SlideShare una empresa de Scribd logo
1 de 19
Enterprise Storage
Management at the University
of Iowa
August 14, 2006
Introduction
David Shafer
• The University of Iowa (1999-Present)
ITS-SPA, Unix Systems Group
– Enterprise Unix servers
– Organizational improvements
• Inlet, Inc. / McLeod USA (1998-99)
– Windows file and web servers
– Web and database programming
• Coe College (1997-98)
– Unix, Netware, and Windows servers
– Campus fiber optic network
Questions
1. How are storage needs at
Iowa changing?
2. What are the goals of ESM?
3. Where is the storage
industry headed?
4. What is the best ESM
strategy for the University of
Iowa?
• “The University is on the cusp
of a data management crisis.”
• Recommendation:
– Identify processes
– Develop services
– Reliable and secure
– Storage, backup, archiving
Campus IT Review
2006 ITS Key Projects
• Improve disaster recovery
– Backup/restore capabilities
– Data center improvements
• Develop data storage services
• Assess need for institutional
repository
• Improve effectiveness through
metrics
ITS-SPA FY06 Efforts
• AT: Provide support for growing
storage needs (ICON, digital
media, research computing)
• AIS: Support storage for
enterprise databases (data
warehouse, SIS, PeopleSoft)
• CS: Expand storage for Exchange
and Webmail services, enterprise
file service growth
ITS-SPA Storage
Growth
Disk Storage in Terabytes
0
10
20
30
40
50
60
70
80
2000 2002 2004 2006
Year
TB
Shark
RVA
SAN
SAS
Themes: More, more,
more…
• More data
• More consumers
• More reliable
• More secure
…more, more, more
• More complex
• More costly
• More heat, space, and power
What are the goals of
ESM?
1. Accessibility
– Provide campus with better
access to centrally managed
data
2. Cost Efficiency
– Leverage economies of scale
and scope to decrease costs
What are the goals of
ESM?
3. Flexibility
– Pool funds to increase buying
power
4. Reliability
– Ensure high availability, data
protection, and disaster recovery
5. Security
– Prevent data theft and accidental
exposure
Where is the storage
industry headed?
• Many evolving technologies
• Consider risk factors:
– Years to mainstream adoption
– Potential benefit
Low Risk
Today:
SANs Based on Fibre
Channel
Array Based Virtualization
Future:
• iSCSI
Moderate Risk
Today:
 Serial ATA RAID
 Tape Backup
 Metro Area SANs
Future:
• Continuous Data Protection
• Single Instance Store
• Hardware Tape Encryption
Higher Risk
 Array-Based Replication
 Recovery From Disk
• High Capacity Optical Drives
• TCP/IP Offload Engines
• Virtual Tape for Unix, Wintel and Linux
• Serial Attached SCSI – HDD Interface
• Distributed Virtual Tape
• Heterogeneous Storage Virtualization
• Server-Based Replication
• Wide Area SANs
• Database Archiving
• E-Mail Archiving
What is the best ESM
strategy for Iowa?
• Pursue moderate risk
technologies
– At or near mainstream adoption
– Moderate to high value
• Focus on specific goals:
– e.g., Accessibility, Cost
Efficiency, Flexibility, Reliability,
Security
Implementing ESM
• Establish metrics (e.g., $/GB)
• Use SRM tools to identify
trends and project growth
• Negotiate aggressively with
vendors
• Well-defined, tiered storage
services
Focus on Goals
Accessibility  iSCSI
Cost Efficiency  Single instance store
Flexibility  Virtual tape for Unix,
Wintel and Linux
Reliability  Asynchronous
replication
Security  Hardware tape
encryption
Questions?
David Shafer
david-shafer@uiowa.edu

Más contenido relacionado

Similar a Enterprise Storage Management

Building your big data solution
Building your big data solution Building your big data solution
Building your big data solution
WSO2
 
Huawei Symantec Oceanspace VIS6000 Overview
Huawei Symantec Oceanspace VIS6000 OverviewHuawei Symantec Oceanspace VIS6000 Overview
Huawei Symantec Oceanspace VIS6000 Overview
Utopia Media
 
Aos Overview Presentation
Aos Overview PresentationAos Overview Presentation
Aos Overview Presentation
bradchopkins
 

Similar a Enterprise Storage Management (20)

Data Storage and Information Management
Data Storage and Information ManagementData Storage and Information Management
Data Storage and Information Management
 
Evolving Domains, Problems and Solutions for Long Term Digital Preservation
Evolving Domains, Problems and Solutions for Long Term Digital PreservationEvolving Domains, Problems and Solutions for Long Term Digital Preservation
Evolving Domains, Problems and Solutions for Long Term Digital Preservation
 
EMC InfoArchive Overview: Offered by Sigma
EMC InfoArchive Overview: Offered by SigmaEMC InfoArchive Overview: Offered by Sigma
EMC InfoArchive Overview: Offered by Sigma
 
S100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804aS100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804a
 
Webinar: Overcoming the Top 3 Challenges of the Storage Status Quo
Webinar:  Overcoming the Top 3 Challenges of the Storage Status QuoWebinar:  Overcoming the Top 3 Challenges of the Storage Status Quo
Webinar: Overcoming the Top 3 Challenges of the Storage Status Quo
 
Webinar: End NAS Sprawl - Gain Control Over Unstructured Data
Webinar: End NAS Sprawl - Gain Control Over Unstructured DataWebinar: End NAS Sprawl - Gain Control Over Unstructured Data
Webinar: End NAS Sprawl - Gain Control Over Unstructured Data
 
