Trends in Data Protection CDP and VTL
|
|
- Melanie Stokes
- 5 years ago
- Views:
Transcription
1 Trends in Data Protection CDP and VTL Agnes Lamont, TimeSpring Jason Iehl, Network Appliance
2 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced without modification The SNIA must be acknowledged as source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. 2
3 About SNIA and the DMF About the Storage Networking Industry Association (SNIA) SNIA s primary goal is to ensure that storage networks become complete and trusted solutions across the IT community For additional information about SNIA see SNIA s Dictionary of Storage Networking Terminology is online at About the SNIA Data Management Forum (DMF) The DMF is a sub-group of SNIA acting as the worldwide authority on Data Management, Data Protection and ILM The DMF is a collaborative storage industry resource available to anyone responsible for the accessibility and integrity of their organization s information. Data Protection Initiative (DPI) Defining new approaches and best practices for data protection and recovery DMF Information Lifecycle Management Initiative (ILMI) Developing, teaching and promoting ILM practices, implementation methods, and benefits Long term Archive and Compliance Storage Initiative (LTACSI) Addressing challenges in developing, securing, and retaining long-term digital archives 3
4 Abstract Trends in Data Protection CDP and VTL Data protection is evolving beyond traditional backup, snapshots and replication. CDP and VTL are rapidly emerging as key data protection technologies. This session will provide an overview of Continuous Data Protection (CDP) and Virtual Tape Libraries (VTL). This tutorial will examine how CDP and VTL address common data protection concerns, including backup windows and data recovery. The session will provide clarity on what CDP and VTL are and are not and what can realistically be achieved with these technologies. It will offer practical guidance on how CDP and VTL technologies can be introduced into the IT environment in a way that minimizes disruption and simplifies ongoing management, thereby reducing complexity and costs. 4
5 Outline Traditional data protection challenges Introduction to VTL Introduction to CDP Challenges addressed by VTL and CDP Evolving data protection SNIA resources 5
6 Traditional Data Protection Challenges Backup window Failed, inconsistent, unreliable recovery Recovery time too long (poor RTO) Negative production impact Protection gaps (poor RPO) Disaster recovery Regulatory compliance and corporate governance Costly and inefficient Disruptive to change 6
7 Protection Based on Recovery Years Days Hrs Mins Secs Secs Mins Hrs Days Recovery Point Recovery Time Protection Methods Recovery Methods Tape Backups Vaults Archival Capture on Write Disk Backups Snapshots Synthetic Backup Real Time Replication Instant Recovery Disk Restores Tape Restores Point-in-Time Roll Back Search & Retrieve Enabling Technologies Tape & Automation Virtual Tape Library Deduplication Continuous Data Protection Archive Store 7
8 VTL Defined Virtual Tape Library (VTL) is made up of a couple definitions virtual device CONTEXT [Storage System] A device presented to an operating environment by control software or by a volume manager. From an application standpoint, a virtual device is equivalent to a physical one. In some implementations, virtual devices may differ from physical ones at the operating system level virtual tape CONTEXT [Storage System] A virtual device with the characteristics of a tape. SNIA dictionary definitions 8
9 Introduction to VTL What: Originally designed for mainframe Moved into open systems market Fits within the backup environment Easy to deploy and integrate Takes advantage of current processes Reduces tape media handling IP / FC SAN VTL Backup Server Why: Improved speed and reliability Speed of higher end tape without the downside Ability to achieve high performance with or without the use of multiplexing Enables faster access to data for single file/folder restores No detached tape leaders or mechanical failures Tape Library 9
10 The VTL Difference Easy to manage in traditional backup software environment: Works like normal tape library Fits into existing backup and restore processes Viewed as open systems cartridges, robot, tape drives, and in some cases even a mail slot Standard tape copy, cloning, or vaulting functions apply for off-site copies Used to replicate data to physical tape for long term retention Cost effective solution Leverages lower cost disk Can extend the life of current physical tape investment Used as a front-end to the backup process Tape is still used for longer term retention 10
11 VTL Deployment Scenario 1 Scenario 2 Backup Server Backup Server VTL VTL IP / FC SAN IP / FC SAN Tape Library Tape Library Backup Media Servers Backup Media Servers 11
