{"global":{"lastError":{},"locale":"de","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"implementations":{"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"more":{"en":"Learn more","ru":"Узнать больше","_type":"localeString"},"sort-title-asc":{"_type":"localeString","en":"From A to Z","ru":"От А до Я"},"sort-title-desc":{"ru":"от Я до А","_type":"localeString","en":"From Z to A"},"sort-rating-asc":{"en":"Rating ascending","ru":"По возрастанию рейтинга","_type":"localeString"},"sort-rating-desc":{"ru":"По убыванию рейтинга","_type":"localeString","en":"Rating descending"},"sort-discount-asc":{"en":"Rebate ascending","ru":"По возрастанию скидки","_type":"localeString"},"sort-discount-desc":{"_type":"localeString","en":"Rebate descending","ru":"По убыванию скидки"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"supplier":{"en":"Supplier","ru":"Поставщик","_type":"localeString"},"status":{"_type":"localeString","en":"Status","ru":"Статус"},"product":{"_type":"localeString","en":"Product","ru":"Продукт"},"no-results":{"ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString","en":"No results found. We didn't find any results with the filter you selected."},"with-reference":{"ru":"С референсом","_type":"localeString","en":"With reference"},"items-found":{"_type":"localeString","en":"Deployments found","ru":"Внедрений найдено"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"en":"Deal canceled","ru":"Сделка отменена","_type":"localeString"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"_type":"localeString","en":"Deal is planned","ru":"Сделка планируется"},"finished":{"_type":"localeString","en":"Finished","ru":"Завершено"},"in-process":{"_type":"localeString","en":"In Process","ru":"Ведется"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"roi":{"_type":"localeString","en":"ROI","ru":"ROI"},"implementations-fetching-error":{"en":"An error has occurred. Please reload the page.","ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString"}},"header":{"help":{"_type":"localeString","en":"Help","de":"Hilfe","ru":"Помощь"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"en":" Price calculator","ru":"Калькулятор цены","_type":"localeString"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"ru":"от","_type":"localeString","en":"from"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"ru":"Вид","_type":"localeString","en":"View"},"sort-type-label":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"category":{"ru":"Категория","_type":"localeString","en":"Category"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"_type":"localeString","en":"Add Product","ru":"Добавить продукт"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"filter-toggle":{"ru":"Фильтр","_type":"localeString","en":"Filter"},"clear-button":{"en":"Сlear","ru":"Очистить","_type":"localeString"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"en":"Providers","ru":"Поставщик, производитель","_type":"localeString"},"business-tasks-field":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"problems-field":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"with-discounts-checkbox":{"ru":"Со скидками","_type":"localeString","en":"With discounts"},"expert-price-checkbox":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"roi-calculator-checkbox":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"apply-filter-button":{"en":"Apply filter","ru":"Применить фильтр","_type":"localeString"},"sorting-toggle":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"en":"With deployments","ru":"С внедрениями","_type":"localeString"},"bonus-4-reference":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 Reference"},"product-categories":{"ru":"Категории продуктов","_type":"localeString","en":"Product Categories"},"countries":{"ru":"Страны","_type":"localeString","en":"Countries"},"seller":{"en":"Seller","ru":"Продавец","_type":"localeString"},"vendors":{"_type":"localeString","en":"User products vendors","ru":"Производители продуктов пользователя"},"suppliers":{"_type":"localeString","en":"User suppliers","ru":"Поставщики пользователя"},"business-process":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"business-objectives":{"en":"Business tasks","ru":"Бизнес задачи","_type":"localeString"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"en":"Users","ru":"Пользователи","_type":"localeString"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"ru":"С референсами","_type":"localeString","en":"With reference"},"show-deal-checkbox":{"ru":"Показывать сделки с noname","_type":"localeString","en":"Show deal with noname"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"_type":"localeString","en":"Date","ru":"Дата"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"company-size":{"ru":"Размер компании","_type":"localeString","en":"Company size"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"ru":"От Я до А","_type":"localeString","en":"From Z to A"},"sellers-field":{"en":"Sellers","ru":"Поставщики, Производители","_type":"localeString"},"supply-types":{"_type":"localeString","en":"Supply type","ru":"Тип поставки"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"user":{"_type":"localeString","en":"User","ru":"Пользователь"},"company-type":{"_type":"localeString","en":"Company type","ru":"Тип компании"},"partners-field":{"en":"Partners","ru":" Партнеры","_type":"localeString"},"customers":{"_type":"localeString","en":"Customers","ru":"Покупатели"},"product-supplier":{"en":"Product supplier","ru":"Поставщик продукта","_type":"localeString"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product vendor"},"implementation-date":{"en":"Deployment date","ru":"Дата внедрения","_type":"localeString"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"en":"Deal closed","ru":"Сделка закрыта","_type":"localeString"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"_type":"localeString","en":"In Process","ru":"Ведется"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"_type":"localeString","en":"Proof of concept","ru":"Пилотный проект"},"stopped":{"en":"Stopped","ru":"Остановлено","_type":"localeString"},"competencies":{"ru":"Компетенции","_type":"localeString","en":"Competencies"}}},"translationsStatus":{"implementations":"success","filters":"success"},"sections":{"implementations-text-block":{"body":{"ru":[{"style":"normal","_key":"1435aa042111","markDefs":[],"children":[{"marks":[],"text":"Каталог внедрений ROI4CIO - это база данных о внедрениях программного обеспечения, оборудования и ИТ-услуг. Находите внедрения по вендору, поставщику, пользователю, бизнес-задачам, проблемам, статусу, фильтруйте по наличию ROI и референса.","_key":"1435aa0421110","_type":"span"}],"_type":"block"}],"_type":"localeBlock","en":[{"markDefs":[],"children":[{"marks":[],"text":"The ROI4CIO Deployment Catalog is a database of software, hardware, and IT service implementations. Find implementations by vendor, supplier, user, business tasks, problems, status, filter by the presence of ROI and reference.","_key":"0e40f9075bd00","_type":"span"}],"_type":"block","style":"normal","_key":"0e40f9075bd0"}]},"label":"catalog-implementations-text-block"}},"sectionsStatus":{"implementations-text-block":"success"},"pageMetaData":{"implementations":{"title":{"en":"ROI4CIO: Implementations","ru":"ROI4CIO: Внедрения","_type":"localeString"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"og:title","translations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"}},{"name":"og:description","translations":{"ru":"Каталог внедрений различных видов программного обеспечения, ИТ проектов. Результаты внедрений ИТ, результаты, референсы, ROI","_type":"localeString","en":"Implementations"}},{"translations":{"ru":"Внедрения","_type":"localeString","en":"Implementations"},"name":"title"},{"name":"description","translations":{"_type":"localeString","en":"Implementations description","ru":"Описание внедрений"}},{"name":"keywords","translations":{"ru":"Внедрения ключевые слова","_type":"localeString","en":"Implementations keywords"}}]}},"pageMetaDataStatus":{"implementations":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{"hitachi-content-platform-anywhere-to-modernize-bank-it-management":{"id":258,"title":"Hitachi Content Platform Anywhere to Modernize Bank IT Management","description":"Description is not ready yet","alias":"hitachi-content-platform-anywhere-to-modernize-bank-it-management","roi":0,"seo":{"title":"Hitachi Content Platform Anywhere to Modernize Bank IT Management","keywords":"","description":"Description is not ready yet","og:title":"Hitachi Content Platform Anywhere to Modernize Bank IT Management","og:description":"Description is not ready yet"},"deal_info":"","user":{},"supplier":{},"vendors":[{"id":313,"title":"Hitachi Data Systems","logoURL":"https://old.roi4cio.com/uploads/roi/company/hitachi.png","alias":"hitachi-data-systems","address":"","roles":[],"description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Division.\r\n\r\nIn 2010 Hitachi Data Systems sold through direct and indirect channels in more than 170 countries and regions. Its customers included over half of the Fortune 100 companies at the time.","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":6,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"www.hds.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hitachi Data Systems","keywords":"Hitachi, Systems, Data, than, channels, more, direct, sold","description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Divi","og:title":"Hitachi Data Systems","og:description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Divi","og:image":"https://old.roi4cio.com/uploads/roi/company/hitachi.png"},"eventUrl":""}],"products":[{"id":808,"logo":false,"scheme":false,"title":"Hitachi Content Platform Anywhere","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"hitachi-content-platform-anywhere","companyTypes":[],"description":"Mobilize Your Workforce, Minimize Your Risks\r\nMOBILIZE YOUR ENTERPRISE DATA\r\nTransform to a digital workplace for greater efficiency and workforce engagement\r\nEnsure that data is properly protected, and meet regulatory requirements for access, preservation, security and auditing\r\nIncrease worker productivity through collaboration tools and anytime, anywhere, any device access to data\r\nEmpower Your IT to Deliver Its Own Mobility Solution\r\nSECURE, INTEGRATED MOBILITY SOLUTION\r\nMobilize data in existing NAS and content management systems, and transform from traditional to cloud-based home directories\r\nProtect end-user data and easily recover from device failures, user error and threats such as ransomware\r\nCreate a digital workplace with cloud home directories, collaboration tools and rich APIs to satisfy diverse needs and avoid the risks of shadow IT\r\n\r\nAdvantages\r\n\r\nSECURE\r\nMobilize Data Without Compromising Security and Visibility\r\nRetain Visibility and Control of Your Data\r\nAdhere to compliance and governance policies, all while securing access from anywhere.\r\nDiminish Shadow IT and Unsanctioned Application Use\r\nDeliver the public cloud services users need and the collaborative tools they want from your own cloud environment.\r\nSafeguard End-User Data\r\nProtect, secure and easily recover data on end-user devices.\r\n\r\nSIMPLE\r\nEmpower Your Workforce With Intuitive Collaboration Tools\r\nAnytime, Anywhere, Any Device Access to Data\r\nSync and share across PC, Mac, iOS, Android, Windows Phone® or any web-enabled device through the HCP Anywhere user portal.\r\nAvoid Mailbox Quota and File-Size Limitations\r\nPlug-in for Microsoft® Outlook® converts attachments into shared links, reducing mailbox size and enabling collaboration on files as large as 2TB.\r\nStreamline Deployment for Enterprise Environments\r\nEasily deploy software within existing IT environments while supporting antivirus, device management and user authentication services, automatic client updates and user self-service.\r\n\r\nSMART\r\nOptimize Savings for the Long Term\r\nProvide Mobile Access to Corporate File Shares\r\nExtend mobile access to data in existing NAS devices, including Hitachi Data Ingestor, Hitachi NAS Platform, EMC, NetApp and Microsoft® Windows® servers.