Modern Infrastructure For Dummies PDF
Modern Infrastructure For Dummies PDF
Infrastructure
Dell EMC #GetModern Special Edition
by Lawrence C. Miller
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Modern Infrastructure For Dummies®, Dell EMC #GetModern
Special Edition
Published by: John Wiley & Sons Singapore Pte Ltd., 1 Fusionopolis Walk, #07-01 Solaris South
Tower, Singapore 138628, www.wiley.com
© 2017 by John Wiley & Sons Singapore Pte Ltd.
Registered Office
John Wiley & Sons Singapore Pte Ltd., 1 Fusionopolis Walk, #07-01 Solaris South Tower,
Singapore 138628
All rights reserved No part of this publication may be reproduced, stored in a retrieval system or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording,
scanning or otherwise, except as permitted by the Copyright Act of Singapore 1987, without the
prior written permission of the Publisher. For information about how to apply for permission to
reuse the copyright material in this book, please see our website http://www.wiley.com/go/
permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com,
Making Everything Easier, and related trade dress are trademarks or registered trademarks of
John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not
be used without written permission. Dell EMC and the Dell EMC logo are registered trademarks of
Dell EMC. All other trademarks are the property of their respective owners. John Wiley & Sons
Singapore Pte Ltd., is not associated with any product or vendor mentioned in this book.
For general information on our other products and services, or how to create a custom For Dummies
book for your business or organization, please contact our Business Development Department in
the U.S. at 877-409-4177, contact [email protected], or visit www.wiley.com/go/custompub. For
information about licensing the For Dummies brand for products or services, contact
BrandedRights&[email protected].
ISBN 978-0-730-34866-5 (pbk); ISBN 978-0-730-34868-9 (ebk)
10 9 8 7 6 5 4 3 2 1
Publisher’s Acknowledgments
Some of the people who helped bring this book to market include the following:
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
INTRODUCTION................................................................................................ 1
About This Book.................................................................................... 2
Foolish Assumptions............................................................................. 2
Icons Used in This Book........................................................................ 3
Beyond the Book................................................................................... 3
Where to Go from Here........................................................................ 3
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
CHAPTER 5: Learning About Dell EMC Converged
and Hyper-Converged Solutions..................................... 33
Dell EMC VxBlock................................................................................. 34
Dell EMC VxRail.................................................................................... 35
Dell EMC VxRack.................................................................................. 36
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
M
odern businesses are increasingly embracing digital
transformation — leveraging new technologies to rein-
vent core processes, business models, product offerings,
and the customer experience. As businesses embark on the digital
transformation journey, they need to modernize their underlying
technology infrastructure to enable a more agile, customer-
focused, flexible, and innovative digital workplace to drive greater
human and operational efficiencies.
Introduction 1
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
the sheer volume of data that must be migrated when storage
infrastructure is upgraded is daunting and often means signifi-
cant risk and downtime for the organization.
Foolish Assumptions
It’s been said that most assumptions have outlived their useless-
ness, but I assume a few things nonetheless!
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
perhaps a bit rusty), I explain any technical terms and concepts
that come up in this book.
This icon points out information you should commit to your non-
volatile memory, your gray matter, or your noggin’ — along with
anniversaries and birthdays!
You won’t find a map of the human genome here, but if you seek
to attain the seventh level of NERD-vana, perk up! This icon
explains the jargon beneath the jargon!
“Would you tell me, please, which way I ought to go from here?”
Introduction 3
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
“That depends a good deal on where you want to get to,” said the
Cat — err, the Dummies Man.
If you don’t know where you’re going, any chapter will get you
there — but Chapter 1 might be a good place to start! However,
if you see a particular topic that piques your interest, feel free to
jump ahead to that chapter. Each chapter is written to stand on its
own, so you can read this book in any order that suits you (though
we don’t recommend upside down or backwards).
I promise you won’t get lost falling down the rabbit hole!
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Embracing digital transformation
Chapter 1
Recognizing Modern
Storage Challenges
I n this chapter, you learn how modern business trends are cre-
ating data storage challenges for legacy storage infrastructure.
Digital Transformation
As today’s businesses undertake digital transformation initiatives
to increase business agility, productivity, and competitiveness,
IT organizations are struggling to keep pace with legacy infra-
structure. Figure 1-1 illustrates how IT transformation maturity
directly impacts business outcomes.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
and risky and time-consuming to migrate. These systems create
“islands of storage” that effectively silo information that must
then be duplicated across multiple systems in order to be con-
sumed by the users and applications that need access to the data.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
data, mobile, social, cloud and Internet of Things (IoT) trends are
driving this massive growth of new (primary) data.
