everything you wanted to know about storage but were afraid to ask n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Everything You Wanted to Know About Storage, but Were Afraid to Ask PowerPoint Presentation
Download Presentation
Everything You Wanted to Know About Storage, but Were Afraid to Ask

Loading in 2 Seconds...

play fullscreen
1 / 139

Everything You Wanted to Know About Storage, but Were Afraid to Ask - PowerPoint PPT Presentation


  • 124 Views
  • Uploaded on

Everything You Wanted to Know About Storage, but Were Afraid to Ask . Do you have a Cell phone, PDA or Smartphone?. Do you have a DIGITAL CAMERA?. Do you have a PC?. What do all of these devices have in common ?. How do you protect your data?. Digital Footprint Calculator.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Everything You Wanted to Know About Storage, but Were Afraid to Ask' - gay


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
digital footprint calculator
Digital Footprint Calculator

http://www.emc.com/digital_universe/downloads/web/personal-ticker.htm

raid 0
RAID 0
  • Data is striped across the HDDs in a RAID set
  • The stripe size is specified at a host level for software RAID and is vendor specific for hardware RAID
  • When the number of drives in the array increases, performance improves because more data can be read or written simultaneously
  • Used in applications that need high I/O throughput
  • Does not provide data protection and availability in the event of drive failures
raid 1
RAID 1
  • Mirroring is a technique whereby data is stored on two different HDDs, yielding two copies of data.
  • In addition to providing complete data redundancy, mirroring enables faster recovery from disk failure.
  • Mirroring involves duplication of data — the amount of storage capacity needed is twice the amount of data being stored. Therefore, mirroring is considered expensive
  • It is preferred for mission-critical applications that cannot afford data loss
nested raid
Nested RAID
  • Mirroring can be implemented with striped RAID by mirroring entire stripes of disks to stripes on other disks
  • RAID 0+1 and RAID 1+0 combine the performance benefits of RAID 0 with the redundancy benefits of RAID 1
  • These types of RAID require an even number of disks, the minimum being four.
  • RAID 0+1 is also called mirrored stripe.
  • This means that the process of striping data across HDDs is performed initially and then the entire stripe is mirrored.
nested raid1
Nested RAID
  • RAID 1+0 is also called striped mirror
  • The basic element of RAID 1+0 is that data is first mirrored and then both copies of data are striped across multiple HDDs in a RAID set
  • Some applications that benefit from RAID 1+0 include the following:
  • High transaction rate Online Transaction Processing (OLTP),Database applications that require high I/O rate, random access, and high availability
raid 3
RAID 3
  • RAID 3 stripes data for high performance and uses parity for improved fault tolerance.
  • Parity information is stored on a dedicated drive so that data can be reconstructed if a drive fails
  • RAID 3 is used in applications that involve large sequential data access, such as video streaming.
raid 4
RAID 4
  • Stripes data across all disks except the parity disk at the block level
  • Parity information is stored on a dedicated disk
  • Unlike RAID 3 , data disks can be accessed independently so that specific data elements can be read or written on a single disk without read or write of an entire stripe
raid 5
RAID 5
  • RAID 5 is a very versatile RAID implementation
  • The difference between RAID 4 and RAID 5 is the parity location.
  • RAID 4, parity is written to a dedicated drive, while In RAID 5, parity is distributed across all disks
  • The distribution of parity in RAID 5 overcomes the write bottleneck.
  • RAID 5 is preferred for messaging, medium-performance media serving, and relational database management system (RDBMS) implementations in which database administrators (DBAs) optimize data access
raid 6
RAID 6
  • RAID 6 works the same way as RAID 5 except that RAID 6 includes a second parity element
  • This enable survival in the event of the failure of two disks in a RAID group.
  • RAID-6 protects against two disk failures by maintaining two parities
hot spare
Hot Spare
  • A hot spare refers to a spare HDD in a RAID array that temporarily replaces a failed HDD of a RAID set.
  • When the failed HDD is replaced with a new HDD, The hot spare replaces the new HDD permanently, and a new hot spare must be configured on the array, or data from the hot spare is copied to it, and the hot spare returns to its idle state, ready to replace the next failed drive.
  • A hot spare should be large enough to accommodate data from a failed drive.
  • Some systems implement multiple hot spares to improve data availability.
  • A hot spare can be configured as automatic or user initiated, which specifies how it will be used in the event of disk failure
what is an intelligent storage system
What is an Intelligent Storage System
  • Intelligent Storage Systems are RAID arrays that are:

Highly optimized for I/O processing

Have large amounts of cache for improving I/O

performance

Have operating environments that provide:

– Intelligence for managing cache

– Array resource allocation

– Connectivity for heterogeneous hosts

– Advanced array based local and remote replication options

components of an intelligent storage system
Components of an Intelligent Storage System
  • An intelligent storage system consists of four key components: front end, cache, back end, and physical disks.
components of an intelligent storage system1
Components of an Intelligent Storage System
  • The front end provides the interface between the storage system and the host.
  • It consists of two components: front-end ports and front-end controllers
  • The front-end ports enable hosts to connect to the intelligent storage system, and has processing logic that executes the appropriate transport protocol, such as SCSI, Fibre Channel, or iSCSI, for storage connections
  • Front-end controllers route data to and from cache via the internal data bus. When cache receives write data, the controller sends an acknowledgment
components of an intelligent storage system2
Components of an Intelligent Storage System
  • Controllers optimize I/O processing by using command queuing algorithms
  • Command queuing is a technique implemented on front-end controllers
  • It determines the execution order of received commands and can reduce unnecessary drive head movements and improve disk performance
intelligent storage system cache
Intelligent Storage System: Cache
  • Cache is an important component that enhances the I/O performance in an intelligent storage system.
  • Cache improves storage system performance by isolating hosts from the mechanical delays associated with physical disks, which are the slowest components of an intelligent storage system. Accessing data from a physical disk usually takes a few milliseconds
  • Accessing data from cache takes less than a millisecond. Write data is placed in cache and then written to disk
cache data protection
Cache Data Protection
  • Cache mirroring: Each write to cache is held in two different memory locations on two independent memory cards
  • Cache vaulting: Cache is exposed to the risk of uncommitted data loss due to power failure
  • using battery power to write the cache content to the disk storage vendors use a set of physical disks to dump the contents of cache during power failure
intelligent storage system back end
Intelligent Storage System: Back End
  • It consists of two components: back-end ports and back-end controllers
  • Physical disks are connected to ports on the back end.
  • The back end controller communicates with the disks when performing reads and writes and also provides additional, but limited, temporary data storage.
  • The algorithms implemented on back-end controllers provide error detection and correction, along with RAID functionality. Controller
  • Multiple controllers also facilitate load balancing
intelligent storage system physical disks
Intelligent Storage System: Physical Disks
  • Disks are connected to the back-end with either SCSI or a Fibre Channel interface
what is luns
What is LUNs
  • Physical drives or groups of RAID protected drives can be logically split into volumes known as logical volumes, commonly referred to as Logical Unit Numbers (LUNs)
high end storage systems
High-end Storage Systems
  • High-end storage systems, referred to as active-active arrays, are generally aimed at large enterprises for centralizing corporate data
  • These arrays are designed with a large number of controllers and cache memory
  • An active-active array implies that the host can perform I/Os to its LUNs across any of the available Paths
midrange storage systems
Midrange Storage Systems
  • Also referred as Active-passive arrays
  • Host can perform I/Os to LUNs only through active paths
  • Other paths remain passive till active path fails
  • Midrange array have two controllers, each with cache, RAID controllers and disks drive interfaces
  • Designed for small and medium enterprises
  • Less scalable as compared to high-end array
slide39
DAS

Direct-Attached Storage (DAS)

  • storage connects directly to servers
  • applications access data from DAS using block-level access protocols
  • Examples:
    • internal HDD of a host,
    • tape libraries, and
    • directly connected external HDD
slide40
DAS

Direct-Attached Storage (DAS)

  • DAS is classified as internal or external, based on the location of the storage device with respect to the host.
  • Internal DAS: storage device internally connected to the host by a serial or parallel bus
    • distance limitations for high-speed connectivity
    • can support only a limited number of devices, and
    • occupy a large amount of space inside the host
slide41
DAS

Direct-Attached Storage (DAS)