#MFSummit2016 Operate: The race for space
#MFSummit2016 Operate: The race for space#MFSummit2016 Operate: The race for space
#MFSummit2016 Operate: The race for space
 
Building your big data solution
Building your big data solution Building your big data solution
Building your big data solution
 
How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”How To Build A Stable And Robust Base For a “Cloud”
How To Build A Stable And Robust Base For a “Cloud”
 
An Introduction to Digital Preservation
An Introduction to Digital PreservationAn Introduction to Digital Preservation
An Introduction to Digital Preservation
 
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
 
Rethink Protecting Your Data in a Virtual World - StorageIO at VMworld 2014
Rethink Protecting Your Data in a Virtual World - StorageIO at VMworld 2014Rethink Protecting Your Data in a Virtual World - StorageIO at VMworld 2014
Rethink Protecting Your Data in a Virtual World - StorageIO at VMworld 2014
 
Huawei Symantec Oceanspace VIS6000 Overview
Huawei Symantec Oceanspace VIS6000 OverviewHuawei Symantec Oceanspace VIS6000 Overview
Huawei Symantec Oceanspace VIS6000 Overview
 
Webinar: Designing Storage and Apps to Enable Data Monetization
Webinar: Designing Storage and Apps to Enable Data MonetizationWebinar: Designing Storage and Apps to Enable Data Monetization
Webinar: Designing Storage and Apps to Enable Data Monetization
 
Comp8 unit9c lecture_slides
Comp8 unit9c lecture_slidesComp8 unit9c lecture_slides
Comp8 unit9c lecture_slides
 
ISM Unit 1.pdf
ISM Unit 1.pdfISM Unit 1.pdf
ISM Unit 1.pdf
 
Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?
 
Lecture1
Lecture1Lecture1
Lecture1
 
Aos Overview Presentation
Aos Overview PresentationAos Overview Presentation
Aos Overview Presentation
 
Big data.ppt
Big data.pptBig data.ppt
Big data.ppt
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Enterprise Storage Management

  • 1. Enterprise Storage Management at the University of Iowa August 14, 2006
  • 2. Introduction David Shafer • The University of Iowa (1999-Present) ITS-SPA, Unix Systems Group – Enterprise Unix servers – Organizational improvements • Inlet, Inc. / McLeod USA (1998-99) – Windows file and web servers – Web and database programming • Coe College (1997-98) – Unix, Netware, and Windows servers – Campus fiber optic network
  • 3. Questions 1. How are storage needs at Iowa changing? 2. What are the goals of ESM? 3. Where is the storage industry headed? 4. What is the best ESM strategy for the University of Iowa?
  • 4. • “The University is on the cusp of a data management crisis.” • Recommendation: – Identify processes – Develop services – Reliable and secure – Storage, backup, archiving Campus IT Review
  • 5. 2006 ITS Key Projects • Improve disaster recovery – Backup/restore capabilities – Data center improvements • Develop data storage services • Assess need for institutional repository • Improve effectiveness through metrics
  • 6. ITS-SPA FY06 Efforts • AT: Provide support for growing storage needs (ICON, digital media, research computing) • AIS: Support storage for enterprise databases (data warehouse, SIS, PeopleSoft) • CS: Expand storage for Exchange and Webmail services, enterprise file service growth
  • 7. ITS-SPA Storage Growth Disk Storage in Terabytes 0 10 20 30 40 50 60 70 80 2000 2002 2004 2006 Year TB Shark RVA SAN SAS
  • 8. Themes: More, more, more… • More data • More consumers • More reliable • More secure
  • 9. …more, more, more • More complex • More costly • More heat, space, and power
  • 10. What are the goals of ESM? 1. Accessibility – Provide campus with better access to centrally managed data 2. Cost Efficiency – Leverage economies of scale and scope to decrease costs
  • 11. What are the goals of ESM? 3. Flexibility – Pool funds to increase buying power 4. Reliability – Ensure high availability, data protection, and disaster recovery 5. Security – Prevent data theft and accidental exposure
  • 12. Where is the storage industry headed? • Many evolving technologies • Consider risk factors: – Years to mainstream adoption – Potential benefit
  • 13. Low Risk Today: SANs Based on Fibre Channel Array Based Virtualization Future: • iSCSI
  • 14. Moderate Risk Today:  Serial ATA RAID  Tape Backup  Metro Area SANs Future: • Continuous Data Protection • Single Instance Store • Hardware Tape Encryption
  • 15. Higher Risk  Array-Based Replication  Recovery From Disk • High Capacity Optical Drives • TCP/IP Offload Engines • Virtual Tape for Unix, Wintel and Linux • Serial Attached SCSI – HDD Interface • Distributed Virtual Tape • Heterogeneous Storage Virtualization • Server-Based Replication • Wide Area SANs • Database Archiving • E-Mail Archiving
  • 16. What is the best ESM strategy for Iowa? • Pursue moderate risk technologies – At or near mainstream adoption – Moderate to high value • Focus on specific goals: – e.g., Accessibility, Cost Efficiency, Flexibility, Reliability, Security
  • 17. Implementing ESM • Establish metrics (e.g., $/GB) • Use SRM tools to identify trends and project growth • Negotiate aggressively with vendors • Well-defined, tiered storage services
  • 18. Focus on Goals Accessibility  iSCSI Cost Efficiency  Single instance store Flexibility  Virtual tape for Unix, Wintel and Linux Reliability  Asynchronous replication Security  Hardware tape encryption