Storage UPDATE--Information Lifecycle Management--February 9, 2004

This Issue Sponsored By

Microsoft(R) and Quest Software

http://www.quest.com/landing/winnetmag_storage020903.asp

Windows & .NET Magazine

http://www.winnetmag.com/rd.cfm?code=fsep204xup

===============

==== Sponsor: Microsoft(R) and Quest Software ====

Determine potential savings- Get your storage assessment today

Disk space is cheap, but managing storage isn't. How are you planning to tackle this growing concern? Determine your company's storage fitness, potential TCO and achievable project savings with Microsoft(R) and Quest Software's Storage Optimization Offering. Download the complimentary tools and get on the road to storage fitness.

http://www.quest.com/landing/winnetmag_storage020903.asp

==========

==== 1. Commentary ====

by Elliot King, eking2@prodigy.net

The ILM Drumbeat Intensifies

The concept of Information Lifecycle Management (ILM) is widely bandied about in the storage world. Most major storage vendors are touting their ILM strategies, and when new products are released, vendors describe those products' roles within the overall ILM framework. Companies are even acquiring other companies with an eye to bolstering their ILM portfolios.

As is often the case when a concept sweeps through the industry, the term ILM can have very different meanings to different communities of users. Moreover, different vendors might push the idea for very different reasons. Consequently, the term ILM leaves a lot of room for confusion, which could lead to poor customer choices and implementations.

ILM isn't an emerging product category in the same sense that Storage Resource Management (SRM) is. Rather, ILM rests on the common-sense notion that as data diminishes in value over time, it should be stored using a less expensive storage technology. ILM is an exercise in data stratification. Todd Rief, director of corporate strategy for StorageTek, said that ILM differs from the older idea of Hierarchical Storage Management (HSM) because HSM focuses solely on data movement, whereas ILM also encompasses data protection. Like the airline industry has discovered about its passengers, Rief said, storage professionals have determined that some data is more valuable than other data and thus deserves different treatment.

The industry is enamored with ILM now for at least two reasons. First, because storage technology has become more sophisticated, faster, and cheaper, companies are building more complex storage infrastructures. From a directly attached high-performance hard disk or a Storage Area Network (SAN), for example, companies can move data to lower-cost near-online disk storage, then to tape; move data directly to tape; or archive some data while preserving other data on the production hard disk.

Second, the number of data protection schemes is also exploding. For example, companies can use mirroring techniques, point-in-time snapshots, and continuous backup. At the same time, customers have a sense that the most expensive, high-performance production storage is poorly utilized. Industry observers have noted that high-performance disks are often filled at only 30 to 35 percent of their capacity. Although SRM is intended to rectify that situation, the implementation of solutions has been slow.

But improved technology is just one reason that the idea of ILM resonates so clearly in the enterprise. Regulatory-compliance and business-continuity concerns require an improved data management layer and a better archive layer in storage implementations. In addition to being able to retrieve specific files expeditiously, companies must be able to document that those files weren't tampered with in any way.

If successfully implemented, ILM could deliver lower-cost, more flexible, more efficient storage infrastructures. But the road to realizing those benefits isn't at all clear. No single company offers all the pieces to complete the ILM puzzle. James Lee, vice president of product marketing at Princeton Softech, a vendor of archiving technology that recently cut a deal with Network Appliance (NetApp), argues that ILM will require a best-of-breed approach to selecting specific pieces of the solutions.

However, selecting best-of-breed technology requires people to make difficult choices. Moreover, best-of-breed solutions involve complexity. Because different vendors supply different parts of the answer, those pieces must be integrated, and projects that require a lot of integration often have many points of failure. But implementing solutions that introduce more points of failure runs counter to the instincts of most professionals responsible for safeguarding company data. Although senior executives give lip service to Return on Investment (ROI) being the most important criterion in deciding which technology to use, for people on the front line, minimizing risk is the first priority. If a system fails and crucial data is lost, the cost-effectiveness of the implementation no longer matters.

