Virtual machines running Windows operating systems on VMware ESX can now share access to application data on SAN volumes and maintain access to application data, even when virtual servers are migrated between physical host servers. Now Sanbolic’s Melio clustered file system available from NavigateStorage addresses a shortcoming of virtualization across all major platforms – an inability to share application data between multiple virtual machines, which creates an inflexible storage platform for virtual data centers.
"Previously, a SAN storage volume containing application data had to be assigned uniquely to a single physical or virtual server, limiting flexibility and providing a single path to application data," said Momchil Michailov, Sanbolic’s founder. "Sanbolic’s Melio file system (Melio FS) enables multiple paths to the data and concurrent read/write access to the application data using a high performance, low latency SAN storage fabric. Shared access to application data on SAN storage infrastructures enhances application availability, and also provides flexibility to scale applications and improve performance of tiered applications."
"We are building a VMware-based virtual environment for most of our servers," said Anders Alexandersson of GVA Consultants AB, a KBR company. "All of the physical and virtual servers have common shared storage volumes formatted with Melio FS. All of our data is placed on the Melio FS formatted volumes, and we can dynamically add both physical and virtual machines to access the data. This kind on infrastructure not only significantly reduces our administrative costs, but also allows us to keep a single set of the data and increase the processing times significantly."
Sanbolic’s Melio clustered file system and LaScala volume manager are designed to support Windows applications which benefit from central administration of a large virtual storage pool simultaneously accessed by multiple physical or virtual servers. Melio FS uses 64 bit architecture, allowing very large volume and file system sizes. These products install easily on physical or virtual servers, and can utilize any fibre channel or iSCSI storage hardware. Windows directory, reporting, and clustering features are supported. Reporting on storage I/O and transaction performance facilitates optimization of storage intensive workloads.
To learn more and see a demo contact NavigateStorage
Thursday, September 4, 2008
Tuesday, September 2, 2008
iQStor Storage Enterprise-Level Features - High Performance - Affordable Price
The iQ2880 storage system from NavigateStorage delivers the high performance and reliability required by today’s demanding applications, at an affordable price. The iQ2880 combines enterprise-level features such as storage virtualization, snapshot, mirroring, remote replication, storage provisioning and automated capacity growth with fully redundant components, to deliver storage scalability, data protection, storage automation and management simplicity. And all this at a price point that’s dramatically less than competing storage solutions on the market today.
Modular Configurations
Each iQ2880 supports up to fifteen Fibre Channel drives providing 4.5TB of storage capacity using 300GB disk drives or 15TB with 1TB SATA disk drives. This capacity can be easily and dynamically scaled to 240TB by attaching optional J2880 disk enclosure with FC or SATA disk drives to the iQ2880 storage system, creating a tiered-storage environment, with Fibre Channel drives for primary storage and SATA drives for secondary storage.
If you would like a competitive quote or more information please contact us. Or just pick up the phone and call 978-308-9000 or e mail us with your questions.
Modular Configurations
Each iQ2880 supports up to fifteen Fibre Channel drives providing 4.5TB of storage capacity using 300GB disk drives or 15TB with 1TB SATA disk drives. This capacity can be easily and dynamically scaled to 240TB by attaching optional J2880 disk enclosure with FC or SATA disk drives to the iQ2880 storage system, creating a tiered-storage environment, with Fibre Channel drives for primary storage and SATA drives for secondary storage.
If you would like a competitive quote or more information please contact us. Or just pick up the phone and call 978-308-9000 or e mail us with your questions.
Sunday, August 31, 2008
E-Mail Discovery Best Practices
NavigateStorage has been in the email archiving solutions business since 2001. Intitially with Educomm which was later bought by ZANTAZ. Today we offer solutions from ZANTAZ and Global Relay. We are experts in the field and offer a full range of services. Give us a call at 978-318-9000 or request us to contact you here.
Be proactive.
Don't wait to be on the receiving end of a subpoena or regulatory investigation before acting. Whether it is because of Enron, Elliot Spitzer, or the Wall Street Journal, regulators and the courts have become increasingly aggressive in enforcing regulations, all of which involve e-discovery. Courts view e-mails as the place to find out who knew what and when in civil, criminal, or patent litigation. Sooner or later, it will happen to you. So be proactive and invest in processes and products to minimize the impact of e-discovery on your organization.
What you don't know can hurt you.