\r\nReduce Your Help Desk Burden\r\nSelf-service features let users manage devices, file sharing and data recovery themselves while the service automatically stores and protects end-user data.\r\nStore Data Efficiently\r\nShare links to files instead of attachments to reduce network load; deduplicate and compress data to reduce storage needs.\r\nFLEXIBLE\r\nTurnkey Mobility Platform Designed for Your Business\r\nDeliver Private, Hybrid or Public Cloud Storage Services\r\nOffer a range of file services from a single solution extending from your data center to remote offices and end users.\r\nCustomize for Your Business Needs\r\nTailor the solution based on your unique sharing policies, quotas, and governance rules and apply your own logos and branding.\r\nTransform to a Digital Workplace\r\nSoftware development kits and rich APIs let you build your own apps and workflows with built-in collaboration, data protection and compliance tools.\r\n","shortDescription":"Hitachi Content Platform Anywhere\r\nSECURE, SIMPLE, SMART ENTERPRISE MOBILITY\r\nMobilize, protect, sync and share user data to improve productivity","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Hitachi Content Platform Anywhere","keywords":"data, Your, from, Data, your, collaboration, user, tools","description":"Mobilize Your Workforce, Minimize Your Risks\r\nMOBILIZE YOUR ENTERPRISE DATA\r\nTransform to a digital workplace for greater efficiency and workforce engagement\r\nEnsure that data is properly protected, and meet regulatory requirements for access, preservation, se","og:title":"Hitachi Content Platform Anywhere","og:description":"Mobilize Your Workforce, Minimize Your Risks\r\nMOBILIZE YOUR ENTERPRISE DATA\r\nTransform to a digital workplace for greater efficiency and workforce engagement\r\nEnsure that data is properly protected, and meet regulatory requirements for access, preservation, se"},"eventUrl":"","translationId":809,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":7,"title":"Improve Customer Service"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":177,"title":"Decentralized IT systems"}]}},"categories":[{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.cnews.ru/news/line/2017-05-24_ibs_platformix_uprostil_upravlenie_itinfrastrukturoj","title":"Media"}},"comments":[],"referencesCount":0},"hitachi-tagmastore-adaptable-modular-storage-ams-500-for-raiffeisen-bank-aval":{"id":927,"title":"Hitachi TagmaStore Adaptable Modular Storage AMS 500 for Raiffeisen Bank Aval","description":"Description is not ready yet","alias":"hitachi-tagmastore-adaptable-modular-storage-ams-500-for-raiffeisen-bank-aval","roi":0,"seo":{"title":"Hitachi TagmaStore Adaptable Modular Storage AMS 500 for Raiffeisen Bank Aval","keywords":"","description":"Description is not ready yet","og:title":"Hitachi TagmaStore Adaptable Modular Storage AMS 500 for Raiffeisen Bank Aval","og:description":"Description is not ready yet"},"deal_info":"","user":{"id":544,"title":"Raiffeisen Bank Aval","logoURL":"https://old.roi4cio.com/uploads/roi/company/Aval.jpg","alias":"raiffaizen-bank-aval","address":"","roles":[],"description":"Raiffeisen Bank Aval Public Joint Stock Company was registered on March 27, 1992 (operated under the brand name of Joint Stock Postal Pension Bank Aval until September 25, 2006). Since October 2005, the Bank has been part of the Raiffeisen International Bank Holding AG Group, Austria (since October 2010 — Raiffeisen Bank International AG, as of September 30, 2015 the Group held 96.46% of shares in the Bank).\r\nThe Bank provides a broad range of standard and innovative banking services through its nationwide network which comprised, as of September 30, 2015, 617 outlets located in big cities, provincial and community centers throughout Ukraine.\r\nThe Bank has an effective management structure, based on a clear division into business lines and supporting verticals (information technologies, operation support, controlling, security and other) both in the Bank’s Head-office and regional directorates. As a truly international bank, Raiffeisen Bank Aval clearly separates front-office functions from back-office ones to achieve higher quality of client service and enhance risk mitigation.\r\nTraditionally, Raiffeisen Bank Aval is ranked among top Ukrainian banks by trust and recognition of clients, partners and experts, both Ukrainian and international.\r\nThe Bank strives to improve its customer service quality through using its own long-term experience, the valuable expertise of Raiffeisen Bank International network banks and the newest technologies.\r\nSource: https://www.linkedin.com/company/raiffeisen-bank-aval/about/","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":6,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.aval.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Raiffeisen Bank Aval","keywords":"Aval, Bank, Raiffeisen, Joint, Stock, name, brand, Postal","description":"Raiffeisen Bank Aval Public Joint Stock Company was registered on March 27, 1992 (operated under the brand name of Joint Stock Postal Pension Bank Aval until September 25, 2006). Since October 2005, the Bank has been part of the Raiffeisen International Bank H","og:title":"Raiffeisen Bank Aval","og:description":"Raiffeisen Bank Aval Public Joint Stock Company was registered on March 27, 1992 (operated under the brand name of Joint Stock Postal Pension Bank Aval until September 25, 2006). Since October 2005, the Bank has been part of the Raiffeisen International Bank H","og:image":"https://old.roi4cio.com/uploads/roi/company/Aval.jpg"},"eventUrl":""},"supplier":{"id":246,"title":"SI BIS","logoURL":"https://old.roi4cio.com/uploads/roi/company/sibis-logo.png","alias":"si-bis","address":"г. Киев, 04073, ул. Рылеева, 10-А +38 (044) 499-12-12","roles":[],"description":"SI BIS Company specializes in implementing complex projects for the creation of modern communications infrastructure, based on the principles of integration of IT and business solutions. The company was founded in 2003 and has more than 12 years a reliable IT partner for more than 400 Ukrainian companies.\r\n\r\nSI BIS has a high competence in the promotion of integrated IBM solutions, Cisco and the Microsoft, is a recognized leader in the provision of services and technical support, implementing complex consulting projects and provides a wide range of services to optimize the information and business processes for organizations.\r\n\r\nUsing industry experience and global best practices, deep technological expertise, a balanced portfolio of solutions and predictive model of service and technical support, the company SI BIS helps customers to simplify and rationalize the management of their business.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":203,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":42,"vendorImplementationsCount":16,"vendorPartnersCount":9,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://sibis.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SI BIS","keywords":"solutions, business, technical, services, support, than, more, company","description":"SI BIS Company specializes in implementing complex projects for the creation of modern communications infrastructure, based on the principles of integration of IT and business solutions. The company was founded in 2003 and has more than 12 years a reliable IT ","og:title":"SI BIS","og:description":"SI BIS Company specializes in implementing complex projects for the creation of modern communications infrastructure, based on the principles of integration of IT and business solutions. The company was founded in 2003 and has more than 12 years a reliable IT ","og:image":"https://old.roi4cio.com/uploads/roi/company/sibis-logo.png"},"eventUrl":""},"vendors":[{"id":313,"title":"Hitachi Data Systems","logoURL":"https://old.roi4cio.com/uploads/roi/company/hitachi.png","alias":"hitachi-data-systems","address":"","roles":[],"description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Division.\r\n\r\nIn 2010 Hitachi Data Systems sold through direct and indirect channels in more than 170 countries and regions. Its customers included over half of the Fortune 100 companies at the time.","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":6,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"www.hds.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hitachi Data Systems","keywords":"Hitachi, Systems, Data, than, channels, more, direct, sold","description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Divi","og:title":"Hitachi Data Systems","og:description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Divi","og:image":"https://old.roi4cio.com/uploads/roi/company/hitachi.png"},"eventUrl":""}],"products":[{"id":4800,"logo":false,"scheme":false,"title":"Hitachi TagmaStore™ Adaptable Modular Storage Model AMS500","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"alias":"hitachi-tagmastoretm-adaptable-modular-storage-model-ams500","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Enterprise-class Solutions for SMB Customers</span>\r\nSmall-to-midsized businesses (SMBs) are facing big-company challenges of escalating data growth, availability, and protection as well as regulatory compliance and complex storage infrastructures. With many years of experience serving FORTUNE 500 companies, Hitachi Data Systems understands these challenges and has developed Application Optimized Storage™ solutions to match application requirements to storage attributes. Now Hitachi Data Systems brings SMB customers these proven solutions in modular, cost-effective packaging—including the Hitachi TagmaStore™ Adaptable Modular Storage model AMS500.<br />\r\n<span style=\"font-weight: bold;\">Business Benefits</span><br />\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Gain high-end performance and capacity, priced for the midrange</span></span>\r\n<ul><li>Move from server-internal storage to scalable external storage, consolidate multiple storage systems into one, or build a first storage area network (SAN); either iSCSI or Fibre Channel connectivity supported.</li></ul>\r\n<ul><li>Use NAS connectivity options for collaborative file-sharing applications.</li></ul>\r\n<ul><li>Deliver application-specific performance, availability, and protection across systems—from a few terabytes to more than 86TB (SATA intermix drives) or 64TB (Fibre Channel drives).</li></ul>\r\n<ul><li>Use advanced features—Cache Partition Manager and RAID-6—to help improve performance, reliability, and usability.</li></ul>\r\n<ul><li>Partition and dedicate cache to maximize performance of high-I/O applications.</li></ul>\r\n<ul><li>Support outstanding performance for virtually any workload, with 2,048 logical units (LUNs).</li></ul>\r\n<ul><li>Choose between SATA intermix and Fibre Channel to host any workload on the most economical storage system.</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Consolidate storage, anticipate growth</span></span>\r\n<ul><li>Consolidate and centralize management to reduce costs.</li></ul>\r\n<ul><li>Scale to 86.9TB of SATA and Fibre Channel intermix or to 64.7TB of Fibre Channel storage capacity.</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Meet compliance requirements, protect data, and reduce recovery times</span></span>\r\n<ul><li>Enhanced SATA data protection provides unmatched data availability and resiliency.</li></ul>\r\n<ul><li>RAID-6 ensures high availability and flexibility in RAID group rebuild.</li></ul>\r\n<ul><li>Hi-Track® “call-home” service/remote maintenance tool for 24/7 diagnostics keeps potential issues from becoming problems.</li></ul>\r\n<ul><li>Fully redundant and hot-swappable components keep your applications online.</li></ul>\r\n<ul><li>Within-system volume replication or incremental copies provide frequent and nondisruptive backups.</li></ul>\r\n<ul><li>Remote replication is enabled by Hitachi TrueCopy™ Remote Replication software.