12 VTL Best Practices Use as primary backup target to reduce backup window Still take advantage of tape as backup target where appropriate Build out to enable addition quick restores Single file, folder, and/or volume Rules the same rules for libraries and tape when physically connecting Virtual Drives per connection Tape redeployment Eject process, controlled by the backup software Offsite requirements Bandwidth, connectivity, time to complete tape copies 12
13 VTL Investment Payback Physical tape media management Mission and business critical data Increased retention periods Customers Report Back Average Payback Period Average Satisfaction Backup and Restore Reliability Average Backup Speed Increase Average Restore Speed Increase 12 months 9 out of % Improvement 200% 400% 13
14 CDP Defined Continuous Data Protection (CDP) is a methodology that continuously captures or tracks data modifications and stores changes independent of the primary data, enabling recovery points from any point in the past. CDP systems may be block-, file- or application-based and can provide fine granularities of restorable objects to infinitely variable recovery points. SNIA DMF DPI/CDP SIG definition 14
15 Introduction to CDP What: Capture every change as it occurs Protected copy in a secondary location Recover to any point in time How: Block-based File-based Application-based Why: Implementations of true CDP today are delivering zero data loss, zero backup window and simple recovery. CDP customers can protect all data at all times and recover directly to any point in time. 15
16 The CDP Difference Replication is not CDP: Maintains only a current copy of the data May be combined with some snapshot capabilities Snapshots are not CDP: Snapshots are scheduled events Data loss possible if crash or corruption happens between snaps Snapshots frequently to same system as primary Lack continuous index with embedded knowledge of relationship of data to files, folders, application and server Scheduled events are not CDP: Scheduled backup processes Log collection for database style applications, rolling transactions forwards or backwards 16
17 Traditional Recovery Last Known- Good Image Analyze APPLICATION DOWNTIME Application Restarted Modifications Since Last Image Analyze Restore* Recover Recovery Point Objective Drives *10TB = 4 hours from disk, 12.5 hours from tape Recovery Time Objective 17
18 CDP Buyers Guide Storage Networking Industry Association Recovery with CDP APPLICATION DOWNTIME Application Restarted Analyze Recover Offers a Closer Recovery Point Instant Restore...and a Shorter Recovery Time 18
19 CDP Deployment DATABASE SERVER SERVERS MAY BE CLUSTERED SERVER REPOSITORY AND/OR REMOTE REPOSITORY APPLICATION SERVER 19
20 CDP Implementation Models Database Database Server Applications NTFS Network Server NFS, CIFS Files Virtual Blocks Application-based File-based Volume Manager Logical Blocks Device Driver Storage Network Block-based 20
21 Consistency Logical Coherence In electronic data management, a set of data is said to be consistent when the data can be correctly and unambiguously interpreted by an application. Data Consistency is THE critical issue in data recovery 21
22 Event delays in stack 22
23 Of Growing Importance The Traditional Data Protection Process required closing files to create data consistency Data Growth This process causes a lot of pain As service levels for restore become more demanding, the problem gets unmanageable Restore Time Service Level Performance 23
24 CDP 4 Phase Operational Summary 1. Installation - classify and group application data 2. Operation - continuously captures data changes 3. Retention validates, retains and manages data in repository 4. Access view and retrieve as needed 24
25 CDP Best Practices Classify data and ILM policies Content grouping, retention Consistency System-level, transaction, crash etc. Assess storage requirements volume of data, change rates Include opportunity in TCO modeling Tape redeployment Offsite requirements Bandwidth, connectivity, cache tuning Understand versions available Data leverage beyond protection Backward and forward data manipulation 25
26 Challenges Revisited Backup window Failed, inconsistent, unreliable recovery Recovery time too long (poor RTO) Negative production impact Protection gaps (poor RPO) Disaster recovery Regulatory compliance and corporate governance Costly and inefficient Disruptive to change 26
27 Evolving the Data Protection Infrastructure Investment protection No forklift upgrades No lock in open mind Right technology for the right problem Evolutionary approach What s ahead? 27
28 Solving the problem Desktops / Clients CDP Repository Application / Database Servers IP Network IP / FC SAN VTL / File Servers Backup Media Servers Tape Library 28
29 SNIA Resources Related tutorials Disk and Tape Backup Mechanisms Disk Based Restoration Technology Visit the Data Management Forum website at Data Protection Buyers Guide available 29
