Documente Academic
Documente Profesional
Documente Cultură
and Management
information optimally
-2
Protect
Optimize
Leverage the
-3
-4
What
is
Data
Collection of raw facts from which conclusions may be drawn
Data is converted into more
Video
Photo
technology
Book
-5
Letter
01010101010
10101011010
00010101011
01010101010
10101010101
01010101010
Digital Data
Categories of Data
Data can be categorized as either
E-Mail Attachments
X-Rays
Manuals
Images
Forms
Contracts
Check
PDFs
Unstructured (80%)
Instant Messages
Documents
Web Pages
Rich Media
Invoices
Audio Video
Structured (20%)
Rows and Columns
Information
What do individuals/businesses do
Centralized information
storage and processing
Network
Network
Wireless
Wireless
Uploading
information
Wired
Accessing
information
Users of
Information
Creators of
information
Customer satisfaction/service
Tracking shipments, and deliveries
New services
Security alerts for stolen credit card purchases
-8
Storage
processing
Type of storage used is based on the type of data and the rate at
which it is created and used
Examples:
Individuals: Digital camera, Cell phone, DVDs, Hard disk
Big Data
It refers to data sets whose sizes are beyond the ability of commonly used
software tools to capture, store, manage, and process within acceptable
time limits.
variety of sources
Big data in real time requires new techniques and tools that
provide:
High performance
Massively parallel processing (MPP) data platforms
Advanced analytics
10
Storage
Stores data created by individuals and organizations
Provides access to data for further processing
Disk drives
Disk arrays
Tapes
11
Department 1
Server
Department 2
Server
Department 2
Server
Department 3
Server
Department 3
Server
Storage
Network
Server-centric Storage Architecture
Storage Device
Information-centric Storage Architecture
12
Data Center
It is a facility that contains storage, compute, network, and other IT
resources to provide centralized data-processing capabilities.
Application
Database management system (DBMS)
Host or Compute
Network
Storage
requirements
13
LAN
FC SAN
Multi Protocol
Router
IP SAN
RAID Array
JBOD
Internal DAS
- 14
Time
SAN / NAS
- 15
Lesson Summary
Key points covered in this lesson:
Importance of information
Data, information and storage
Categories of data
Storage architectures and their evolution
- 16
Data Integrity
Manageability
Capacity
Performance
Scalability
17
Provisioning
18
Virtualization: An Overview
Virtualization is a technique of abstracting physical resources
19
resources quickly
Enables consumption-based metering
Consumers pay only for the resources they use
Example: CPU hours used, amount of data transferred, and Gigabytes of
data stored
20
Summary
Key points covered in this module:
Data and information
Types of data
Big data
Evolution of storage architecture
Core elements of data center
Key characteristics of data center
Virtualization and cloud computing
21
Server/ OS
Client
LAN
Application
User
Interface
FC SAN
DBMS
Storage Array
- 22
Data Integrity
Manageability
Capacity
Performance
Scalability
- 23
tomorrow.
- 24
New
order
Process
order
Deliver
order
Warranty
claim
Time
Value
Fulfilled
order
Create
- 25
Access
Aged
data
Migrate
Warranty
Voided
Archive
Dispose
Implement
policies with
information
management
tools
Integrated
management
of storage
environment
FLEXIBLE
- 26
Organize
storage
resources to
align with data
classes
Simplified management
Simplified backup and recovery
Maintaining compliance
Lower Total Cost of Ownership
- 27
Lesson Summary
Key points covered in this module:
The five core elements of a Data Center infrastructure
Key requirements of storage systems to support business
activities, as well as some of the constraints
ILM strategy
Importance
Characteristics
Activities in developing ILM strategy
ILM implementation
Benefits of ILM
- 28
Module Summary
Key points covered in this module:
Importance of data, information, and storage infrastructure
Types of data, its value, and key management requirements of
a storage system
Evolution of storage architectures
Core elements of a data center
Importance of the ILM strategy
- 29