Features and Amenities
Features and Amenities:
Wifi ready study area
Gym and Function Room
Features and Amenities:
2 Lap Pools
Ground Floor Commercial Areas
Features and Amenities:
3 Swimming Pools
Gym and Fitness Center
Outdoor Basketball Court
Contact us today for a no obligation quotation:
Copyright © 2018 SMDC :: SM Residences, All Rights Reserved.
I want modern dumps of 000-454 examination.
Despite the fact that i have sufficient heritage and revel in in IT, I expected the 000-454 exam to be simpler. killexams.com has savedmy time and money, with out those QAs i would have failed the 000-454 exam. I were given burdened for few questions, so I almosthad to bet, but this is my fault. I need to have memorized well and pay attention the questions higher. Its pinnacle to comprehend that I passed the 000-454 exam.
000-454 certification examination is pretty worrying without this observe manual.
I passed the 000-454 exam thanks to this bundle. The questions are accurate, and so are the topics and study guides. The format is very convenient and allows you to study in different formats - practicing on the exam simulator, reading PDFs and printouts, so you can work out the style and balance thats right for you. I personally loved practicing on the exam simulator. It fully simulates the exam, which is especially important for 000-454 exam, with all their specific question types. So, its a flexible yet reliable way to obtain your 000-454 certification. Ill be using killexams.com for my next level certification exams, too.
Did you attempted this amazing supply ultra-modern dumps.
yes, very beneficial and i was able to marks eighty two% inside the 000-454 exam with five days preparation. especially the facility of downloading as PDF documents on your bundle gave me a terrific room for effective practice coupled with online tests - no restricted attempts limit. answers given to every query by using you is one hundred% accurate. thank you plenty.
amazed to peer 000-454 real test questions!
I passed the 000-454 exam. It was the first time I used killexams.com for my preparation, so I didnt know what to expect. So, I got a pleasant surprise as killexams.com has stunned me and totally passed my expectations. The exam simulator/practice tests work great, and the questions are valid. By valid I mean that they are REAL exam questions, and I got many of them on my actual exam. Very reliable, and I was left with great impressions. I would not hesitate to recommend killexams.com to my colleagues.
I need dumps of 000-454 examination.
Its concise answers helped me to accomplish good marks noting all questions under the stipulated time in 000-454. Being an IT master, my abilities with respect are so forth need to be good. Not withstanding, proceeding with a customary employment with gigantic obligations, it was not simple for me to take a solid planning. At that point, I found out about the generally organized question and answer aide of killexams.com dumps.
Get p.c. of understanding to prepare 000-454 exam. best for you.
I ought to appreciate that your answers and factors to the questions are excellent. those helped me understand the basicsand thereby helped me try the questions which had been not direct. I ought to have handed with out your questions and answers, however your questions bank and ultimate day revision set have been definitely beneficial. I had predicted a marks of 90+, however despite the fact that scored eighty three.50%. thanks.
Got no problem! 3 days preparation of 000-454 actual test questions is required.
i used to be trying to get prepared for my 000-454 test that changed into across the corner, i discovered myself to be lost inside the books and wandering far far from the real factor. I didnt apprehend a unmarried word and that changed into truely regarding because I had to prepare as quickly as feasible. Giving up on my books I determined to register myself on this killexams.com and that turned into the first-class decision. I cruised thru my 000-454 test and was able to get a decent marks so thanks very an awful lot.
Weekend examine is enough to pass 000-454 examination with I got.
I passed the 000-454 exam. It was the first time I used killexams.com for my practise, so I didnt recognise what to anticipate. So, I got a nice marvel as killexams.com has greatly surprised me and completely handed my expectations. The trying out engine/exercise tests work high-quality, and the questions are valid. By legitimate I mean that theyre REAL exam questions, and I were given many of them on my real exam. Very dependable, and I become left with brilliant impressions. I would not hesitate to endorse killexams.com to my colleagues.
000-454 exam isn't any greater tough with these QAs.
every single morning i would take out my strolling shoes and determine to exit walking to get some sparkling air and experience energized. But, the day earlier than my 000-454 test I didnt experience like strolling in any respect because i was so concerned i would lose time and fail my check. I had been given precisely the element I had to energize me and it wasnt going for walks, it became this killexams.com that made a pool of educational statistics to be had to me which helped me in getting right rankings within the 000-454 test.
simply attempt those dumps and success is yours.
Well, I did it and I cant consider it. I should never have passed the 000-454 with out your assist. My marks was so excessive I changed into amazed at my overall performance. Its simply due to you. Thank you very an awful lot!!!
IBM to Open Quantum Computation core for industrial consumers in Poughkeepsie, new york
YORKTOWN HEIGHTS, N.Y., Jan. 8, 2019 /PRNewswire/ -- at the 2019 client Electronics show (CES), IBM (NYSE: IBM) today unveiled IBM Q device One™, the world's first built-in widely wide-spread approximate quantum computing equipment designed for scientific and industrial use. IBM additionally introduced plans to open its first IBM Q Quantum Computation middle for industrial shoppers in Poughkeepsie, ny in 2019.
IBM Q methods are designed to sooner or later tackle complications that are presently viewed as too advanced and exponential in nature for classical techniques to handle. Future purposes of quantum computing may also encompass finding new ways to model fiscal facts and isolating key international risk factors to make more suitable investments, or discovering the choicest direction across international techniques for ultra-productive logistics and optimizing fleet operations for deliveries.
Designed by using IBM scientists, systems engineers and industrial designers, IBM Q system One has an advanced, modular and compact design optimized for balance, reliability and continual business use. For the primary time ever, IBM Q equipment One permits accepted approximate superconducting quantum computer systems to function beyond the confines of the analysis lab.
tons as classical computers mix assorted add-ons into an built-in structure optimized to work collectively, IBM is applying the identical method to quantum computing with the first integrated commonplace quantum computing system. IBM Q equipment One is created from a couple of customized components that work collectively to serve because the most superior cloud-primarily based quantum computing application purchasable, together with:
The IBM Q Quantum Computation center
The IBM Q Quantum Computation middle opening later this 12 months in Poughkeepsie, new york, will expand the IBM Q community commercial quantum computing software, which already comprises methods at the Thomas J. Watson research core in Yorktown, big apple. This new center will house some of the world's most advanced cloud-primarily based quantum computing methods, which can be accessible to individuals of the IBM Q network, a global group of leading Fortune 500 businesses, startups, academic associations, and national analysis labs working with IBM to advance quantum computing and discover useful functions for company and science.
IBM Poughkeepsie's pleasing history in computing stretches back to the building of IBM's first line of construction company computer systems in the Nineteen Fifties, the IBM 700 sequence, and the IBM equipment/360 in the 1960s, which revolutionized the world via changing the way agencies concept about computer hardware. Now home to one of the world's most-potent classical system, the IBM mainframe, IBM Poughkeepsie is placed to be some of the few places on this planet with the technical capabilities, infrastructure and advantage to run a quantum computation core, together with access to high efficiency computing systems and a high availability data core obligatory to work alongside quantum computer systems.
"The IBM Q gadget One is an immense step ahead in the commercialization of quantum computing," spoke of Arvind Krishna, senior vice president of Hybrid Cloud and director of IBM research. "This new equipment is important in expanding quantum computing beyond the walls of the analysis lab as they work to develop practical quantum applications for company and science."
Designing a primary: IBM Q system One
IBM assembled a global-class team of industrial designers, architects, and manufacturers to work alongside IBM analysis scientists and methods engineers to design IBM Q system One, together with UK industrial and indoors design studios Map project workplace and usual Design Studio, and Goppion, a Milan-based mostly company of high-end museum screen situations that offer protection to one of the vital world's Most worthy artwork including the Mona Lisa at the Louvre, and the Crown Jewels at the Tower of London.
together these collaborators designed the first quantum gadget to consolidate hundreds of components into a pitcher-enclosed, air-tight environment developed peculiarly for company use, a milestone in the evolution of business quantum computers.
This integrated system aims to handle one of the vital difficult elements of quantum computing: constantly keeping the fine of qubits used to operate quantum computations. potent yet gentle, qubits quickly lose their special quantum homes, usually within one hundred microseconds (for state-of-the-art superconducting qubits), due in part to the interconnected machinery's ambient noise of vibrations, temperature fluctuations, and electromagnetic waves. protection from this interference is one in every of many the explanation why quantum computers and their accessories require careful engineering and isolation.
The design of IBM Q device One includes a nine-foot-tall, 9-foot-vast case of half-inch thick borosilicate glass forming a sealed, airtight enclosure that opens easily using "roto-translation," a motor-driven rotation round two displaced axes engineered to simplify the device's renovation and improve procedure whereas minimizing downtime – an extra ingenious trait that makes the IBM Q gadget One appropriate to reputable commercial use.