30 Q&A / Feedback Please send any questions or comments on this presentation to SNIA: trackdatamgmt@snia.org Many thanks to the following individuals for their contributions to this tutorial: Agnes Lamont, TimeSpring Shane Jackson, Quantum Jason Iehl, Network Appliance Dr. Rick Carlson, TimeSpring Get Involved! - Find a passion - Join a committee - Gain knowledge & influence - Make a difference 30
Trends in Data Protection and Restoration Technologies. Jason Iehl, Network Appliance Michael Rowan, Consultant
Trends in Data Protection and Restoration Technologies Jason Iehl, Network Appliance Michael Rowan, Consultant SNIA Legal Notices The material contained in this tutorial is copyrighted by the SNIA Member
More informationTrends in Data Protection and Restoration Technologies. Jason Iehl, NetApp
Trends in Data Protection and Restoration Technologies Jason Iehl, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and
More informationTrends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation
Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member
More informationRestoration Technologies
Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Gideon Senderov / NEC Author: SNIA - Data Protection & Capacity Optimization (DPCO) Committee SNIA Legal Notice The material
More informationDisk and Tape Backup Mechanisms
Disk and Tape Backup Mechanisms Michael Fishman, EMC SNIA Legal Notices The material contained in this tutorial is copyrighted by the SNIA Member companies and individuals may use this material in presentations
More informationADVANCED DEDUPLICATION CONCEPTS. Thomas Rivera, BlueArc Gene Nagle, Exar
ADVANCED DEDUPLICATION CONCEPTS Thomas Rivera, BlueArc Gene Nagle, Exar SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may
More informationData Deduplication Methods for Achieving Data Efficiency
Data Deduplication Methods for Achieving Data Efficiency Matthew Brisse, Quantum Gideon Senderov, NEC... SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
More informationADVANCED DATA REDUCTION CONCEPTS
ADVANCED DATA REDUCTION CONCEPTS Thomas Rivera, Hitachi Data Systems Gene Nagle, BridgeSTOR Author: Thomas Rivera, Hitachi Data Systems Author: Gene Nagle, BridgeSTOR SNIA Legal Notice The material contained
More informationContinuous Data Protection Solving the Problem of Restoration June, 2008
Continuous Data Protection Solving the Problem of Restoration June, 2008 Table of Contents Introduction...1 The SNIA DMF Data Protection Initiative: the CDP-SIG...1 Historical look at Data Protection...2
More informationA Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer
A Crash Course In Wide Area Data Replication Jacob Farmer, CTO, Cambridge Computer SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals
More informationIBM Storage Software Strategy
IBM Storage Software Strategy Hakan Turgut 1 Just how fast is the data growing? 128 GB/ person The World s total data per person No Problem I I think I can do this We have a problem 24 GB/ person 0.8 GB/
More information50 TB. Traditional Storage + Data Protection Architecture. StorSimple Cloud-integrated Storage. Traditional CapEx: $375K Support: $75K per Year
Compelling Economics: Traditional Storage vs. StorSimple Traditional Storage + Data Protection Architecture StorSimple Cloud-integrated Storage Servers Servers Primary Volume Disk Array ($100K; Double
More informationTom Sas HP. Author: SNIA - Data Protection & Capacity Optimization (DPCO) Committee
Advanced PRESENTATION Data Reduction TITLE GOES HERE Concepts Tom Sas HP Author: SNIA - Data Protection & Capacity Optimization (DPCO) Committee SNIA Legal Notice The material contained in this tutorial
More informationThe Nuances of Backup and Recovery Solutions
DEFINING THE RIGHT DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions Cindy LaChapelle, Principal Consultant, ISG ISG WHITE PAPER 2012 Information Services Group, Inc. All Rights Reserved
More informationDisk-to-Disk backup. customer experience. Harald Burose. Architect Hewlett-Packard
Disk-to-Disk backup customer experience Harald Burose Architect Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice I believe
More informationHYCU and ExaGrid Hyper-converged Backup for Nutanix
HYCU and ExaGrid Hyper-converged Backup for Nutanix Backing Up and Recovering Data: Nutanix, ExaGrid and HYCU As IT data centers move to hyper-converged infrastructure, new and innovative backup approaches
More informationFarid SAADI. Senior Systems Engineer, Backup Recovery Systems
1 Farid SAADI Senior Systems Engineer, Backup Recovery Systems 2 Today s Challenges Data Growth Budgets Infrastructure Visibility 3 A Lot Has Changed 3X = Around the World 9 Track Open Reel Tapes >82,000
More informationarcserve r16.5 Hybrid data protection
arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements
More informationChapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/
Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and
More informationCopyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.
