Enviar pesquisa
Carregar
Chapter 9
•
Transferir como PPT, PDF
•
3 gostaram
•
2,241 visualizações
Vipin Pachauri
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 23
Baixar agora
Recomendados
Information and data security cryptography and network security
Information and data security cryptography and network security
Mazin Alwaaly
Elmasri Navathe DBMS Unit-1 ppt
Elmasri Navathe DBMS Unit-1 ppt
AbhinavPandey274499
DDBMS Paper with Solution
DDBMS Paper with Solution
Gyanmanjari Institute Of Technology
Rotor machine,subsitution technique
Rotor machine,subsitution technique
kirupasuchi1996
Distributed Database System
Distributed Database System
Sulemang
Database System Architectures
Database System Architectures
Information Technology
Database backup & recovery
Database backup & recovery
Mustafa Khan
2. visualization in data mining
2. visualization in data mining
Azad public school
Recomendados
Information and data security cryptography and network security
Information and data security cryptography and network security
Mazin Alwaaly
Elmasri Navathe DBMS Unit-1 ppt
Elmasri Navathe DBMS Unit-1 ppt
AbhinavPandey274499
DDBMS Paper with Solution
DDBMS Paper with Solution
Gyanmanjari Institute Of Technology
Rotor machine,subsitution technique
Rotor machine,subsitution technique
kirupasuchi1996
Distributed Database System
Distributed Database System
Sulemang
Database System Architectures
Database System Architectures
Information Technology
Database backup & recovery
Database backup & recovery
Mustafa Khan
2. visualization in data mining
2. visualization in data mining
Azad public school
Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.
Meghaj Mallick
Homogeneous ddbms
Homogeneous ddbms
Pooja Dixit
CNS - Chapter1
CNS - Chapter1
JeevananthamArumugam
Ethernet Computer network
Ethernet Computer network
miteshppt
Architecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Gyanmanjari Institute Of Technology
Security Attacks.ppt
Security Attacks.ppt
Zaheer720515
Database Security
Database Security
RabiaIftikhar10
Distributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query Processing
Gyanmanjari Institute Of Technology
Distributed DBMS - Unit 1 - Introduction
Distributed DBMS - Unit 1 - Introduction
Gyanmanjari Institute Of Technology
Security services and mechanisms
Security services and mechanisms
Rajapriya82
Database Security And Authentication
Database Security And Authentication
Sudeb Das
IT6801-Service Oriented Architecture
IT6801-Service Oriented Architecture
Madhu Amarnath
Data link layer
Data link layer
sbkbca
Database User and Administrator
Database User and Administrator
A. S. M. Shafi
Swap-space Management
Swap-space Management
Agnas Jasmine
Introduction to distributed database
Introduction to distributed database
Sonia Panesar
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptx
SaqibAhmedKhan4
Key management and distribution
Key management and distribution
Riya Choudhary
DBMS - RAID
DBMS - RAID
MythiliMurugan3
Presentation atmos architecture overview
Presentation atmos architecture overview
xKinAnx
Chapter 9
Chapter 9
Ali Broumandnia
Mais conteúdo relacionado
Mais procurados
Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.
Meghaj Mallick
Homogeneous ddbms
Homogeneous ddbms
Pooja Dixit
CNS - Chapter1
CNS - Chapter1
JeevananthamArumugam
Ethernet Computer network
Ethernet Computer network
miteshppt
Architecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Gyanmanjari Institute Of Technology
Security Attacks.ppt
Security Attacks.ppt
Zaheer720515
Database Security
Database Security
RabiaIftikhar10
Distributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query Processing
Gyanmanjari Institute Of Technology
Distributed DBMS - Unit 1 - Introduction
Distributed DBMS - Unit 1 - Introduction
Gyanmanjari Institute Of Technology
Security services and mechanisms
Security services and mechanisms
Rajapriya82
Database Security And Authentication
Database Security And Authentication
Sudeb Das
IT6801-Service Oriented Architecture
IT6801-Service Oriented Architecture
Madhu Amarnath
Data link layer
Data link layer
sbkbca
Database User and Administrator
Database User and Administrator
A. S. M. Shafi
Swap-space Management
Swap-space Management
Agnas Jasmine
Introduction to distributed database
Introduction to distributed database
Sonia Panesar
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptx
SaqibAhmedKhan4
Key management and distribution
Key management and distribution
Riya Choudhary
DBMS - RAID
DBMS - RAID
MythiliMurugan3
Mais procurados
(20)
Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.
Homogeneous ddbms
Homogeneous ddbms
CNS - Chapter1
CNS - Chapter1
Ethernet Computer network
Ethernet Computer network
Architecture of Mobile Computing
Architecture of Mobile Computing
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Security Attacks.ppt
Security Attacks.ppt
Database Security
Database Security
Distributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 1 - Introduction
Distributed DBMS - Unit 1 - Introduction
Security services and mechanisms
Security services and mechanisms
Database Security And Authentication
Database Security And Authentication
IT6801-Service Oriented Architecture
IT6801-Service Oriented Architecture
Data link layer
Data link layer
Database User and Administrator
Database User and Administrator
Swap-space Management
Swap-space Management
Introduction to distributed database
Introduction to distributed database
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptx
Key management and distribution
Key management and distribution
DBMS - RAID
DBMS - RAID
Semelhante a Chapter 9
Presentation atmos architecture overview
Presentation atmos architecture overview
xKinAnx
Chapter 9
Chapter 9
Ali Broumandnia
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdf
Tony Pearson
Object Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area Networks
Vaidas Brundza
Chapter 6
Chapter 6
Vipin Pachauri
IDT Replaces On-Premises Appliances with Primary Backup on AWS
IDT Replaces On-Premises Appliances with Primary Backup on AWS
Amazon Web Services
Se training storage grid webscale technical overview
Se training storage grid webscale technical overview
solarisyougood
Oracle E-Business Suite On Oracle Cloud
Oracle E-Business Suite On Oracle Cloud
pasalapudi
Oci meetup v1
Oci meetup v1
RaphaelCampelo
Oracle Cloud Infraestructure Update
Oracle Cloud Infraestructure Update
RaphaelCampelo
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018
Snowy Chen
Oxford Common File Layout (OCFL)
Oxford Common File Layout (OCFL)
Simeon Warner
S016825 ibm-cos-nola-v1710d
S016825 ibm-cos-nola-v1710d
Tony Pearson
Storage networking fcf_co_eiscsivsn_technology
Storage networking fcf_co_eiscsivsn_technology
EMC
20100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_0330
glorykim
20100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_0330
광영 김
NetApp Se training storage grid webscale technical overview
NetApp Se training storage grid webscale technical overview
solarisyougood
S104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809b
Tony Pearson
S100299 ibm-cos-orlando-v1804c
S100299 ibm-cos-orlando-v1804c
Tony Pearson
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...
Amazon Web Services
Semelhante a Chapter 9
(20)
Presentation atmos architecture overview
Presentation atmos architecture overview
Chapter 9
Chapter 9
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdf
Object Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area Networks
Chapter 6
Chapter 6
IDT Replaces On-Premises Appliances with Primary Backup on AWS
IDT Replaces On-Premises Appliances with Primary Backup on AWS
Se training storage grid webscale technical overview
Se training storage grid webscale technical overview
Oracle E-Business Suite On Oracle Cloud
Oracle E-Business Suite On Oracle Cloud
Oci meetup v1
Oci meetup v1
Oracle Cloud Infraestructure Update
Oracle Cloud Infraestructure Update
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018
Oxford Common File Layout (OCFL)
Oxford Common File Layout (OCFL)
S016825 ibm-cos-nola-v1710d
S016825 ibm-cos-nola-v1710d
Storage networking fcf_co_eiscsivsn_technology
Storage networking fcf_co_eiscsivsn_technology
20100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_0330
NetApp Se training storage grid webscale technical overview
NetApp Se training storage grid webscale technical overview
S104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809b
S100299 ibm-cos-orlando-v1804c
S100299 ibm-cos-orlando-v1804c
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...