This explosion of copy data is being driven by “shadow IT” and the
shift to user self-service, which has led to siloes of copy creation
across the enterprise without global oversight. Solving this copy
data problem requires modern data management, which focuses
on optimizing infrastructure efficiency, streamlining operations,
and consistently meeting service levels across the enterprise.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 1-2: Storage requirements are outpacing storage investments.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The inevitable result is that organizations everywhere — and in
every industry — must protect and retain digital data for ever
longer periods — often for as long as 30, 50, or even 100 years.
To put that into perspective, most organizations today didn’t even
produce digital data 30 years ago (if the organization even existed
30 years ago). How confident are you that you can restore data
from a backup tape created 6 months ago, let alone 10, 20, or
30 years ago? Do you still have a compatible (and working) tape
drive and the right backup/restore software version to use for the
restore?
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
10 Modern Infrastructure For Dummies, Dell EMC #GetModern Special Edition
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Choosing flash-y or hybrid (storage, not
cars)
Chapter 2
Understanding Storage
Infrastructure Options
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Changing market dynamics are driving many IT organizations to
adopt an “all-flash for primary storage” strategy. According to
IDC, all-flash storage can significantly lower total cost of owner-
ship (TCO) in the following ways:
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
in a storage pool or cluster. Intelligent storage management soft-
ware ensures that data is automatically distributed (balanced)
across new nodes that are added to the storage architecture for
scale-out capacity and performance.
»» Lower costs
»» Greater levels of utilization
»» Reduced downtime
Software-Defined Storage
Software-defined storage (SDS) uses standard off-the-shelf
compute and storage hardware, and performs storage and
management functions in intelligent software. SDS essentially
separates storage management software from the underlying
hardware, in much the same way that virtualization technol-
ogy abstracts application workloads from the underlying server
hardware, pools the storage resources together, and automatically
allocates and balances resources based on each application’s need
(see Figure 2-1).
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
In addition to off-the-shelf hardware, SDS leverages
»» Storage virtualization
»» Massive scale-out architecture
»» Automated policy-driven administration for storage manage-
ment functions
Cloud-based Storage
Cloud-based storage typically leverages hyper-scale technology,
which decouples the compute and storage infrastructure ele-
ments so that they can be scaled independently to achieve greater
performance or capacity, as needed. Like hyper-converged sys-
tems and SDS, cloud-based hyper-scale storage uses standard
off-the-shelf servers and storage elements.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Traditional data storage models include block storage and file
storage. Block storage became increasingly popular as servers in
the data center moved from each using its own directly-attached
storage device, to sharing a single large storage device or array —
a storage area network (SAN).
Although block and file storage have many advantages, the chang-
ing nature and explosive growth of data also create new chal-
lenges for these storage types. More and more of the data that’s
created today is unstructured — individual items of information,
such as documents, images, and videos. Because this type of data
isn’t organized in a structured format, such as a database, block
storage isn’t well suited for it.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
A common analogy used to explain how object storage works is
parking a car. Imagine your car is an item of unstructured data
and you want to store or “park” it. Block storage is like a parking
lot — you can park it in a rigidly defined space, but the available
space in the lot is limited. File storage is like a parking garage,
arranged in hierarchical levels, but again physically limited.
Object storage is like valet parking. You simply drop off your keys,
and the valet takes care of parking your car — you don’t need to
worry about whether it’s ultimately parked in an adjacent parking
lot or garage, or a couple of blocks away, as long as you know it’s
safe and secure, and available when you need it (see Figure 2-3).
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Creating redundant copies of data with
snapshots and replication
Chapter 3
Addressing
Data Protection
Requirements
C
ompanies are rethinking their data protection strategies
due to exponential data growth, regulatory compliance,
strict service-level agreements (SLAs), and shrinking
backup windows. Additionally, IT teams face challenges associ-
ated with virtualization, cloud and mobile computing, agile devel-
opment and rapid deployment (DevOps) initiatives, and the need
to better protect data throughout the enterprise.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Snapshots and Replication
Having a redundant copy of data is crucial to protect against out-
ages which can interrupt data availability. Snapshots and replica-
tion help to ensure a redundant copy of data is available in the
event of an outage or disaster.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
destination resource, all writes are tracked on the source. This
data will be replicated during the next synchronization.