</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Build a first storage network or extend an existing one</span></span>\r\n<ul><li>Plug-and-play SAN Kits for Microsoft Simple SAN and SAN Starter solutions for easy deployment</li></ul>\r\n<ul><li>Diskless boot for SAN-attached servers</li></ul>\r\n<ul><li>High-capacity storage for network attached storage (NAS) applications</li></ul>\r\n<ul><li>Systems management and configuration using Storage Management and Hitachi HiCommand® Suite software</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Leverage for SMB applications or enterprise tiered storage deployments</span></span>\r\n<ul><li>Microsoft Exchange Server, ERP, CRM, database, NAS filer, backup applications, or tape replacement</li></ul>\r\n<ul><li>Archival and long-term tamperproof data retention to meet regulatory requirements</li></ul>\r\n<ul><li>Complete data lifecycle management solutions within a tiered storage environment when combined with Hitachi enterprise-class storage</li></ul>","shortDescription":"Hitachi TagmaStore® Adaptable Modular Storage models AMS500 deliver the best price/performance, availability and best-in-class scalability in the modular storage market space","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Hitachi TagmaStore™ Adaptable Modular Storage Model AMS500","keywords":"","description":"<span style=\"font-weight: bold;\">Enterprise-class Solutions for SMB Customers</span>\r\nSmall-to-midsized businesses (SMBs) are facing big-company challenges of escalating data growth, availability, and protection as well as regulatory compliance and complex sto","og:title":"Hitachi TagmaStore™ Adaptable Modular Storage Model AMS500","og:description":"<span style=\"font-weight: bold;\">Enterprise-class Solutions for SMB Customers</span>\r\nSmall-to-midsized businesses (SMBs) are facing big-company challenges of escalating data growth, availability, and protection as well as regulatory compliance and complex sto"},"eventUrl":"","translationId":4801,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":180,"title":"Inability to forecast execution timelines"},{"id":340,"title":"Low quality of customer service"},{"id":346,"title":"Shortage of inhouse IT resources"},{"id":370,"title":"No automated business processes"},{"id":373,"title":"IT infrastructure does not meet business tasks"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.sibis.com.ua/project/modernizatsiya-shd-na-baze-oborudovaniya-hitachi/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"hitachi-universal-storage-platform-v-usp-v-for-bank":{"id":39,"title":"Hitachi Universal Storage Platform V (USP V) for bank","description":"Description is not ready yet","alias":"hitachi-universal-storage-platform-v-usp-v-for-bank","roi":0,"seo":{"title":"Hitachi Universal Storage Platform V (USP V) for bank","keywords":"","description":"Description is not ready yet","og:title":"Hitachi Universal Storage Platform V (USP V) for bank","og:description":"Description is not ready yet"},"deal_info":"","user":{"id":537,"title":"PrivatBank","logoURL":"https://old.roi4cio.com/uploads/roi/company/PrivatBank.png","alias":"privatbank","address":"","roles":[],"description":"Established in 1992, PrivatBank is the leader in Ukrainian banking. According to market research carried out by Gfk Ukraine in the II quarter of 2019, 55,3% of individual clients considered us as their main bank. This percentage exceeded the total percentages of the next twenty banks in the Gfk ranking. This index made up 63,7% for corporate clients.\r\nPrivatBank is one of the world's most innovative banks. Over ten years ago the Bank was among the first banks that started using one-time SMS passwords. Among the recent innovations recognised all over the world, there are such products as payment mini-terminals, login to Internet bank using a QR code, online cash collection, and dozens of different mobile applications.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://privatbank.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"PrivatBank","keywords":"PrivatBank, portfolio, value, loan, paid, budget, national, assets","description":"Established in 1992, PrivatBank is the leader in Ukrainian banking. According to market research carried out by Gfk Ukraine in the II quarter of 2019, 55,3% of individual clients considered us as their main bank. This percentage exceeded the total percentages ","og:title":"PrivatBank","og:description":"Established in 1992, PrivatBank is the leader in Ukrainian banking. According to market research carried out by Gfk Ukraine in the II quarter of 2019, 55,3% of individual clients considered us as their main bank. This percentage exceeded the total percentages ","og:image":"https://old.roi4cio.com/uploads/roi/company/PrivatBank.png"},"eventUrl":""},"supplier":{"id":246,"title":"SI BIS","logoURL":"https://old.roi4cio.com/uploads/roi/company/sibis-logo.png","alias":"si-bis","address":"г. Киев, 04073, ул. Рылеева, 10-А +38 (044) 499-12-12","roles":[],"description":"SI BIS Company specializes in implementing complex projects for the creation of modern communications infrastructure, based on the principles of integration of IT and business solutions. The company was founded in 2003 and has more than 12 years a reliable IT partner for more than 400 Ukrainian companies.\r\n\r\nSI BIS has a high competence in the promotion of integrated IBM solutions, Cisco and the Microsoft, is a recognized leader in the provision of services and technical support, implementing complex consulting projects and provides a wide range of services to optimize the information and business processes for organizations.\r\n\r\nUsing industry experience and global best practices, deep technological expertise, a balanced portfolio of solutions and predictive model of service and technical support, the company SI BIS helps customers to simplify and rationalize the management of their business.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":203,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":42,"vendorImplementationsCount":16,"vendorPartnersCount":9,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://sibis.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SI BIS","keywords":"solutions, business, technical, services, support, than, more, company","description":"SI BIS Company specializes in implementing complex projects for the creation of modern communications infrastructure, based on the principles of integration of IT and business solutions. The company was founded in 2003 and has more than 12 years a reliable IT ","og:title":"SI BIS","og:description":"SI BIS Company specializes in implementing complex projects for the creation of modern communications infrastructure, based on the principles of integration of IT and business solutions. The company was founded in 2003 and has more than 12 years a reliable IT ","og:image":"https://old.roi4cio.com/uploads/roi/company/sibis-logo.png"},"eventUrl":""},"vendors":[{"id":313,"title":"Hitachi Data Systems","logoURL":"https://old.roi4cio.com/uploads/roi/company/hitachi.png","alias":"hitachi-data-systems","address":"","roles":[],"description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Division.\r\n\r\nIn 2010 Hitachi Data Systems sold through direct and indirect channels in more than 170 countries and regions. Its customers included over half of the Fortune 100 companies at the time.","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":6,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"www.hds.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hitachi Data Systems","keywords":"Hitachi, Systems, Data, than, channels, more, direct, sold","description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Divi","og:title":"Hitachi Data Systems","og:description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Divi","og:image":"https://old.roi4cio.com/uploads/roi/company/hitachi.png"},"eventUrl":""}],"products":[{"id":374,"logo":false,"scheme":false,"title":"Hitachi Universal Storage Platform V","vendorVerified":0,"rating":"2.70","implementationsCount":3,"suppliersCount":0,"alias":"hitachi-universal-storage-platform-v","companyTypes":[],"description":"\r\nUniversal Storage Platform V Specifications [9]\r\n\r\nFrames (Cabinets) - Integrated Control/Drive Group Frame and 1 to 4 optional Drive Group Frames\r\nUniversal Star Network Crossbar Switch - Number of switches 8\r\nAggregate bandwidth (GB/sec) - 106\r\nAggregate IOPS - Over 4 million\r\nCache Memory - Number of cache modules 1-32, Module capacity 8 or 16GB, Maximum cache memory 512GB\r\nControl/Shared Memory - Number of control memory modules 1-8, Module capacity 4GB, Maximum control memory 28GB\r\nFront End Directors (Connectivity)\r\nNumber of Directors 1-14\r\nFibre Channel host ports per Director - 8 or 16\r\nFibre Channel port performance - 4, 8 Gbit/s\r\nMaximum Fibre Channel host ports - 224\r\nVirtual host ports - 1,024 per physical port\r\nMaximum IBM FICON host ports - 112\r\nMaximum IBM ESCON host ports - 112\r\nLogical Devices (LUNs) — Maximum Supported\r\nOpen systems 65,536\r\nIBM z/OS 65,536\r\nDisks\r\nType: Flash 73, 146, 200 and 400GB\r\nType: Fibre Channel 146, 300, 450 and 600GB\r\nType: SATA II 1TB, 2TB\r\nNumber of disks per system (min/max) 4-1,152\r\nNumber spare disks per system (min/max) 1-40\r\nMaximum Internal Raw Capacity - (2TB disks) 2,268 TB\r\nMaximum Usable Capacity - RAID-5\r\nOpen systems (2TB disks) 1,972 TB\r\nz/OS-compatible (1TB disks) 931 TB\r\nMaximum Usable Capacity — RAID-6\r\nOpen systems (2TB disks) 1,690TB\r\nz/OS-compatible (1TB disks) 796 TB\r\nMaximum Usable Capacity — RAID-1+\r\nOpen systems (2TB disks) 1,130TB\r\nz/OS-compatible (1TB disks) 527.4TB\r\nOther Features\r\nRAID 1, 10, 5, 6 support\r\nMaximum internal and external capacity 247PB\r\nVirtual Storage Machines 32 max\r\nBack end directors 1-8\r\nOperating System Support\r\nMainframe - Fujitsu: MSP; IBM z/OS, z/OS.e, z/VM, zVSE, TPF; Red Hat; Linux for IBM S/390 and zSeries; SUSE: Linux Enterprise Server for System z.\r\nOpen systems - HP: HP-UX, Tru64 UNIX, Open VMS; IBM AIX; Microsoft Windows Server 2000, 2003, 2008; Novell NetWare; SUSE Linux Enterprise Server; Red Hat Enterprise Linux; SGI IRIX; Sun Microsystems Solaris; VMware ESX and Vsphere, Citrix XENserver\r\n","shortDescription":"At the core of the Universal Storage Platform V and VM is a fully fault tolerant, high performance, non-blocking, silicon based switched architecture designed to provide the bandwidth needed to support infrastructure consolidation of enterprise file and block-based storage services on and behind a single platform.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Hitachi Universal Storage Platform V","keywords":"Maximum, disks, Number, Open, host, ports, systems, Channel","description":"\r\nUniversal Storage Platform V Specifications [9]\r\n\r\nFrames (Cabinets) - Integrated Control/Drive Group Frame and 1 to 4 optional Drive Group Frames\r\nUniversal Star Network Crossbar Switch - Number of switches 8\r\nAggregate bandwidth (GB/sec) - 106\r\nAggregate I","og:title":"Hitachi Universal Storage Platform V","og:description":"\r\nUniversal Storage Platform V Specifications [9]\r\n\r\nFrames (Cabinets) - Integrated Control/Drive Group Frame and 1 to 4 optional Drive Group Frames\r\nUniversal Star Network Crossbar Switch - Number of switches 8\r\nAggregate bandwidth (GB/sec) - 106\r\nAggregate I"},"eventUrl":"","translationId":375,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"},{"id":174,"title":"No unified email system"}]}},"categories":[{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://sibis.com.ua/clientproj/banki-i-strakhovaniya/privatbank/modernizatsiya-platformy-khraneniya-dannykh-hitachi-universal-storage-platform-v/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"hitachi-universal-storage-platform-v-usp-vm-for-supermarket-backup":{"id":40,"title":"Hitachi Universal Storage Platform V (USP VM) for Supermarket Backup","description":"Description is not ready yet","alias":"hitachi-universal-storage-platform-v-usp-vm-for-supermarket-backup","roi":0,"seo":{"title":"Hitachi Universal Storage Platform V (USP VM) for Supermarket Backup","keywords":"","description":"Description is not ready yet","og:title":"Hitachi Universal Storage Platform V (USP VM) for Supermarket Backup","og:description":"Description is not ready yet"},"deal_info":"","user":{"id":596,"title":"FOZZY GROUP","logoURL":"https://old.roi4cio.com/uploads/roi/company/FOZZY_GROUP.png","alias":"fozzy-group","address":"","roles":[],"description":"FOZZY GROUP, THE GROUP OF COMPANIES\r\nFozzy Group is one of the largest trade industrial groups in Ukraine and one of the leading Ukrainian retailers, with over 600 outlets all around the country. Besides retail, the Group's businesses interests include food production, bank business, and restaurants.