A series of impartial aluminum and metal frames unify, however also decouple the gadget's cryostat, handle electronics, and exterior casing, helping to stay away from capabilities vibration interference that leads to "phase jitter" and qubit decoherence.
a replica of IBM Q system One will be on screen at CES. For extra tips talk over with, here.
This new equipment marks the subsequent evolution of IBM Q, the business's first effort to introduce the general public to programmable generic quantum computing during the cloud-based mostly IBM Q journey, and the business IBM Q network platform for enterprise and science applications. The free and publicly attainable IBM Q experience has been continuously operating considering may of 2016 and now boasts more than one hundred,000 users, who have run more than 6.7 million experiments and published greater than 130 third-party research papers. builders have additionally downloaded Qiskit, a full-stack, open-supply quantum application building equipment, greater than 140,000 instances to create and run quantum computing programs. The IBM Q community includes the recent additions of Argonne national Laboratory, CERN, ExxonMobil, Fermilab, and Lawrence Berkeley country wide Laboratory.
About IBM Q
IBM Q is an business-first initiative to build industrial widespread quantum techniques for business and science purposes. For more assistance about IBM's quantum computing efforts, please talk over with www.ibm.com/ibmq.
IBM Q community™, IBM Q gadget One™, and IBM Q™ are logos of international business Machines service provider.
Media Contact:Chris NayIBM analysis Communicationscnay@us.ibm.com 720-349-2032
A rendering of IBM Q gadget One, the area's first thoroughly built-in regularly occurring quantum computing system, presently put in on the Thomas J Watson research center in Yorktown Heights, ny, where IBM scientists are using it to explore device advancements and enhancements that accelerate industrial applications of this transformational expertise. For the primary time ever, IBM Q system One enables quantum computers to operate past the confines of the analysis lab.extra
IBM organisation logo. (PRNewsFoto/IBM business enterprise) (PRNewsFoto/) (PRNewsfoto/IBM)greater
View customary content material to down load multimedia:http://www.prnewswire.com/news-releases/ibm-unveils-worlds-first-integrated-quantum-computing-gadget-for-business-use-300774332.html
January 28, 2019 Timothy Prickett Morgan
The vigor programs line, buoyed by means of the carry of excessive-end energy E980 systems for large AIX and IBM i jobs, a steady movement of IBM i device upgrades, and a few traction in vigour-based mostly Linux clusters for HPC and information analytics workloads, turned in a good looking good remaining quarter for 2018, and capped three prior quarters of increase throughout 2018 to show in a full 12 months of increase.
which you can’t tell how a lot boom, of path, but within the lead story of this challenge of The 4 Hundred, I took my most desirable stab at modeling the quarterly revenue move of the vigor techniques line given that the beginning of 2018, and in keeping with that model, I reckon that the vigour techniques line booked only a tad over $1.6 billion in sales, up 8.8 percent compared to 2017’s figures and marking the primary year of boom due to the fact 2011 and probably the most dramatic growth they now have probably viewed in an awful lot longer.
Jim Kavanaugh, IBM’s chief economic officer, talked in short with Wall highway analysts about how the energy techniques line did in q4 2018. “vigor salary become up 10 p.c, pushed by way of Linux and continued robust adoption throughout their new Power9-primarily based architecture,” Kavanaugh referred to. “in the fourth quarter, they achieved the free up of their subsequent era Power9 processors in the excessive conclusion, and they had strong adoption in both the low and high-conclusion techniques. Their Power9 programs are designed for managing superior analytics, cloud environments, and data intensive workloads in AI, SAP HANA, and Unix markets and they now have extended HANA certification to their Power9 excessive end. within the fourth quarter, they had powerful initial traction with their new choices that optimize both hardware and application for AI, similar to PowerAI vision, which they delivered in the 2d half of 2018. And they have virtually completed the deployment of their supercomputers at the U.S. branch of power labs within the quarter.”
That changed into a $325 million deal, which IBM has been booking all the way through 2018 as machines rolled in and the “Summit” desktop at o.k.Ridge countrywide Laboratory and the “Sierra” machine at Lawrence Livermore country wide Laboratory handed degrees of qualification tests.
What they might in fact want to understand is how 2019 is asking, and this is all Kavanaugh had to say when poked that query: “We continue to bring new innovation to market to deliver value for their clients in their Power9 structure, which is resonating well in the industry. And they received great acceptance, and grew 10 percent within the fourth quarter. They predict to be able to continue to play out in 2019. So they now have bought a great ebook of company right here and some tailwinds at us.”
Tailwinds are all the time respectable, in case you are attempting to make up for misplaced time in specific, so that’s decent.
So how did the leisure of huge Blue fare? Let’s take a look. within the closing quarter of 2018, IBM’s revenues dipped by way of 3.5 % to $2176 billion and net profits became $1.95 billion, which turned into twice as large in magnitude as the loss that IBM reported in this fall 2017 as a result of some write-offs. IBM pushed $2.sixty two billion in system and storage hardware and operating systems to exterior purchasers in the fourth quarter, down 21.three p.c, plus yet another $238 million in iron to different IBM gadgets. IBM had $551 million in pre-tax revenue for the combined internal and external revenue, which become 19.3 percent of revenue. My ultimate guess, considering the fact that IBM doesn’t provide out precise numbers, is that IBM sold $2.17 billion in hardware (servers and storage) plus an additional $447 million in working techniques.
in the event you add all of the base working device, middleware, database, programming equipment, tech assist, and financing on true of the equipment z and energy methods traces, plus external disk, flash, and tape storage, IBM has quite an superb business. a good deal better than the gadget hardware and working system figures that it reports on a quarterly basis to Wall street. here is the breakdown of IBM’s revenue throughout its divisions, which is the beginning element for estimating IBM’s true and actual systems business:
From this, I drill down into every division and estimate how a great deal of each division’s revenue is chiefly for IBM’s own system z and power methods structures and the connected storage product revenue. in case you make some guesses – and i should, as can they all outside of the company – then a suppose for the true programs company emerges. And this doesn't encompass compute, storage, and networking means sold on the IBM Cloud, which is a further animal utterly.
Suffice it to assert that this is an attractive gigantic business certainly, with gross profits throughout the mixed platforms that are in the latitude of 55 % to 60 % of revenues usually. here is relatively respectable, and is a plenty stronger programs business than IBM itself talks about. in the fourth quarter, I reckon that this company definitely declined via 11 percent or so, to $7.41 billion, however that changed into mainly due to the gadget z14 mainframe improve cycle running its path after five quarters of income. IBM spoke of in its record that system z revenues were down 44 p.c 12 months-on-yr within the fourth quarter at regular forex, and that truly harm. power techniques sales cannot, as yet, make up the change.
That stated, power methods income are on the upward push, and have tremendous prospects in HPC, records analytics, computer learning. in-memory processing, and different advanced workloads as smartly because the consistent freddy ERP purposes that have been on IBM i and AIX systems for many years. it's difficult to think about that IBM can push revenue up as high as they had been lower back in 2010 through 2012, but it surely can get some of the way returned there. One other component: I don't have any conception what energy systems operating IBM i earnings are, however what I do understand is that IBM i income have been riding salary increase all the way through 2018, and when you add in the software, services, and financing atop of this, here's nevertheless a fairly large and in reality ecocnomic enterprise. Which is a pretty good component for the long-time period possibilities of IBM i.linked stories
systems A bright Spot In combined outcomes For IBM
The Frustration Of not figuring out How we're Doing
energy techniques Posts boom within the First Quarter
IBM’s programs group On The fiscal Rebound
huge Blue earnings, Poised For The Power9
The energy Neine Conundrum
IBM Commits To Power9 enhancements For big vigor methods shops
OVERLAND PARK, Kan., Jan 31, 2019 (GLOBE NEWSWIRE by way of COMTEX) -- OVERLAND PARK, Kan., Jan. 31, 2019 (GLOBE NEWSWIRE) -- TSANet (Technical guide Alliance network), a multi seller help alliance, has appointed Duane Watkins, software Director for prime-end Storage at IBM, to the TSANet Board of directors.
"IBM has been a key member of TSANet due to the fact its inception in 1993. In its tenure, IBM has taken a number of management positions in the alliance and i'm very a whole lot eager for Duane's contribution and participation in TSANet at a Board of Director stage," mentioned Dennis Smeltzer, TSANet president. "With the up-coming changes to TSANet, his skill units are very complementary to both IBM and TSANet's goals in presenting better collaboration amongst the membership."
