Data Protection and Management


Material on this page is intended solely for the purpose of content review by SNIA members. Tutorial material may be read and commented upon by any SNIA member, but may not be saved, printed, or otherwise copied, nor may it be shared with non-members of the SNIA. Tutorial managers are responsible for responding to all comments made during the open review period. No responses will be given to comments made outside the open review period.

Jump straight to an abstract:

The Abstracts

Introduction to Data Protection:  Backup to Tape, Disk and Beyond
Michael Fishman
Download

Extending the enterprise backup paradigm with disk-based technologies allow users to significantly shrink or eliminate the backup time window.  This tutorial focuses on various methodologies that can deliver an efficient and cost effective disk-to-disk-to-tape (D2D2T) solution.  This includes approaches to storage pooling inside of modern backup applications, using disk and file systems within these pools, as well as how and when to utilize virtual tape libraries (VTL) within these infrastructures.

Learning Objectives:

  • Get a basic grounding in backup and restore technology including tape, disk, virtual tape and replication technologies
  • Compare and contrast backup and restore alternatives to achieve data protection and data recovery
  • Identify and define backup and restore operations and terms.

Trends in Data Protection and Restoration Technologies
Jason Iehl and Michael Rowan
Download

Many disk technologies, both old and new, are being used to augment tried and true backup methodologies to deliver better information and application restoration performance.  These technologies work in parallel to the existing backup paradigm, either synergistically or completely orthogonally.  This session will discuss many of these technologies in detail, including snapshots, full-copy snapshots (mirror-splits), small aperture snapshots (SAS), Virtual Tape Libraries (VTL), as well as continuous data protection (CDP) in its various forms. Detail about how these technologies operate will be provided as well as best practices recommendations for deployment in today's heterogeneous data centers.

Learning Objectives:

  • Understand legacy and contemporary storage technologies that provide advanced data protection
  • Compare and contrast advanced data protection alternatives
  • Gain insights into emerging DP technologies

Deduplication - Methods for Achieving data Efficiency
Matthew Brisse and Gideon Senderov
Download

Deduplication has become a very popular topic in the industry because of the potentially large reduction in cost and increase in efficiency it offers.  Deduplication technologies are being promoted at various points within the storage network including source deduplication, deduplication of data in transit, and deduplication at the storage destination.  Deduplication technologies are also being promoted in all tiers: backup, archiving, and primary storage.  Each of these storage use cases represents a unique set of challenges. Implementing any deduplication technology has major implications for scale, performance, and functionality.  Deduplication also has long term legal and compliance implications for records management.  This session will review various deduplication technologies available and the implications of each.

Learning Objectives

  • Understand the differences between various deduplication strategies
  • Learn where, when, and how to utilize deduplication to boost storage efficiency in one’s own environment
  • Understand the beneficial effects of implementing these technologies

How NAS Systems Participate in Data Protection
Paul Massiglia
Download

Network Attached Storage (NAS) systems are able to use their awareness of file structures to take a more proactive part in protecting data against faults and disasters than is possible with disk arrays. This session will survey common techniques for protecting data against hardware and software failures, accidental or deliberate corruption, and disasters that incapacitate entire data centers, and show how NAS systems are able to participate actively in all forms of protection. Backup, snapshots, continuous and periodic replication, and continuous data protection will be discussed. For each technique, the threats it covers, the costs of using it, and expected recovery times and recovery points will be pointed out. The goal of the session is to give students an appreciation for the high availability and disaster protection options available for data stored in NAS systems, to better equip them to make informed decisions when purchasing equipment or defining operating procedures.

Learning Objectives

  • Explain how NAS systems are able to take a more proactive part in protecting data against component, system, and data center failures
  • Improve students' ability to select and implement NAS-based data protection solutions appropriate to business value of data assets

A Crash Course in Wide Area Data Replication
Jacob Farmer
Download

Replicating data over a WAN sounds pretty straight forward, but it turns out that there are literally dozens of different approaches, each with it's own pros and cons.  Which approach is the best?  Well, that depends on a wide variety of factors! This tutorial is a fast-paced crash course in the various ways in which data can be replicated and the pros and cons of each major approach.  We trace the data path from applications to disk drives and examine all of the points along the way wherein replication logic can be inserted.  We look at host based replication (application, database, file system, volume level, and hybrids), SAN replication (disk arrays, virtualization appliances, caching appliances, and storage switches), and backup system replication (block level incremental backup, CDP, and de-duplication).