\r\nThe group sells food and household products via its Silpo supermarkets chain and Le Silpo premium stores, wholesale and retail Fozzy hypermarkets, Fora convenience stores, and thrash! discounters chain. Fozzy Group chains stock their own brands of goods Premiya, Premiya Select, Povna Chasha, Povna Charka, Zelena Krayina, Protex, EXTRA!, and others. Silpo supermarkets have a customer loyalty program called Vlasnyi Rakhunok, which, in addition to offering customer rewards, is an effective research and marketing tool for both the chain and for suppliers.\r\nThe group sells non-food products in its Bila Romashka pharmaceutical supermarkets, and ringoo personal electronics stores.\r\nThe major industrial enterprises in the Fozzy Group are the Nizhyn canning business and the Varto poultry factory, Boguslav Food Plant, and Vogni Hestii, LLC (Lights of Hestya).\r\nBanking sector is another Group's business area. Fozzy Group is a key shareholder of PJSC “BANK VOSTOK” and the new operator in the shipping market - Justin.\r\nFozzy Group restaurant business includes the U Hromogo Pola, Staromak, POSITANO, Jiao-bar, ESCOBAR ,WHO&WHY.DRINKERY bar, and two bakeries Boulangerie in Kyiv.\r\nFozzy Group is introducing modern solutions in all areas of its activity. By investing in improving its business processes, the group has achieved leading positions in the retail market. By performing retail chains logistics through its own distribution centers, Fozzy Group has been able to ensure the timely delivery of food to its stores all over Ukraine. In addition, the group operates its own quality control system, ensuring full compliance with its standards in goods storage, transportation and sale.\r\nSince its inception in 1997, Fozzy Group has focused on making innovative business improvements, creating new opportunities for the market and further developing the industry as a whole.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":4,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.fozzy.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"FOZZY GROUP","keywords":"GROUP, Ukrainian, with, retailers, leading, over, country, Besi","description":"FOZZY GROUP, THE GROUP OF COMPANIES\r\nFozzy Group is one of the largest trade industrial groups in Ukraine and one of the leading Ukrainian retailers, with over 600 outlets all around the country. Besides retail, the Group's businesses interests include food pr","og:title":"FOZZY GROUP","og:description":"FOZZY GROUP, THE GROUP OF COMPANIES\r\nFozzy Group is one of the largest trade industrial groups in Ukraine and one of the leading Ukrainian retailers, with over 600 outlets all around the country. Besides retail, the Group's businesses interests include food pr","og:image":"https://old.roi4cio.com/uploads/roi/company/FOZZY_GROUP.png"},"eventUrl":""},"supplier":{"id":246,"title":"SI BIS","logoURL":"https://old.roi4cio.com/uploads/roi/company/sibis-logo.png","alias":"si-bis","address":"г. Киев, 04073, ул. Рылеева, 10-А +38 (044) 499-12-12","roles":[],"description":"SI BIS Company specializes in implementing complex projects for the creation of modern communications infrastructure, based on the principles of integration of IT and business solutions. The company was founded in 2003 and has more than 12 years a reliable IT partner for more than 400 Ukrainian companies.\r\n\r\nSI BIS has a high competence in the promotion of integrated IBM solutions, Cisco and the Microsoft, is a recognized leader in the provision of services and technical support, implementing complex consulting projects and provides a wide range of services to optimize the information and business processes for organizations.\r\n\r\nUsing industry experience and global best practices, deep technological expertise, a balanced portfolio of solutions and predictive model of service and technical support, the company SI BIS helps customers to simplify and rationalize the management of their business.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":203,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":42,"vendorImplementationsCount":16,"vendorPartnersCount":9,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://sibis.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SI BIS","keywords":"solutions, business, technical, services, support, than, more, company","description":"SI BIS Company specializes in implementing complex projects for the creation of modern communications infrastructure, based on the principles of integration of IT and business solutions. The company was founded in 2003 and has more than 12 years a reliable IT ","og:title":"SI BIS","og:description":"SI BIS Company specializes in implementing complex projects for the creation of modern communications infrastructure, based on the principles of integration of IT and business solutions. The company was founded in 2003 and has more than 12 years a reliable IT ","og:image":"https://old.roi4cio.com/uploads/roi/company/sibis-logo.png"},"eventUrl":""},"vendors":[{"id":313,"title":"Hitachi Data Systems","logoURL":"https://old.roi4cio.com/uploads/roi/company/hitachi.png","alias":"hitachi-data-systems","address":"","roles":[],"description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Division.\r\n\r\nIn 2010 Hitachi Data Systems sold through direct and indirect channels in more than 170 countries and regions. Its customers included over half of the Fortune 100 companies at the time.","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":6,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"www.hds.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hitachi Data Systems","keywords":"Hitachi, Systems, Data, than, channels, more, direct, sold","description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Divi","og:title":"Hitachi Data Systems","og:description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Divi","og:image":"https://old.roi4cio.com/uploads/roi/company/hitachi.png"},"eventUrl":""}],"products":[{"id":374,"logo":false,"scheme":false,"title":"Hitachi Universal Storage Platform V","vendorVerified":0,"rating":"2.70","implementationsCount":3,"suppliersCount":0,"alias":"hitachi-universal-storage-platform-v","companyTypes":[],"description":"\r\nUniversal Storage Platform V Specifications [9]\r\n\r\nFrames (Cabinets) - Integrated Control/Drive Group Frame and 1 to 4 optional Drive Group Frames\r\nUniversal Star Network Crossbar Switch - Number of switches 8\r\nAggregate bandwidth (GB/sec) - 106\r\nAggregate IOPS - Over 4 million\r\nCache Memory - Number of cache modules 1-32, Module capacity 8 or 16GB, Maximum cache memory 512GB\r\nControl/Shared Memory - Number of control memory modules 1-8, Module capacity 4GB, Maximum control memory 28GB\r\nFront End Directors (Connectivity)\r\nNumber of Directors 1-14\r\nFibre Channel host ports per Director - 8 or 16\r\nFibre Channel port performance - 4, 8 Gbit/s\r\nMaximum Fibre Channel host ports - 224\r\nVirtual host ports - 1,024 per physical port\r\nMaximum IBM FICON host ports - 112\r\nMaximum IBM ESCON host ports - 112\r\nLogical Devices (LUNs) — Maximum Supported\r\nOpen systems 65,536\r\nIBM z/OS 65,536\r\nDisks\r\nType: Flash 73, 146, 200 and 400GB\r\nType: Fibre Channel 146, 300, 450 and 600GB\r\nType: SATA II 1TB, 2TB\r\nNumber of disks per system (min/max) 4-1,152\r\nNumber spare disks per system (min/max) 1-40\r\nMaximum Internal Raw Capacity - (2TB disks) 2,268 TB\r\nMaximum Usable Capacity - RAID-5\r\nOpen systems (2TB disks) 1,972 TB\r\nz/OS-compatible (1TB disks) 931 TB\r\nMaximum Usable Capacity — RAID-6\r\nOpen systems (2TB disks) 1,690TB\r\nz/OS-compatible (1TB disks) 796 TB\r\nMaximum Usable Capacity — RAID-1+\r\nOpen systems (2TB disks) 1,130TB\r\nz/OS-compatible (1TB disks) 527.4TB\r\nOther Features\r\nRAID 1, 10, 5, 6 support\r\nMaximum internal and external capacity 247PB\r\nVirtual Storage Machines 32 max\r\nBack end directors 1-8\r\nOperating System Support\r\nMainframe - Fujitsu: MSP; IBM z/OS, z/OS.e, z/VM, zVSE, TPF; Red Hat; Linux for IBM S/390 and zSeries; SUSE: Linux Enterprise Server for System z.\r\nOpen systems - HP: HP-UX, Tru64 UNIX, Open VMS; IBM AIX; Microsoft Windows Server 2000, 2003, 2008; Novell NetWare; SUSE Linux Enterprise Server; Red Hat Enterprise Linux; SGI IRIX; Sun Microsystems Solaris; VMware ESX and Vsphere, Citrix XENserver\r\n","shortDescription":"At the core of the Universal Storage Platform V and VM is a fully fault tolerant, high performance, non-blocking, silicon based switched architecture designed to provide the bandwidth needed to support infrastructure consolidation of enterprise file and block-based storage services on and behind a single platform.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Hitachi Universal Storage Platform V","keywords":"Maximum, disks, Number, Open, host, ports, systems, Channel","description":"\r\nUniversal Storage Platform V Specifications [9]\r\n\r\nFrames (Cabinets) - Integrated Control/Drive Group Frame and 1 to 4 optional Drive Group Frames\r\nUniversal Star Network Crossbar Switch - Number of switches 8\r\nAggregate bandwidth (GB/sec) - 106\r\nAggregate I","og:title":"Hitachi Universal Storage Platform V","og:description":"\r\nUniversal Storage Platform V Specifications [9]\r\n\r\nFrames (Cabinets) - Integrated Control/Drive Group Frame and 1 to 4 optional Drive Group Frames\r\nUniversal Star Network Crossbar Switch - Number of switches 8\r\nAggregate bandwidth (GB/sec) - 106\r\nAggregate I"},"eventUrl":"","translationId":375,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":177,"title":"Decentralized IT systems"}]}},"categories":[{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://sibis.com.ua/news/443/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"hitachi-universal-storage-platform-v-for-ukrainian-mobile-operator":{"id":992,"title":"Hitachi Universal Storage Platform V for Ukrainian mobile operator","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"hitachi-universal-storage-platform-v-for-ukrainian-mobile-operator","roi":0,"seo":{"title":"Hitachi Universal Storage Platform V for Ukrainian mobile operator","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"Hitachi Universal Storage Platform V for Ukrainian mobile operator","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":349,"title":"Lifecell","logoURL":"https://old.roi4cio.com/uploads/roi/company/lifecell.png","alias":"lifecell","address":"03680, Kyiv, Amosova St., 12, Horizon Park Business Center, floor 14","roles":[],"description":"lifecell is the third largest Ukrainian mobile telephone network operator, (after Kyivstar and Vodafone Ukraine) covering 98.82% of Ukrainian inhabited territory.\r\nThe company is wholly owned by Turkcell.\r\nIn January 2005 Astelit launched GSM-1800 service under the life:) brand, and has attracted 7.6 million contract and prepaid subscribers by December 2007. As of the end of Q3 of 2014, Ukrainian GSM operator life:) serves 13.6 million subscribers of prepaid, contract and corporate subscription. Company provides roaming opportunities in 184 countries via more than 456 roaming partners.\r\nThe operator was the first mobile network operator in Ukraine to introduce EDGE technology that offers high speed data transfer. Now the technology is enabled in 100% life:) network.\r\nAs of today, 6 lifecell customer service centers and 193 exclusive shops operate in 103 cities of Ukraine. In addition, life:) subscribers can order life:) services through 153 branded points of sale and 49 487 GSM and non-GSM sales points throughout Ukraine.\r\nIn 2007, lifecell joined the UN Global Compact, as an initiative to encourage CSR (corporate social responsibility) practices by example. As a Compact signatory, life:) follows the 10 basic principles of human rights, labor standards, environmental protection and anti-corruption measures.