Duane is responsible for the realm-broad consumer help mission for the DS8000 sequence product. He has event in successfully managing consumer service relationships outcomes and has developed a technique for managing excessive performing groups in the aid self-discipline with a spotlight on innovation, advantage, problem decision suggestions and worker retention. Duane works daily with international main monetary institutions helping to keep high availability and decreased downtime.
Duane serves with TSANet board members: Rene Karel (VMware), Doug Jones (NetApp), Jim West (Citrix techniques), Kenny bathroom toilet (Dell EMC), Richard lengthy (Actian organisation), Charlotte put up (Cisco systems), Uwe Schaefer (Hewlett-Packard commercial enterprise), Michelle Huenink (Microsoft), Deepak Chawla (Nutanix) and Sandra Falzarano (pink Hat).
About TSANetFounded in 1993, TSANet (Technical aid Alliance network) is a world, dealer neutral assist alliance that presents an business-extensive discussion board to facilitate servicing multi dealer customers whereas offering an infrastructure for greater efficient multi dealer problem solving. Membership carries greater than 600 software and hardware groups. TSANet will also be reached at (913) 345-9311 or at www.tsanet.org.
business and product names mentioned can be logos or registered emblems of their respective businesses.
Editorial Contact:Brittany Jimerson, TSANet(913) 345-9311
(C) Copyright 2019 GlobeNewswire, Inc. All rights reserved.
Unquestionably it is hard assignment to pick dependable certification questions/answers assets regarding review, reputation and validity since individuals get sham because of picking incorrectly benefit. Killexams.com ensure to serve its customers best to its assets concerning exam dumps update and validity. The vast majority of other's sham report dissension customers come to us for the brain dumps and pass their exams joyfully and effortlessly. They never trade off on their review, reputation and quality on the grounds that killexams review, killexams reputation and killexams customer certainty is imperative to us. Uniquely they deal with killexams.com review, killexams.com reputation, killexams.com sham report objection, killexams.com trust, killexams.com validity, killexams.com report and killexams.com scam. On the off chance that you see any false report posted by their rivals with the name killexams sham report grievance web, killexams.com sham report, killexams.com scam, killexams.com protest or something like this, simply remember there are constantly awful individuals harming reputation of good administrations because of their advantages. There are a huge number of fulfilled clients that pass their exams utilizing killexams.com brain dumps, killexams PDF questions, killexams hone questions, killexams exam simulator. Visit Killexams.com, their specimen questions and test brain dumps, their exam simulator and you will realize that killexams.com is the best brain dumps site.
NS0-181 brain dumps | 9A0-084 real questions | 2V0-622 study guide | C9020-560 free pdf | CN0-201 bootcamp | 000-R25 dump | HP0-082 Practice Test | JN0-314 practice questions | CNN questions and answers | HP2-E35 pdf download | 000-048 exam prep | MOS-OXP dumps | HH0-280 braindumps | JN0-311 braindumps | 200-125 practice test | A00-206 study guide | 000-M72 test prep | 600-455 study guide | 1Z0-511 examcollection | HP0-738 free pdf |
Passing the 000-454 exam is simple with killexams.com
killexams.com give latest and refreshed Pass4sure Practice Test with Actual Exam Questions and Answers for new syllabus of IBM 000-454 Exam. Practice their Real Questions and Answers to Improve your insight and pass your exam with High Marks. They guarantee your accomplishment in the Test Center, covering each one of the subjects of exam and enhance your Knowledge of the 000-454 exam. Pass with no uncertainty with their correct questions.
Are you looking for IBM 000-454 Dumps containing real exams questions and answers for the IBM High-End Tape Technical Solutions V7 Exam prep? killexams.com is here to provide you one most updated and quality source of 000-454 Dumps that is http://killexams.com/pass4sure/exam-detail/000-454. They have compiled a database of 000-454 Dumps questions from actual exams in order to let you prepare and pass 000-454 exam on the first attempt.
killexams.com Huge Discount Coupons and Promo Codes are as under;
WC2017 : 60% Discount Coupon for all exams on website
PROF17 : 10% Discount Coupon for Orders greater than $69
DEAL17 : 15% Discount Coupon for Orders greater than $99
DECSPECIAL : 10% Special Discount Coupon for All Orders
killexams.com helps a large number of hopefuls pass the exams and get their certifications. They have a large number of effective audits. Their dumps are solid, reasonable, updated and of really best quality to beat the troubles of any IT certifications. killexams.com exam dumps are latest updated in very outflank way on general premise and material is discharged occasionally. Latest killexams.com dumps are accessible in testing focuses with whom they are keeping up their relationship to get latest material.
The killexams.com exam questions for 000-454 IBM High-End Tape Technical Solutions V7 exam is for the most part Considering two open configurations, PDF and Practice questions. PDF document conveys all the exam questions, answers which makes your planning less demanding. While the Practice questions are the complimentary component in the exam item. Which serves to self-survey your advancement. The assessment instrument likewise questions your frail zones, where you have to put more endeavors with the goal that you can enhance every one of your worries.
killexams.com prescribe you to must attempt its free demo, you will see the instinctive UI and furthermore you will think that its simple to modify the readiness mode. In any case, ensure that, the real 000-454 item has a bigger number of highlights than the preliminary adaptation. On the off chance that, you are satisfied with its demo then you can buy the actual 000-454 exam item. Profit 3 months Free endless supply of 000-454 IBM High-End Tape Technical Solutions V7 Exam questions. killexams.com offers you three months free endless supply of 000-454 IBM High-End Tape Technical Solutions V7 exam questions. Their master group is constantly accessible at back end who updates the substance as and when required.
killexams.com Huge Discount Coupons and Promo Codes are as under;
WC2017: 60% Discount Coupon for all exams on website
PROF17: 10% Discount Coupon for Orders greater than $69
DEAL17: 15% Discount Coupon for Orders greater than $99
DECSPECIAL: 10% Special Discount Coupon for All Orders
000-454 | 000-454 | 000-454 | 000-454 | 000-454 | 000-454
Killexams LE0-583 practice questions | Killexams H13-621 free pdf | Killexams C2180-374 VCE | Killexams 1Z0-054 braindumps | Killexams 000-884 pdf download | Killexams CAT-241 free pdf | Killexams 250-265 questions answers | Killexams 1Z1-522 practice test | Killexams P2020-079 dumps questions | Killexams 70-536-VB exam questions | Killexams 4A0-109 real questions | Killexams C2090-621 Practice Test | Killexams 642-883 questions and answers | Killexams BCBA dump | Killexams HP0-J34 study guide | Killexams 050-SEPROSIEM-01 test prep | Killexams HP0-A113 sample test | Killexams C2170-051 braindumps | Killexams HP2-B70 braindumps | Killexams HP0-K02 practice exam |
Killexams HP0-512 examcollection | Killexams 190-982 pdf download | Killexams 700-001 real questions | Killexams 650-295 exam questions | Killexams HP0-763 braindumps | Killexams PSAT dump | Killexams M2065-741 study guide | Killexams 9A0-901 cram | Killexams 00M-226 real questions | Killexams C2040-420 braindumps | Killexams 310-810 VCE | Killexams 000-797 bootcamp | Killexams E20-575 test prep | Killexams 9L0-612 practice exam | Killexams 2B0-104 dumps | Killexams CAPM practice test | Killexams P2170-037 braindumps | Killexams EX0-102 real questions | Killexams JN0-696 brain dumps | Killexams DES-1721 exam prep |
(IDG) -- This is a story about programmers and systems administrators who, by and large, don't want to speak on the record because they're afraid of being fired. They're smugglers who sneak unapproved operating systems into corporate offices without telling upper management. These activities aren't in the same league as gunrunning or drug trafficking, but that doesn't mean you can't get fired for doing them.
In many cases, the unapproved operating systems are the so-called open-source systems, which come with all of the source code, so that a programmer can rewrite them as much as he wants. These versions, with names like Debian GNU/Linux, FreeBSD or Red Hat Linux, are produced by loosely knit groups of programmers who contribute their code into a vast commonwealth of software that can be freely shared. The members contribute what they can and have the freedom to improve the code.
At first glance, many information technology managers from traditional backgrounds recoil in horror at the thought of open-source operating systems. The freewheeling exchange of source code seems like a recipe for total chaos, and every IT manager knows that preventing chaos is the most important part of the job. No one ever got fired for buying from Microsoft Corp., IBM or Sun Microsystems Inc.
Some programmers, however, love the open-source systems. They come with all the source code, which often means less cursing at a black box. Talented programmers with a good knowledge of open-source systems can often finish jobs much faster.
