Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/23/2013
02:09 PM
Don Bailey
Don Bailey
Products and Releases
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Huawei Announces An Integrated Data Integrity Solution In Collaboration With Emulex And Oracle

Solution can help customers prevent silent data corruption in mission-critical services

SHENZHEN, China, Sept. 23, 2013 /PRNewswire/ -- Huawei, a leading global information and communications technology (ICT) solutions provider, today announced an end-to-end (E2E) data integrity solution, developed in conjunction with Emulex and Oracle. This solution can help customers prevent silent data corruption in mission-critical services, delivering crucial data protection.

In data access, data goes through various components, transfer channels, and software processing. Errors during this process may cause silent data corruption. Silent data corruption is often overlooked, but it can have great and adverse impact on the services such as databases that require absolute data integrity. Silent data corruption can lead to service disruptions or unrecoverable data loss.

The data integrity solution announced today by Huawei, in collaboration with Emulex, and Oracle enhances the current technology where hosts and storage systems protect data integrity independently. This is done by implementing E2E data integrity protection across applications, hosts, storage systems, and disks. As a result, this solution can help prevent silent data corruption in mission-critical services and eliminate potential downtime, which may cost organizations millions of dollars in revenue.

Huawei Global Certification Test Center (GCTC) has qualified this solution,

including: Oracle Database, Oracle Linux with the Unbreakable Enterprise Kernel, Emulex Gen5 FC HBA, and HUAWEI OceanStor Enterprise Storage System, and confirmed that these components are compatible with industry specifications such as the SCSI Protection Information Model (T10 PI) and Data Integrity Extensions (DIX). HUAWEI OceanStor Enterprise Storage System supports standard T10 PI, which can detect and resolve the silent data corruption. It also provides a PI interface to the host, and supports assorting with the DIX. With this, Huawei becomes one of the early enterprise storage vendors to offer an E2E data integrity protection solution.

"Emulex is pleased to be working closely with Huawei and Oracle to provide exclusive Fiber Channel HBA support within this solution," said Jimmy Yam, vice president of sales, APAC, Emulex. "This solution enables IT managers the ability to protect data and resources while elevating the reliability and operations of their database environments. Emulex Gen 5 Fiber Channel HBAs provide the industry's highest level of data integrity with full line-rate performance and no systems overhead with our vEngine(TM) CPU offload technology making SANs faster, and operate better."

"As a leading contributor to the Linux kernel, Oracle developed and introduced the data integrity feature that is now part of the mainline Linux and included with Oracle Linux. We are pleased to see that technology come to fruition with an end-to-end data integrity solution, as part of our collaboration with Huawei and Emulex. This solution can benefit our mutual customers who rely on the integrity of their data to run their business," said Wim Coekaerts, Senior Vice President Linux and Virtualization Engineering, Oracle.

Fan Ruiqi, President of Huawei IT Storage Product Line, said, "Huawei is honored to have cooperated with Emulex and Oracle to announce an E2E data integrity solution compatible with T10 PI and DIX. This solution perfectly demonstrates Huawei storage products' philosophy of being secure and trusted to the storage industry. Huawei storage product line keeps being customer-centric with the endowed mission of protecting customers' data security. From the innovative RAID 2.0+, 9-magnitude earthquake resistance certification, to the 32:1 centralized disaster recovery solution, Huawei has been dedicated to providing customers with secure and trusted data storage services and will continue to spare no efforts on this road."

About Huawei

Huawei is a leading global information and communications technology (ICT) solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end advantages in telecom networks, devices and cloud computing. We are committed to creating maximum value for telecom operators, enterprises and consumers by providing competitive solutions and services. Our products and solutions have been deployed in over

140 countries, serving more than one third of the world's population. For more information, visit Huawei online: www.huawei.com

Follow us on Twitter: www.twitter.com/huaweipress and YouTube:

http://www.youtube.com/user/HuaweiPress

About Oracle PartnerNetwork

Oracle PartnerNetwork (OPN) Specialized is the latest version of Oracle's partner program that provides partners with tools to better develop, sell and implement Oracle solutions. OPN Specialized offers resources to train and support specialized knowledge of Oracle products and solutions and has evolved to recognize Oracle's growing product portfolio, partner base and business opportunity. Key to the latest enhancements to OPN is the ability for partners to differentiate through Specializations. Specializations are achieved through competency development, business results, expertise and proven success. To find out more visit http://www.oracle.com/partners Don A. Bailey is a pioneer in security for mobile technology, the Internet of Things, and embedded systems. He has a long history of ground-breaking research, protecting mobile users from worldwide tracking systems, securing automobiles from remote attack, and mitigating ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Edge-DRsplash-10-edge-articles
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
Commentary
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32238
PUBLISHED: 2021-05-18
Epic Games / Psyonix Rocket League <=1.95 is affected by Buffer Overflow. Stack-based buffer overflow occurs when Rocket League handles UPK object files that can result in code execution and denial of service scenario.
CVE-2020-23851
PUBLISHED: 2021-05-18
A stack-based buffer overflow vulnerability exists in ffjpeg through 2020-07-02 in the jfif_decode(void *ctxt, BMP *pb) function at ffjpeg/src/jfif.c:513:28, which could cause a denial of service by submitting a malicious jpeg image.
CVE-2020-23852
PUBLISHED: 2021-05-18
A heap based buffer overflow vulnerability exists in ffjpeg through 2020-07-02 in the jfif_decode(void *ctxt, BMP *pb) function at ffjpeg/src/jfif.c (line 544 & line 545), which could cause a denial of service by submitting a malicious jpeg image.
CVE-2020-23856
PUBLISHED: 2021-05-18
Use-after-Free vulnerability in cflow 1.6 in the void call(char *name, int line) function at src/parser.c, which could cause a denial of service via the pointer variable caller->callee.
CVE-2020-24026
PUBLISHED: 2021-05-18
TinyShop, a free and open source mall based on RageFrame2, has a stored XSS vulnerability that affects version 1.2.0. TinyShop allows XSS via the explain_first and again_explain parameters of the /evaluate/index.php page. The vulnerability may be exploited remotely, resulting in cross-site scripting...