Monday, February 26, 2018

"Week 12 posting"



This weeks chapter on performance and troubleshooting was very in-depth. There was a lot of information dealing with proper optimization and performance with storage devices that used within the storage area network. One of the things I thought was interesting was the way IOPS (output operations per second) is used to measure storage performance. Pending on the type of drive is being used, IOPS measures the performance speed of your system to determine if the required performance is provided by a system for an application.  Synchronization and proper bandwidth gives your storage device the best chance of optimal performance.

Monday, February 19, 2018

"week 11 posting"

This weeks chapter on data different types of storage management was very detail on giving you various types of management for storage systems.  With the use of data migration, compliance, deduplication, and compression, gives you the option to format your data and store it using 3 types of storage tiers, manual storing tiering gives  you the option to collect your information on a set of drives and then manually placed them on a different type drive based on performance. Automated storage tiering, has the option to dynamically move data between different disks with the use of Serial Attached Technology (SATA), and Redundancy Array of Independent Disk (RAID). These types of are organized based on their type of speed. Deduplication and Compression are used to store data with one file copy and replaces any duplicates, this helps with the reduction of redundancy.

Wednesday, February 14, 2018

"Week 10 Blog posting"



This week chapter on environmental considerations when selecting a viable place for equipment that is used in a data center was very easy to understand. I like the way the sections broke down the various types storage racks and the best avenues of cooling ventilation and temperature methods to maximize the performance of equipment being used in server or data rooms. Having the right type of fire suppression system available in case of fire will result in minimal devices and equipment having to be completely destroyed, or having to replace equipment. When deciding to install rack servers, you want to make sure that the proper power is being used to handle to load on the equipment so they are not overloaded. Various UPS are available to help balance the load for each device so they all-consuming the proper voltage needed.

Tuesday, February 6, 2018

Week 9 Blog Posting"


I like  this weeks chapter on how storage systems can be design and provide the proper functionality for redundancy with limited downtime. Using cloud services such as Software as a service (Saas), gives you the option to surf the web thru an virtual interface without the use of client software. Platform as a service (PaaS),  uses a cloud-based with the use an operating system and database  that allows users to use applications that will support their data storage so their web site is able to fuction properly. Having the right devices and hardware such as Host bus adapters ,Network interface cards, and switches help with configuring , storing and connecting to the storage area networks.

Monday, January 29, 2018

"Week 8 Blog Posting"



In this week reading in chapter 8 on Security, it had a lot of good information ranging from access controls, types of permissions and encryption. I thought the encryption section was very useful information with good detail in the various types of categories like Symmetric-key encryption and Asymmetric-key encryption. These computer systems are used with computers or devices either in the home or business sector in order to keep data encrypted with use of one or multiple keys. When these encryptions are used there are several ways to protect your data from being compromised on the network, one of these options is the use of Disk Encryption. This technology is used to convert your data into a code that is unreadable, and that only authorized by an administrator that has the permissions to decipher and read it. Another type of encryption that is used is File Encryption. This technology is also used by companies to safeguard their information with the use of a filing system. It works similar to disk encryption, but it does it by encrypting files individually.

Tuesday, January 23, 2018

"Week 7 Blog Posting"



This week's reading on Business Continuity was in an interesting chapter read.  Even though it was about 23 pages, it was informal. I like the way it broke down the options with uses of storage you can use from tapes, CD-ROM, or external hard drives. Pending on how much your company wants to spend, these options all have a certain percentage rate for backup success on your network. Implementing backup implementations like LAN-free and serverless backup up will increase the amount of time when backup storage because LAN-free will give you the option to back up the data to the server without the use of a LAN, by using tape device that is directly connected to a storage media. Which the use of Serverless backup, no bandwidth is used so it chooses what should be back up with the use of Fibre Chanel or SCSCI.  Having offsite locations for storing data will give you the option when picking the right company that specializes in protecting all the data that needs to stored.  You want to make sure that the company that you use has the compacity to storage data without running out of space, and have measures in place in case of natural disasters.

Wednesday, January 17, 2018

Week 6 Blog


This week's reading assignment on storage management was actually pretty good. I am still new to some of these subjects, but I like learning about the content and how storage is managed, and how administrators control how much data is stored with the use of provisioning, management, monitoring. With the use of all these protocols, it gives the IT administrator the permission to gather and log information on all systems and devices, while being able to see how the data is being stored efficiently by evaluating the trends of how the networking is receiving and storing the information. This what I got out of reading this chapter, but overall a good subject on storage management.