Data Encryption
Data encryption ensures the confidentiality and integrity of data
in backups and storage (in flight and at rest). Confidentiality
is ensured by rendering the data unreadable if it’s improperly
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
accessed. Integrity is ensured though cryptographic hashes of
data sets. If data is improperly modified — even a single byte —
the new hash won’t match the original hash.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
advanced search capabilities for finding and restoring data across
all consumption models.
Long-Term Retention
Organizations that lack robust data archiving processes risk
reduced user productivity, along with increased storage and
backup costs. Organizations also require fast, easy access to
archived email, files, and other content in support of high-volume
discovery, regulatory compliance, and secure legal holds.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
analytics, IT operations (such as patch testing and sandboxing),
and testing and development, can be challenging to track and
manage in a self-service model without global oversight.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Modern infrastructure addresses these challenges in both primary
and secondary storage, in many cases, enabling RPOs and RTOs of
a minute or less, and failover for an entire data center in a mat-
ter of minutes — without minimal business disruption. And with
the right setup, organizations can create an air-gap to prevent all
copies of data being sabotaged from cybercriminals, allowing for
an isolated recovery.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
24 Modern Infrastructure For Dummies, Dell EMC #GetModern Special Edition
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Maxing out all-flash performance for
mission-critical workloads
Chapter 4
Exploring Dell EMC All-
Flash Storage Solutions
A
dopting all-flash technology is key to keeping pace with
and exceeding customer demands in today’s digital world.
While flash is the foundation that drives your modern
infrastructure, the secret to outperforming your competition lies
in innovative software features and flash-designed architectures
that come together to deliver higher performance, lower total cost
of ownership (TCO), and better business outcomes for you and
your company. In this chapter, you learn about Dell EMC’s port-
folio of all-flash storage solutions.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Dell EMC VMAX All Flash arrays are architected to solve the chal-
lenge of embracing a modernized flash-centric data center and
hybrid cloud while simultaneously simplifying, automating, and
consolidating IT operations. VMAX All Flash is engineered for the
latest high-density flash technology and to specifically exploit
the rich set of data services of VMAX All Flash. These data services
address the new requirements of the modern data center while
continuing to deliver reliability and “6 nines” mission-critical
availability.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Dell EMC XtremIO
Dell EMC XtremIO is a purpose-built all-flash array that offers
consistently high performance and sub-millisecond latency,
inline storage efficiency (compression & dedupe), all-the-time
data services, rich application integrated copy services, and man-
agement simplicity. XtremIO architecture is based on a metadata-
centric, content-aware system.
XtremIO delivers:
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
data on the fly, as it enters the system. XtremIO in-memory dedu-
plication is global—across the entire XtremIO cluster irrespective
of the number of X-Bricks in a cluster. This means that XtremIO
only writes unique data — data that the entire cluster didn’t see
in its I/O history — to the SSDs. These inline storage efficien-
cies not only reduce SSD storage requirements but also improve
performance and longevity of the media while driving down cost.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Dell EMC Unity
Dell EMC Unity storage solutions are designed for midrange
unified storage needs. Dell EMC Unity All-Flash and Hybrid Flash
storage platforms optimize solid-state drive (SSD) performance
and efficiency, with fully integrated storage area network (SAN)
and network-attached storage (NAS) capabilities, and cloud-
based storage analytics. Dell EMC Unity solutions include
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Unified for block as well as transactional and traditional
file workloads
»» Converged, software-defined and cloud-enabled
»» Online data-in-place controller upgrades
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
arrays. Live Volume lets you meet ZERO RTO/RPO objectives, and
actually auto-repairs your high-availability environment when a
downed array comes back online.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
fast data replication along with push-button failover and
failback simplicity, to further increase the availability of data
for mission-critical applications.
»» Security: To address compliance and governance require-
ments, Isilon provides robust security options, including file
system auditing and Data at Rest Encryption (DARE) with
self-encrypting drives (SEDs). Isilon offers write once, read
many (WORM) data protection to prevent accidental or
malicious alteration or deletion and help you meet regula-
tory requirements. You can also leverage role-based access
control (RBAC) options and, if needed, create isolated
storage pools for specific departments within your
organization.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Discovering Dell EMC VxBlock converged
systems
Chapter 5
Learning About Dell EMC
Converged and Hyper-
Converged Solutions
C
onverged infrastructure brings together disparate infra-
structure elements including servers, data storage devices,
networking functions, virtualization, management soft-
ware, orchestration, and applications.
