{"id":121,"date":"2002-12-29T16:29:38","date_gmt":"2002-12-29T16:29:38","guid":{"rendered":"http:\/\/ellery.no-ip.info\/wp\/thinkingmore\/2002\/12\/29\/national-storage-day-2-digest\/"},"modified":"2002-12-29T16:29:38","modified_gmt":"2002-12-29T16:29:38","slug":"national-storage-day-2-digest","status":"publish","type":"post","link":"https:\/\/ellery.no-ip.info\/wp\/thinkingmore\/2002\/12\/national-storage-day-2-digest\/","title":{"rendered":"National Storage Day 2 Digest"},"content":{"rendered":"<p>Introduction:<br \/>\n\u4e00\u958b\u59cb<br \/>\n\u4f55\u9e97\u73b2,HP\u73fe\u4efb\u8463\u4e8b\u9577\u5c31\u51fa\u4f86\u81f4\u8a5e~<br \/>\n\u4f86\u8cd3\u51fa\u4f86\u62cb\u78da~<br \/>\n\u5927\u81f4\u63d0\u5230:<br \/>\nAdaptive Storage Infrastructure \u4e00\u500b\u6f38\u9032\u5f0f\u7684 Storage \u67b6\u69cb,\u800c\u975e\u6025\u9032\u7684,\u610f\u601d\u5c31\u662f\u4f60\u53ef\u4ee5\u6162\u6162\u8cb7,\u518d\u52a0\u4e0a\u53bb.<br \/>\n\u9084\u6709 New Storage Architectures \u7684\u4e00\u4e9b\u7279\u6027,<br \/>\n1.Cheap Storage<br \/>\n2.Fleshing out internet application<br \/>\n3.Storage intensive data types<br \/>\n4.Grow<br \/>\n&#8230;<br \/>\n\u4e3b\u8981\u7684 issue,<br \/>\n1. Managing risk<br \/>\n2.\u8cc7\u6599\u7684\u6210\u9577\u6bd4 Storage \u7684\u9810\u671f\u589e\u52a0\u901f\u5ea6\u8981\u5feb.<br \/>\n&#8230;<br \/>\n&#8220;&#8230;&#8221;\u8868\u793a\u662f\u6284\u6f0f\u7684,\u5230\u6642\u5019\u8981\u53bb\u4e0b\u8f09\u7814\u8a0e\u6703\u7c21\u5831\u624d\u77e5\u9053.<br \/>\nENSA eXtended<br \/>\n\u63a5\u8457\u5c31\u662f HP \u7684Storage\u8655\u7684\u8655\u9577\u51fa\u4f86\u4ecb\u7d39 HP \u7684 ENSA eXtended<br \/>\n\u8523\u5148\u751f\u63d0\u5230 1998 \u5e74 HP \u5c31\u5df2\u7d93\u63d0\u51fa ENSA, \u800c\u5728\u9019\u5e7e\u5e74,\u4e5f\u90fd\u4e00\u4e00\u5be6\u73fe\u4e86<br \/>\nENSA \u4e3b\u8981\u7684\u5b9a\u7fa9\u662f:<br \/>\n&#8211; Modularity<br \/>\n&#8211; Scalability<br \/>\n&#8211; Available<br \/>\n\u800c\u65b0\u7684 ENSA eXtended \u5247\u662f<br \/>\n\u4ee5 an open adaptive storage infrustructure \u4f5c\u70ba\u67b6\u69cb,\u6709 Controllable, Resilient(\u5feb\u901f\u5fa9\u539f), Extensible \u9019\u4e09\u500b\u7279\u6027<br \/>\n\u9019\u88e1\u662f\u6211\u624b\u7e6a\u7684\u5716\u5f62:<br \/>\n<img loading=\"lazy\" decoding=\"async\" alt=\"ensaX.jpg\" src=\"digest\/ensaX.jpg\" width=\"606\" height=\"514\" border=\"0\" \/><br \/>\n\u4e0d\u904e\u756b\u7684\u4e0d\u662f\u5f88\u597d,\u540c\u6a23\u4ee5\u5f8c\u4e5f\u53ef\u4ee5\u76f4\u63a5\u53c3\u8003\u4e0a\u9762\u63d0\u4f9b\u7684\u7db2\u5740\u53bb\u4e0b\u8f09\u7c21\u5831\u4f86\u770b.