Blog index > Archives > Posts Tagged ‘training’
avatar

Deduplication just went ballistic with Aggregate Inline Deduplication

Wednesday, September 27th, 2017

So with the release of ONTAP 9.2 came a long desired feature of being to deduplicate data at the aggregate level and not just volume level.

So why is this so key, well lets look at the historical view of how dedupe worked and its pitfalls. As a feature dedupe has always been a great feature but its biggest downfall was that if I sent an attachment to many colleagues there is a strong possibility that they will all want to save it for future use or reference. Now if your lucky they may all save the same file into the same volume in which case you win as dedupe will effectively reduce all instances to just one. Unfortunately we know that with IT we are never that lucky and as a result I may have some instances in a volume but more instances in other volumes in which case on a per volume basis I get the benefit but I still loose out. With ONTAP 9.2 this has been addressed so that you can now dedupe at the aggregate level, so you may have multiple copies of the file located in many volumes, if those volumes are located in the same aggregate then aggregate dedupe can take all instances and reduce them to a single instance. Now you really do win with Dedupe. From a simplified technical concept….If you’re not familiar with deduplication, it’s a feature that allows data blocks that are identical to rely on pointers to a single block instead of having multiple copies of the same blocks.

This is all currently done inline (as data is ingested) only, and currently  on All Flash FAS systems by default. The space savings really show with workloads such as ESXi datastores, where you may be applying OS patches across multiple VMs in multiple datastores hosted in multiple FlexVol volumes but all within an aggregate. Aggregate inline deduplication brings an average additional ~1.32:1 ratio of space savings for VMware workloads. Who doesn’t want to save some space?

Should you require any information on training from Fast Lane, please contact us on:NetApp

Phone: 0845 470 1000

enquiries@flane.co.uk

 

No Comments
avatar

Cyber Security

Thursday, May 25th, 2017

Cyber Security, is the protection of computer systems; from theft or damage to their hardware, software or information, from annonymous attackers. The UK suffers with many cyber attacks every year, having eight in ten of the biggest companies in the UK attacked, costing the economy billions of pounds. One of the biggest problems  of cyber-security is the quick and constant evolving nature of security risks.

The approach has been to focus most resources on the most important system components and protect against the biggest known threats, which meant leaving some less important system components undefended and some less dangerous risks un-protected. Such an approach is insufficient in the current environment.

All companies can face two types of cyber attack:

They will either be deliberately attacked because they have a high profile and appear to have valuable data that is visible, or they will be attacked because an automated scan detects the existence of exploitable information. Nearly every Internet-facing company will have exploitable information unless it has tested and secured.

There are 3 main types of Cyber risks that companies are vunerable to:

Cyber crime – this is conducted by individual people or in groups, they primarily focus on money, data and causing disruption within a company.

Cyber war – where a nation state conducting sabotage and espionage against another nation in order to cause disruption or to extract data

Cyber terror – an organisation, working independently of a nation state, conducting terrorist activities through the medium of cyberspace.

Computer security is neccessary in almost any industry which uses computers. At the moment, most electronic devices such as computers, laptops and phones come with built in firewall security software, but despite this, computers are not 100% secure and may not be able to protect our data.

How do attackers operate?

Cyber criminals operate remotely, using numerous types of attack that are also known as ‘malware’. These include:

Worms – these expose weaknesses in operating systems to damage networks and allow full control of the infected security, is one of the biggest topics within information technology, which is why many organizations have been created to meet the demand for it.

Spyware/adware – this takes contro of your device and collect personal information without you knowing

Trojans – these create an escape on your device by which information can be stolen and damage can be caused to your device

Fast Lane offer a variety of Cyber security training, both in-classroom and e-learning programmes, ranging from beginner to expert classes.

Cisco

Gigamon

Crossvender

For more information surrounding all training offers from various venders, please follow this url: http://www.flane.co.uk/security

Should you require any information on training from Fast Lane, please contact us on:

Phone: 0845 470 1000

Fax: 0845 470 1001

icons

 

No Comments