Access "Intelligence belongs in the network and on the switch"
This article is part of the Vol. 2 No. 5 July 2003 issue of Evaluating the benefits of IP SANs
The low-risk route is through appliances--if they don't work, you can yank 'em. Easy, right? Cisco will put intelligence in its switch. Or I'll just run my Veritas software on my new Brocade switch, right? Well, maybe someday, but I highly doubt a lot of you are going to run to this new paradigm soon. First, let me define what I'm talking about. Today we run virtualization in the form of volume management in the host, (usually Veritas') and LUN masking/mapping in the arrays. We use volume management to carve up physical devices into logical ones. We mirror with it and often replicate with an array-based technology. These are essential functions and perfect examples of "services" that should run in the network--not on the end points. Why? Common repetitive software functions running in the network vs. the host mean far less software. If you're a big shop today, you run different versions of Veritas Volume Manager on your Solaris or Windows boxes, HP/IBM/SGI etc. If those core functions ran in the fabric, you'd support only a handful of platforms--vs. hundreds... Access >>>
Premium Content for Free.
Close the IM Loophole
NYSE sends message about instant messages
by Jerome Wendt
Installing, configuring and maintaining Fibre Channel host bus adapters (HBAs) is the bane of many SAN administrators. Thankfully, these new cards offer better management tools.
When a Mighty Wind Blows into Town
South Floridian IT managers don't worry a whole lot about terrorism, but there's one thing they do worry about: hurricanes.
Virtual SANs put to the test
by David Braue
Cisco's new virtual SAN technology has aroused a lot of interest. But how does it work in practice? We look at how Australia's Deakin University uses VSANs to isolate development activity within its large, multisite fabric.
CAD for SANs
by John Vacca
New automated design tools can help you build the SAN of your dreams.
Drive Vendors Think Small
Seagate's incredible shrinking disk
Creating a large e-mail system
by Jim Booth
Here's how one storage team transformed a monolithic storage design into a flexible, scalable system.
- Close the IM Loophole
Roll Your Own NAS
Is building your own NAS better?
The evolving storage department
by Carol Hildebrand
Here's how to avoid common road blocks as you revolutionize your storage department.
Getting remote data right
by Marc Farley
The second of a two-part series on business continuity, this article focuses on how to use replicated data and the different types of replication: subsystem, host and network device based.
EMC Launches Space-Saving Copy Option for Symmetrix
EMC wants to save you space
SEC: No Hard and Fast Distance Minimums
SEC doesn't define distance minimums
- Serial ATA Adoption Ramping Up
IP SANs take their place
There's a growing interest in using IP for storage in small to midsized enterprises, although Fibre Channel is still dominant in large organizations. What's right for you: IP, FC or a combination of both?
- Roll Your Own NAS
How to build a storage security strategy for your enterprise
According to a Morgan Stanley December 2002 survey of 225 CIOs, security spending tops their 10 highest priorities for 2003. This article details how to build a thorough, companywide security strategy.
Intelligence belongs in the network and on the switch
Storage Bin: Intelligence belongs in the network and on the switch, but it's not going to get there in a jiffy.
Snapshot: 4Gb/s Fibre Channel Switches
Would You Buy a 4Gb/s Fibre Channel Switch?
Veritas SANPoint Control compared with EMC ControlCenter
by Darryl Brooks
In the second part of a two-part article, we review Veritas SANPoint Control and compare it with EMC ControlCenter.
Is compliance the next killer app?
by Mark Schlack
Is compliance the next killer app?
What are your backup, DR and data retention policies?
by James Damoulakis
Can you describe your backup, retention and disaster recovery policies? And do they correctly address your business needs?
- How to build a storage security strategy for your enterprise
More Premium Content Accessible For Free
In a relatively short time, solid-state storage has made an indelible mark on storage systems and data center environments. Today, few arrays ship...
Big data infrastructure and analytics are some of the hottest technology topics today, and it can sometimes seem impossible to dissect and digest all...
Mobile workers are now accessing, creating and modifying data on ultra-portable devices such as smartphones, tablets and phablets. Most companies ...