\r\nIn June 2011, it was reported that Alfa Group was negotiating a deal to purchase the 45% share in Astelit.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":3,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.lifecell.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Lifecell","keywords":"became, life, January, 2016","description":"lifecell is the third largest Ukrainian mobile telephone network operator, (after Kyivstar and Vodafone Ukraine) covering 98.82% of Ukrainian inhabited territory.\r\nThe company is wholly owned by Turkcell.\r\nIn January 2005 Astelit launched GSM-1800 service unde","og:title":"Lifecell","og:description":"lifecell is the third largest Ukrainian mobile telephone network operator, (after Kyivstar and Vodafone Ukraine) covering 98.82% of Ukrainian inhabited territory.\r\nThe company is wholly owned by Turkcell.\r\nIn January 2005 Astelit launched GSM-1800 service unde","og:image":"https://old.roi4cio.com/uploads/roi/company/lifecell.png"},"eventUrl":""},"supplier":{"id":7517,"title":"TechnoServ Ukraine (TSU)","logoURL":"https://old.roi4cio.com/uploads/roi/company/TSU.png","alias":"tekhnoserv-ukraina-tsu","address":"4, Vaclav Havel blvd.,Kyiv, 03067 Kyiv, n/a 03164, UA","roles":[],"description":" “Technoserv Ukraine” is the Ukrainian system integrator company, started its business in Ukraine in 2006. “Technoserv Ukraine” currently offers the whole spectrum of complex solutions and services to the Ukrainian customers in the field of system integration, building corporate-class info-communication systems and telecommunication networks for communications service providers. \r\n“Technoserv Ukraine” incorporates and develops the informational and engineering systems based on in-house technological developments as well as solutions of the world market leaders of info-communication technologies. Totally more than 50 vendors, including CA, Cisco, IBM, Citrix, EMC, Hitachi Data Systems, HP, Microsoft, NetАpp, Oracle, SAF Tehnika, SAP, VMware are among “Technoserv Ukraine” long-term partners.<br />\r\nThe company has certified specialists in all areas of cooperation with partners, as well as "Service Partner" status of many vendors, thereby providing ongoing technical support of customers’ solutions, including 24x7x365 mode. “Technoserv Ukraine” has its own demonstration laboratory. Timely opportunity to test the performance of the proposed multi-vendor solutions and compatibility of all their components allows reduce the lifetime of the project, minimize customers’ costs and ensure the maximum reliability of implemented systems.<br />\r\nThe main achievement of the company is the number of large implemented projects since 2007.<br />\r\n“Technoserv Ukraine” customers are the largest enterprises of key industries: leading fixed and mobile operators, industry enterprises, financial organizations and banks, energy complex enterprises. Among the company's customers are: Vodafone Ukraine, lifecell, VOLIA, Raffaisen Bank Aval, SBERBANK, Alfa-Bank, Ukrenergo, insurance company "Oranta" and others.<br /><br />“Technoserv Ukraine” company has acquired a reputation of a reliable and competent business partner among its customers, thanks to a team of professionals, flexible project management system, well-functioning system of quality management and innovative approaches. The additional confirmation of "Technoserv Ukraine" comprehensive management system is the Certificate of ISO 9001: 2015 (DSTU ISO 9001: 2015).","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://tsu.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TechnoServ Ukraine (TSU)","keywords":"","description":" “Technoserv Ukraine” is the Ukrainian system integrator company, started its business in Ukraine in 2006. “Technoserv Ukraine” currently offers the whole spectrum of complex solutions and services to the Ukrainian customers in the field of system integration,","og:title":"TechnoServ Ukraine (TSU)","og:description":" “Technoserv Ukraine” is the Ukrainian system integrator company, started its business in Ukraine in 2006. “Technoserv Ukraine” currently offers the whole spectrum of complex solutions and services to the Ukrainian customers in the field of system integration,","og:image":"https://old.roi4cio.com/uploads/roi/company/TSU.png"},"eventUrl":""},"vendors":[{"id":313,"title":"Hitachi Data Systems","logoURL":"https://old.roi4cio.com/uploads/roi/company/hitachi.png","alias":"hitachi-data-systems","address":"","roles":[],"description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Division.\r\n\r\nIn 2010 Hitachi Data Systems sold through direct and indirect channels in more than 170 countries and regions. Its customers included over half of the Fortune 100 companies at the time.","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":6,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"www.hds.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hitachi Data Systems","keywords":"Hitachi, Systems, Data, than, channels, more, direct, sold","description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Divi","og:title":"Hitachi Data Systems","og:description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Divi","og:image":"https://old.roi4cio.com/uploads/roi/company/hitachi.png"},"eventUrl":""}],"products":[{"id":374,"logo":false,"scheme":false,"title":"Hitachi Universal Storage Platform V","vendorVerified":0,"rating":"2.70","implementationsCount":3,"suppliersCount":0,"alias":"hitachi-universal-storage-platform-v","companyTypes":[],"description":"\r\nUniversal Storage Platform V Specifications [9]\r\n\r\nFrames (Cabinets) - Integrated Control/Drive Group Frame and 1 to 4 optional Drive Group Frames\r\nUniversal Star Network Crossbar Switch - Number of switches 8\r\nAggregate bandwidth (GB/sec) - 106\r\nAggregate IOPS - Over 4 million\r\nCache Memory - Number of cache modules 1-32, Module capacity 8 or 16GB, Maximum cache memory 512GB\r\nControl/Shared Memory - Number of control memory modules 1-8, Module capacity 4GB, Maximum control memory 28GB\r\nFront End Directors (Connectivity)\r\nNumber of Directors 1-14\r\nFibre Channel host ports per Director - 8 or 16\r\nFibre Channel port performance - 4, 8 Gbit/s\r\nMaximum Fibre Channel host ports - 224\r\nVirtual host ports - 1,024 per physical port\r\nMaximum IBM FICON host ports - 112\r\nMaximum IBM ESCON host ports - 112\r\nLogical Devices (LUNs) — Maximum Supported\r\nOpen systems 65,536\r\nIBM z/OS 65,536\r\nDisks\r\nType: Flash 73, 146, 200 and 400GB\r\nType: Fibre Channel 146, 300, 450 and 600GB\r\nType: SATA II 1TB, 2TB\r\nNumber of disks per system (min/max) 4-1,152\r\nNumber spare disks per system (min/max) 1-40\r\nMaximum Internal Raw Capacity - (2TB disks) 2,268 TB\r\nMaximum Usable Capacity - RAID-5\r\nOpen systems (2TB disks) 1,972 TB\r\nz/OS-compatible (1TB disks) 931 TB\r\nMaximum Usable Capacity — RAID-6\r\nOpen systems (2TB disks) 1,690TB\r\nz/OS-compatible (1TB disks) 796 TB\r\nMaximum Usable Capacity — RAID-1+\r\nOpen systems (2TB disks) 1,130TB\r\nz/OS-compatible (1TB disks) 527.4TB\r\nOther Features\r\nRAID 1, 10, 5, 6 support\r\nMaximum internal and external capacity 247PB\r\nVirtual Storage Machines 32 max\r\nBack end directors 1-8\r\nOperating System Support\r\nMainframe - Fujitsu: MSP; IBM z/OS, z/OS.e, z/VM, zVSE, TPF; Red Hat; Linux for IBM S/390 and zSeries; SUSE: Linux Enterprise Server for System z.\r\nOpen systems - HP: HP-UX, Tru64 UNIX, Open VMS; IBM AIX; Microsoft Windows Server 2000, 2003, 2008; Novell NetWare; SUSE Linux Enterprise Server; Red Hat Enterprise Linux; SGI IRIX; Sun Microsystems Solaris; VMware ESX and Vsphere, Citrix XENserver\r\n","shortDescription":"At the core of the Universal Storage Platform V and VM is a fully fault tolerant, high performance, non-blocking, silicon based switched architecture designed to provide the bandwidth needed to support infrastructure consolidation of enterprise file and block-based storage services on and behind a single platform.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Hitachi Universal Storage Platform V","keywords":"Maximum, disks, Number, Open, host, ports, systems, Channel","description":"\r\nUniversal Storage Platform V Specifications [9]\r\n\r\nFrames (Cabinets) - Integrated Control/Drive Group Frame and 1 to 4 optional Drive Group Frames\r\nUniversal Star Network Crossbar Switch - Number of switches 8\r\nAggregate bandwidth (GB/sec) - 106\r\nAggregate I","og:title":"Hitachi Universal Storage Platform V","og:description":"\r\nUniversal Storage Platform V Specifications [9]\r\n\r\nFrames (Cabinets) - Integrated Control/Drive Group Frame and 1 to 4 optional Drive Group Frames\r\nUniversal Star Network Crossbar Switch - Number of switches 8\r\nAggregate bandwidth (GB/sec) - 106\r\nAggregate I"},"eventUrl":"","translationId":375,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":390,"title":"Low quality of customer support"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://ko.com.ua/tehnoserv_uvelichil_emkost_sistemy_hraneniya_dannyh_dlya_life_52436","title":"Media"}},"comments":[],"referencesCount":0},"hitachi-virtual-storage-platform-for-ukrainian-mobile-operator-mts":{"id":989,"title":"Hitachi Virtual Storage Platform for Ukrainian mobile operator MTS","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"hitachi-virtual-storage-platform-for-ukrainian-mobile-operator-mts","roi":0,"seo":{"title":"Hitachi Virtual Storage Platform for Ukrainian mobile operator MTS","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"Hitachi Virtual Storage Platform for Ukrainian mobile operator MTS","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":503,"title":"MTS Ukraine","logoURL":"https://old.roi4cio.com/uploads/roi/company/MTS_Ukraina.png","alias":"mts-ukraina","address":"","roles":[],"description":" The network of PrJSC MTS Ukraine covers more than 98% of the territory of Ukraine, where 99% of the population lives. The company serves more than 21.59 million subscribers. The company owns licenses for the provision of mobile (GSM-900/1800, CDMA-450 standard), fixed and international/long-distance communications, and also provides international roaming services on five continents. Revenues for 2013 amounted to 9.965 billion hryvnias.\r\nOJSC Mobile TeleSystems is the largest mobile operator in Eastern and Central Europe. The consolidated subscriber base of the company, excluding the MTS Belarus subscriber base, is more than 100 million subscribers. MTS and its subsidiaries provide GSM services in Armenia, Belarus, Russia, Ukraine and Turkmenistan; in the UMTS standard - in Russia, Armenia, Belarus; in CDMA-450 standard - in Ukraine, in LTE standard - in Russia and Armenia. The company also provides fixed-line and cable television services in Russia and Ukraine.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":5,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://company.mts.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"MTS Ukraine","keywords":"России, стандарте, услуги, Армении, связи, Украине, Компания, более","description":" The network of PrJSC MTS Ukraine covers more than 98% of the territory of Ukraine, where 99% of the population lives. The company serves more than 21.59 million subscribers. The company owns licenses for the provision of mobile (GSM-900/1800, CDMA-450 standar","og:title":"MTS Ukraine","og:description":" The network of PrJSC MTS Ukraine covers more than 98% of the territory of Ukraine, where 99% of the population lives. The company serves more than 21.59 million subscribers. The company owns licenses for the provision of mobile (GSM-900/1800, CDMA-450 standar","og:image":"https://old.roi4cio.com/uploads/roi/company/MTS_Ukraina.png"},"eventUrl":""},"supplier":{"id":7517,"title":"TechnoServ Ukraine (TSU)","logoURL":"https://old.roi4cio.com/uploads/roi/company/TSU.png","alias":"tekhnoserv-ukraina-tsu","address":"4, Vaclav Havel blvd.,Kyiv, 03067 Kyiv, n/a 03164, UA","roles":[],"description":" “Technoserv Ukraine” is the Ukrainian system integrator company, started its business in Ukraine in 2006. “Technoserv Ukraine” currently offers the whole spectrum of complex solutions and services to the Ukrainian customers in the field of system integration, building corporate-class info-communication systems and telecommunication networks for communications service providers. \r\n“Technoserv Ukraine” incorporates and develops the informational and engineering systems based on in-house technological developments as well as solutions of the world market leaders of info-communication technologies. Totally more than 50 vendors, including CA, Cisco, IBM, Citrix, EMC, Hitachi Data Systems, HP, Microsoft, NetАpp, Oracle, SAF Tehnika, SAP, VMware are among “Technoserv Ukraine” long-term partners.