1 Using patented high-speed inline deduplication technology, Data Domain systems identify redundant data as they are being stored, creating a storage foot print that is 10X 30X smaller on average than
More informationIdentifying and Eliminating Backup System Bottlenecks: Taking Your Existing Backup System to the Next Level
Identifying and Eliminating Backup System Bottlenecks: Taking Your Existing Backup System to the Next Level Jacob Farmer, CTO Cambridge Computer SNIA Legal Notice The material contained in this tutorial
More information1 Quantum Corporation 1
1 Tactics and Tips for Protecting Virtual Servers Mark Eastman Director, Solutions Marketing April 2008 VMware Changing the Way Data Protection is Done No longer 1 server, 1 backup paradigm App Virtual
More informationDe-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid
De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (CRC)
More informationAgenda Secondary Storage Problem Cohesity Hyperconverged Secondary Storage Demo: Cohesity and Vmware vilogics Use Case
STO3331BES Cohesity Hyperconverged Secondary Storage: Simple Data Protection for VMware vsphere and vsan Gaetan Castelein, Head of Product Marketing, Cohesity Paul Khosla, Infrastructure Architect, Colliers
More informationSTORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp
STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in
More informationBy William Ng Senior IT Specialist
How to protect users data upon system failure? By William Ng Senior IT Specialist Agenda The challenge of Information Management in today s environment The trend of information recovery The new hybrid
More informationHow Symantec Backup solution helps you to recover from disasters?
How Symantec Backup solution helps you to recover from disasters? Finn Henningsen Presales Specialist Technology Days 2011 1 Thank you to our sponsors Technology Days 2011 2 Agenda Why do we bother? Infrastructure
More informationSTORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp
STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in
More informationDell DR4000 Replication Overview
Dell DR4000 Replication Overview Contents Introduction... 1 Challenges with Data Disaster Recovery... 1 The Dell DR4000 Solution A Replication Overview... 2 Advantages of using DR4000 replication for disaster
More informationBackups and archives: What s the scoop?
E-Guide Backups and archives: What s the scoop? What s a backup and what s an archive? For starters, one of the differences worth noting is that a backup is always a copy while an archive should be original
More informationThe storage challenges of virtualized environments
The storage challenges of virtualized environments The virtualization challenge: Ageing and Inflexible storage architectures Mixing of platforms causes management complexity Unable to meet the requirements
More informationWAN Application Infrastructure Fueling Storage Networks
WAN Application Infrastructure Fueling Storage Networks Andrea Chiaffitelli, AT&T Ian Perez-Ponce, Cisco SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
More informationHPE Converged Data Solutions
HPE Converged Data Solutions Erdinc Kaya - kaya@hpe.com Storage Solution Architect Areas of Transformation & HPE IM&P A platform approach for effectively managing and protecting all information enterprise-wide
More informationBalakrishnan Nair. Senior Technology Consultant Back Up & Recovery Systems South Gulf. Copyright 2011 EMC Corporation. All rights reserved.
Balakrishnan Nair Senior Technology Consultant Back Up & Recovery Systems South Gulf 1 Thinking Fast: The World s Fastest Backup Now Does Archive Too Introducing the New EMC Backup and Recovery Solutions
More informationChapter 11. SnapProtect Technology
Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting
More informationSimplify and Improve IMS Administration by Leveraging Your Storage System
Simplify and Improve Administration by Leveraging Your Storage System Ron Bisceglia Rocket Software, Inc. August 9, 2011 Session Number: 9406 Session Agenda and Storage Integration Overview System Level
More informationCopyright 2012 EMC Corporation. All rights reserved.