In this chapter, you learn about Dell EMC’s converged and hyper-
converged storage solutions.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Dell EMC VxBlock
Dell EMC VxBlock converged systems integrate enterprise-class
technologies — including compute, network, storage, virtualiza-
tion, and management — into one engineered system. These sys-
tems deliver simple IT solutions for a broad range of use cases,
significantly reducing costs, time-to-deploy, and on-going
management/maintenance-time, thereby enabling your IT staff
to spend more time focused on business outcomes and new ini-
tiatives, rather than managing the IT infrastructure and keeping
the lights on.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
cloud environment healthy, stable, optimized, and secure. The
software manages compute, network, storage, and virtualization
components together as a single system, and multiple systems as
a single pool of resources. Functions include health, RCM compli-
ance, and security compliance management.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
A wide range of platforms and configure-to-order hardware are
designed to address any use case. Single node scaling and storage
capacity expansion provide a predictable, “pay-as-you-grow”
approach for future scale up and out as your business and user
requirements evolve. With different optimized models for differ-
ent use cases and workloads, customers can quickly choose and
deploy their hyper-converged infrastructure based on their needs.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Scaling out with Dell EMC ScaleIO
software
Chapter 6
Introducing Dell EMC
Software-Defined
Storage Solutions
T
he benefits of server virtualization are well understood in
the modern data center. By abstracting, pooling, and auto-
mating compute resources, companies have achieved sig-
nificant savings. In the past decade, web-scale companies like
Google and Amazon have demonstrated the ability to operate data
centers with ruthless efficiency. Dell EMC ScaleIO Software-
Defined Storage applies the principles of abstraction, pooling, and
automation to local storage in standard x86 servers, creating a
high-performance shared storage service without the need for
conventional storage arrays. ScaleIO also enables a highly effi-
cient data center operating model. Combined, these capabilities
deliver a radical reduction in storage life cycle costs.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Dell EMC ScaleIO
Dell EMC ScaleIO is software that creates a server-based stor-
age area network (SAN) from local application server storage to
deliver flexible and scalable performance and capacity on demand.
It converges storage and compute resources of commodity hard-
ware into a single-layer architecture — aggregating capacity and
performance, simplifying management, and scaling to thousands
of nodes.
Massive scalability
ScaleIO is designed to massively scale from three to thousands
of nodes. Unlike most traditional storage systems, as the num-
ber of storage devices grows, so do throughput and input/output
operations per second (IOPS). The scalability of performance is
linear with regard to the growth of the deployment. Whenever the
need arises, additional storage and compute resources (that is,
additional servers and/or drives) can be added modularly so that
resources can grow individually or together to maintain balance.
Therefore, storage growth is always automatically aligned with
application needs.
Extreme performance
Every server in the ScaleIO cluster is used in the processing of I/O
operations, making all I/O and throughput accessible to any appli-
cation within the cluster. Such massive I/O parallelism eliminates
bottlenecks. In addition, throughput and IOPS scale in direct pro-
portion to the number of servers and local storage devices added
to the system, improving cost and performance rates with growth.
Performance optimization is automatic; whenever rebuilds and
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
rebalances are needed, they occur in the background with mini-
mal or no impact to applications and users. The ScaleIO system
autonomously manages performance hot spots and data layout.
Unparalleled flexibility
ScaleIO provides two flexible deployment options (see Figure 6-1):
Supreme elasticity
With ScaleIO, storage and compute resources can be increased
or decreased whenever the need arises. The system automati-
cally rebalances data on the fly with no downtime. Additions and
removals can be done in small or large increments. No capacity
planning or complex reconfiguration due to interoperability con-
straints is required, which reduces complexity and cost.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Also, the ScaleIO system reconfigures itself as the underlying
resources change; data is rearranged and spread evenly on the
servers to optimize performance and enhance resiliency. All of
this happens automatically, without operator intervention, elimi-
nating the need for costly and disruptive data migrations.
Essential features
ScaleIO offers a set of features that enable complete control over
performance, capacity, and data location. For both private cloud
data centers and service providers, these features enhance sys-
tem control and manageability — ensuring that QoS performance
requirements are met. With ScaleIO, you can limit the amount
of performance — IOPS or bandwidth — that selected tenants
can consume. The limiter allows for resource distribution to be
imposed and regulated, preventing application “hogging” sce-
narios. CloudLink encryption software can be used to provide
added security for sensitive data. ScaleIO offers instantaneous,
writeable snapshots for additional data protection.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» ScaleIO software: Delivers the maximum flexibility and
installs directly on your x86 standard server hardware and
infrastructure.
