Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/23/2013
02:09 PM
Don Bailey
Don Bailey
Products and Releases
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Huawei Announces An Integrated Data Integrity Solution In Collaboration With Emulex And Oracle

Solution can help customers prevent silent data corruption in mission-critical services

SHENZHEN, China, Sept. 23, 2013 /PRNewswire/ -- Huawei, a leading global information and communications technology (ICT) solutions provider, today announced an end-to-end (E2E) data integrity solution, developed in conjunction with Emulex and Oracle. This solution can help customers prevent silent data corruption in mission-critical services, delivering crucial data protection.

In data access, data goes through various components, transfer channels, and software processing. Errors during this process may cause silent data corruption. Silent data corruption is often overlooked, but it can have great and adverse impact on the services such as databases that require absolute data integrity. Silent data corruption can lead to service disruptions or unrecoverable data loss.

The data integrity solution announced today by Huawei, in collaboration with Emulex, and Oracle enhances the current technology where hosts and storage systems protect data integrity independently. This is done by implementing E2E data integrity protection across applications, hosts, storage systems, and disks. As a result, this solution can help prevent silent data corruption in mission-critical services and eliminate potential downtime, which may cost organizations millions of dollars in revenue.

Huawei Global Certification Test Center (GCTC) has qualified this solution,

including: Oracle Database, Oracle Linux with the Unbreakable Enterprise Kernel, Emulex Gen5 FC HBA, and HUAWEI OceanStor Enterprise Storage System, and confirmed that these components are compatible with industry specifications such as the SCSI Protection Information Model (T10 PI) and Data Integrity Extensions (DIX). HUAWEI OceanStor Enterprise Storage System supports standard T10 PI, which can detect and resolve the silent data corruption. It also provides a PI interface to the host, and supports assorting with the DIX. With this, Huawei becomes one of the early enterprise storage vendors to offer an E2E data integrity protection solution.

"Emulex is pleased to be working closely with Huawei and Oracle to provide exclusive Fiber Channel HBA support within this solution," said Jimmy Yam, vice president of sales, APAC, Emulex. "This solution enables IT managers the ability to protect data and resources while elevating the reliability and operations of their database environments. Emulex Gen 5 Fiber Channel HBAs provide the industry's highest level of data integrity with full line-rate performance and no systems overhead with our vEngine(TM) CPU offload technology making SANs faster, and operate better."

"As a leading contributor to the Linux kernel, Oracle developed and introduced the data integrity feature that is now part of the mainline Linux and included with Oracle Linux. We are pleased to see that technology come to fruition with an end-to-end data integrity solution, as part of our collaboration with Huawei and Emulex. This solution can benefit our mutual customers who rely on the integrity of their data to run their business," said Wim Coekaerts, Senior Vice President Linux and Virtualization Engineering, Oracle.

Fan Ruiqi, President of Huawei IT Storage Product Line, said, "Huawei is honored to have cooperated with Emulex and Oracle to announce an E2E data integrity solution compatible with T10 PI and DIX. This solution perfectly demonstrates Huawei storage products' philosophy of being secure and trusted to the storage industry. Huawei storage product line keeps being customer-centric with the endowed mission of protecting customers' data security. From the innovative RAID 2.0+, 9-magnitude earthquake resistance certification, to the 32:1 centralized disaster recovery solution, Huawei has been dedicated to providing customers with secure and trusted data storage services and will continue to spare no efforts on this road."

About Huawei

Huawei is a leading global information and communications technology (ICT) solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end advantages in telecom networks, devices and cloud computing. We are committed to creating maximum value for telecom operators, enterprises and consumers by providing competitive solutions and services. Our products and solutions have been deployed in over

140 countries, serving more than one third of the world's population. For more information, visit Huawei online: www.huawei.com

Follow us on Twitter: www.twitter.com/huaweipress and YouTube:

http://www.youtube.com/user/HuaweiPress

About Oracle PartnerNetwork

Oracle PartnerNetwork (OPN) Specialized is the latest version of Oracle's partner program that provides partners with tools to better develop, sell and implement Oracle solutions. OPN Specialized offers resources to train and support specialized knowledge of Oracle products and solutions and has evolved to recognize Oracle's growing product portfolio, partner base and business opportunity. Key to the latest enhancements to OPN is the ability for partners to differentiate through Specializations. Specializations are achieved through competency development, business results, expertise and proven success. To find out more visit http://www.oracle.com/partners Don A. Bailey is a pioneer in security for mobile technology, the Internet of Things, and embedded systems. He has a long history of ground-breaking research, protecting mobile users from worldwide tracking systems, securing automobiles from remote attack, and mitigating ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5641
PUBLISHED: 2020-11-24
Cross-site request forgery (CSRF) vulnerability in GS108Ev3 firmware version 2.06.10 and earlier allows remote attackers to hijack the authentication of administrators and the product's settings may be changed without the user's intention or consent via unspecified vectors.
CVE-2020-5674
PUBLISHED: 2020-11-24
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2020-29002
PUBLISHED: 2020-11-24
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
CVE-2020-29003
PUBLISHED: 2020-11-24
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.
CVE-2020-26890
PUBLISHED: 2020-11-24
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the r...