  • External DAS: server connects directly to the external storage device
  • usually communication via SCSI or FC protocol.
    • overcomes the distance and device count limitations of internal DAS, and
    • provides centralized management of storage devices.
das benefits
DAS Benefits
  • Ideal for local data provisioning
  • Quick deployment for small environments
  • Simple to deploy
  • Reliability
  • Low capital expense
  • Low complexity
das connectivity options
DAS Connectivity Options
  • host  storage device communication via protocols
  • ATA/IDE and SATA – Primarily for internal bus
  • SCSI
    • – Parallel (primarily for internal bus)
    • – Serial (external bus)
  • FC – High speed network technology
das connectivity options1
DAS Connectivity Options
  • protocols are implemented on the HDD controller
  • a storage device is also known by the name of the protocol it supports
das management
DAS Management
  • LUN creation, filesystem layout, and data addressing
  • Internal – Host (or 3rd party software) provides:
    • Disk partitioning (Volume management)
    • File system layout
das management1
DAS Management
  • External
  • –Array based management
  • – Lower TCO for managing data and storage Infrastructure
das challenges
DAS Challenges
  • limited scalability
    • Number of connectivity ports to hosts
    • Number of addressable disks
    • Distance limitations
  • For internal DAS, maintenance requires downtime
  • Limited ability to share resources (unused resources cannot be easily re-allocated)
  • – Array front-end port, storage space
  • – Resulting in islands of over and under utilized storage pools
introduction to scsi
Introduction to SCSI
  • SCSI–3 is the latest version of SCSI
scsi architecture
SCSI Architecture

Primary commands common to all devices

scsi architecture1
SCSI Architecture

Standard rules for device communication and information sharing

scsi architecture2
SCSI Architecture

Interface details such as electrical signaling methods and data transfer modes

scsi device model
SCSI Device Model
  • SCSI initiator device
  • – Issues commands to SCSI target devices
  • – Example: SCSI host adaptor
scsi device model1
SCSI Device Model
  • SCSI target device
  • – Executes commands issued by initiators
  • – Examples: SCSI peripheral devices
scsi device model2
SCSI Device Model
  • Device requests contain
  • Command Descriptor Block (CDB)
scsi device model3
SCSI Device Model
  • CDB structure
  • – 8 bit structure
  • – defines the command to be executed
  • – contains operation code, command specific parameter and control parameter
scsi addressing
SCSI Addressing

a number from 0 to 15 with the most common value being 7

scsi addressing1
SCSI Addressing

a number from 0 to 15

scsi addressing2
SCSI Addressing

a number that specifies a device addressable through a target

scsi addressing example
SCSI Addressing Example

controller

target

device

areas where das fails
Areas Where DAS Fails
  • Just-in-time information to business users
  • Integration of information infrastructure with business processes
  • Flexible and resilient storage architecture
the solution
The Solution?
  • Storage Networking
    • FC SAN
    • NAS
    • IP SAN
what is a san
What is a SAN ?
  • Dedicated high speed network of servers and shared storage devices
  • Provide block level data access
what is a san1
What is a SAN ?
  • Resource Consolidation – Centralized storage and management
  • Scalability
  • – Theoretical limit: Appx. 15 million devices
  • Secure Access
fibre channel
Fibre Channel

Latest FC implementations support 8Gb/s

fibre channel1
Fibre Channel

a high-speed network technology that runs on high-speed optical fiber cables (for front-end SAN connectivity)

fibre channel2
Fibre Channel

and serial copper cables (for back-end disk connectivity)

components of san
Components of SAN
  • three basic components:
      • servers,
      • network infrastructure, and
      • storage,
  • can be further broken down into the following key elements:
    • node ports,
    • cabling,
    • interconnecting devices (such as FC switches or hubs),
    • storage arrays, and
    • SAN management software
components of san node ports
Components of SAN: Node ports
  • Examples of nodes
  • – Hosts, storage and tape library
  • Ports are available on:
  • – HBA in host– Front-end adapters in storage
  • – Each port has transmit (Tx) link and receive (Rx) link
  • HBAs perform low-level interface functions automatically to minimize impact on host performance
components of san cabling
Components of SAN: Cabling
  • Copper cables for short distance
  • Optical fiber cables for long distance
  • – Single-mode
        • Can carry single beams of light
        • Distance up to 10 KM
      • – Multi-mode
        • Can carry multiple beams of light simultaneously
        • Distance up to 500 meters
components of san cabling connectors
Components of SAN: Cabling (connectors)
  • Node Connectors:
  • SC Duplex Connectors
  • LC Duplex Connectors
  • Patch panel Connectors:
  • ST Simplex Connectors
components of san interconnecting devices
Components of SAN: Interconnecting devices

– Hubs

– Switches and

– Directors

components of san storage array
Components of SAN: Storage array
  • storage consolidation and centralization
  • provides
  • – High Availability/Redundancy
  • – Performance
  • – Business Continuity – Multiple host connect
components of san san management software
Components of SAN: SAN management software
  • A suite of tools used in a SAN to manage the interface between host and storage arrays
  • Provides integrated management of SAN environment
  • Web based GUI or CLI
san interconnectivity options fc al
SAN Interconnectivity Options: FC-AL

