By Greg Schulz, Server and StorageIO @storageio
In part I of this series we looked at basic Hard Disk Drive (HDD) characteristics and wrapped up with the question of what is the best type of HDD to use?
I often get asked why there needs to be different types or tiers of data storage devices including HDD and Solid State Devices (SSDs), along with interfaces, why not just one or a few? Continue reading Hard Disk Drives (HDD) for virtual environments (Part II) how drives differ
VMware buying Virsto is a big move and after considerable discussion a logical step for VMware in many technical areas as well. We previously mentioned that Virsto would add to VMware’s existing in Software Defined Data Center (SDDC), but there is more to this than just SDDC, which I believe is the end goal. Getting there absolutely requires a storage abstraction layer. So what does VMware gain other than SDDC with Virsto. Continue reading Virsto: Software Defined Data Center: Tip of the Iceberg
At VMworld 2012, VMware presented a Tech Preview of one of their latest ideas, which they termed “Distributed Storage”. So what exactly is this new technology? It is basically locally attached storage.
How is Distributed Storage new?
We know that VMware has allowed the use of local storage since inception; however, access to that storage was limited to the local host only, so it was only utilised for guests that were node-based, e.g., vShield appliances. To delve a little deeper you could use the analogy of a VSA (Virtual Storage Appliance), but unlike the VSA, which is a fully functioning virtual machine, this technology is actually part of the hypervisor. Continue reading How Will VMware’s Distributed Storage Change their Relationships?
Storage Security is not only about Encryption, which is just one aspect of Storage Security requirements for the virtual and cloud environments. It is also about increasing defense in depth and knowledge of what is touching your storage environment. As well as providing security around those touch points and to a great extent auditing and protecting the data residing within the storage devices regardless of where the devices live: within the virtual environment or within a cloud. Traditionally we have the following storage security capabilities: