Maritime museum backs up with HP LeftHand, Microsoft

The Australian National Maritime Museum has revamped its storage infrastructure, selecting HP LeftHand and Microsoft.

When Karen Holt tried to introduce mobile email to The Australian National Maritime Museum, one of the things that stymied her efforts was a lack of disk space.

For Holt, The Museum’s Head of Information Services, that lack of space was one of many frustrations that saw her commission a $2million refresh of its technology infrastructure, one part of which is a new pair of storage area networks to support a new backup regime.

“I wanted true offsite backup and fast recovery,” Holt says. She has it now, thanks to servers clustered across the museum’s two main Sydney sites and a pair of HP LeftHand P4500 SANs.

“We needed hardware that was certified with Hyper-V, not for VMware,” Holt says, offering one reason for the HP decision. “Secondly LeftHand is far sexier and funkier than an EVA. Every time you add to the cluster you get more spindles. You get more bang for your buck.”

The Museum has also adopted Microsoft’s Data Protection Manager for its backup and data management needs, a choice made easy by use of many other Microsoft products throughout the organisation.

The software points to an HP virtual tape library (VTL) for backup and copies deltas of recently changed data to an offsite, third-party, data centre where another VTL offers a further layer of data protection.

Frontline Systems is leading a consortium to refresh the Museum's infrastructure.

Read more on Data protection, backup and archiving

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close