Skip to main content

Local Govt loves Datacore

“A total virtualization environment across servers and storage really gives us tremendous flexibility in terms of what we can do,” K.C. Roestenberg, director, business IT shared services, County of Orange.

The Orange County Data Center (OCDC) hosts many different servers – both virtual and physical – using a combination of VMware and physical hosts that support other outlying agencies within the County of Orange. Before DataCore was added to virtualize, consolidate and mange the SANs, OCDC had two HP Enterprise Virtual Arrays (EVAs) storing their data and they had just finished purchasing their third EVA – supporting their third separate storage area network.

Bottom-line:
OCDC had three business objectives for deploying DataCore’s SANsymphony™: 1) Consolidating multiple SANs for ease of management and improved utilization; 2) Alleviating data migration issues from SAN-to-SAN and making that more efficient; 3) The third reason for DataCore’s adoption had to do with disaster recovery. This is more of a long-term goal; however, in the next fiscal year of the data center, the IT team will be implementing a disaster recovery site. When IT managers at OCDC were made aware of DataCore’s asynchronous capabilities with AIM, they saw the opportunity to build a SAN-to-SAN replication-type infrastructure without having to stick with HP EVA or any other hardware-specific type of storage. A remote site DataCore mirrored SAN scenario will enable OCDC to be able to leverage older storage solutions or even direct-attached storage at a DR site.


Press Release

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op

Virtualization is hot and sexy!

If this does not convince you to virtualize, believe me, nothing will :-) As you will hear these gorgeous women mention VMware, Akkori, Pano Logic, Microsoft and VKernel. They forgot to mention rackspace ;-) virtualization girl video I'm convinced, aren't you? Check out their site as well!