<br \/>\n\u8a73\u60c5\u7db2\u5740: http:\/\/www.hp.com\/go\/ENSAextended\/<br \/>\n\u5728\u5373\u5c07\u4e2d\u5348\u7684\u6642\u5019<br \/>\n\u53c8\u6709\u63d0\u5230 HP Utility Data Center,\u9019\u500b\u6642\u5019\u5df2\u7d93\u5feb\u7761\u8457\u4e86 icon_sad.gif<br \/>\nUDC \u6709\u4ee5\u4e0b\u7684\u7279\u6027:<br \/>\n1.Write Once<br \/>\n2.Resource virtualization<br \/>\n3.Utility Controller<br \/>\n\u4e3b\u8b1b\u4eba\u56e0\u70ba\u6709\u88ab\u4ea4\u4ee3\u4e0d\u53ef\u4ee5\u803d\u8aa4\u5927\u5bb6\u7528\u9910\u6642\u9593,\u6240\u4ee5\u8b1b\u7684\u5f88\u5feb<br \/>\n\u8a73\u60c5\u7db2\u5740: <a href=\"http:\/\/www.hp.com\/large\/infrastructure\/utilitydata\/overview\/\">http:\/\/www.hp.com\/large\/infrastructure\/utilitydata\/overview\/<\/a><br \/>\n\u5403\u5b8c\u4e2d\u9910<br \/>\n\u5c31\u662f\u4e0b\u5348\u7684\u8b70\u7a0b\u4e86<br \/>\n\u4e0b\u5348\u5206\u6210\u56db\u500b Track: A, B, C, D<br \/>\n\u6211\u9078\u64c7 A1, D2, C3<br \/>\nA1<br \/>\n\u4e3b\u8981 topic:<br \/>\n1. What&#8217;s virtualization?<br \/>\n2. Array level virtualization.<br \/>\n3. Storage Level virtualization.<br \/>\n\u9019\u908a\u7684\u5927\u610f\u5c31\u662f:<br \/>\n\u628a\u6240\u6709\u7684 Storage \u96c6\u4e2d\u70ba\u4e00\u500b pool, \u5c0d\u5916\u53ea\u516c\u958b\u4e00\u500b Interface, \u5225\u4eba\u53ea\u8981\u900f\u904e\u9019\u500b Interface \u5c31\u53ef\u4ee5\u53d6\u5f97\u6240\u9700\u7684\u7a7a\u9593,\u800c\u589e\u6e1b\u53ea\u5728\u9019\u500b pool \u4e2d\u589e\u6e1b,\u4e0d\u5f71\u97ff\u5176\u4ed6\u7684\u6a5f\u5668.\u751a\u81f3\u5728\u9019\u500b Storage pool \u548c\u8981\u5b58\u53d6\u7684 Server \u4e2d\u9593,\u518d\u52a0\u4e0a\u9069\u7576\u7684 switch, \u53ca\u4f48\u7dda,\u5c31\u53ef\u4ee5\u9054\u5230\u4e92\u76f8\u652f\u63f4\u53ca Balance \u7684\u529f\u80fd.<br \/>\n\u597d\u8655:<br \/>\n&#8211; Increase disk utilization<br \/>\n&#8211; Reduce operational burden<br \/>\n&#8211; Eliminate costly downtime<br \/>\n&#8211; enhance performance<br \/>\n\u53e6\u5916\u6709\u63d0\u5230 FSAM, \u5979\u662f\u4e00\u500b Storage vision, \u4e3b\u8981\u8a0e\u8ad6\u5982\u4f55\u6709\u6548\u96c6\u4e2d\u7ba1\u7406 Storage.<br \/>\n\u9019\u500b Virtualization \u7684\u6838\u5fc3\u6280\u8853\u5c31\u662f SAN, \u4f7f\u7528 Server &amp; Storage Technology.<br \/>\n\u6700\u5f8c\u6709\u65e5\u5149\u661f\u7684 CIO \u8aaa\u660e\u70ba\u4ec0\u9ebc\u6703\u4f7f\u7528\u6b64\u6280\u8853,\u9084\u6709\u5c31\u662f\u4e3b\u8b1b\u4eba\u63d0\u4f9b\u4e00\u500b\u4ee5\u8272\u5217\u516c\u53f8\u7684 Flash \u52d5\u756b,\u5f88\u751f\u52d5\u5730\u628a\u5979\u6240\u8981\u8aaa\u7684\u8ab2\u984c\u8868\u9054\u51fa\u4f86.<br \/>\nD2. Continuity Plan( Disaster Recovery)<br \/>\np.s.\u9019\u5802\u8ab2\u5f88\u591a\u4eba\u53bb\u807d,\u5dee\u9ede\u64e0\u4e0d\u9032\u53bb.<br \/>\n\u7576\u767c\u751f\u610f\u5916\u72c0\u6cc1\u6642,\u5c0d IT \u800c\u8a00\u662f\u640d\u5931\u8a2d\u5099\u548c\u8cc7\u6599,\u5c0d\u4f01\u696d\u800c\u8a00\u662f business process.\u4f01\u696d\u9019\u908a\u4ed6\u8209\u4e86\u4e00\u500b\u69ae\u7e3d\u7684\u4f8b\u5b50,\u8aaa\u69ae\u7e3d\u6709\u4e00\u6b21\u96fb\u8166\u58de\u6389,\u7136\u5f8c\u4e00\u5806\u4eba\u5c31\u4e0d\u6703\u4f7f\u7528\u4eba\u5de5\u7e7c\u7e8c\u4f5c\u696d\u4e86.