1 Transforming Backup And Recovery 2 THE JOURNEY CONTINUES 3 IT PRESSURES KEEP STACKING UP Compliance & Discovery Infrastructure Shift Budget Dilemma Data Growth 4 CONVERGENCE OF BACKUP & ARCHIVING Backup
More informationVeeam Availability Solution for Cisco UCS: Designed for Virtualized Environments. Solution Overview Cisco Public
Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments 1 2017 2017 Cisco Cisco and/or and/or its
More informationSimplify and Improve DB2 Administration by Leveraging Your Storage System
Simplify and Improve Administration by Leveraging Your Storage System Ron Haupert Rocket Software, Inc. March 1, 2011 Session Number 8404 Session Agenda Database and Storage Integration Overview System-Level
More informationReasons to Deploy Oracle on EMC Symmetrix VMAX
Enterprises are under growing urgency to optimize the efficiency of their Oracle databases. IT decision-makers and business leaders are constantly pushing the boundaries of their infrastructures and applications
More informationProtecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery
White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments
Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationChapter 10 Protecting Virtual Environments
Chapter 10 Protecting Virtual Environments 164 - Protecting Virtual Environments As more datacenters move to virtualize their environments and the number of virtual machines and the physical hosts they
More informationPreserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS
Preserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS We are the only company to integrate disk, tape, and replication in a single solution set for better near-term
More informationHP D2D & STOREONCE OVERVIEW
HP D2D & STOREONCE OVERVIEW Robert Clifford Pre-Sales Storage Consultant 1 Data loss (Recovery Point Objective) Let s put it in context.. Last Transaction Increased availability Mission critical support
More informationComplete Data Protection & Disaster Recovery Solution
Complete Data Protection & Disaster Recovery Solution Quadric Software 2015 We were looking at other solutions. Alike was the best with XenServer, and none of them had Alike s compression abilities. After
More informationThe 5 Keys to Virtual Backup Excellence
The 5 Keys to Virtual Backup Excellence The Challenges 51 87 Percent of IT pros say virtualized server backups do not meet or only partially meet business goals for restores and recovery Percent of CIOs
More informationScale-out Data Deduplication Architecture
Scale-out Data Deduplication Architecture Gideon Senderov Product Management & Technical Marketing NEC Corporation of America Outline Data Growth and Retention Deduplication Methods Legacy Architecture
More informationApplication Recovery. Andreas Schwegmann / HP
Intelligent PRESENTATION Architecture TITLE GOES HERE for Application Recovery Andreas Schwegmann / HP SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise
More informationProtect enterprise data, achieve long-term data retention
Technical white paper Protect enterprise data, achieve long-term data retention HP StoreOnce Catalyst and Symantec NetBackup OpenStorage Table of contents Introduction 2 Technology overview 3 HP StoreOnce
More informationIntegrated Data Protection
Integrated Data Protection Subra Mohan Director, Product Management SnapCenter and Data Protection Solutions 1 2014 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only Agenda NetApp Data
More informationTSM Paper Replicating TSM
TSM Paper Replicating TSM (Primarily to enable faster time to recoverability using an alternative instance) Deon George, 23/02/2015 Index INDEX 2 PREFACE 3 BACKGROUND 3 OBJECTIVE 4 AVAILABLE COPY DATA
More informationTHE FOUR STEPS TO A TAPELESS BACKUP ENVIRONMENT: YOUR HOW-TO GUIDE FOR DATA MANAGEMENT SUCCESS INTRODUCTION
THE FOUR STEPS TO A TAPELESS BACKUP ENVIRONMENT: YOUR HOW-TO GUIDE FOR DATA MANAGEMENT SUCCESS WHITE PAPER CONTENTS 1 INTRODUCTION 2 ASSESSMENT 3 EVALUATION 6 IMPLEMENTATION 7 MANAGEMENT 8 CONCLUSION INTRODUCTION
More informationECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump
ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS By George Crump Economical, Storage Purpose-Built for the Emerging Data Centers Most small, growing businesses start as a collection of laptops
More informationBackup and archiving need not to create headaches new pain relievers are around
Backup and archiving need not to create headaches new pain relievers are around Frank Reichart Senior Director Product Marketing Storage Copyright 2012 FUJITSU Hot Spots in Data Protection 1 Copyright
More informationUsing Self-Protecting Storage to Lower Backup TCO
Economic Insight Paper Using Self-Protecting Storage to Lower Backup TCO A TCO comparison of NetApp s integrated data protection solution vs. a traditional backup to an external PBBA By John Webster, Sr.