For many vendors, ILM starts as a service offering. Consultants will help companies assess where their data resides and how to reengineer the storage structure. In other words, vendors will help companies think about how they can look at their current setups through the lens of ILM. But the thought process is just beginning. The outcome remains out of sight.

==== Sponsor: Windows & .NET Magazine ====

Get 2 Sample Issues of Windows & .NET Magazine!

Every issue of Windows & .NET Magazine includes intelligent, impartial, and independent coverage of security, Active Directory, Exchange Server, and more. Our expert authors deliver content you simply can't find anywhere else. Try two, no-risk sample issues today, and find out why 100,000 IT professionals read Windows & .NET Magazine each month!

http://www.winnetmag.com/rd.cfm?code=fsep204xup

==== 2. News and Views ====

by Keith Furman, keith@winnetmag.com

New Storage Management Definition Released

The Distributed Management Task Force (DMTF) has released the final version of the Common Information Model (CIM) Schema Version 2, Release 8. The schema provides a common, standards-based definition of management information and is a key part of the Storage Networking Industry Association's (SNIA's) Storage Management Interface Specification (SMI-S). CIM 2.8 adds new classes for storage and adds modeling support for Java 2 Enterprise Edition (J2EE). "With new modeling for widespread standards such as J2EE and SMI-S, as well as additional capabilities in telecommunications, management profiles and other areas, CIM 2.8 will enable a new level of interoperable manageability for the \[management\] industry," said Oracle's Todd Guay, vice president of technology for the DMTF.

New and improved storage-related features in CIM 2.8 include support for management of replicas of storage objects, LUN mapping and masking controls, better modeling of SCSI, zoning configuration and control, and startup and shutdown of devices and services. The specification also provides support for mapping from the CIM database model to the storage level. In the past 2 years, storage vendors have spent much effort on standards-based management interoperability. CIM 2.8 will let storage management vendors easily design standards-based products. "The industry standard for management information, DMTF's CIM 2.8 delivers the unparalleled management infrastructure critical to the success of SMI-S, the standard for interoperable storage management," said Roger Reich, chair of SNIA's SMI committee.

http://www.dmtf.org/standards/cim

FCIA Announces New Testing Program

A new program spearheaded by the Fibre Channel Industry Association (FCIA) will give vendors the opportunity to qualify their products as SANmark approved. The SANmark Qualified Test Provider program allows third-party vendors to become qualified SANmark test providers and provide testing services to Fibre Channel OEMs. The program lets OEMs have their products tested against industry standards for functionality and interoperability without having to set up their own test labs. Approved products can use the SANmark trademark to denote testing success.

FCIA sponsors, operates, and promotes the SANmark Qualified Program. The program addresses product interoperability and device-level compatibility for participating companies. Membership in the FCIA isn't required to take advantage of the SANmark program. For more information about the SANmark program, click the URLs below.

http://www.sanmark.org

http://www.fibrechannel.org

==== 3. Announcements ====

(from Windows & .NET Magazine and its partners)

Try a Sample Issue of Security Administrator!

Security Administrator is the monthly newsletter from Windows & .NET Magazine that shows you how to protect your network from external intruders and control access for internal users. Sign up now to get a 1-month trial issue--you'll feel more secure just knowing you did. Click here!

http://www.secadministrator.com/rd.cfm?code=fsep254xup

Check Out 2 Free Web Seminars--Selecting the Right IM Security Solution and Streamlining User Provisioning and Password Management

Gain control over your IM security by learning about IM authentication, encryption, support for and interoperability between different IM networks, auditing, automatic legal disclaimers, and virus and worm scanning. Or, discover automating provisioning and centralizing password management and how to reduce support costs and security breaches. Register now!

http://www.winnetmag.com/seminars

==== 4. Resource ====

How to Access Shadow Copies That Reside on a Windows Server 2003-Based Computer by Using the Shadow Copy Client in Windows 2000 or in Windows XP

Installations that use shadow copies that reside on a Windows Server 2003-based system can use a Windows XP or a Windows 2000 Service Pack 3 (SP3) client computer to access those shadow copies. For more information and to download the Shadow Copy Client, click the URL below.

http://support.microsoft.com/?kbid=832217

==== 5. Events Central ====

(A complete Web and live events directory brought to you by Windows & .NET Magazine: http://www.winnetmag.com/events )

New--Microsoft Security Strategies Roadshow!