Consider an engineer I'll call "Bob." He's an open-source smuggler. His boss wanted first and foremost to keep the networks running and the file servers serving. His boss believed that the best way to accomplish this was to pay one company to provide order. You get what you pay for, he assumed, and one way to get a lot is to pay a lot.
Bob's problem was simple. One of the company's newly acquired branch offices ran Windows NT and some custom software that was hard-wired to work with the old network. The new bosses insisted that Bob integrate the existing network with the new, incompatible network that had its offices in another state. Bob considered doing the job the official way. He calculated the hours, weighed the amount of red tape required to reinstall, figured out the travel time and then considered whether it was even possible to rewrite the software. The potential bill skyrocketed.
Then he had an idea. He grabbed an obsolete 50-MHz 486-based PC and installed FreeBSD on it. This Linux cousin is well-known and loved in the networking community because it's a descendant of the Berkeley Software Distribution (BSD) versions of Unix that formed the original backbone of the Internet. In fact, most Internet software was originally conceived of on machines running BSD, so it's often the most compatible operating system for Internet applications. A few days later, the old, previously discarded computer was up and running, translating the data from one system to the other and gluing the two networks together.
"It took about four days because I'm so slow at FreeBSD," Bob says, "but I could now redo the entire thing if I had to in just one afternoon."Politically correct PCs
Bob's story is a happy one. The low cost pleased his boss, and no one looked too closely at the guts of his "NT-compatible" router. The boss apparently preferred to concentrate on the price tag.
Unfortunately, many programmers are in situations like Bob's. IT departments face endless problems just keeping their data synchronized and their computers working smoothly. Everyone knows that strong rules like "Always buy Microsoft" often make life a bit simpler. But everyone also knows that it sometimes just makes good sense to break the rules.
The world of operating systems may seem like a placid environment where all the blood was shed years ago when Microsoft achieved its final dominance. That's what many managers want their IT staffs to believe: Microsoft on all machines means harmony everywhere.
But sometimes the right tool isn't made by Microsoft, IBM or whoever the dominant player happens to be. Increasingly, engineers are turning to open-source operating systems because having the source code lets them customize their work and solve the hard problems.
Another anonymous programmer reports that he got involved in a duel with a rival branch in his company that protested when it found out he was using the security-conscious OpenBSD operating system to process credit-card transactions.
"(The leader of that branch) wasn't happy and was determined to defeat us, so he decided to start a separate e-commerce organization that they would have no input into which would (have been) based entirely around Windows NT 4.0," he says. "That was in September. (Their system) still doesn't work. But the BSD kit on the other side of the company has been handling credit-card transactions securely since October."The right tool for the job
There are plenty of other success stories out there on the Net. Many of the contributors to open-source systems say the tools are more flexible and easier to adapt to complicated tasks. This feature is especially valuable when the engineers are called upon to produce new applications or offer new services over the Internet. When the machines start working successfully, the smart manager doesn't inquire too often or too closely about the operating system vendor.
The success stories can be found in some strange places. The TiVo television recorder is a kind of digital VCR that stores MPEG-encoded versions of television programs on its hard disk. The system comes with a number of new features, such as an "instant replay" that quickly jumps back seven seconds.
Underneath the user interface is the Linux operating system. TiVo Inc. in Sunnyvale, Calif., customized the operating system to speed up the real-time tasks it needed and started shipping Linux deeply embedded in the box. The TiVo user is none the wiser, because all the Linux calls are hidden from view.
The programmers involved usually cite two reasons for their success. First, the source code makes it easier for them to tweak, revise or extend the operating system. While companies like Microsoft or Sun make it possible to extend their operating systems, they often keep some of the information secret to maintain their leverage.
And because the Internet was originally built on machines running BSD, the basic protocols were specified, prototyped and finalized in that environment. Therefore, it's just easier to create new Internet applications using the original article.
That compatibility is one reason why Apple Computer Inc. is rewriting its Mac OS operating system to incorporate much of the code from the open-source community's FreeBSD and NetBSD. The core, which the company calls Darwin, is also being shared with the world in the hope of making it easier for Macintosh customers to work with the systems. Still, Apple hasn't opened up all the forthcoming Mac OS X code. The slick user interface and many of the time-saving features that attract new users are being kept proprietary.
IT professionals working with Mac OS X report mixed experiences. Those who use only the open-source parts of Darwin say they enjoy the new opportunities. But those who need access to the part that's still proprietary grouse about the restrictions.
One anonymous programmer says his boss heard his pleas for an open-source operating system and suggested Mac OS X. Because it's both open-source and a product from a big company, it has the aura of respectability and openness, he says. But in his case, the openness didn't help, and he ended up switching to FreeBSD.
Many open-source operating systems make it simple to strip away all but their most necessary parts. This flexibility makes it possible to run on less-expensive hardware and also get the maximum performance out of high-end hardware. The extra layers of gloss that make systems like Windows NT easier to understand can also make them less efficient, because they prevent a systems administrator from stripping away unnecessary functions.
"I reckon a PIII-450 properly configured with about 512MB of RAM will give me around a 400% to 500% performance increase over the incredibly expensive Sun hardware at around a tenth of the cost," says an engineer who supports open-source systems.Coping with configuration
While many programmers are quite positive about open-source solutions, some are more circumspect. Rob Newberry, a programmer at Group Logic Inc. in Arlington, Va., has been an avid fan of Linux. Some of his networking code has, in fact, been made part of the standard Linux kernel.
Still, he says that his company is thinking seriously about converting its mail server back from Linux to Windows NT. Group Logic has documented several cases where the sendmail program running on the Linux server lost an e-mail message. While it's had few other problems with Linux, he says the software is still difficult for much of the staff to manage; Windows NT is just easier for most of them to use and reconfigure. According to Newberry, saving the cost of a Windows NT license just isn't worth it.
"Even though there are some of us here who respect Linux and work on Linux, they are rapidly trying to phase it out. It just kind of becomes a maintenance headache," he says. "We have lots of engineers here. There (are) only a few of us who know the Linux tricks." The folks who know Linux have better things to do than maintain the mail system, he notes.
This effect is leading some companies to roll the operating system into their product and sell the two as a pair. Network Flight Recorder Inc. in Rockville, Md., creates software that turns a PC into a spy that watches a network for suspicious activity. Abnormal data-flow patterns that might sneak by firewalls will set off alarm bells when this device spots them.
Naturally, the creators of the product want this system to be as secure as possible, so they turned to OpenBSD, a cousin of FreeBSD designed to eliminate security holes. They stripped out extra parts of the system and built a special version of the kernel that handles only their workload. They bundled all of this on a single, bootable CD-ROM that takes over the PC.
Marcus Ranum, Network Flight Recorder's CEO, explains that the CD-ROM also simplifies the technical support. The user can't change anything on the machine, so nothing can inadvertently be screwed up.
"The CD-ROM has a bootstrap loader and a kernel and their own set of applications inside. There are no user services inside," he says. "There's nothing on this sucker except the one application. It takes about 12 minutes to install their product, and that's the time to boot up and autodetect."
Ranum says hiding the operating system from everyone, including the professionals who know how to maintain one, is a smart solution. Every system takes time to learn, and his company wants to make its Network Flight Recorder product simple to use.
Ranum says, "The Unix heads hate NT, and the NT heads hate Unix, so their answer is that it's like a toaster: There are no user-serviceable parts inside."RELATED STORIES:
How proprietary software can help the open source movementMay 2, 2000Users hire open-sourcers to build internal appsApril 24, 2000Neoware debuts thin version of LinuxApril 13, 2000Open-source, networkable shooter has Linux gamers buzzingApril 12, 2000Linux-friendly ASP surfacesApril 10, 2000RELATED IDG.net STORIES:
Open-source projects get done cheaplyComputerworldUsers hire open-source community to build internal appsComputerworldRed Hat to create largest open-source companyComputerworldThree Unixlike systems may be better than LinuxComputerworldWindows 2000 isn't the answer to the future of computingComputerworldRELATED SITES:
FreeBSD Inc.OpenBSD: Multiplatform Ultra-secure OSLinux Online
Note: Pages will open in a new browser windowExternal sites are not endorsed by CNN Interactive.
New all-in-one backup, archive, and disaster-recovery appliances approved as “Built on IBM Express” offerings
Colorado Springs, CO -- April 3, 2006 -- STORServer®, manufacturer of the all-in-one suite of Business Continuity Appliances, announces a new line of STORServer EZ Backup Appliances®. These cost-effective, easy-to-use backup solutions, which are preloaded with IBM storage software and hardware, are designed to help small to medium size businesses (SMBs) manage their data.