More informationDAHA AKILLI BĐR DÜNYA ĐÇĐN BĐLGĐ ALTYAPILARIMIZI DEĞĐŞTĐRECEĞĐZ
Information Infrastructure Forum, Istanbul DAHA AKILLI BĐR DÜNYA ĐÇĐN BĐLGĐ ALTYAPILARIMIZI DEĞĐŞTĐRECEĞĐZ 2010 IBM Corporation Information Infrastructure Forum, Istanbul IBM XIV Veri Depolama Sistemleri
More informationVerron Martina vspecialist. Copyright 2012 EMC Corporation. All rights reserved.
Verron Martina vspecialist 1 TRANSFORMING MISSION CRITICAL APPLICATIONS 2 Application Environments Historically Physical Infrastructure Limits Application Value Challenges Different Environments Limits
More informationNetapp Exam NS0-510 NCIE-Backup & Recovery Implementation Engineer Exam Version: 7.0 [ Total Questions: 216 ]
s@lm@n Netapp Exam NS0-510 NCIE-Backup & Recovery Implementation Engineer Exam Version: 7.0 [ Total Questions: 216 ] https://certkill.com Topic break down Topic No. of Questions Topic 1: Volume A 100 Topic
More informationEMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 31 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
More informationA Centralized Data Protection Application for Cross Vendor Storage Systems Prateek Sinha & Nishi Gupta Tata Consultancy Services
A Centralized Data Protection Application for Cross Vendor Storage Systems Prateek Sinha & Nishi Gupta Tata Consultancy Services Abstract Data centers consist of Storage Products from different vendors
More informationWong Tze Chuan General Manager. Gadget Wearable Tech (M) Sdn Bhd
Wong Tze Chuan General Manager Gadget Wearable Tech (M) Sdn Bhd Business Continuity Depends on Data Recovery Businesses of all types are facing unprecedented challenges to keep more information available,
More informationWHITE PAPER: DATA PROTECTION. Veritas NetBackup for Microsoft Exchange Server Solutions Guide. Larry Cadloff February 2009
WHITE PAPER: DATA PROTECTION Veritas NetBackup for Microsoft Exchange Server Solutions Guide Larry Cadloff February 2009 Contents 1.0 GOAL OF THIS PAPER... 3 1.1 INTENDED AUDIENCE... 3 1.2 SOLUTION OVERVIEW...
More informationSimplify and Improve IMS Administration by Leveraging Your Storage System
Simplify and Improve Administration by Leveraging Your Storage System Ron Haupert Rocket Software, Inc. March 3, 2011 Session Number: 8568 Session Agenda Database and Storage Integration Overview System
More informationIBM Spectrum Protect Version Introduction to Data Protection Solutions IBM
IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information
More informationVendor: IBM. Exam Code: C Exam Name: Fundamentals of Applying Tivoli Storage Solutions V3. Version: Demo
Vendor: IBM Exam Code: C2010-564 Exam Name: Fundamentals of Applying Tivoli Storage Solutions V3 Version: Demo Topic 1, Volume A QUESTION NO: 1 Which difference is reflected in a gap analysis? A. between
More informationPROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS
>> PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS COMPUTACENTER HELPS ORGANISATIONS INCREASE THE AVAILABILITY AND INTEGRITY OF THEIR INFORMATION ASSETS WITH NEW-GENERATION DATA PROTECTION SOLUTIONS >> PROTECT
More informationData Protection. Rethinking. Michael Andrews, Director, Enterprise Data Protection, APJ HP Autonomy IM
Rethinking Data Protection Michael Andrews, Director, Enterprise Data Protection, APJ HP Autonomy IM Today s Reality: The Rules of the Game Have Changed for Data Protection EXPLOSION OF DATA DATA EVERYWHERE
More informationVirtualization with Arcserve Unified Data Protection
Virtualization with Arcserve Unified Data Protection Server and desktop virtualization have become very pervasive in most organizations, and not just in the enterprise. Everybody agrees that server virtualization
More informationMidsize Enterprise Solutions Selling Guide. Sell NetApp s midsize enterprise solutions and take your business and your customers further, faster
Midsize Enterprise Solutions Selling Guide Sell NetApp s midsize enterprise solutions and take your business and your customers further, faster Many of your midsize customers might have tried to reduce
More informationBusiness Resiliency in the Cloud: Reality or Hype?