Fibre Channel Arbitrated Loop (FC-AL)

– Devices must arbitrate to gain control

– Devices are connected via hubs

– Supports up to 127 devices

san interconnectivity options fc sw
SAN Interconnectivity Options: FC-SW

Fabric connect (FC-SW)

– Dedicated bandwidth between devices

– Support up to 15 million devices

– Higher availability than hubs

what is nas1
What is NAS?
  • IP-based file sharing device attached to LAN
  • Server consolidation
  • File-level data access and sharing
slide90

Why NAS?

dedicated to file-serving

slide91

Benefits of NAS

  • Support comprehensive access to information
  • Improves efficiency and flexibility
  • Centralizes storage
  • Simplifies management
  • Scalability
  • High availability – through native clustering
  • Provides security integration to environment (user authentication and authorization)
slide92

CPU and Memory

NICs

file sharing protocols

IP network

NAS OS

storage protocols (ATA, SCSI, or FC)

slide94

Benefits:

  • Increases performance throughput (service level) to end users
  • Minimizes investment in additional servers
  • Provides storage pooling
  • Provides heterogeneous file servings
  • Uses existing infrastructure, tools, and processes
slide96

Benefits:

  • Provides continuous availability to files
  • Heterogeneous file sharing
  • Reduces cost for additional OS dependent servers
  • Adds storage capacity non-disruptively
  • Consolidates storage management
  • Lowers Total Cost of Ownership
slide99

Driver for IP SAN

  • In FC SAN transfer of block level data takes place over Fibre Channel
  • Emerging technologies provide for the transfer of block-level data over an existing IP network infrastructure
slide100

Why IP?

  • Easier management
  • Existing network infrastructure can be leveraged
  • Reduced cost compared to new SAN hardware and software
  • Supports multi-vendor interoperability
  • Many long-distance disaster recovery solutions already leverage IP-based networks
  • Many robust and mature security options are available for IP networks
block storage over ip iscsi
Block Storage over IP - iSCSI
  • SCSI over IP
  • IP encapsulation
    • Ethernet NIC card
    • iSCSI HBA
  • Hardware-based gateway to Fibre Channel storage
  • Used to connect servers
block storage over ip fcip
Block Storage over IP - FCIP
  • Fibre Channel-to-IP bridge / tunnel (point to point)
  • Fibre Channel end points
  • Used in DR implementations
slide103

iSCSI ?

  • IP based protocol used to connect host and storage
  • Carries block-level data over IP-based network
  • Encapsulate SCSI commands and transport as TCP/IP packet
slide104

Components of iSCSI

  • iSCSI host initiators
    • – Host computer using a NIC or iSCSI HBA to connect to storage
    • – iSCSI initiator software may need to be installed
  • iSCSI targets
    • – Storage array with embedded iSCSI capable network port
    • – FC-iSCSI bridge
  • LAN for IP storage network
    • – Interconnected Ethernet switches and/or routers
slide105

No FC components

  • Each iSCSI port on the array is configured with an IP address and port number
  • – iSCSI Initiators Connect directly to the Array
slide106

Bridge device translates iSCSI/IP to FCP

  • – Standalone device
  • – Integrated into FC switch (multi-protocol router)
  • iSCSI initiator/host configured with bridge as target
  • Bridge generates virtual FC initiator
slide108

FCIP (Fibre Channel over IP)?

  • FCIP is an IP-based storage networking technology
  • Combines advantages of Fibre Channel and IP
  • Creates virtual FC links that connect devices in a different fabric
  • FCIP is a distance extension solution
  • – Used for data sharing over geographically dispersed SAN
question 1

A. 60 Billion

B. 46.2 Billion

D. 9 Billion

C. 14 Billion

Ask a Colleague

Ask the Audience

50:50

Question 1

What was EMC’s revenue in 2009?

Ask the Audience

question 2

A. 846 Terabytes

B. 686 Petabytes

D. 2502 Exabytes

C. .8 Zettabytes

Ask a Colleague

Ask the Audience

50:50

Question 2

How much digital information was created worldwide in 2009?