»» ScaleIO ReadyNode: Bundles Dell PowerEdge servers and
ScaleIO software, enabling you to quickly deploy a fully
architected software-defined, scale out, server SAN (see
Chapter 5). Note: ReadyNodes are only available with Dell
PowerEdge servers.
»» VxRack Flex: A fully integrated, turnkey, hyper-converged
solution which leverages ScaleIO, enabling you to hit the
ground running (I discuss this in Chapter 5).
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Faster app development: Application programming
interface (API) accessible storage and strong consistency
accelerates cloud apps and analytics
»» Turnkey cloud: Multi-tenancy, self-service access, and
metering capabilities
Modern archive
Moving cold data off Tier 1 storage for archive and long term
retention purposes in an important activity for every organiza-
tion today. Public cloud storage services can offer flexible virtual
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
machine (VM) deployments, easy to manage platforms, and a low
upfront cost to start. However, concerns around security, compli-
ance, vendor lock-in, and unpredictable costs can quickly become
a major issue. ECS provides all the benefits of public cloud in an
on-premises, cloud-scale object archiving solution for inactive
workloads.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Storage for next-generation
applications
Enjoy quick and easy access to storage from your next-generation
applications — mobile, cloud, big data, and IoT with ECS. Like
public cloud storage, ECS is simple to manage as a singular entity
from a central location with its globally distributed infrastruc-
ture. With “Exabyte scale” storage, IT organizations can manage
billions of multi-size objects with ease. ECS is optimized to sup-
port ingest of and access to both small and large files with strong
global consistency.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Exploring Data Domain data protection
solutions
Chapter 7
Getting to Know Dell
EMC Data Protection
Solutions
I
n this chapter, you discover the Dell EMC data protection solu-
tions, including Dell EMC Data Domain, Dell EMC Data
Protection Suite, and cloud backup and protection options.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The key to DD OS performance while minimizing disk require-
ments is the Stream-Informed Segment Layout (SISL) scaling
architecture. Specifically, SISL leverages the continued advance-
ment of CPU performance to continuously increase Data Domain
system performance by minimizing disk accesses required to de-
duplicate data. SISL de-duplicates data by identifying duplicate
data segments in memory, which minimizes disk usage. This
enables Data Domain throughput to be CPU-centric, not “spindle
bound.”
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
needs. The Data Protection Suite provides comprehensive data
protection to enterprise organizations of any size, for a broad
range of applications from edge to core to cloud.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Data Protection Suite for VMware: End-to-end data
protection for VMware-based environments including
backup and recovery, continuous replication, monitoring and
analysis, and search capabilities. This offering is a software-
only data protection solution that delivers simplified
deployment and administration within virtualized and cloud
environments.
»» Data Protection Suite for Archive: Best-in-class archive
and eDiscovery solutions for email, files, and collaboration
systems. As a part of the Data Protection Suite, this solution
gives organizations full ownership and control over their
information. Organizations have the ability to reduce costs
by reclaiming valuable primary data storage space, optimiz-
ing server and operational performance, and meeting
company compliance regulations, and eDiscovery and
litigation needs.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Determining your starting point in digital
transformation
Chapter 8
Ten Questions to Assess
Your IT Transformation
Maturity
IT Transformation Assessment
To know where you’re going, it’s important to know first where
you are on your journey to digital transformation.
Dell EMC offers a free assessment that shows where your orga-
nization stands in the IT transformation spectrum. Based on
your results, you see next steps recommended to accelerate your
progress.
You can access the free Dell EMC online assessment at www.
dellemc.com/en-us/storage/it-transformation-assessment/
index.htm.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The IT transformation assessment asks the following questions
about your organization:
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Dell EMC #GetModern Assessment
With the insights you gain from the IT Transformation Assess-
ment, your next step is to schedule a Dell EMC #GetModern
assessment. A #GetModern assessment is a consultative process
that produces a comprehensive proposal which demonstrates
the value of a modern infrastructure. The #GetModern assess-
ment helps you identify infrastructure throughout your data
center and readily identify performance and capacity bottlenecks.
Enterprises need to modernize, automate, and transform their
data centers, regardless of their current level of transformation
maturity. A #GetModern assessment can help you get started with
an in-depth look at your storage needs. Visit www.dellemc.com/
getmodern to get started.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.