“SMBs are a fast-growing and often-underserved market, especially in terms of backup and disaster recovery,” said Ellen Rome, STORServer vice president of sales and marketing. “Our new EZ Backup Appliance bundles IBM’s leading hardware and software technology to provide an affordable, reliable solution that is easy to implement and maintain while providing a sophisticated feature set appropriate to SMBs’ growing needs.”
The new line of EZ Backup Appliances, available in both entry-level and high-end scalable models, are effective storage solutions for SMBs that typically have smaller budgets and fewer employees armed with the necessary skills to deal with complex IT management issues. Pre-configured with hardware and software necessary for backup, archiving, and disaster recovery, the appliance contains IBM’s latest in data-protection technologies, including disk and tape storage such as the new IBM TotalStorage TS3310 Tape Library.
The STORServer EZ Backup Appliance leverages IBM Tivoli Storage Manager, enterprise-level backup and recovery software, and is offered in three pre-configured bundles: Disk-to-Disk, which offers backup and archives with optional tape or disk for disaster recovery; Disk-to-Tape, with backup, archives, an online tape pool and disaster recovery to tape; and Disk-to-Disk-to-Tape, which offers backup, archives, an online pool of IBM TotalStorage DS4100 disk arrays, and disaster recovery to tape.
Fully automated, policy-based configurations are available for customers storing all amounts of data, from less than one terabyte to up to 10 terabytes for a single appliance. Multiple appliances can be installed and managed from one interface for customers that have more data or that need to distribute their recovery storage management. Each appliance comes with a 3-year warranty that provides a single point of contact for technical support.
Backup and disaster recovery is a top concern for SMBs and large organizations alike, according to Enterprise Strategy Group (ESG) analyst Heidi Biggar. She credits STORServer with creating a solution for SMBs that is both affordable and simple to manage.
"The problem is SMBs generally lack the necessary resources -- people, dollars, and technology -- to attack the backup and recovery problem at its root,” Biggar said. “Historically, SMBs have either tried to 'fix' the problem with enterprise backup solutions (which tend to be too unwieldy and expensive for their needs) or have ignored the problem altogether. What SMBs want -- and need -- are easy-to-use, scalable, and integrated solutions. The STORServer Appliance fits this bill nicely and takes the guesswork out of data protection."
Also announced today, STORServer’s EZ “Entry” Backup Appliance provides a low-cost, reliable, disk-to-disk backup solution for up to two terabytes of data. The EZ “Entry” Backup Appliance integrates IBM’s new Tivoli Storage Manager Express, automated backup and recovery software designed specifically for small and mid-sized businesses. All backups are stored on the server disk and an optional disk array is available for expanded storage capacity. Customers can also add tape backup for disaster recovery. Two scalable entry appliances are available -- one for customers with less than one terabyte of data and the other designed to accommodate up to two terabytes of storage.
The entire line of EZ Backup Appliances back up all popular servers and workstations and can also be purchased with IBM Tivoli Continuous Data Protection for Files – software that is designed to continuously and instantaneously capture and save changes to files in real time and send copies of data to a backup location to add a second layer of defense against data loss.
With the integration of IBM Express Portfolio software and hardware, the new STORServer EZ Backup Appliances have received “Built on IBM Express” validation. Built on IBM Express is an initiative designed to incorporate IBM Express products with IBM Business Partner products in order to provide integrated solutions that help enable SMBs to manage their IT environments with the same capabilities as larger companies.
The STORServer EZ Backup Appliances are available through IBM resellers only. Pricing for the entry-level appliance starts at $5,000 and the higher-end model begins at $15,000. For more information, visit http://www.storserver.com.
Various types of backup schemes exist, and they can be categorized in different ways. In an actual data center, one typically uses multiple types of backups. In short, the categorization of backups should not be taken to be mutually exclusive. Backups can be classified on the basis of
Sections 5.3.1 through 5.3.3 take a look at each of these types of classification.5.3.1 Backup Classifications Based on Architecture
One way of classifying backups is based on the architecture. That is, backups are classified in terms of the objects they deal with and the amount of awareness the backup application has of these objects. The available types of architecture-based backups, described in Sections 126.96.36.199 through 188.8.131.52, are184.108.40.206 Image- or Block-Level Backup
The backup application in this case deals with blocks of data. Typically, this kind of backup scheme needs all applications on the server to cease accessing the data that is being backed up. The application opens the disk to be backed up as a raw disk (ignoring the file locations) and literally does logical block-level read and write operations.
The advantages of this kind of backup are that the backup and restore operations are very fast, and it can be a good disaster recovery solution. One disadvantage is that applications and even the operating system cannot access the disk while the backup or restore is happening. Another disadvantage is that image-level backups of a sparsely populated volume can result in a lot of unused logical blocks being copied for the backup. Some backup applications provide the logic necessary to detect and skip unused logical blocks. These are called sparse image backups.
Finally, it is hard to retrieve just a particular file or a few files rather than restore all the data to a disk. To do so, the restore software must understand the file system metadata as it exists on the tape, retrieve this metadata, and from there, compute the location on the tape where the data for the particular file resides. Some vendors provide the ability to restore a particular file from an image-level backup, but these offerings are available on only certain operating system platforms and not others. Some restore applications do attempt to optimize restoring a file from an image-level backup. These applications write file metadata such as the file allocation table for FAT16 to the tape.
The version of NTFS included with Windows 2000 already keeps all metadata in files—for example, the bit map that represents logical block allocation. The restore application locates the required metadata. From this the software calculates the positions on tape of each of the required logical data blocks for the file being restored. The tape is then spooled in one direction, and all the relevant portions of the tape are read while the tape is moving in a single direction, thus providing the file data for restoration. The tape is not moved forward and backward at all, so not only is the restore time reduced, but the life of the tape is extended as well. Legato Celestra is one example of such a backup application.
Note that sometimes the choice of backup is limited. Consider the case in which a database uses a raw disk volume (without any kind of file system on that volume). In this case the only two choices are an image-level backup or an application-level backup (the latter is described in Section 220.127.116.11).18.104.22.168 File-Level Backup
With this type of backup, the backup software makes use of the server operating system and file system to back up files. One advantage is that a particular file or set of files can be restored relatively easily. Another is that the operating system and applications can continue to access files while the backup is being performed.
There are several disadvantages as well. The backup can take longer, especially compared to an image-level backup. If a lot of small files are backed up, the overhead of the operating system and file and directory metadata access can be high. Also the problem of open files described earlier exists and needs to be solved.
Another disadvantage is related to security. This issue arises irrespective of whether the backup is made via a file-level backup or an image backup. The problem is that the restore is typically done through an administrator account or backup operator account rather than a user account. This is the only way to ensure that multiple files belonging to different users can be restored in a single restore operation. The key is that the file metadata, such as access control and file ownership information, must be properly set. Addressing the problem requires some API support from the operating system and file system involved (NTFS) to allow the information to be set properly on a restore operation. In addition, of course, the restore application must make proper use of the facility provided.22.214.171.124 Application-Level Backup
In this case, backup and restore are done at the application level, typically an enterprise application level—for example, Microsoft SQL Server or Microsoft Exchange. The backup is accomplished via APIs provided by the application. Here the backup consists of a set of files and objects that together constitute a point-in-time view as determined by the application. The main problem is that the backup and restore operations are tightly associated with the application. If a new version of the application changes some APIs or functionality of an existing API, one must be careful to get a new version of the backup/restore application.
Applications either use a raw disk that has no file system associated with the volume/partition or simply have a huge file allocated on disk and then lay down their own metadata within this file. A good example of an application that takes this approach is Microsoft Exchange. Windows XP and Windows Server 2003 introduce an important feature in NTFS to facilitate restore operations for such files. The file can be restored via logical blocks, and then the end of the file is marked by a new Win32 API called SetFileValidData.5.3.2 Backup Classifications Based on Functionality
Yet another way of classifying backup applications is based on the functionality that is achieved in the backup process. Note that a data center typically uses at least two and very often all types of the backups described in Sections 126.96.36.199 through 188.8.131.52: full, differential, and incremental.184.108.40.206 Full Backup
In a full backup, the complete set of files or objects and associated metadata is copied to the backup media. The advantage of having a full backup is that only one media set is needed to recover everything in a disaster situation. The disadvantage is that the backup operation takes a long time because everything needs to be copied. Full backups are very often accomplished with the image- or block-level backup architecture.220.127.116.11 Differential Backup
A differential backup archives all changes since the last full backup. Because differential backups can be either image block based or file based, this set of changes would represent either the set of changed disk blocks (for image-based backup) or the set of changed files (for file-based backup). The main advantage of differential backup is that the backup takes a lot less time than a full backup. On the other hand, the disadvantage is that recovering from a disaster takes longer. A disaster recovery operation involves running at least two restore operations, one corresponding to a full backup and one corresponding to a differential backup.
