Data Management


Jump straight to an abstract:

The Abstracts

Information Classification: The Cornerstone to Information Management

Sheila Childs Download

Without a clear understanding of all the information under management in your environment, it is impossible to get a handle on information growth, compliance-related risk mitigation and information management costs. The practice of information classification is the cornerstone and fundamental to any ILM strategy. Information classification requires that I.T. administrators work with Line-of-Business and knowledge workers to gain an understanding of the data to be managed.

  • This session will explore the different types of classification methodologies and techniques that are available today. Differentiation between file system metadata-based classification and content/context-based classification will be identified.
  • Manual versus automated classification procedures (including taxonomy development, along with the pros and cons of each approach to implementation will be discussed.

     

  • In addition, the difference between indexing and classification, and where each approach makes sense will be explored.

Disk and Tape Backup Mechanisms

Michael Fishman Download

Extending the enterprise backup paradigm with disk-based technologies allow users to significantly shrink or eliminate the backup time window. This tutorial focuses on various methodologies that can deliver an efficient and cost effective disk-to-disk-to-tape (D2D2T) solution. This includes approaches to storage pooling inside of modern backup applications, using disk and file systems within these pools, as well as how and when to utilize virtual tape libraries (VTL) within these infrastructures.

Learning Objectives

  • Get a basic grounding in backup and restore technology including tape, disk, virtual tape and replication technologies.
  • Compare and contrast backup and restore alternatives to achieve data protection and data recovery.
  • Identify and define backup and restore operations and terms.

Disk-based Restoration Technologies

Michael Rowan Download

 

Many disk technologies, both old and new, are being used to augment tried and true backup methodologies to deliver better information and application restoration performance. These technologies work in parallel to the existing backup paradigm, either synergistically or completely orthogonally. This session will discuss many of these technologies in detail, including snapshots, full-copy snapshots (mirror-splits), differential snapshots, and small aperture snapshots (SAS), as well as continuous data protection (CDP) in its various forms. Detail about how these technologies operate will be provided as well as best practices recommendations for deployment in today's heterogeneous data centers.

Learning Objectives

  • Understand legacy and contemporary storage technologies that provide advanced data protection
  • Compare and contrast advanced data protection alternatives.
  • Gain insights into emerging DP technologies.

ILM: Tiered services and the Need for Classification

Edgar St.Pierre Download

Establishing an ILM strategy is a high priority for many organizations as they struggle to deal with data growth and regulatory compliance. The definition of tiered services is an important part of that ILM strategy. Two keys to a successful tiered service implementation are:

  • Resource classification - organizing your storage-related services into tiers that will meet the requirements of your business
  • Data Classification - if you don't know what you have or how valuable it is, it's very hard to decide what data should be placed on a particular service tier.

In this tutorial we will look at how to think about organizing your storage-related service tiers based on your needs, and at data classification techniques and emerging technologies that can help you manage the placement of data across different tiers of service, or the movement of data across storage within the same service tier.

Identifying and Eliminating Backup System Bottlenecks: Taking Your Existing Backup

Michael Fishman Download

This tutorial reveals the obvious and not-so-obvious bottlenecks found in enterprise backup systems and offers practical examples for applying the technologies described in the other Data Protection tutorials to achieve one's performance objectives. The goal of this session is to illustrate how one can take an existing backup system to the next level by integrating cutting edge technologies and low-cost disk. We start with the assumption that the end user has made a sizable investment in his/her enterprise backup system and is looking for a road map for affordable growth in both performance and capacity. We also assume that tape is here to stay (at least for now) and that the ultimate goal is to get data onto tape for off-site removal. Topics include accelerating LAN-based backups, achieving maximum performance from tape, disk staging with ordinary disk, capacity optimized backup devices (de-duplication), block-level differencing, removable disk media, and virtual tape. The take home message is that you cannot simply buy your way out of backup system headaches, you must design your way out.

Solving the Coming Archive Crisis

Michael Peterson Download

The volume of digital information being kept online for long term is overwhelming and leading to a crisis of cost and complexity. New methods and practices are required to deal with the avalanche. This presentation will discuss the following:

  • Best practices for long term digital information retention based on the work of the 100 Year Archive Task Force
  • New technologies you can deploy that will help such as de-duplication and CAS
  • Future technologies and solutions that we can expect.