<br \/>\n\u800c Continuity Plan Plan \u5c31\u662f\u4f7f\u640d\u5931\u964d\u5230\u6700\u4f4e.<br \/>\nDefinition:<br \/>\nHA &#8211; High available.<br \/>\nDR &#8211; Disaster Recovery<br \/>\nDT &#8211; Disaster Tolerance<br \/>\nBC &#8211; Business Continuity<br \/>\nBC = HA DR DT<br \/>\n\u8003\u616e downtime is not acceptable,\u6700\u5927\u7684\u539f\u56e0\u662f\u4f01\u696d\u671d\u5411\u570b\u969b\u5316\u9081\u9032,\u56e0\u70ba\u6642\u5dee\u4e4b\u6545,\u6240\u4ee5\u4e0d\u80fd\u88ab\u63a5\u53d7.\u8981\u5982\u4f55\u6e1b\u4f4e??<br \/>\nDowntime is controllable.<br \/>\nPerspective:<br \/>\n&#8211; Ensure \u4e8b\u4ef6\u4e0d\u8b8a\u6210\u707d\u96e3.<br \/>\n&#8211; \u5305\u542b Broad spectrum of business and technology issue.<br \/>\n&#8211; \u9054\u5230\u6700\u9ad8\u53ef\u7528\u5ea6.<br \/>\n\u4e00\u822c\u800c\u8a00\u6709\u5341\u500b\u6b65\u9a5f\u4f86\u7df4\u7fd2\/\u898f\u5283,\u7a31<br \/>\nProfessional Practice for Continuity Planning:<br \/>\nStep 1~3 \u662f Preplanning<br \/>\nStep 4~6 Planning<br \/>\nStep 7~10 Post planning<br \/>\n\u800c Step 9~10 \u662f Optional \u7684,\u8996\u884c\u696d\u53ca\u516c\u53f8\u72c0\u6cc1\u800c\u5b9a,\u6216\u8005\u9023\u7d61\u5916\u9762\u7684\u6a5f\u69cb.<br \/>\nPlanning Model \u548c CMMI Model \u76f8\u4f3c,\u4f46 execution \u662f\u5728\u72c0\u6cc1\u767c\u751f\u6642\u624d\u57f7\u884c,\u540c\u6a23\u4e5f\u662f\u4e00\u500b Cycle, \u898f\u5283 -&gt; \u6a21\u64ec\u6f14\u7df4 -&gt; \u6e2c\u8a66 -&gt; &#8230;..<br \/>\n\u5728 Plan \u64ec\u8a02\u51fa\u4f86\u4e4b\u5f8c,\u4ecd\u8981\u9069\u7576\u7684\u8a55\u4f30,\u4ee5\u671f\u80fd\u4f7f\u7528\u6700\u9069\u7576\u7684 cost \u4f86\u5f97\u5230\u6700\u597d\u7684 benefit.<br \/>\n\u53e6\u5916\u4eba\u54e1\u7684\u98df\u5bbf\u4e5f\u8981\u8003\u91cf.<br \/>\nC3.<br \/>\n\u6211\u6709\u9ede\u5f8c\u6094\u53bb\u807d\u9019\u5802\u8ab2,\u4e3b\u8981\u4ecb\u7d39 CA ARC Server v9.<br \/>\n\u4e0d\u904e\u6709\u628a\u5e7e\u500b\u5c08\u696d\u540d\u8a5e\u6284\u4e86\u4e0b\u4f86:<br \/>\nOnline storage &#8211; always standby \u7d66\u4eba\u5b58\u53d6\u7684 storage.<br \/>\nNearline storage &#8211; \u5982: MO, \u5149\u789f\u6ac3&#8230;\u7b49,\u53ef\u4ee5 random access, \u4f46\u4e26\u975e\u7d93\u5e38\u5b58\u53d6,\u5b58\u653e\u5728\u9019\u88e1\u7684\u8cc7\u6599\u7a31\u4f5c Inactive Data.<br \/>\nOffline storage &#8211; \u4e3b\u8981\u662f tape, autoloader&#8230;..<br \/>\n\u7d50\u8ad6:<br \/>\nHP \u4ee5\u53ca\u5176\u5354\u529b\u5ee0\u5546\u7684\u4e00\u500b storage solution show.<br \/>\n\u76f8\u95dc\u7db2\u5740:<br \/>\nNational Storage Day \u7db2\u5740:<br \/>\n<a href=\"http:\/\/gate.erapr.com\/event\/hpstorageday\/\">http:\/\/gate.erapr.com\/event\/hpstorageday\/<\/a><br \/>\n\u7814\u8a0e\u6703\u7c21\u5831\u4e0b\u8f09\u4f4d\u5740:<br \/>\n<a href=\"http:\/\/gate.erapr.com\/event\/hpstorageday\/news.html\">http:\/\/gate.erapr.com\/event\/hpstorageday\/news.