Ask the Audience

the digital universe 2009 2020
The Digital Universe 2009-2020

2020: 35.2 Zettabytes

Growingby aFactor of 44

2009:0.8 ZB

One Zettabyte (ZB) = 1 trillion gigabytes

Source: IDC Digital Universe Study, sponsored by EMC, May 2010

slide116

1.2 ZB in 2010 is Equal to . . .

75 Billion Fully Loaded 16GB iPads

what is driving the digital explosion

Data Center

Remote Site

Data

1

2

4

3

Remote Copies

Local Copies

6

5

Backup copy

Copy for archiving

What is Driving the Digital Explosion?

Web 2.0 Applications

Ubiquitous Content-Generating Devices

3G/4G

Secure Collaboration

Longer Data Retention Periods

SEC 17a-4

Freedom of Information Act

HIPAA

Sarbanes-Oxley

Regulation Landscape

question 3

A. 30%

B. 50%

D. 90%

C. 70%

Ask a Colleague

Ask the Audience

50:50

Question 3

What percentage of the .8 zettabytes of digital information is created by individuals?

Ask the Audience

the digital information world

Corp.

Corp.

85%

Ind.

Of the digital universe willbe the responsibility of companies to manageand secure

70%

Of the digital universe

will be created by individuals

Ind.

The Digital Information World

Individuals create data …companies manage it!

Create

Manage

Source: IDC Digital Universe Study, sponsored by EMC, May 2010

question 4

A. 24 Gigabytes

B. 240 Gigabytes

D. 2502 Exabytes

C. 24 Terabytes

Ask a Colleague

Ask the Audience

50:50

Question 4

How much storage capacity was available on the first Symmetrix 4200 that EMC shipped in 1990?

Ask the Audience

emc s tiered storage platforms

EMCDisk Library

EMCDisk Library

CLARiiON

Celerra

Celerra

Symmetrix

NS500

NS700NS704

CX3 UltraScale Series

DL4100DL4200

DL740

DMX-3

NS40NS80

DL4400

NSX

NSX

NS350

NS350

DL210

DL210

DL710

DL720

DMX800

FC & iSCSI

NS40G

AX150

NS80G

NS500GNS700G

NS704G

Rainfinity

Global FileVirtualization

Rainfinity

Global FileVirtualization

DMX1000

EMC’s Tiered Storage Platforms

Broadest Range of Function, Performance, and Connectivity

iSCSI

IP

FICON

SAN

NAS

CAS

Fibre Channel

ADICScalarfamily

EMC Centera

Symmetrix

Invista

Connectrix

iSCSI

DMX-3 950

DMX-3

EMC Centera

4-Node

Low-costFibre Channel

500 GB

7,200 rpm

SATA

250 GB

7,200 rpm

SATA

500 GB

7,200 rpm

Fibre Channel

73 GB

10k/15k rpm

Fibre Channel

146 GB

10k/15k rpm

Fibre Channel

300 GB

10k rpm

1990

2009

Symmetrix 4200 Integrated Cached Disk Array introduced with a capacity of 24 gigabytes.

Symmetrix V-Max Systems are available with up to 2 petabytes of usable storage in a single system.

question 6

x

A. Storage consolidation

B. Designing & deploying multi-site environments

C. Managing storage growth

D. Making informed strategic / big picture decisions

Ask a Colleague

Ask the Audience

50:50

Question 6

What is the number 1 challenge identified by IT and storage managers?

Ask the Audience

digital information storage challenges
Digital Information Storage Challenges

Most important activities/constraints identified as challenges

by IT/storage managers

  • Managing Storage Growth
  • Designing, deploying, and managing backup and recovery
  • Designing, deploying, and managing storage in a virtualized server environment
  • Designing, deploying, and managing disaster recovery solutions
  • Storage consolidation
  • Making informed strategic / big-picture decisions
  • Integrating storage in application environments (such as Oracle, Exchange, etc.)
  • Designing and deploying multi-site environments
  • Lack of skilled storage professionals

Managing Information Storage: Trends, Challenges and Options 2010-2011

*Source

Input from over 1,450 storage professionals worldwide 

http://education.EMC.com/ManagingStorage/

building an effective storage mgmt organization
Building an Effective Storage Mgmt Organization

Hire an additional 22%+ storage professionals . . .

Based on EMC study ‘ Managing Information Storage: Trends, Challenges & Options (2010-2011)’

www.emc.com/managingstorage

where managers plan to find storage expertise
Where Managers Plan to Find Storage Expertise

Based on EMC study ‘ Managing Information Storage: Trends, Challenges & Options (2010-2011)’

www.emc.com/managingstorage

top it certifications by salary
Top IT Certifications by Salary

Source: Certification Magazine, December 2009

storage role across it disciplines
Storage Role Across IT Disciplines

Leverage the functionalities of storage technology products to…..