<br />\r\nThe company has certified specialists in all areas of cooperation with partners, as well as "Service Partner" status of many vendors, thereby providing ongoing technical support of customers’ solutions, including 24x7x365 mode. “Technoserv Ukraine” has its own demonstration laboratory. Timely opportunity to test the performance of the proposed multi-vendor solutions and compatibility of all their components allows reduce the lifetime of the project, minimize customers’ costs and ensure the maximum reliability of implemented systems.<br />\r\nThe main achievement of the company is the number of large implemented projects since 2007.<br />\r\n“Technoserv Ukraine” customers are the largest enterprises of key industries: leading fixed and mobile operators, industry enterprises, financial organizations and banks, energy complex enterprises. Among the company's customers are: Vodafone Ukraine, lifecell, VOLIA, Raffaisen Bank Aval, SBERBANK, Alfa-Bank, Ukrenergo, insurance company "Oranta" and others.<br /><br />“Technoserv Ukraine” company has acquired a reputation of a reliable and competent business partner among its customers, thanks to a team of professionals, flexible project management system, well-functioning system of quality management and innovative approaches. The additional confirmation of "Technoserv Ukraine" comprehensive management system is the Certificate of ISO 9001: 2015 (DSTU ISO 9001: 2015).","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":8,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://tsu.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TechnoServ Ukraine (TSU)","keywords":"","description":" “Technoserv Ukraine” is the Ukrainian system integrator company, started its business in Ukraine in 2006. “Technoserv Ukraine” currently offers the whole spectrum of complex solutions and services to the Ukrainian customers in the field of system integration,","og:title":"TechnoServ Ukraine (TSU)","og:description":" “Technoserv Ukraine” is the Ukrainian system integrator company, started its business in Ukraine in 2006. “Technoserv Ukraine” currently offers the whole spectrum of complex solutions and services to the Ukrainian customers in the field of system integration,","og:image":"https://old.roi4cio.com/uploads/roi/company/TSU.png"},"eventUrl":""},"vendors":[{"id":313,"title":"Hitachi Data Systems","logoURL":"https://old.roi4cio.com/uploads/roi/company/hitachi.png","alias":"hitachi-data-systems","address":"","roles":[],"description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Division.\r\n\r\nIn 2010 Hitachi Data Systems sold through direct and indirect channels in more than 170 countries and regions. Its customers included over half of the Fortune 100 companies at the time.","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":6,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"www.hds.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hitachi Data Systems","keywords":"Hitachi, Systems, Data, than, channels, more, direct, sold","description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Divi","og:title":"Hitachi Data Systems","og:description":"Hitachi Data Systems (HDS) is a company that provides modular mid-range and high-end computer data storage systems, software and services. It is a wholly owned subsidiary of Hitachi Ltd. and part of the Hitachi Information Systems & Telecommunications Divi","og:image":"https://old.roi4cio.com/uploads/roi/company/hitachi.png"},"eventUrl":""}],"products":[{"id":149,"logo":false,"scheme":false,"title":"Hitachi Virtual Storage Platform G1000","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"hitachi-virtual-storage-platform-g1000","companyTypes":[],"description":"Hitachi Virtual Storage Platform G1000 is a unified storage system that\r\nprovides high performance, high availability, and reliability. VSP G1000 scales\r\nto meet the demands of IT organizations’ ever-increasing workloads. When\r\ncombined with server virtualization, the mission-critical storage virtualization\r\nof VSP G1000 supports a new breed of applications at cloud scale while\r\nreducing complexity.\r\nThe following key features illustrate how VSP G1000 provides a Continuous\r\nCloud Infrastructure for the enterprise:\r\n• Global storage virtualization enables an always-on infrastructure with\r\nenterprise-wide scalability that provides a complete separation between\r\nhost and storage. The scalability is independent of connectivity, location,\r\nstorage system, or vendor. Remote data center replication support allows\r\nprovisioning and management of virtual storage machines up to 100\r\nmeters apart.\r\n• Integrated active mirroring enables volume extensibility between systems\r\nand across sites through the provisioning and management of active-active\r\nvolumes up to 100 km apart. Combined with remote data center\r\nreplication, this mirroring is an ideal solution for critical applications that\r\nrequire zero recovery point and recovery time objectives. Active mirroring\r\nis enabled by the Hitachi global-active device feature.\r\n• Unified storage with enterprise scalability allows you to centrally manage\r\nmultivendor storage resources across all virtualized internal and external\r\nstorage pools, whether deployed for SAN, NAS, or object storage.\r\n• Unified storage management software (Hitachi Command Suite) simplifies\r\nadministrative operations and streamlines basic management tasks.\r\n• Hitachi Accelerated Flash storage offers a patented data center-class\r\ndesign and rack-optimized form factor that delivers more than 600 TB per\r\nsystem. It supports a sustained performance of 100,000 8K I/O operations\r\nper second per device, with fast and consistent response time.\r\n• Server virtualization integration with leading virtual server platforms\r\nprovides end-to-end visibility, from an individual virtual machine to the\r\nstorage logical unit, protecting large-scale multivendor environments","shortDescription":"Hitachi Virtual Storage Platform G1000 is a unified storage system that provides high performance, high availability, and reliability. VSP G1000 scales to meet the demands of IT organizations’ ever-increasing workloads.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Hitachi Virtual Storage Platform G1000","keywords":"storage, with, G1000, provides, management, Hitachi, that, virtualization","description":"Hitachi Virtual Storage Platform G1000 is a unified storage system that\r\nprovides high performance, high availability, and reliability. VSP G1000 scales\r\nto meet the demands of IT organizations’ ever-increasing workloads. When\r\ncombined with server virtualizat","og:title":"Hitachi Virtual Storage Platform G1000","og:description":"Hitachi Virtual Storage Platform G1000 is a unified storage system that\r\nprovides high performance, high availability, and reliability. VSP G1000 scales\r\nto meet the demands of IT organizations’ ever-increasing workloads. When\r\ncombined with server virtualizat"},"eventUrl":"","translationId":150,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":507,"title":"Mission Critical Storage","alias":"mission-critical-storage","description":" As enterprises become more digital, the role of mission-critical applications on which the functioning of the business depends. In practice, this requires more platform flexibility to serve both traditional applications and modern cloud computing.\r\nIT professionals who are already fully loaded with support for traditional corporate tools, such as virtualization or database management systems, have to implement and maintain modern applications such as containers or analytics.\r\nServer virtualization has almost become the main driver for the development of storage virtualization, especially since virtual machines have already penetrated quite a lot into the critical applications segment.\r\nData storage systems help to cope with the ever-growing volumes of data, allowing you to effectively work with information. Storage systems for mission-critical applications are focused on the needs of companies of various sizes - from remote branches to large enterprises with significant amounts of information.\r\nAlso many factors affect the selection of a data center location, but utility infrastructure, uptime, talent, and speed are always the focal points.\r\nFew people are unaware of the large electric loads (usage) of data centers. Naturally, due to the amount of power they need, data centers are very price-sensitive to a location’s cost of electricity. The cost is more than centers per kWh, though. Data centers have unique ramp-up needs and reserved capacity demands. The utility’s ability to accommodate these requirements can have a significant impact on cost. Likewise, the mission-critical aspect of the data center, requiring it to be online at all times, drives rigorous power redundancy and reliability requirements. The utility’s “cost-to-serve” and revenue credit policies must be factored into the overall cost of providing the requisite power.","materialsDescription":" <span style=\"font-weight: bold;\">What is mission-critical data?</span>\r\nA 'mission-critical' operation, system or facility may sound fairly straightforward – something that is essential to the overall operations of a business or process within a business. Essentially, something that is critical to the mission.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Mission_Critical_Storage.png"},{"id":383,"title":"Software-defined storage platforms, SDS","alias":"software-defined-storage-platforms-sds","description":" <span style=\"font-weight: bold;\">Software-defined storage (SDS)</span> is a marketing term for computer data storage software for policy-based provisioning and management of data storage independent of the underlying hardware. \r\n<span style=\"font-weight: bold;\">SDS software</span> typically includes a form of storage virtualization to separate the storage hardware from the software that manages it. The software enabling a software-defined storage environment may also provide policy management for features such as data deduplication, replication, thin provisioning, snapshots and backup.<br /><br /><span style=\"font-weight: bold;\">SDS system</span> hardware may or may not also have abstraction, pooling, or automation software of its own. When implemented as software only in conjunction with commodity servers with internal disks, it may suggest software such as a virtual or global file system. If it is software layered over sophisticated large storage arrays, it suggests software such as storage virtualization or storage resource management, categories of products that address separate and different problems. If the policy and management functions also include a form of artificial intelligence to automate protection and recovery, it can be considered as intelligent abstraction.\r\n<span style=\"font-weight: bold;\">Software-defined storage solutions</span> may be implemented via appliances over a traditional storage area network (SAN), or implemented as network-attached storage (NAS), or using object-based storage. ","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What does SDS mean?</span></h1>\r\n<span style=\"font-weight: bold; \">SDS </span>stays for <span style=\"font-weight: bold; \">software-defined storage </span>solution - it is a computer program that manages data storage resources and functionality and has no dependencies on the underlying physical storage hardware.\r\nAll storage systems have always been software-defined. What's changed is that the <span style=\"font-weight: bold; \">software has become portable</span>.