Flylib.com
The Holy Grail of Network Storage Management
The Holy Grail of Network Storage Management
ISBN: 0130284165
EAN: 2147483647
Year: 2003
Pages: 96
Authors:
Jon William Toigo
BUY ON AMAZON
Main Page
Table of content
Copyright
About Prentice Hall Professional Technical Reference
List of Illustrations
Preface
Acknowledgments
Chapter 1. Introduction
Conspiracy Theory
The Storage Industry: Fear of Standards and Commoditization
The Road to Unification?
Yesterday s Resellers, Tomorrow s Competitors
About This Book
Endnotes
Chapter 2. The Data Explosion and Matters of the Disk
The Data Explosion Myth
Deconstructing the Data Explosion Myth
Fact and Fiction in Networked Storage
From Evolution to Revolution: The Myth of the Fibre Channel SAN
Endnotes
Chapter 3. 21st Century Oxymorons: Jumbo Shrimp and Fibre Channel SAN
SANs and Capacity Allocation Efficiency
The V Word
Capacity Utilization Efficiency: Another Grail
What About Management?
Conclusion
Endnotes
Chapter 4. Sanity Check on IP SANs
IP SANs and Metcalfe s Law
What, When, and Where iSCSI
Why IP SANs?
Conclusion
Chapter 5. The Quest for Networked Storage: Many Roads to Rome
The Zen Riddle of Storage Networking
Block and File
NASSAN Hybrids
Conclusion
Endnotes
Chapter 6. Making Storage Platforms Smarter
The Sources of Storage Infrastructure Value
Barriers to Growth in Disk and Consequences for Platform Decision Making
Media Materials Are Key
Capacity Versus Performance and Other Economic Realities
Economic Realities
Back to Architecture
Disk and Array Selection Criteria
Storage Intelligence Begins With Informed and Pragmatic Device Decisions
Endnotes
Chapter 7. Virtualization: Still a Dirty Word?
A Brief Overview of Virtualization in IT
SANs and Virtualization
Host Software-Based Virtualization
In-Band Virtualization
Out-of-Band Virtualization
Array Controller-Based Virtualization
Are Switches the New Virtualization Platform?
Back to Reality
Endnotes
Chapter 8. Squeezing Real Value from Storage
What is Capacity Utilization Efficiency?
Hierarchical Storage Management
A Brief Overview of Storage Management Architecture
Product-Centric Management
Infrastructure-Centric or Storage Resource Management (SRM)
Application-Centric Management
Data-Centric Storage Management
Not Speculation
In the Absence of a Data-Centric Storage Management Solution
Endnotes
Chapter 9. Final Word: Tape is Dead . . . Maybe
Data Protection
The Backup Versus Mirror Debate
Tape is Not a Panacea
Mirroring is Not a Silver Bullet
Enhanced Backup Options Exist
Attacking Backup Time
DDT: Not the Pesticide, the Other DDT
Saving Restore Time
The Bottom Line About Bolt-Ons
Endnotes
Chapter 10. The Cone of Silence
A Security Capability for Storage
The Three A s of Security
Which is More Secure: IP or Fibre Channel?
Burgeoning Technologies
Storage Encryption
Adapting Other Security Concepts to Storage
Conclusion
Endnotes
Chapter 11. Conclusion: Joining the Quest for the Holy Grail
The Solution is Out There
Professionalism, Pragmatism, and Consumerism
What is to be Done?
Endnotes
Glossary
The Holy Grail of Network Storage Management
ISBN: 0130284165
EAN: 2147483647
Year: 2003
Pages: 96
Authors:
Jon William Toigo
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Apply Your Knowledge
Determining Assessment Scope
Picking the Right Platform
Summary
Functions of Cryptography
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Cisco CME PSTN Connectivity Options
Monitoring Cisco IPC Express
Step 7: Configuring Cisco CME Call Processing Features
Summary
Troubleshooting the Database, LDAP, and Mailbox Activities
C++ GUI Programming with Qt 3
Hello Qt
Splash Screens
Dock Windows
Using QHttp
Using QTextBrowser as a Simple Help Engine
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The Microsoft Client Library for AJAX
The Pulsing Heart of ASP.NET AJAX
The AJAX Control Toolkit
Remote Method Calls with ASP.NET AJAX
Building AJAX Applications with ASP.NET
InDesign Type: Professional Typography with Adobe InDesign CS2
(Not) Using Auto Leading
Up Next
Stylin with Paragraph and Character Styles
Changing Columns
Things to Consider
DNS & BIND Cookbook
Creating a Zone Data File
Protecting a Slave Name Server from Abuse
Controlling Multiple named Processes with ndc
Securing Zone Transfers
Configuring a Name Server to Accommodate a Slave Running BIND 4
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies