Access "Virtual I/O aims to streamline network traffic"
This article is part of the Vol. 5 No. 8 October 2006 issue of What you need to know about data storage provisioning
New servers usually mean Fibre Channel (FC) host bus adapters (HBAs) for SAN traffic and Ethernet cards for NAS traffic. But I/O virtualization, or virtual I/O, changes that assumption. "Virtual I/O allows servers to connect to a multitude of different targets irrespective of the protocol," says Patrick Guay, senior VP of marketing at Voltaire, a provider of virtual I/O routers in Billerica, MA. To accomplish this, the virtual I/O router performs a "network address translation [NAT]-like function," says Bill Erdman, director of marketing at Cisco Systems' Server Virtualization Business Unit. Cisco's SFS 3012 Multi-fabric Server Switch connects to servers using InfiniBand and then translates the InfiniBand protocol to the respective IP or FC storage protocol used by the storage array. Cisco finds that virtual I/O offers organizations the following benefits: It creates a pool of physical HBAs and network interface cards (NICs) that may be shared between servers. It eliminates the need to install and cable HBAs and NICs for each server. It breaks the physical 1... Access >>>
Premium Content for Free.
- M&A stirs up standards
Snapshot: Reducing tape use in backup
Is tape in your future?
The right way to provision storage
Provisioning storage is still mostly a manual job, but solid planning, including the right interested parties and some improved tools, can help ease the chore. Follow these provisioning best practices to gain greater performance and higher disk utilization.
- Instant messaging shouldn't strain storage
- Virtual I/O aims to streamline network traffic
- Vendors debate different XAM strategies
How to manage encryption keys
Encryption is an effective way to secure data. But managing encryption keys can be a major undertaking. While there are no encompassing key management tools available yet, some apps can help you keep track of proliferating encryption keys.
- School expels outsourced backup, enrolls CDP
- Survey Says: Users name their 10GbE price
With some legislative requirements mandating data be kept for as long as 70 years, your organization needs an archiving plan that defines what data needs to be kept and why. But don't overlook how you'll restore old data when it needs to be accessed.
- New Ethernet protocols could challenge iSCSI
Case Study: Moving from Lotus Notes to Microsoft Exchange
Hyperion Solutions Corp. decided it could no longer cope with having two separate e-mail apps. Storage considerations were among the many hurdles the firm had to overcome. Here's how they did it.
What storage managers are buying and why
The second installment of the 2006 edition of Storage magazine's exclusive Purchasing Intentions Survey reveals key storage technology purchasing decisions by storage managers across all industries.
Untangling the encryption chain
by Stephen Foskett
In many companies, data that should be safeguarded against loss or theft isn't getting encrypted. The main reason why so many storage managers are shying away from encryption is that they don't understand how it functions within the storage infrastructure.
Outsourcing email archiving: the pros and cons
Outsourcing your e-mail archiving is a good alternative if you want to avoid the hassle of implementing archiving yourself. But right now, service providers are falling short and need to expand their product portfolios to meet user demands.
Users don't care about storage and data, they only care about their own applications
Storage Bin: Users don't care about storage and data, they only care about their own applications, so it's essential to deliver IT as a transparent service.
A whole new ballgame?
A whole new ballgame?
- Untangling the encryption chain by Stephen Foskett
More Premium Content Accessible For Free
In a relatively short time, solid-state storage has made an indelible mark on storage systems and data center environments. Today, few arrays ship...
Big data infrastructure and analytics are some of the hottest technology topics today, and it can sometimes seem impossible to dissect and digest all...
Mobile workers are now accessing, creating and modifying data on ultra-portable devices such as smartphones, tablets and phablets. Most companies ...