\r\nBut nothing in the storage world elicits more divergent opinions than the term "software-defined storage products". With no universally accepted definition, SDS is vendor-specific. Software defined storage leaders shape the SDS definition to match their storage offerings. The result is that every storage vendor appears to offer SDS.\r\nStorage system software historically was tied to the hardware it managed. When the hardware ran out of capacity or performance, it had to be replaced and the software licensing was repurchased along with the hardware.<br />What made matters significantly worse was that storage system architectures created isolated silos. Unique infrastructures made everything from storage provisioning, data protection, disaster recovery, tech refresh, data migration, power and cooling more and more untenable. Compound that with the ongoing trend of rapid data growth and the need to store ever-increasing amounts of data, and the available architectures made storage systems management too complicated, difficult, expensive and ultimately unmaintainable.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are SDS categories pros and cons?</span></h1>\r\n With no working standard SDS definition, a variety of technologies have emerged in the software-defined storage market. For our purposes, the four categories of SDS include: \r\n<ul><li class=\"align-left\"><span style=\"font-weight: bold; \">Hypervisor-based SDS</span></li><li class=\"align-left\"><span style=\"font-weight: bold; \">Hyper-converged infrastructure (HCI) SDS</span></li><li class=\"align-left\"><span style=\"font-weight: bold; \">Storage virtualization SDS</span></li><li class=\"align-left\"><span style=\"font-weight: bold; \">Scale-out object and/or file SDS</span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\"> Hypervisor-based SDS pros:</span><br /> </p>\r\n<span style=\"font-weight: bold; \">Flexibility</span>. VSAN works with both hard disk drives (HDDs) and solid-state drives (SSDs), including DIMM-based flash drives, PCIe, SAS, SATA and even NVMe. VMware vSAN supports both HDDs and SSDs in a hybrid mode or all SSDs in all-flash mode.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Scalability and performance</span>. VSAN is highly scalable while delivering high levels of performance. It scales out through vSphere clustering and can support up to 64 vSphere hosts per cluster. Each vSphere host supports approximately 140 TB raw storage capacity and well north of 8 PB of raw storage capacity per cluster. On the performance side, each vSAN host can supply 100,000 or more IOPS, yielding millions of IOPS per cluster.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Hypervisor-based SDS cons:</span></p>\r\n<span style=\"font-weight: bold; \">Scalability and performance issues.</span> If a VM requires more IOPS than one physical vSphere host can provide, it can get them from other nodes in the cluster, but with a considerable latency penalty. Inter-cluster storage performance is another issue. Most vSAN clusters use 10 Gbps to 40 Gbps Ethernet and TCP/IP to interconnect the hosts. This architecture essentially replaces a deterministic system bus with a non-deterministic TCP/IP network so latencies between hosts become highly variable. Unless the cluster uses more sophisticated and faster interconnections, its storage performance from one clustered host to another will be highly variable and inconsistent.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Some things are not so simple. </span>Converting from a siloed storage environment to a pure vSAN requires converting non-VM images to VMs first. It's a time-consuming process for non-vSphere environments.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Hyper-converged infrastructure (HCI) SDS pros:</span></p>\r\n<span style=\"font-weight: bold; \">Scalability and performance.</span> Scaling HCI is as simple as adding a node to the cluster. Scaling storage capacity just requires adding drives (HDDs or SSDs) up to a node's maximum or adding additional nodes. Each HCI product has its own scalability and performance limitations; however, most scale well into the PBs and add performance linearly with each server node added to the cluster.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Simplicity. </span>Plug it in, turn it on, configure and you're done. Few systems are simpler. No DIY, and there's just one throat to choke for support.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Hyper-converged infrastructure (HCI) SDS cons:</span></p>\r\n<span style=\"font-weight: bold; \">Scalability and performance issues.</span> HCI cluster capacity is limited by the number of nodes supported in the cluster and the amount of capacity supported per node. If a VM requires more IOPS than a given host can provide, it can get IOPS from other nodes, but with a considerable latency penalty. Inter-cluster storage performance is another issue. Most HCI clusters use 10 Gbps to 40 Gbps Ethernet and TCP/IP to interconnect the hosts so latencies between hosts can be highly variable.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Some things are not so simple.</span> Converting from a siloed storage environment to an HCI cluster requires first converting both non-VM images and VMs to the HCI VMs or Docker containers, a time-consuming process.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Storage virtualization SDS pros:</span></p>\r\n<span style=\"font-weight: bold; \"></span><span style=\"font-weight: bold;\">Flexibility.</span> It works with most x86 physical hosts or VMs as long as the hardware or hypervisor is certified and supported by the vendor. It converts all storage that sits behind it into the virtual storage pool, enabling repurposing of older storage. The scale-out versions permit physical or VM access to any node. Multi-copy mirroring isn't necessary to protect against a single controller failure, although it's available. Storage virtualization SDS can be provided as software or bundled with server hardware similar to HCI.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Total cost of ownership (TCO)</span>. The biggest cost savings in storage virtualization SDS comes from commodity hardware and server-based drives. Another cost saving comes from inline data reduction technologies. Compared to equivalent storage systems, most storage virtualization SDS will yield a much more favorable TCO.<span style=\"font-weight: bold; \"><br /></span>\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Storage virtualization SDS cons:</span></p>\r\n<span style=\"font-weight: bold;\">Flexibility issues. </span>Most storage virtualization SDS can only run on the specific commodity hardware certified and supported by the vendor. Products that can run as VSAs require hypervisors certified and supported by the vendor.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Scalability and performance issues.</span> On paper, these systems support tremendous capacity scalability, but the pragmatic approach is a bit different. Storage virtualization SDS capacity is constrained by x86 server limitations. Each server can handle only so much capacity before performance declines below acceptable levels. Storage virtualization SDS scale-out is constrained by clustering because the number of storage controller nodes supported is limited. Performance may also be constrained by the same limitations. \r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Scale-out object and/or file SDS pros:<br /></span></p>\r\n<span style=\"font-weight: bold; \">Scalability and performance. </span>Scaling is multi-dimensional: each node can be scaled individually and generally the cluster itself can add nodes for capacity or performance. Performance for both will never approach that of high-performance block storage.<span style=\"font-weight: bold; \"></span><span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Simplicity. </span>When bundled with hardware, scale-out object or file storage is very simple to set up, configure, and manage. Implementing it as software requires DIY systems integration. Both types leverage commodity hardware, have exceptional scalability and -- in the case of scale-out object storage -- unmatched data resilience and longevity via erasure coding.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Scale-out object and/or file SDS cons:</span></p>\r\n<span style=\"font-weight: bold;\">Flexibility issues. </span>Whether delivered as software or bundled with hardware, the hardware must be certified and supported by the vendors.\r\n<span style=\"font-weight: bold; \">Scalability and performance issues.</span> Scale-out file SDS generally doesn't scale as high as scale-out object storage, but object will have somewhat higher latencies. Object storage has significant additional latencies from the metadata and data resiliency functions. Both types are best suited for secondary applications where high performance is not a requirement.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Some things are not so simple. </span>When scale-out file or object storage SDS is purchased as software, it's a DIY project, so special skills, professional services or a systems integrator may be required.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Software_defined_storage_platforms.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"},{"id":397,"title":"Insufficient risk management"},{"id":340,"title":"Low quality of customer service"}]}},"categories":[{"id":507,"title":"Mission Critical Storage","alias":"mission-critical-storage","description":" As enterprises become more digital, the role of mission-critical applications on which the functioning of the business depends. In practice, this requires more platform flexibility to serve both traditional applications and modern cloud computing.\r\nIT professionals who are already fully loaded with support for traditional corporate tools, such as virtualization or database management systems, have to implement and maintain modern applications such as containers or analytics.\r\nServer virtualization has almost become the main driver for the development of storage virtualization, especially since virtual machines have already penetrated quite a lot into the critical applications segment.\r\nData storage systems help to cope with the ever-growing volumes of data, allowing you to effectively work with information. Storage systems for mission-critical applications are focused on the needs of companies of various sizes - from remote branches to large enterprises with significant amounts of information.\r\nAlso many factors affect the selection of a data center location, but utility infrastructure, uptime, talent, and speed are always the focal points.\r\nFew people are unaware of the large electric loads (usage) of data centers. Naturally, due to the amount of power they need, data centers are very price-sensitive to a location’s cost of electricity. The cost is more than centers per kWh, though. Data centers have unique ramp-up needs and reserved capacity demands. The utility’s ability to accommodate these requirements can have a significant impact on cost. Likewise, the mission-critical aspect of the data center, requiring it to be online at all times, drives rigorous power redundancy and reliability requirements. The utility’s “cost-to-serve” and revenue credit policies must be factored into the overall cost of providing the requisite power.","materialsDescription":" <span style=\"font-weight: bold;\">What is mission-critical data?</span>\r\nA 'mission-critical' operation, system or facility may sound fairly straightforward – something that is essential to the overall operations of a business or process within a business. Essentially, something that is critical to the mission.