October 29, 2009
Are you using Windows Server 2008’s iSCSI initiator? Do you know what connection policy you have?
If you said “no” to the last question, you may need to check out this TechRepublic article which explains the multiple connected sessions (MCS) policies.
Here are the 5 policies defined:
- Round robin (default): This policy attempts to evenly distribute storage traffic to all available processing paths.
- Fail over only: This policy designates one active (primary) path to the storage resource; the remaining paths are assigned to a standby role. If the remaining paths are engaged for active storage, they will attempt to come online with a round robin policy until one is available.
- Round robin with subset: This policy runs round robin on active paths and has standby paths that are available via round-robin if the active paths fail.
- Least queue depth: This policy attempts to distribute loads based on I/O requests and the associated queue length. The round robin policy simply processes each request equally, with no regard to the load associated with the I/O task on the path.
- Weighted paths: This policy designates a path to have a low number (priority) to a path
Share your experience with MCS policies, drop a line.
October 20, 2009
DNF Corp introduces a new member to its management team, Mr. Hamid Marshall. Hamid brings over 17 years of management experience in the security field, with a proven track record. He comes to DNF Security from Cyberwatch Security Communication, Inc. (CSCI), a provider of Managed Video Security Services (MVSS), where he was the technical director for systems integration and software development.
Mo Tahmasebi, CEO of DNF, was thrilled to have Hamid on board. Here’s what he had to say:
“We’re privileged to have a seasoned professional like Mr. Marshall lead our IP surveillance unit to the next level of growth. I am confident Hamid will make significant contributions, particularly in expanding our global reach with new partners, customers, and where substantial market opportunities exist.”
To see the full induction announcement, check out the news release.
October 15, 2009
Here is yet another example of what can happen if you neglect to backup your data. For all you T-Mobile users out there, you probably know that the Sidekick stores all of your critical data in a network datastore and not within the physical device. If something were to happen to any of those servers holding your data, you would lose your data. Scary thought, huh? Well, that is exactly what happened.
Michael Sheehan believes that during hardware upgrades, there was a failure that occurred. Since the upgrade of the SAN proceeded without data backup the result was thousands of Sidekick users stuck without their data. Here are five tips he presents in his blog post, that are critical for any IT department to remember:
Backups – Back up often. Set up automatic as well as manual backup procedures. Store your data locally AND somewhere completely geographically distinct from your infrastructure. *Check out the SAN backup features on the StoneFusion OS.
Redundancy – Physical servers AND virtualized servers do encounter issues. You would never put all of your eggs in one basket so why do it with your infrastructure! You should ensure that you set up a “high availability” (HA) infrastructure where you have 2 (or more) of everything, whether they be all active or as hot or warm standbys. *Check out the fully redundant, HA Voyager IP SAN.
Failovers – Most people, unless they are hugely successful, decide to put off setting up a Disaster Recovery (DR) environment due to costs and the time it takes to do so. That is, until their primary site goes down for hours or days, then DR suddenly moves to the top of the list. *Learn about StoneFly’s Data Continuity.
“Hybrid Hosting” – By setting up your front-end environment using the cloud (scalable, dynamic, elastic, etc.), you can optimize your web server environment for traffic and redundancy. Using physical boxes in the backend allows you to have additional services (like managed backups or security enhancements), thus making your infrastructure more secure and reliable. *Stay tuned for more info on this coming soon.
Due Diligence – Regardless of your infrastructure, datacenter or hosting environment, take some time right now to figure out your IT strategy and Best Practices.
October 12, 2009
What does “No Single Point of Failure” (NSPOF) really mean? If you read it at face value, you may conclude that it is the highest level of data protection. There are several ways to achieve NSPOF on your volumes: mirroring ( RAID 1); mirroring and striping (RAID 10 or 0+1); complete subsystem mirroring (RAID51 or RAID61); or host based applications that manage mirroring. With these conventional NSPOF methods, you are only doubling the disk count, and essentially doubling the entire subsystems cost.
With StoneFly’s new RAIDML configuration, you can create NSPOF volumes and purely RAID5 or 6 protected volumes, and do it in a single storage unit or across multiple storage units.
Here is a highlight of the benefits:
- Flexible expansion at RAID and iSCSI volume levels
- Targeted NSPOF iSCSI volume(s) coexist with standard RAID5 and 6 iSCSI volumes
- Auto fail-over and fall-back protection
- No 100% drive count penalty
- Advanced StoneFusion volume management
To learn more, read the RAIDML tech brief.
Interested in a technology demo? Contact our sales team.
Use our new RAID calculator to help choose the RAID level that’s right for you.