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction: \u4e00\u958b\u59cb \u4f55\u9e97\u73b2,HP\u73fe\u4efb\u8463\u4e8b\u9577\u5c31\u51fa\u4f86\u81f4\u8a5e~ \u4f86\u8cd3\u51fa\u4f86\u62cb\u78da~ \u5927\u81f4\u63d0\u5230: Adaptive Storage Infrastructure \u4e00\u500b\u6f38\u9032\u5f0f\u7684 Storage \u67b6\u69cb,\u800c\u975e\u6025\u9032\u7684,\u610f\u601d\u5c31\u662f\u4f60\u53ef\u4ee5\u6162\u6162\u8cb7,\u518d\u52a0\u4e0a\u53bb. \u9084\u6709 New Storage Architectures \u7684\u4e00\u4e9b\u7279\u6027, 1.Cheap Storage 2.Fleshing out internet application 3.Storage intensive data types 4.Grow &#8230; \u4e3b\u8981\u7684 issue, 1. Managing risk 2.\u8cc7\u6599\u7684\u6210\u9577\u6bd4 Storage \u7684\u9810\u671f\u589e\u52a0\u901f\u5ea6\u8981\u5feb. &#8230; &#8220;&#8230;&#8221;\u8868\u793a\u662f\u6284\u6f0f\u7684,\u5230\u6642\u5019\u8981\u53bb\u4e0b\u8f09\u7814\u8a0e\u6703\u7c21\u5831\u624d\u77e5\u9053. ENSA eXtended \u63a5\u8457\u5c31\u662f HP \u7684Storage\u8655\u7684\u8655\u9577\u51fa\u4f86\u4ecb\u7d39 HP \u7684 ENSA eXtended \u8523\u5148\u751f\u63d0\u5230 1998 \u5e74 HP \u5c31\u5df2\u7d93\u63d0\u51fa ENSA, \u800c\u5728\u9019\u5e7e\u5e74,\u4e5f\u90fd\u4e00\u4e00\u5be6\u73fe\u4e86 ENSA &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/ellery.no-ip.info\/wp\/thinkingmore\/2002\/12\/national-storage-day-2-digest\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;National Storage Day 2 Digest&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5],"tags":[],"class_list":["post-121","post","type-post","status-publish","format-standard","hentry","category-idea"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2MOxp-1X","_links":{"self":[{"href":"https:\/\/ellery.no-ip.info\/wp\/thinkingmore\/wp-json\/wp\/v2\/posts\/121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ellery.no-ip.info\/wp\/thinkingmore\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ellery.no-ip.info\/wp\/thinkingmore\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ellery.no-ip.info\/wp\/thinkingmore\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ellery.no-ip.info\/wp\/thinkingmore\/wp-json\/wp\/v2\/comments?post=121"}],"version-history":[{"count":0,"href":"https:\/\/ellery.no-ip.info\/wp\/thinkingmore\/wp-json\/wp\/v2\/posts\/121\/revisions"}],"wp:attachment":[{"href":"https:\/\/ellery.no-ip.info\/wp\/thinkingmore\/wp-json\/wp\/v2\/media?parent=121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ellery.no-ip.info\/wp\/thinkingmore\/wp-json\/wp\/v2\/categories?post=121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ellery.no-ip.info\/wp\/thinkingmore\/wp-json\/wp\/v2\/tags?post=121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}