If only the old adage ("what you don't know won't hurt you") were true. You could simply delete all e-mails and minimize the risk of someone using them against you. But in today's increasingly inter-connected world, that is no longer an option. E-mail flows freely across organizational boundaries, making it impossible to destroy all copies of any given message. Enterprises are better off storing all business-related e-mails and knowing what they contain. Ultimately, when you sit down to determine your legal strategy (e.g., "do we settle or fight?"), it's not unlike playing a game of poker. By storing e-mails, you not only know your cards but you also know the cards that your opponent may have.
Pick your partner carefully.
Given that keyword search tools from e-mail archives or other vendors aren't sufficient, you'll need to pick an e-discovery partner. There are a wide range of e-discovery products and services to choose from. Whatever you decide, make sure that your chosen solution has everything it takes to address the problem: a single interface to all of your e-mail repositories so nothing is missed; the linking of e-mails into discussion threads to establish who knew what and when; the ranking of e-mail search results by relevance; and so on.
Take e-discovery products for a test drive.
Don't take the word of an e-discovery vendor. Ask them to install their product in your environment and try it out before you buy. (With Global Relay we can have you operational in a test environment in about an hour. ZANTAZ is more difficult to install and test environments require much more.) Ask the solution vendors to provide customer references and case studies of enterprise deployments. Speak with their existing customers to learn about the solution as well as the company. It is worth spending the time to evaluate before you buy.
Document processes and best practices.
Document your end-to-end e-discovery processes, from collection to analysis to review to production. Capture all the tasks and document how each task addresses chain of custody, spoliation, and security issues. Outline all the parties involved in each task and their roles and responsibilities. Conduct post-mortem analyses after every large case or several small cases to identify opportunities for improvement. This will help ensure the highest return on your investments in automating and streamlining your e-discovery processes.
This article is an excerpt from Aaref Hilaly's article, "So You Bought An E-Mail Archive System. Now What?" originally published in the July 2006 issue of E-Discovery Advisor Magazine.
Be proactive.
Don't wait to be on the receiving end of a subpoena or regulatory investigation before acting. Whether it is because of Enron, Elliot Spitzer, or the Wall Street Journal, regulators and the courts have become increasingly aggressive in enforcing regulations, all of which involve e-discovery. Courts view e-mails as the place to find out who knew what and when in civil, criminal, or patent litigation. Sooner or later, it will happen to you. So be proactive and invest in processes and products to minimize the impact of e-discovery on your organization.
What you don't know can hurt you.
If only the old adage ("what you don't know won't hurt you") were true. You could simply delete all e-mails and minimize the risk of someone using them against you. But in today's increasingly inter-connected world, that is no longer an option. E-mail flows freely across organizational boundaries, making it impossible to destroy all copies of any given message. Enterprises are better off storing all business-related e-mails and knowing what they contain. Ultimately, when you sit down to determine your legal strategy (e.g., "do we settle or fight?"), it's not unlike playing a game of poker. By storing e-mails, you not only know your cards but you also know the cards that your opponent may have.
Pick your partner carefully.
Given that keyword search tools from e-mail archives or other vendors aren't sufficient, you'll need to pick an e-discovery partner. There are a wide range of e-discovery products and services to choose from. Whatever you decide, make sure that your chosen solution has everything it takes to address the problem: a single interface to all of your e-mail repositories so nothing is missed; the linking of e-mails into discussion threads to establish who knew what and when; the ranking of e-mail search results by relevance; and so on.
Take e-discovery products for a test drive.
Don't take the word of an e-discovery vendor. Ask them to install their product in your environment and try it out before you buy. (With Global Relay we can have you operational in a test environment in about an hour. ZANTAZ is more difficult to install and test environments require much more.) Ask the solution vendors to provide customer references and case studies of enterprise deployments. Speak with their existing customers to learn about the solution as well as the company. It is worth spending the time to evaluate before you buy.
Document processes and best practices.
Document your end-to-end e-discovery processes, from collection to analysis to review to production. Capture all the tasks and document how each task addresses chain of custody, spoliation, and security issues. Outline all the parties involved in each task and their roles and responsibilities. Conduct post-mortem analyses after every large case or several small cases to identify opportunities for improvement. This will help ensure the highest return on your investments in automating and streamlining your e-discovery processes.
This article is an excerpt from Aaref Hilaly's article, "So You Bought An E-Mail Archive System. Now What?" originally published in the July 2006 issue of E-Discovery Advisor Magazine.
Labels:
E-Mail Discovery Best Practices
Subscribe to:
Posts (Atom)