  • Systems Architects/Administrators
    • Maximize performance, increase availability, and avoid costly server upgrades.
  • Network Administrators
    • Maximize performance of your network and to help you plan in advance.
  • Database Administrators
    • Maximize performance, increase availability, and realize faster recoverability of your database.
  • Application Architect
    • Increase the performance and availability of your application
  • IT Project Managers
    • Plan & execute your IT Projects, which involve or are impacted by Storage technology components
key pillars of it

Pillars of Information Technology

Key Pillars of IT

Businesses IT perspective on the data center in the last 20 years have focused on 4 pillars of Information Technology: operating systems, databases, networking, and software application development

Based on today’s IT infrastructure, Information Storage is the 5th pillar of IT!

question 7

x

A. Storage Area Networks for Dummies

B. Storage Networks Explained

C. Administering Data Centers

D. Information Storage and Management

Ask a Colleague

Ask the Audience

50:50

Question 7

What is the name of the EMC authored booked that was released in May 2009?

Ask the Audience

information storage and management ism

Modules

Section 1.

Storage

System

Section 2.

Storage Networking

Technologies

& Virtualization

Section 3.

Business

Continuity

Section 4.

Storage Security

& Management

Information Storage and Management (ISM)

http://education.EMC.com/ismbook

information storage and mgmt ism

Student Profiles

Experienced

Aspiring

Section 1.

Section 2.

Section 3.

Section 4.

‘Open’

Information Storage and Mgmt (ISM)
  • Section 1. Storage System

KEY CONCEPT COVERAGE

information storage and mgmt ism1

Key initiatives for all companies

Consolidation

Virtualization

Section 1.

Section 2.

Section 3.

Section 4.

‘Open’

+

Physical / Smaller Footprint

Logical / Greater Flexibility

Information Storage and Mgmt (ISM)
  • Section 2. Storage Networking Technologies and Virtualization

KEY CONCEPT COVERAGE

information storage and mgmt ism2

Always available / Never lost

Data Center

Remote Site

Customer

/ Business

Data

1

2

Section 1.

Section 2.

4

3

Section 3.

Section 4.

Remote Copies

Local Copies

6

5

‘Open’

Copy for archiving

Backup copy

+

Maximize Data Availability

Minimize chances of data loss

Information Storage and Mgmt (ISM)
  • Section 3. Business Continuity

KEY CONCEPT COVERAGE

information storage and mgmt ism3

Is my data secure?

Section 1.

Section 2.

Section 3.

Section 4.

Consolidated

Virtualized

‘Open’

Data storage security considerations

Information Storage and Mgmt (ISM)
  • Section 4. Storage Security and Management

KEY CONCEPT COVERAGE

and in the Cloud

emc academic alliance1
EMC Academic Alliance

Developing tomorrow’s Information Storage Professionals…today!

  • Partnering with leading Institutes of Higher Education worldwide to bridge the storage knowledge gap in Industry
  • Providing EMC, Customers and Partners with source to hire storage educated graduates
  • Hundreds of institutions globally, educating thousands of students
  • Offering unique ‘open’ course on Information Storage and Management
    • Focus on concepts and principles
  • Opportunity for EMC to give back as the industry leader
  • For the latest list of participating institutions and to introduce us to your Alma Mater, visit
  • http://education.EMC.com/academicalliance
becoming an academic partner required steps
Becoming an Academic PartnerRequired Steps . . .
  • Institution enrolls via the EAA online application.

http://info.emc.com/mk/get/EAA_APPL_form?src=&HBX_Account_Number=emc-emccom

  • Institution identifies faculty to teach course and administer the program.
  • Institution identifies faculty to attend the 5 day ISM Faculty Readiness Seminar (FRS) and clear ISM certification exam.
  • Institution accesses secure Faculty website to download teaching aids such as chapter PowerPoints, quizzes, simulators, etc.
  • Institution promotes ISM course to students.
  • Institution schedules and begins teaching the ISM course.
summary
Summary
  • Information storage is one of the fastest growing sectors within IT.
  • Information growth and complexity creates challenges and career opportunities
  • Business and industry are looking for IT professionals who know all 5 pillars.
  • Those who obtain the skills through formal education and industry qualification have an advantage.