Último
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
XfilesPro
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
Último
(20)
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Chapter 9
1.
© 2009 EMC
Corporation. All rights reserved. EMC Proven Professional The #1 Certification Program in the information storage and management industry Content Addressed Storage Chapter 9 Section 2 : Storage Networking Technologies and Virtualization
2.
© 2009 EMC
Corporation. All rights reserved. Chapter Objectives Upon completion of this chapter, you will be able to: o Describe CAS, fixed content and archives, traditional storage solutions for archive o Describe the features and benefits of a CAS based storage strategy o List the physical and logical elements of CAS o Describe the storage and retrieval process for CAS data objects o Describe the best suited operational environments for CAS solutions
3.
© 2009 EMC
Corporation. All rights reserved. Lesson: CAS Overview Upon completion of this lesson, you be able to: o Define fixed content o Describe traditional archival solutions and its shortcoming o Define Content Addressed Storage (CAS) o List benefits of CAS
4.
© 2009 EMC
Corporation. All rights reserved. What are Fixed Content and Archives Electronic Documents •Contracts, claims, etc. •E-mail and attachments •Financial spread sheets •CAD/CAM designs •Presentations Digital Records •Documents – Checks, securities trades – Historical preservation •Photographs – Personal / professional •Surveys – Seismic, astronomic, geographic Digital Assets Retained For Active Reference And Value Leverage Historical Value Improve Service Levels Generate New Revenues Rich Media •Medical – X-rays, MRIs, CTI •Video – News / media, movies – Security surveillance •Audio – Voicemail – Radio
5.
© 2009 EMC
Corporation. All rights reserved. Challenges of Storing Fixed Content o Fixed content is growing at more than 90% annually o Significant amount of newly created information falls into this category o New regulations require retention and data protection o Often, long-term preservation is required (years-decades) o Simultaneous multi-user online access is preferable to offline storage o Need faster access to fixed content o Need for location independent data, enabling technology refresh and migration o Traditional storage methods are inadequate
6.
© 2009 EMC
Corporation. All rights reserved. Traditional storage solutions for Archive o Three categories of archival solution are: o Online, nearline, and offline based on the means of access o Traditional archival solution were offline o Traditional archival process used optical disks and tapes as media for archival o An archive is often stored on a Write Once Read Many (WORM) device, such as a CD-ROM
7.
© 2009 EMC
Corporation. All rights reserved. Shortcomings of Traditional Archiving Solutions o Tape is slow, and standards are always changing o Optical is expensive, and requires vast amounts of media o Recovering files from tape and optical is often time consuming o Data on tape and optical is subject to media degradation o Both solution require sophisticated media management CAS has emerged as an alternative to traditional archiving solutions
8.
© 2009 EMC
Corporation. All rights reserved. What is Content Addressed Storage (CAS) o Object-oriented, location-independent approach to data storage o Repository for the “Objects” o Access mechanism to interface with repository o Globally unique identifiers provide access to objects
9.
© 2009 EMC
Corporation. All rights reserved. Benefits of CAS o Content authenticity o Content integrity o Location independence o Single-instance storage (SiS) o Retention enforcement o Record-level protection and disposition o Technology independence o Fast record retrieval Additional Task Research on role of CAS in ILM Strategy
10.
© 2009 EMC
Corporation. All rights reserved. Lesson Summary Key points covered in this lesson: o CAS Definition o Challenges of Storing Fixed Content o Shortcomings of Traditional Archiving Solutions o Benefits of CAS
11.
© 2009 EMC
Corporation. All rights reserved. Lesson: CAS Architecture Upon completion of this lesson, you will be able to: o Describe CAS architecture o Describe Physical and logical elements of CAS o Describe data storage and retrieval process in CAS environment o CAS examples
12.