Business Resiliency in the Cloud: Reality or Hype? Karen Jaworski Senior Director, Product Marketing EVault, a Seagate Company 8/10/2012 2012 EVault, Inc. All Rights Reserved 1 Who is EVault? Cloud-Connected
More informationBoost your data protection with NetApp + Veeam. Schahin Golshani Technical Partner Enablement Manager, MENA
Boost your data protection with NetApp + Veeam Schahin Golshani Technical Partner Enablement Manager, MENA NetApp Product Strategy Market-leading innovations, that are NetApp Confidential Limited Use 3
More informationIBM SmartCloud Resilience offers cloud-based services to support a more rapid, reliable and cost-effective enterprise-wide resiliency.
Arjan Mooldijk 27 September 2012 Choice and control developing resilient cloud strategies IBM SmartCloud Resilience offers cloud-based services to support a more rapid, reliable and cost-effective enterprise-wide
More informationMoving From Reactive to Proactive Storage Management with an On-demand Cloud Solution
Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution The Ever-Present Storage Management Conundrum In the modern IT landscape, the storage management conundrum is as familiar
More informationNext Generation Data Protection and Recovery Solution. Den Ng
Next Generation Data Protection and Recovery Solution Den Ng Agenda 1. 2. 3. Next Generation Data Protection Video TSM FastBack Overview + Value Proposition Deployment Scenario Visibility Control Automation
More informationUsing Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager
White Paper Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager Author(s): Computer Associates International and Microsoft Corporation Published September 2005 Abstract
More informationRedefine Data Protection: Next Generation Backup & Business Continuity Solutions
Redefine Data Protection: Next Generation Backup & Business Continuity Solutions 1 Creating New Next Gen Applications Existing Workloads Continue to Grow 2 How Can Data Protection Help? Lower Cost Reduce
More informationCopyright 2012 EMC Corporation. All rights reserved.
1 TRANSFORMING MICROSOFT APPLICATIONS TO THE CLOUD Louaye Rachidi Technology Consultant 2 22x Partner Of Year 19+ Gold And Silver Microsoft Competencies 2,700+ Consultants Worldwide Cooperative Support
More informationNutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure
Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.
More informationUniversity Information Technology Data Backup and Recovery Policy
University Information Technology Data Backup and Recovery Policy I. Purpose and Scope A. The purpose of this policy is to document the University of Utah Information Technology (UIT) data backup and recovery
More informationNext Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures
Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures Next 1 What we see happening today. The amount of data businesses must cope with on a daily basis is getting
More informationCombining HP StoreOnce and HP StoreEver Tape
HP Storage Summit 2013 Step into the future Converged storage for the next era of IT Combining HP StoreOnce and HP StoreEver Tape Best Practices for Data Protection and Archive Simon Watkins/ July 3rd,
More informationSymantec Backup Exec Blueprints
Symantec Backup Exec Blueprints Blueprint for D2D2T Advantages Backup & Recovery Technical Services Backup & Recovery Technical Education Services Symantec Backup Exec Blueprints - D2D2T Advantages 1 Symantec
More informationVeeam and HP: Meet your backup data protection goals
Sponsored by Veeam and HP: Meet your backup data protection goals Eric Machabert Сonsultant and virtualization expert Introduction With virtualization systems becoming mainstream in recent years, backups
More informationMaximizing Availability With Hyper-Converged Infrastructure
Maximizing Availability With Hyper-Converged Infrastructure With the right solution, organizations of any size can use hyper-convergence to help achieve their most demanding availability objectives. Here
More informationRedefine Data Protection: Next Generation Backup And Business Continuity
