Technology Communities |
File ManagementMaterial on this page is intended solely for the purpose of content review by SNIA members. Tutorial material may be read and commented upon by any SNIA member, but may not be saved, printed, or otherwise copied, nor may it be shared with non-members of the SNIA. Tutorial managers are responsible for responding to all comments made during the open review period. No responses will be given to comments made outside the open review period. Jump straight to an abstract:
The AbstractsUnified NAS and iSCSI Technology OverviewDownloadRequirements for additional storage are booming. There is a strong trend that most of today's storage will be consolidated and 'networked'. This presentation shows the different approaches to 'Storage Networking.' Learning Objectives:
A Crash Course in Wide Area Data ReplicationDownload
Replicating data over a WAN sounds pretty straight-forward, but it turns out that there are literally dozens of different approaches, each with it's own pros and cons. Which approach is the best? Well, that depends on a wide variety of factors! This tutorial is a fast-paced crash course in the various ways in which data can be replicated and the pros and cons of each major approach. We trace the data path from applications to disk drives and examine all of the points along the way wherein replication logic can be inserted. We look at host based replication (application, database, file system, volume level, and hybrids), SAN replication (disk arrays, virtualization appliances, caching appliances, and storage switches), and backup system replication (block level incremental backup, CDP, and de-duplication). High Availability and Disaster Recovery for NAS SystemsDownloadEnterprises are increasingly entrusting critical data to NAS systems, creating requirements for automatic fault recovery and disaster protection. This session will survey the techniques available for protecting critical data stored on NAS systems against threats including hardware and software component failure, accidental or deliberate corruption, and disasters that incapacitate entire data centers. Backup, RAID and mirroring, system fail-soft, snapshots, continuous and periodic replication, and continuous data protection will be discussed. For each technique, the threats it covers, the capital and operating costs, and expected recovery time and recovery point objectives will be presented. The goal of the session is to give students an appreciation for the high availability and disaster protection options available for their NAS-managed data, in order to better equip them to make informed decisions when purchasing equipment or defining operating procedures. Learning Objectives:
|
LoginFeatured Events
|