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Mission_Critical_Storage.png"},{"id":383,"title":"Software-defined storage platforms, SDS","alias":"software-defined-storage-platforms-sds","description":" <span style=\"font-weight: bold;\">Software-defined storage (SDS)</span> is a marketing term for computer data storage software for policy-based provisioning and management of data storage independent of the underlying hardware. \r\n<span style=\"font-weight: bold;\">SDS software</span> typically includes a form of storage virtualization to separate the storage hardware from the software that manages it. The software enabling a software-defined storage environment may also provide policy management for features such as data deduplication, replication, thin provisioning, snapshots and backup.<br /><br /><span style=\"font-weight: bold;\">SDS system</span> hardware may or may not also have abstraction, pooling, or automation software of its own. When implemented as software only in conjunction with commodity servers with internal disks, it may suggest software such as a virtual or global file system. If it is software layered over sophisticated large storage arrays, it suggests software such as storage virtualization or storage resource management, categories of products that address separate and different problems. If the policy and management functions also include a form of artificial intelligence to automate protection and recovery, it can be considered as intelligent abstraction.\r\n<span style=\"font-weight: bold;\">Software-defined storage solutions</span> may be implemented via appliances over a traditional storage area network (SAN), or implemented as network-attached storage (NAS), or using object-based storage. ","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What does SDS mean?</span></h1>\r\n<span style=\"font-weight: bold; \">SDS </span>stays for <span style=\"font-weight: bold; \">software-defined storage </span>solution - it is a computer program that manages data storage resources and functionality and has no dependencies on the underlying physical storage hardware.\r\nAll storage systems have always been software-defined. What's changed is that the <span style=\"font-weight: bold; \">software has become portable</span>.\r\nBut nothing in the storage world elicits more divergent opinions than the term "software-defined storage products". With no universally accepted definition, SDS is vendor-specific. Software defined storage leaders shape the SDS definition to match their storage offerings. The result is that every storage vendor appears to offer SDS.\r\nStorage system software historically was tied to the hardware it managed. When the hardware ran out of capacity or performance, it had to be replaced and the software licensing was repurchased along with the hardware.<br />What made matters significantly worse was that storage system architectures created isolated silos. Unique infrastructures made everything from storage provisioning, data protection, disaster recovery, tech refresh, data migration, power and cooling more and more untenable. Compound that with the ongoing trend of rapid data growth and the need to store ever-increasing amounts of data, and the available architectures made storage systems management too complicated, difficult, expensive and ultimately unmaintainable.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are SDS categories pros and cons?</span></h1>\r\n With no working standard SDS definition, a variety of technologies have emerged in the software-defined storage market. For our purposes, the four categories of SDS include: \r\n<ul><li class=\"align-left\"><span style=\"font-weight: bold; \">Hypervisor-based SDS</span></li><li class=\"align-left\"><span style=\"font-weight: bold; \">Hyper-converged infrastructure (HCI) SDS</span></li><li class=\"align-left\"><span style=\"font-weight: bold; \">Storage virtualization SDS</span></li><li class=\"align-left\"><span style=\"font-weight: bold; \">Scale-out object and/or file SDS</span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\"> Hypervisor-based SDS pros:</span><br /> </p>\r\n<span style=\"font-weight: bold; \">Flexibility</span>. VSAN works with both hard disk drives (HDDs) and solid-state drives (SSDs), including DIMM-based flash drives, PCIe, SAS, SATA and even NVMe. VMware vSAN supports both HDDs and SSDs in a hybrid mode or all SSDs in all-flash mode.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Scalability and performance</span>. VSAN is highly scalable while delivering high levels of performance. It scales out through vSphere clustering and can support up to 64 vSphere hosts per cluster. Each vSphere host supports approximately 140 TB raw storage capacity and well north of 8 PB of raw storage capacity per cluster. On the performance side, each vSAN host can supply 100,000 or more IOPS, yielding millions of IOPS per cluster.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Hypervisor-based SDS cons:</span></p>\r\n<span style=\"font-weight: bold; \">Scalability and performance issues.</span> If a VM requires more IOPS than one physical vSphere host can provide, it can get them from other nodes in the cluster, but with a considerable latency penalty. Inter-cluster storage performance is another issue. Most vSAN clusters use 10 Gbps to 40 Gbps Ethernet and TCP/IP to interconnect the hosts. This architecture essentially replaces a deterministic system bus with a non-deterministic TCP/IP network so latencies between hosts become highly variable. Unless the cluster uses more sophisticated and faster interconnections, its storage performance from one clustered host to another will be highly variable and inconsistent.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Some things are not so simple. </span>Converting from a siloed storage environment to a pure vSAN requires converting non-VM images to VMs first. It's a time-consuming process for non-vSphere environments.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Hyper-converged infrastructure (HCI) SDS pros:</span></p>\r\n<span style=\"font-weight: bold; \">Scalability and performance.</span> Scaling HCI is as simple as adding a node to the cluster. Scaling storage capacity just requires adding drives (HDDs or SSDs) up to a node's maximum or adding additional nodes. Each HCI product has its own scalability and performance limitations; however, most scale well into the PBs and add performance linearly with each server node added to the cluster.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Simplicity. </span>Plug it in, turn it on, configure and you're done. Few systems are simpler. No DIY, and there's just one throat to choke for support.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Hyper-converged infrastructure (HCI) SDS cons:</span></p>\r\n<span style=\"font-weight: bold; \">Scalability and performance issues.</span> HCI cluster capacity is limited by the number of nodes supported in the cluster and the amount of capacity supported per node. If a VM requires more IOPS than a given host can provide, it can get IOPS from other nodes, but with a considerable latency penalty. Inter-cluster storage performance is another issue. Most HCI clusters use 10 Gbps to 40 Gbps Ethernet and TCP/IP to interconnect the hosts so latencies between hosts can be highly variable.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Some things are not so simple.</span> Converting from a siloed storage environment to an HCI cluster requires first converting both non-VM images and VMs to the HCI VMs or Docker containers, a time-consuming process.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Storage virtualization SDS pros:</span></p>\r\n<span style=\"font-weight: bold; \"></span><span style=\"font-weight: bold;\">Flexibility.</span> It works with most x86 physical hosts or VMs as long as the hardware or hypervisor is certified and supported by the vendor. It converts all storage that sits behind it into the virtual storage pool, enabling repurposing of older storage. The scale-out versions permit physical or VM access to any node. Multi-copy mirroring isn't necessary to protect against a single controller failure, although it's available. Storage virtualization SDS can be provided as software or bundled with server hardware similar to HCI.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Total cost of ownership (TCO)</span>. The biggest cost savings in storage virtualization SDS comes from commodity hardware and server-based drives. Another cost saving comes from inline data reduction technologies. Compared to equivalent storage systems, most storage virtualization SDS will yield a much more favorable TCO.<span style=\"font-weight: bold; \"><br /></span>\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Storage virtualization SDS cons:</span></p>\r\n<span style=\"font-weight: bold;\">Flexibility issues. </span>Most storage virtualization SDS can only run on the specific commodity hardware certified and supported by the vendor. Products that can run as VSAs require hypervisors certified and supported by the vendor.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Scalability and performance issues.</span> On paper, these systems support tremendous capacity scalability, but the pragmatic approach is a bit different. Storage virtualization SDS capacity is constrained by x86 server limitations. Each server can handle only so much capacity before performance declines below acceptable levels. Storage virtualization SDS scale-out is constrained by clustering because the number of storage controller nodes supported is limited. Performance may also be constrained by the same limitations. \r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Scale-out object and/or file SDS pros:<br /></span></p>\r\n<span style=\"font-weight: bold; \">Scalability and performance. </span>Scaling is multi-dimensional: each node can be scaled individually and generally the cluster itself can add nodes for capacity or performance. Performance for both will never approach that of high-performance block storage.<span style=\"font-weight: bold; \"></span><span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Simplicity. </span>When bundled with hardware, scale-out object or file storage is very simple to set up, configure, and manage. Implementing it as software requires DIY systems integration. Both types leverage commodity hardware, have exceptional scalability and -- in the case of scale-out object storage -- unmatched data resilience and longevity via erasure coding.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Scale-out object and/or file SDS cons:</span></p>\r\n<span style=\"font-weight: bold;\">Flexibility issues. </span>Whether delivered as software or bundled with hardware, the hardware must be certified and supported by the vendors.\r\n<span style=\"font-weight: bold; \">Scalability and performance issues.</span> Scale-out file SDS generally doesn't scale as high as scale-out object storage, but object will have somewhat higher latencies. Object storage has significant additional latencies from the metadata and data resiliency functions. Both types are best suited for secondary applications where high performance is not a requirement.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Some things are not so simple. </span>When scale-out file or object storage SDS is purchased as software, it's a DIY project, so special skills, professional services or a systems integrator may be required.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Software_defined_storage_platforms.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"http://tsu.ua/wp-content/uploads/2018/01/TSU_listovka_MTS_read_1.pdf","title":"Supplier's web site"}},"comments":[],"referencesCount":0}},"aliases":{"1":["hitachi-content-platform-anywhere-to-modernize-bank-it-management","hitachi-tagmastore-adaptable-modular-storage-ams-500-for-raiffeisen-bank-aval","hitachi-universal-storage-platform-v-usp-v-for-bank","hitachi-universal-storage-platform-v-usp-vm-for-supermarket-backup","hitachi-universal-storage-platform-v-for-ukrainian-mobile-operator","hitachi-virtual-storage-platform-for-ukrainian-mobile-operator-mts"]},"links":{"first":"http://apis.roi4cio.com/api/implementations?page=1","last":"http://apis.roi4cio.com/api/implementations?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://apis.roi4cio.com/api/implementations","per_page":20,"to":6,"total":6},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}