© 2009 EMC
Corporation. All rights reserved. Physical Elements of CAS o Storage devices (CAS Based) o Storage node o Access node o Servers (to which storage devices get connected) o Client Server Private LAN Storage Nodes Access Nodes CAS System IP API
13.
© 2009 EMC
Corporation. All rights reserved. CAS Terminology o Application Programming Interface (API) o A set of function calls that enables communication between applications or between an application and an operating system o BLOB (Binary Large Object) o The actual data without the descriptive information (metadata) o The Distinct Bit Sequence (DBS) of user data represents the actual content of a file and is independent of the filename and physical location API
14.
© 2009 EMC
Corporation. All rights reserved. CAS Terminology (Cont) o C-Clip o A package containing the user's data and associated metadata o C-Clip ID (C-Clip handle or C-Clip reference) is the CA that the system returns to the client application o Content Address (CA) o An identifier that uniquely addresses the content of a file and not its location. Unlike location-based addresses, content addresses are inherently stable and, once calculated, they never change and always refer to the same content o C-Clip Descriptor File (CDF) o The additional XML file that the system creates when making a C-Clip. This file includes the content addresses for all referenced BLOBs and associated metadata
15.
© 2009 EMC
Corporation. All rights reserved. API How CAS Stores a Data Object Unique Content Address is calculated Client presents data to API to be archived CAS System Client Application Server CDF C-Clip (Object) Object is sent to CAS System via CAS API over IP
16.
© 2009 EMC
Corporation. All rights reserved. API How CAS Stores a Data Object Unique Content Address is calculated Client presents data to API to be archived CAS System Client Application Server Object is sent to CAS System via CAS API over IP Object CAS System validates the Content Address and stores the object Acknowledgement returned to application Clip ID is retained and stored for future use
17.
© 2009 EMC
Corporation. All rights reserved. Application Server Client CAS System Object is needed by an application 1 CAS authenticates the request and delivers the object 4 Application finds Content Address of object to be retrieved 2 Retrieval request is sent to the CAS System via CAS API over IP 3 How CAS Retrieves a Data Object API C-Clip ID
18.
© 2009 EMC
Corporation. All rights reserved. CAS Features o Features available with most CAS systems are: o Integrity checking o Data protection o Local replication o Remote replication o Load balancing o Scalability o Self-diagnosis and repair o Report generation and event notification o Fault tolerance o Through the use of redundant components and data protection schemes o Audit trails o Documentation of management activities, access and disposition of data
19.
© 2009 EMC
Corporation. All rights reserved. Example 1: CAS Healthcare Solution o Each X-ray image ranges from about 15MB to over 1GB o Patient record is stored online for a period of 60-90 days o Beyond 90 days patient records are archived Data Stored on CAS Patient Studies Stored locally for Short-Term Use (60 Days) Hospital CAS SystemApplication Server API
20.
© 2009 EMC
Corporation. All rights reserved. Example 2: CAS Financial Solution o Check image size is about 25KB o Check imaging service provider may process 50–90 million check images per month o Checks are stored online for a period of 60 days o Beyond 60 days data is archived Bank CAS SystemApplication Server API
21.
© 2009 EMC
Corporation. All rights reserved. Lesson Summary Key points covered in this lesson: o CAS architecture o Physical and logical elements of CAS o CAS storage and retrieval process o CAS solution examples
22.
© 2009 EMC
Corporation. All rights reserved. Chapter Summary Key points covered in this chapter: o Benefits of CAS based storage strategy o Overview of physical and logical elements of CAS o Storing and retrieving data from CAS o CAS application examples
23.
© 2009 EMC
Corporation. All rights reserved. #1 IT company For more information visit http://education.EMC.com
Notas do Editor
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage - The objectives for this chapter are shown here. Please take a moment to read them.
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage - The objectives for this lesson are shown here. Please take a moment to read them.
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
Baixar agora