With low-end storage deployed, file-based differential backups are used when the applications by nature tend to create multiple small files and change or create just a few of them since the last full backup. In addition, when low-end storage is deployed, file-based differential backups are not typically used with database applications, because database applications, by their very nature, tend to make changes in small parts of a huge database file. Hence a file-based backup would still have to copy the whole file. A good example here is Microsoft Exchange, which tends to make changes in small parts of a huge database file.
Figure 5.3 Direct-Attached Backup
With high-end storage deployed, image-based differential backup can be used in any situation, including with database applications. The reason for this flexibility is that the high-end storage units can track a lot of metadata and thus quickly identify which disk blocks have changed since the last full backup. Thus, only this small number of disk blocks needs be archived, and the large number of unchanged disk blocks that are present in the same database file can be ignored. Even though the backup with high-end storage is more efficient, APIs that start the backup at a consistent point and allow the I/O to resume after the backup has been accomplished are still needed. The efficiency of high-end storage simply minimizes the time during which all I/O must be frozen while the backup is being made.18.104.22.168 Incremental Backup
An incremental backup archives only the changes since the last full or incremental backup. Again, the obvious advantage is that this backup takes less time because items not modified since the last full or incremental backup do not need to be copied to the backup media. The disadvantage is that a disaster recovery operation will take longer because restore operations must be done from multiple media sets, corresponding to the last full backup followed by the various incremental backups.
In the absence of high-end storage, file-based incremental backup is used only when a different set of files is typically created or modified. With high-end storage that can provide the required metadata tracking, block-based incremental backup may be used.5.3.3 -Backup Classifications Based on Network Infrastructure
One way of classifying a backup scenario is based on the network topology used, and how that topology lends itself to achieving the best method for backing up the attached hosts. The network infrastructure–based backup types—direct-attached backup, network-attached backup, LAN-free backup, and server-free backup—are described in detail in Sections 22.214.171.124 through 126.96.36.199.188.8.131.52 Direct-Attached Backup
Direct-attached backup was the first form of backup used, simply because it emerged in the era when storage devices were typically attached directly to servers. Despite the advent of network storage, direct-attached backup remains a very popular topology for backing up Windows-based servers. Direct-attached backup is illustrated in Figure 5.3.
The advantage of direct-attached backup is that it is fairly simple. An application running on the server reads data from the appropriate disk volume and writes it to the tape device. The biggest problems with direct-attached backup are these:
Tape devices are duplicated (one per server that needs backup), which is expensive. To put it differently, sharing the tape device between servers is difficult.
The total cost of ownership is high because you need more administrators doing tape backups using multiple tape devices.
Storing multiple tapes can be confusing.
Because the data on different servers is often duplicated, but slightly out of sync, the tape media reflects duplication of data with enough seemingly similar data to cause confusion.
Last, but not least, the server must be able to handle the load of the read/write operations that it performs to stream the data from disk to tape.
As Chapter 3 discussed, the era of direct-attached storage was followed by the client/server era with a lot of clients and servers sharing resources on a LAN. This LAN environment facilitated the possibility of having a server on the LAN with a tape backup device that could be shared by all the servers on the LAN.
Figure 5.4 shows a typical deployment scenario for network-attached backup. The left side of the diagram shows a couple of servers. These could be application or file-and-print servers, and there may be more than just a couple. The right side of Figure 5.4 shows a backup server with a tape unit attached. This tape device can be used for backing up multiple file-and-print or application servers. Thus, network-attached backup allows a tape device to be shared for backing up multiple servers, which can reduce costs.
Figure 5.4 Network-Attached Backup
The problems that network-attached backup introduced are these:
The backup operation consumes LAN bandwidth, often requiring careful segmentation of the LAN to put the backup traffic on a separate LAN segment.
Host online hours (i.e., operating hours) increased; that is, the amount of time servers needed to be available for transactions and user access grew. In addition, the amount of data on the servers (that needed to be backed up) started increasing as well.
Increasingly, these problems led to the use of backup requirements as the sole basis for network design, determining the exact number of backup devices needed, and the selection and placement of backup devices.184.108.40.206 LAN-Free Backup
The advent of storage area networks introduced new concepts for backup operations. The new functionality is based on the fact that a storage area network (SAN) can provide a high bandwidth between any two devices and also, depending on the topology, can offer multiple simultaneous bandwidth capability between multiple pairs of devices with very low latencies. In contrast, using Fibre Channel loop topology with many devices—that is, more than approximately 30—cannot offer multiple simultaneous high-bandwidth connections with low latencies, because the total bandwidth of the loop must be shared among all attached devices.
Figure 5.5 shows a typical SAN-based backup application. Note the FC bridge device in the figure. Most tape devices are still non-FC based (using parallel SCSI), so a bridge device is typically used. In this figure, the Windows NT servers have a presence on both the LAN as well as the SAN.
Figure 5.5 SAN-Based Backup
The backup topology in Figure 5.5 has the following advantages:
The tape device can be located farther from the server being backed up. Tape devices are typically SCSI devices, although FC tape devices are now more readily available. This means that they can be attached to only a single SCSI bus and are not shared easily among servers. The FC SAN, with its connectivity capability, neatly solves this problem. Note that one still needs a solution to ensure that the tape device is accessed properly and with appropriate permissions. Here are some possibilities:
One solution is to use zoning, allowing one server at a time to access the tape device. The problem with this solution is that zoning depends on good citizen behavior; that is, it cannot ensure compliance. Another problem with zoning is that it will not ensure proper utilization of a tape changer or multitape device.
Another solution is to use the SCSI Reserve and Release commands.
Yet another solution is to have the tape device connected to a server, allowing for sharing of the tape pool by having special software on this server. Sharing of a tape pool is highly attractive because tape devices are fairly costly. IBM's Tivoli is one example of a vendor that provides solutions allowing the sharing of tape resources.
The backup is now what is often referred to as a LAN-free backup because the backup data transfer load is placed on the SAN, lightening the load on the LAN. Thus, applications do not get bogged down with network bandwidth problems while a backup is happening.
LAN-free backup provides more efficient use of resources by allowing tape drives to be shared.
LAN-free backup and restore are more resilient to errors because backups can now be done to multiple devices if one device has problems. By the same token, restores can be done from multiple devices, allowing more flexibility in resource scheduling.
Finally, the backup and restore operations typically complete a lot more quickly, simply because of the SAN's higher network speed.
Server-free backup is also sometimes referred to as serverless backup or even third-party copy. Note that server-free backup is also usually LAN-free backup—LAN-free backup that also removes the responsibility of file movement from the host that owns the data. The idea is fairly simple, consisting of leveraging the Extended Copy SCSI commands.
Server-free backup began as an initiative placed before the Storage Networking Industry Association (SNIA) that evolved into the SCSI Extended Copy commands ratified by the International Committee for Information Technology Standards (INCITS) T10 Technical Committee (ANSI INCITS.351:2001, SCSI Primary Commands-2). Note that SCSI already supported a copy command, but the problem was that all SCSI devices required attachment to the same SCSI bus to use this command (the Copy command has since been made obsolete in the SCSI standards; see http://www.t10.org). The Extended Copy command adds features such that the data source and data destination may be on different SCSI buses and yet still be addressable because the syntax of the command allows for this.
In server-free backup, the backup server can remain relatively free to handle other work while the actual backup is accomplished by the data mover agent. The data is moved directly from the data source to the destination (backup media) (instead of being moved from the source to the backup server to the destination).
While appreciating the advantages of server-free backup, one should not forget that server-free restore is a very different issue. Server-free restore operations are still relatively rare; that is, backups made using server-free backup technology are very often restored via traditional restore technology that involves the use of a backup software server.
Server-free backup is illustrated in Figure 5.6. In the interest of simplicity, the figure shows the minimum number of elements needed to discuss server-free backup. In practice, however, SANs are much more complex. The figure shows a Windows server connected to an FC switch via an FC HBA. An FC-to-SCSI router is also present, to which are connected a SCSI tape subsystem and a disk device. The disk and tape devices need not be connected to the same router.