The Secret Sauce of ILM - The Professional ILM Assessment

LeRoy Budnik Download

Professional Services and internal consulting figure prominently in the success of successful ILM transformations. Yet, in the midst of success, there can be the sense of hitting the ceiling, a limit, or a barrier that you cannot pass. A time-based path allows you to remove these barriers. The path negotiates requirements, capabilities, practices, and maturity. This is the core of the ILM consultative assessment process. It is a blend of techno/business skill, architect-client relations and selecting the appropriate methodology. In this session, we focus on the Core of ILM consultative process: the measurement of maturity vs. information disciplines. This core is the foundation of most assessment methodologies. Then we consider the assessment strategies that work best at various entry points of maturity. As a customer, when you understand both the process and strategy, you can choose the best strategy for your company today. However, because ILM is a way of life, you will choose a different strategy tomorrow. This is the secret sauce of a successful ILM recipe.

Learning Objectives

  • Understand the relationship of maturity to information disciplines. Identify key disciplines and their execution in the infrastructure. Determine most effective ILM assessment strategy
  • Understand the relationship of maturity to information disciplines
  • Identify key disciplines and their execution in the infrastructure
  • Determine most effective ILM assessment strategy

Archives, Backups and NAS the Open Archive

Andres Rodriguez Download

As technology has advanced it is now possible to maintain all records online that has helped increasingly blur the line between archives, backups, and the first copy of a record stored. All of these are generally cases of fixed content -- content that, once written, does not change -- but these different storage concepts have very different use cases. For example, backup copies are traditionally not intended for access except in very rare circumstances. This presentation will discuss the traditional differences between differing uses of fixed content, the storage technologies that are commonly used, and how new online fixed content storage can change the status quo of these usage models.

Trends in Data Protection - CDP and VTL

Jason Iehl and Agnes Lamont Download

Data protection is evolving beyond traditional backup, snapshots and replication. CDP and VTL are rapidly emerging as key data protection technologies. This session will provide an overview of Continuous Data Protection (CDP) and Virtual Tape Libraries (VTL). This tutorial will examine how CDP and VTL address common data protection concerns, including backup windows and data recovery. The session will provide clarity on what CDP and VTL are and are not and what can realistically be achieved with these technologies. It will offer practical guidance on how CDP and VTL technologies can be introduced into the IT environment in a way that minimizes disruption and simplifies ongoing management, thereby reducing complexity and costs.

Learning Objectives

  • Develop data protection strategies that meet the needs of today's data centers
  • Understand what CDP and VTL are, including capabilities and limitations.
  • Understand the impact of VTL and CDP on data protection strategies

Archiving and Compliance Infrastructure

Gary Zasman Download

The tutorial provides a view into the compelling events driving the implementation of archiving and compliance. It looks at the role of process in compliance, and introduces the concept and details of compliance archiving infrastructures.

Learning Objective

The major learning objective is to develop an understanding of the broad landscape of compliance and archiving factors. This includes, understanding the business motivations for compliance, Understanding a compliance infrastructure

Single Instance Strategies to Storage

Michael Fahey Download

Single Instance Storage (duplicate elimination) has become a very popular topic in the industry because of the potentially large reduction in cost and increase in efficiency it offers. Various technologies are being promoted for different tasks including backup, archiving, and transactional storage. Each of these storage uses represents a unique set of challenges and the single instancing technology being implemented has major implications for scale, performance, and functionality. Single Instance Storage also has long term legal and compliance implications for records management. This session will review various technologies available including object level de-duplication, fixed block de-duplication, and variable length block de-duplication and the implications of each for backup, archive, and transactional storage.

Learning Objectives

  • Various Single Instance Storage strategies including object level de-duplication, fixed block de-duplication, and variable block de-duplication.
  • Where these technologies are being implemented today in backup, archive, and transactional storage.
  • Identifying risks and benefits for employing Single Instance Storage today

Records Managers and Storage Managers Speak: Get the Real Story Behind ILM

Moderator: John WebsterPanelists: Marty LeFebvre, Wendy Betts, Alex Fazekas-Paul, Paula Johnson Document not posted for download

Come get the real story behind ILM, and solve the mystery of records managers. What do they do? How can they help storage managers and engineers? This session features a panel of records managers from ARMA and storage managers from the SNIA End User Council. They'll discuss the differences of between their roles, offer their perspective on issues like Sarbanes-Oxley and HIPAA, take your questions, and show how, together, you can help address company business problems.

Social and MultiMedia


Videos

Webcasts

Blog

Podcasts

        SNIA on Facebook   SNIA on Twitter   SNIA on LinkedIn

Login




Forgot your password? Is your company a member?
Get your login here!
Nonmembers join here

Featured Events

View more SNIA Events>