Redefine Data Protection: Next Generation Backup And Business Continuity 1 Business Is Being Redefined Leveraging the Power of Technology Megatrends CLOUD MOBILE SOCIAL BIG DATA 2 Creating New Next Gen
More informationMOVING TOWARDS ZERO DOWNTIME FOR WINTEL Caddy Tan 21 September Leaders Have Vision visionsolutions.com 1
MOVING TOWARDS ZERO DOWNTIME FOR WINTEL Caddy Tan 21 September 2010 Leaders Have Vision visionsolutions.com 1 MOVING TOWARDS ZERO DOWNTIME Recovery Point Objective (RPO) How much data can you afford to
More informationWelcome! IT Executive Sagamore Spirit
Welcome! IT Executive Evening @ Sagamore Spirit System Source & Nimble Storage: Nimble Storage Partner since 2011 115+ Nimble SAN installations Nimble Storage beneficial for: Server Virtualization VDI
More informationContinuous data protection. PowerVault DL Backup to Disk Appliance
Continuous data protection PowerVault DL Backup to Disk Appliance Current Situation The PowerVault DL Backup-to-Disk Appliance Powered by Symantec Backup Exec offers the industry s only fully integrated
More informationProtecting your Virtualized Server Investment
Protecting your Virtualized Server Investment Using the CA ARCserve Family of Products with Hyper-V Technology A Powerful Combination This white paper is for informational purposes only. MICROSOFT AND
More informationTransforming Data Protection with HPE: A Unified Backup and Recovery June 16, Copyright 2016 Vivit Worldwide
Transforming Data Protection with HPE: A Unified Backup and Recovery June 16, 2016 Copyright 2016 Vivit Worldwide Brought to you by Copyright 2016 Vivit Worldwide Hosted By Bob Crews President Checkpoint
More informationThe Need for a Terminology Bridge. May 2009
May 2009 Principal Author: Michael Peterson Supporting Authors: Bob Rogers Chief Strategy Advocate for the SNIA s Data Management Forum, CEO, Strategic Research Corporation and TechNexxus Chair of the
More informationEMC ACADEMIC ALLIANCE
EMC ACADEMIC ALLIANCE Preparing the next generation of IT professionals for careers in virtualized and cloud environments. Equip your students with the broad and deep knowledge required in today s complex
More informationEMC NetWorker Backup Solution for SAP HANA. Data Protection for Big Data
EMC NetWorker Backup Solution for SAP HANA Data Protection for Big Data 1 Why Is SAP HANA Important? Addresses #1 Tech Priority of CIOs Real Time Analytics & Business Intelligence (Source: Gartner) Transforms
More informationThe Data Protection Rule and Hybrid Cloud Backup
The 3-2-1 Data Protection Rule and Hybrid Cloud Backup IT teams are under extreme pressure to improve backup, disaster recovery and data protection to eliminate downtime and facilitate digital transformation.
More informationControlling Costs and Driving Agility in the Datacenter
Controlling Costs and Driving Agility in the Datacenter Optimizing Server Infrastructure with Microsoft System Center Microsoft Corporation Published: November 2007 Executive Summary To help control costs,
More informationStorage Management for a New Economy
The Storage Networking Industry Association Storage Management for a New Economy Roger Reich The SNIA Board of Directors The DTMF Board of Directors Senior Technical Director, VERITAS Software Roger.Reich@VERITAS.com
More informationHyper-converged Secondary Storage for Backup with Deduplication Q & A. The impact of data deduplication on the backup process
Hyper-converged Secondary Storage for Backup with Deduplication Q & A The impact of data deduplication on the backup process Table of Contents Introduction... 3 What is data deduplication?... 3 Is all
More informationArcserve Solutions for Amazon Web Services (AWS)
Arcserve Solutions for Amazon Web Services (AWS) Introduction The public cloud has become a major factor in all IT decision making due to its endless supply of technical resources at an affordable cost.
More informationHow to solve your backup problems with HP StoreOnce
How to solve your backup problems with HP StoreOnce Andrew Dickerson Senior Manager Backup, Recovery and Archive June 25, 2014 Time is running out for legacy storage Cloud Volume 2005 2010 2012 2015 50X
More information