We've teamed with Microsoft, Avanade, and Network Associates to bring you a full day of training to help you get your organization secure and keep it secure. You'll learn how to implement a patch-management strategy; lock down servers, workstations, and network infrastructure; and implement security policy management. Register now for this free, 20-city tour.

http://www.winnetmag.com/roadshows/computersecurity2004

==== 6. New and Improved ====

by Renee Munshi, products@winnetmag.com

Virtual Machine Software Qualifies for SAN Platforms

VMware, an EMC company, announced that VMware ESX Server 2 has successfully completed comprehensive interoperability testing with leading Storage Area Network (SAN) vendors. ESX Server, virtual machine software for partitioning and consolidating systems, has been qualified for EMC, Fujitsu Siemens Computers, Hitachi Data Systems (HDS), HP, IBM, and Network Appliance (NetApp) storage systems. For more information, click the URL below.

http://www.vmware.com

New iSCSI HBA

Xiran, a division of SimpleTech, announced a new high-performance Internet SCSI (iSCSI) host bus adapter (HBA). The DPA-1400 iSCSI+ Accelerator is designed to work in iSCSI-compliant target devices and as an add-on iSCSI (Initiator) HBA. Combining three key functionalities--a Gigabit Ethernet NIC, a TCP/IP off-load engine, and iSCSI off-load processing--in one standard PCI-Extended (PCI-X) adapter lets customers build low-cost, easy-to-manage IP Storage Area Networks (SANs). The DPA-1400 iSCSI+ Accelerator is scheduled to be available to channel partners in first quarter 2004 for a suggested retail price of $750. For more information, visit Xiran's Web site.

http://www.xiran.com

Tell Us About a Hot Product and Get a T-Shirt!

Have you used a product that changed your IT experience by saving you time or easing your daily burden? Tell us about the product, and we'll send you a Windows & .NET Magazine T-shirt if we write about the product in a future Windows & .NET Magazine What's Hot column. Send your product suggestions with information about how the product has helped you to whatshot@winnetmag.com.

==== Sponsored Links ====

Argent

Comparison Paper: The Argent Guardian Easily Beats Out MOM

http://ad.doubleclick.net/clk;6480843;8214395;q?http://www.argent.com/products/download_whitepaper.cgi?product=mom&&Source=WNTTextLink

Javelina Software

Check out ADvantage to bulk modify Active Directory attributes.

http://ad.doubleclick.net/clk;7115967;8214395;t?http://www.javelinasoftware.com/winnetmag2.html

=========

==== 7. Contact Us ====

About the commentary -- eking2@prodigy.net

About the newsletter -- bgibbens@winnetmag.com

About technical questions -- http://www.winnetmag.com/forums

About product news -- products@winnetmag.com

About your subscription -- storageupdate@winnetmag.com

About sponsoring UPDATE -- emedia_opps@winnetmag.com

===============

This email newsletter is brought to you by Windows & .NET Magazine, the leading publication for IT professionals deploying Windows and related technologies. Subscribe today.

http://www.winnetmag.com/sub.cfm?code=wswi201x1z

Manage Your Account

You are subscribed as #EmailAddr#.

You received this email message because you requested to receive additional information about products and services from the Windows & .NET Magazine Network. To unsubscribe, send an email message to mailto:Storage-UPDATE_Unsub@list.winnetmag.com. Thank you!

View the Windows & .NET Magazine privacy policy at http://www.winnetmag.com/AboutUs/Index.cfm?action=privacy

Windows & .NET Magazine, a division of Penton Media, Inc.

221 East 29th Street, Loveland, CO 80538

Attention: Customer Service Department

Copyright 2004, Penton Media, Inc. All rights reserved.