Figure 5.6 Server-Free Backup
A backup server application on the Windows server discovers the data mover agent on the router, through Plug and Play. The backup application determines the details of the backup needs to be accomplished (disk device identifier, starting logical block, amount of data to be backed up, and so on). The backup server software first issues a series of commands to the tape device to reserve the tape device and ensure that the correct media is mounted and properly positioned. When that is done, the backup server software issues an Extended Copy command to the data mover, resident in the router, which then coordinates the movement of the required data. When the operation has been accomplished, the data mover agent reports the status back to the backup software on the Windows server.
Several different entities play a role in server-free backup architecture, including the data source, data destination, data mover agent, and backup server.
The data source is the device containing the data that needs to be backed up. Typically a whole volume or disk partition needs to be backed up. The data source needs to be directly addressable by the data mover agent (described shortly). This means that storage devices connected directly to a server (or cases in which the server and the storage device have exclusive visibility) cannot be data sources for server-free backup because they cannot be addressed directly from outside the server.
The data destination is typically a tape device where the data is to be written. The device may also be a disk if one is backing up to disk instead of tape. Tape devices are typically connected to a fabric port to avoid disruption of the tape data traffic upon error conditions in other parts of the SAN. For example, if the tape were connected to an FC arbitrated loop, an error in another device or, for that matter, the occurrence of a device joining or leaving the loop, would cause loop reinitialization, resulting in disruption to the tape data traffic.
A data mover agent typically is implemented in the firmware of a storage router because the data mover agent must be able to act on the SCSI Extended Copy command, which is sent to the router in an FC packet. Switches and hubs that examine only the FC frame header are not readily suited to house data mover agents, though this may change in the future.
The data mover agent is passive until it receives instructions from a backup server. Most tapes connected to SANs are SCSI devices, so a storage router (that converts between FC and SCSI) is typically required and provides a good location for housing the data mover agent. Fibre Channel tapes are now appearing on the scene, and some vendors, such as Exabyte, are including data mover agent firmware in the FC tape device itself. In addition, native FC tape libraries are usually built with embedded FC-to-SCSI routers, installed in the library, providing the ability for the library to have a data mover built in. Note that the data mover agent can also be implemented as software in a low-end workstation or even a server. Crossroads, Pathlight (now ADIC), and Chaparral are some examples of vendors that have shipped storage routers with data mover agents embedded in the firmware. A SAN can have multiple data mover agents from different vendors, and they can all coexist.
Of course, to be usable, a data mover agent needs to be locatable (via the SCSI Report LUNs command) and addressable (the WWN is used for addressing) from the backup server software. The data mover agent can also make two simultaneous backups—for example, one to a geographically remote mirror to provide a disaster recovery solution—but the two commands must be built by the server that issued the third-party copy command.
The backup server is responsible for all command and control operations. At the risk of being repetitious, it is worthwhile noting all the duties of the backup server. The backup server software first ensures availability of the tape device, using appropriate SCSI Reserve and Release commands as appropriate. The backup server software then ensures that the correct tape media is mounted and positioned. It is also responsible for identifying the exact address of the data source and the data's location in logical blocks, as well as the amount of data that needs to be backed up. Once the backup server has all this information, it sends an Extended Copy command to the data mover agent. The data mover agent then issues a series of Read commands to the data source device and writes the data to the data destination.
Computer Associates, CommVault, LEGATO, and VERITAS are some examples of vendors that ship a server-free backup software solution. Storage router vendors that ship server-free functionality routinely work with backup independent software vendors (ISVs) to coordinate support because many of the implementations use vendor-unique commands to supplement the basic SCSI Extended Copy commands.
Note that although server-free backup has been around for a while, there is very little support for server-free restore.220.127.116.11 The Windows Server Family and Server-Free Backup
A lot of the trade press and vendor marketing literature claims that a particular server-free backup solution is Windows 2000 compatible. It is worthwhile examining this claim in more detail to understand what it means. The following discussion examines each of the four components that constitute the elements of a server-free backup solution: data source, data destination, backup software server, and data mover agent.
In most cases a data mover agent outside a Windows NT server will not be able to directly address data sources internal to the Windows NT server. The HBAs attached to servers usually work only as initiators, so they will not respond to the Report LUNs command. If the Windows NT server is using a storage device outside the server—say, a RAID array connected to an FC switch—it will be visible to the data mover agent. So rather than saying that storage used by a Windows NT server cannot constitute the data source for a server-free backup, one needs to state that storage internal to a Windows NT server cannot constitute the data source.
Having the data destination internal to the Windows server is also not possible, because the data destination also needs to be directly addressable from outside the Windows box (by the data mover agent).
Having the backup software run on the Windows server is certainly feasible. The HBA attached to the Windows server can issue a series of Report LUNs commands to each initial LUN (LUN 0) that it discovers. The backup software then enumerates the list of visible devices and LUNs, and checks which ones are capable of being third-party copy agents. The backup software would have to deal with some minor idiosyncrasies; for example, some products report extra LUNs that need to be used when Extended Copy commands are being issued. Many backup applications that use these devices go through an additional discovery process to verify the data mover's functionality.
The Windows NT SCSI pass-through (IOCTL) interface is capable of conveying the Extended Copy command to the data mover agent (from the Windows NT backup server). Windows NT does not have native support for data movers; Plug and Play can discover them, but drivers are required to log the data mover into the registry.
That leaves the last case—that is, whether a Windows NT server or workstation can be used to run the data mover agent software. One advantage is that such an agent would be able to address and access the storage devices visible to the Windows server. The backup server, however, which might be outside the Windows NT box, would not be able to see these storage devices inside the Windows NT server. The data mover agent needs to be capable of acting as an initiator and target for SCSI commands. Because the HBA connected to the Windows NT server rarely acts as a target, the Extended Copy command may not get through to the data mover agent.
Note that in Windows NT, an application uses the SCSI pass-through interface (DeviceIoControl with an IoControlCode of IOCTL_SCSI_PASS_THROUGH or IOCTL_SCSI_PASS_THROUGH_DIRECT) to issue SCSI commands.
3COM [8 Certification Exam(s) ]
AccessData [1 Certification Exam(s) ]
