWARDS WINNER IT’S THAT TIME OFYEAR! Eggnog, presents and the products you like best. PLUS > VIRTUAL PREDICTIONS > DELL’S VDI STRATEGY > UNTANGLING VMWARE DRS VISIT VIRTUALIZATIONREVIEW.COM contents The objective is helping organizations accomplish their 6 goals; not to push any specifi c type of technology. By Dan Kusnetzky 2015Readers Choice Awards “Chromebook desktop ÌÌÌÌ Winner ÌÌÌÌ access looks especially promising, especially in the education market.” Garret Grajek, dinCloud 18 6 December 2014 / January 2015 | VIRTUALIZATION REVIEW | VOL. 7, NO. 2 FEATURES 11 Best Cloud Storage Product 15 Best Network 4 The 2015 Reader’s Choice 12 Best Cloud Security Product Virtualization Product Awards and Buyer’s Guide 12 Best Cloud Software Product 16 Best Virtualization Security Product You, the readers, have spoken. 13 Best Business Continuity Product Here are the virtualization and Best Converged 14 Best Virtualization 17 cloud computing products that Automation Product Infrastructure Product rock your world. Best Virtualization Training 15 Best Storage 17 6 Best Application Virtualization Product Virtualization Product 6 Best Server Virtualization Product Best Desktop Virtualization/ 7 18 2015 Virtualization Predictions COLUMNS Virtual Desktop Infrastructure Product What can you expect to happen 2 Editor’s Note: KEITH WARD in the virtualization and cloud 3 Expectations for 2015 8 Best Mobile Virtualization/ BYOD Product industries in the coming year? -
Avaya VPN Gateway Release Notes
Avaya VPN Gateway Release Notes Release 9.1.3.0 NN46120-400 Issue 24.01 April 2014 © 2014 Avaya Inc. license is granted will be one (1), unless a different number of licenses or units of capacity is specified in the documentation or other All Rights Reserved. materials available to you. “Designated Processor” means a single Notice stand-alone computing device. “Server” means a Designated Processor that hosts a software application to be accessed by While reasonable efforts have been made to ensure that the multiple users. information in this document is complete and accurate at the time of printing, Avaya assumes no liability for any errors. Avaya reserves Licence types the right to make changes and corrections to the information in this Designated System(s) License (DS). End User may install and use document without the obligation to notify any person or organization each copy or an Instance of the Software only on a number of of such changes. Designated Processors up to the number indicated in the order. Documentation disclaimer Avaya may require the Designated Processor(s) to be identified in the order by type, serial number, feature key, Instance, location or “Documentation” means information published by Avaya in varying other specific designation, or to be provided by End User to Avaya mediums which may include product information, operating through electronic means established by Avaya specifically for this instructions and performance specifications that Avaya may generally purpose. make available to users of its products and Hosted Services. Documentation does not include marketing materials. Avaya shall not Concurrent User License (CU).