ACFE [1 Certification Exam(s) ]
ACI [3 Certification Exam(s) ]
Acme-Packet [1 Certification Exam(s) ]
ACSM [4 Certification Exam(s) ]
ACT [1 Certification Exam(s) ]
Admission-Tests [13 Certification Exam(s) ]
ADOBE [93 Certification Exam(s) ]
AFP [1 Certification Exam(s) ]
AICPA [2 Certification Exam(s) ]
AIIM [1 Certification Exam(s) ]
Alcatel-Lucent [13 Certification Exam(s) ]
Alfresco [1 Certification Exam(s) ]
Altiris [3 Certification Exam(s) ]
Amazon [2 Certification Exam(s) ]
American-College [2 Certification Exam(s) ]
Android [4 Certification Exam(s) ]
APA [1 Certification Exam(s) ]
APC [2 Certification Exam(s) ]
APICS [2 Certification Exam(s) ]
Apple [69 Certification Exam(s) ]
AppSense [1 Certification Exam(s) ]
APTUSC [1 Certification Exam(s) ]
Arizona-Education [1 Certification Exam(s) ]
ARM [1 Certification Exam(s) ]
Aruba [6 Certification Exam(s) ]
ASIS [2 Certification Exam(s) ]
ASQ [3 Certification Exam(s) ]
ASTQB [8 Certification Exam(s) ]
Autodesk [2 Certification Exam(s) ]
Avaya [96 Certification Exam(s) ]
AXELOS [1 Certification Exam(s) ]
Axis [1 Certification Exam(s) ]
Banking [1 Certification Exam(s) ]
BEA [5 Certification Exam(s) ]
BICSI [2 Certification Exam(s) ]
BlackBerry [17 Certification Exam(s) ]
BlueCoat [2 Certification Exam(s) ]
Brocade [4 Certification Exam(s) ]
Business-Objects [11 Certification Exam(s) ]
Business-Tests [4 Certification Exam(s) ]
CA-Technologies [21 Certification Exam(s) ]
Certification-Board [10 Certification Exam(s) ]
Certiport [3 Certification Exam(s) ]
CheckPoint [41 Certification Exam(s) ]
CIDQ [1 Certification Exam(s) ]
CIPS [4 Certification Exam(s) ]
Cisco [318 Certification Exam(s) ]
Citrix [48 Certification Exam(s) ]
CIW [18 Certification Exam(s) ]
Cloudera [10 Certification Exam(s) ]
Cognos [19 Certification Exam(s) ]
College-Board [2 Certification Exam(s) ]
CompTIA [76 Certification Exam(s) ]
ComputerAssociates [6 Certification Exam(s) ]
Consultant [2 Certification Exam(s) ]
Counselor [4 Certification Exam(s) ]
CPP-Institue [2 Certification Exam(s) ]
CPP-Institute [1 Certification Exam(s) ]
CSP [1 Certification Exam(s) ]
CWNA [1 Certification Exam(s) ]
CWNP [13 Certification Exam(s) ]
Dassault [2 Certification Exam(s) ]
DELL [9 Certification Exam(s) ]
DMI [1 Certification Exam(s) ]
DRI [1 Certification Exam(s) ]
ECCouncil [21 Certification Exam(s) ]
ECDL [1 Certification Exam(s) ]
EMC [129 Certification Exam(s) ]
Enterasys [13 Certification Exam(s) ]
Ericsson [5 Certification Exam(s) ]
ESPA [1 Certification Exam(s) ]
Esri [2 Certification Exam(s) ]
ExamExpress [15 Certification Exam(s) ]
Exin [40 Certification Exam(s) ]
ExtremeNetworks [3 Certification Exam(s) ]
F5-Networks [20 Certification Exam(s) ]
FCTC [2 Certification Exam(s) ]
Filemaker [9 Certification Exam(s) ]
Financial [36 Certification Exam(s) ]
Food [4 Certification Exam(s) ]
Fortinet [13 Certification Exam(s) ]
Foundry [6 Certification Exam(s) ]
FSMTB [1 Certification Exam(s) ]
Fujitsu [2 Certification Exam(s) ]
GAQM [9 Certification Exam(s) ]
Genesys [4 Certification Exam(s) ]
GIAC [15 Certification Exam(s) ]
Google [4 Certification Exam(s) ]
GuidanceSoftware [2 Certification Exam(s) ]
H3C [1 Certification Exam(s) ]
HDI [9 Certification Exam(s) ]
Healthcare [3 Certification Exam(s) ]
HIPAA [2 Certification Exam(s) ]
Hitachi [30 Certification Exam(s) ]
Hortonworks [4 Certification Exam(s) ]
Hospitality [2 Certification Exam(s) ]
HP [750 Certification Exam(s) ]
HR [4 Certification Exam(s) ]
HRCI [1 Certification Exam(s) ]
Huawei [21 Certification Exam(s) ]
Hyperion [10 Certification Exam(s) ]
IAAP [1 Certification Exam(s) ]
IAHCSMM [1 Certification Exam(s) ]
IBM [1532 Certification Exam(s) ]
IBQH [1 Certification Exam(s) ]
ICAI [1 Certification Exam(s) ]
ICDL [6 Certification Exam(s) ]
IEEE [1 Certification Exam(s) ]
IELTS [1 Certification Exam(s) ]
IFPUG [1 Certification Exam(s) ]
IIA [3 Certification Exam(s) ]
IIBA [2 Certification Exam(s) ]
IISFA [1 Certification Exam(s) ]
Intel [2 Certification Exam(s) ]
IQN [1 Certification Exam(s) ]
IRS [1 Certification Exam(s) ]
ISA [1 Certification Exam(s) ]
ISACA [4 Certification Exam(s) ]
ISC2 [6 Certification Exam(s) ]
ISEB [24 Certification Exam(s) ]
Isilon [4 Certification Exam(s) ]
ISM [6 Certification Exam(s) ]
iSQI [7 Certification Exam(s) ]
ITEC [1 Certification Exam(s) ]
Juniper [64 Certification Exam(s) ]
LEED [1 Certification Exam(s) ]
Legato [5 Certification Exam(s) ]
Liferay [1 Certification Exam(s) ]
Logical-Operations [1 Certification Exam(s) ]
Lotus [66 Certification Exam(s) ]
LPI [24 Certification Exam(s) ]
LSI [3 Certification Exam(s) ]
Magento [3 Certification Exam(s) ]
Maintenance [2 Certification Exam(s) ]
McAfee [8 Certification Exam(s) ]
McData [3 Certification Exam(s) ]
Medical [69 Certification Exam(s) ]
Microsoft [374 Certification Exam(s) ]
Mile2 [3 Certification Exam(s) ]
Military [1 Certification Exam(s) ]
Misc [1 Certification Exam(s) ]
Motorola [7 Certification Exam(s) ]
mySQL [4 Certification Exam(s) ]
NBSTSA [1 Certification Exam(s) ]
NCEES [2 Certification Exam(s) ]
NCIDQ [1 Certification Exam(s) ]
NCLEX [2 Certification Exam(s) ]
Network-General [12 Certification Exam(s) ]
NetworkAppliance [39 Certification Exam(s) ]
NI [1 Certification Exam(s) ]
NIELIT [1 Certification Exam(s) ]
Nokia [6 Certification Exam(s) ]
Nortel [130 Certification Exam(s) ]
Novell [37 Certification Exam(s) ]
OMG [10 Certification Exam(s) ]
Oracle [279 Certification Exam(s) ]
P&C [2 Certification Exam(s) ]
Palo-Alto [4 Certification Exam(s) ]
PARCC [1 Certification Exam(s) ]
PayPal [1 Certification Exam(s) ]
Pegasystems [12 Certification Exam(s) ]
PEOPLECERT [4 Certification Exam(s) ]
PMI [15 Certification Exam(s) ]
Polycom [2 Certification Exam(s) ]
PostgreSQL-CE [1 Certification Exam(s) ]
Prince2 [6 Certification Exam(s) ]
PRMIA [1 Certification Exam(s) ]
PsychCorp [1 Certification Exam(s) ]
PTCB [2 Certification Exam(s) ]
QAI [1 Certification Exam(s) ]
QlikView [1 Certification Exam(s) ]
Quality-Assurance [7 Certification Exam(s) ]
RACC [1 Certification Exam(s) ]
Real-Estate [1 Certification Exam(s) ]
RedHat [8 Certification Exam(s) ]
RES [5 Certification Exam(s) ]
Riverbed [8 Certification Exam(s) ]
RSA [15 Certification Exam(s) ]
Sair [8 Certification Exam(s) ]
Salesforce [5 Certification Exam(s) ]
SANS [1 Certification Exam(s) ]
SAP [98 Certification Exam(s) ]
SASInstitute [15 Certification Exam(s) ]
SAT [1 Certification Exam(s) ]
SCO [10 Certification Exam(s) ]
SCP [6 Certification Exam(s) ]
SDI [3 Certification Exam(s) ]
See-Beyond [1 Certification Exam(s) ]
Siemens [1 Certification Exam(s) ]
Snia [7 Certification Exam(s) ]
SOA [15 Certification Exam(s) ]
Social-Work-Board [4 Certification Exam(s) ]
SpringSource [1 Certification Exam(s) ]
SUN [63 Certification Exam(s) ]
SUSE [1 Certification Exam(s) ]
Sybase [17 Certification Exam(s) ]
Symantec [134 Certification Exam(s) ]
Teacher-Certification [4 Certification Exam(s) ]
The-Open-Group [8 Certification Exam(s) ]
TIA [3 Certification Exam(s) ]
Tibco [18 Certification Exam(s) ]
Trainers [3 Certification Exam(s) ]
Trend [1 Certification Exam(s) ]
TruSecure [1 Certification Exam(s) ]
USMLE [1 Certification Exam(s) ]
VCE [6 Certification Exam(s) ]
Veeam [2 Certification Exam(s) ]
Veritas [33 Certification Exam(s) ]
Vmware [58 Certification Exam(s) ]
Wonderlic [2 Certification Exam(s) ]
Worldatwork [2 Certification Exam(s) ]
XML-Master [3 Certification Exam(s) ]
Zend [6 Certification Exam(s) ]
Dropmark : http://killexams.dropmark.com/367904/11572031
Wordpress : http://wp.me/p7SJ6L-Hc
Issu : https://issuu.com/trutrainers/docs/000-454
Dropmark-Text : http://killexams.dropmark.com/367904/12092309
weSRCH : https://www.wesrch.com/business/prpdfBU1HWO000SCUF
Blogspot : http://killexams-braindumps.blogspot.com/2017/11/never-miss-these-000-454-questions.html
RSS Feed : http://feeds.feedburner.com/Pass4sure000-454RealQuestionBank
Youtube : https://youtu.be/DOL3fOZZDEo
Google+ : https://plus.google.com/112153555852933435691/posts/8sVw1Z5t4xa?hl=en
publitas.com : https://view.publitas.com/trutrainers-inc/never-miss-these-000-454-questions-before-you-go-for-test
Calameo : http://en.calameo.com/books/00492352666f886443628
Box.net : https://app.box.com/s/jwgckbda47mvtfilbkeirbaycbjatkv6
zoho.com : https://docs.zoho.com/file/3u6up09f1fdf5a17d442886dcd42ab37e7bb1