Learning Objectives

  • Attendees will learn about different ways to replicate data and how to match business needs to replication technology.
  • Attendees will get a good overview of the terminology of data replication as well as most of the key concepts.
  • Attendees will learn how other storage technologies such as snapshots, backups, SAN storage, and application-failover can integrate with replication solutions.

Records Managers and Storage Managers Speak:  Get the Real Story Behind ILM
Moderator: John Webster. Panelists:  Colette Bliobenes, Brenda Patterson, Laurence Whittaker, Jackson Shea
Download

This session features a panel of records managers from ARMA and storage managers from the SNIA End User Council. They discuss the differences of between their roles, offer their perspective on issues like Sarbanes-Oxley and eDiscovery, take questions, and show how, together, both groups can improve the digital records management process.Comments from last session (Spring 2008):“Could have gone on longer.”“Excellent panel.Do more like these.”“Need to have this again!Excellent!”“This was great - I hadn't thought to engage RIM on these subjects, but will now!”

Learning Objectives

  • For storage administrators: Understand the role of Records Managers in an organization
  • Gain insight into the need to better understand records management processes from the perspective of records management professionals
  • Learn how to approach and start a dialog with records management professionals

Classification: The Cornerstone for Compliance and Cost-driven Information Management
Edgar St.Pierre
Download

Without a clear understanding of all the information under management in your environment, it is impossible to get a handle on information growth, compliance-related risk mitigation and information management costs.The practice of information classification is fundamental to an effective information-centric ILM strategy.Information classification requires that I.T. administrators work with Line-of-Business and knowledge workers to gain an understanding of the data to be managed.Once a clear set of goals and policies are established you can efficiently organize your information into tiers of service that will meet the performance, protection, and compliance requirements of your business.

Learning Objective

 

  • This session will explore the different types of classification methodologies and techniques used to drive data placement and service delivery today, and how that relates to the delivery of a multi-tiered service catalog.
  •  

    Retaining Information for 100 Years
    Mary Baker and Roger Cummings
    Download
    Many organizations now have a requirement to preserve large volumes of digital content indefinitely into the future, and to maintain access to that content for medical treatment decisions, e-discovery, appreciation ofcultural and scientific history etc. Frequent news stories cover organizations' failure to be able to do this, such as the near loss of original video and data of the first Moon landing, eventually recovered from a set of 14-inch tape reels found in dusty Australian basement.This session will focus on the most important questions in long-term digital preservation, and understand why it is still so difficult. Suggestions will be made as to how the storage industry can allow its customers to keep and make use of their digital content over the lifetimes that they expect from past experience with physical and analog assets, lifetimes that can greatly exceed those of any single digital storage device or storage technology.

    Learning Objectives

    • Recognize the growing need in the storage industry to address long-term (> 15 years) digital preservation solutions, and why optimal solutions must be defined for different levels of available time, money and effort.
    • Understand the threats to long-term digital content and how these threats differ from those associated with analog content and short-term digital assets.
    • Identify current Best Practices, developed within SNIA and other in organizations, for addressing these threats. List some of the unsolved problems in long-term digital preservation and identify opportunities for further progress.

    Compliant Storage: The Risks of Retention and Deletion in the Face of FRCP
    Michael Peterson
    Download

    The new amendments to the Federal Rules of Civil Procedures, FRCP, have changed the face of the business risk of retaining information in an uncontrolled manner. eDiscovery requirements to produce legally and forensically authentic information impact IT and storage operations in ways you may have never considered. This presentation will update you on current requirements and best practices and how they affect the management of your storage resources and information assets.

    Learning Objectives

    • How does FRCP affect your organization and its storage practices
    • What are key best practices for retention and deletion considering FRCP
    • How work underway within SNIA will help

    The Secret Sauce of ILM
    Bob Rogers
    Download

    Professional Services and internal consulting figure prominently in the success of ILM transformations. Yet, few storage professionals have the blend of techno/business skill, architect-client relations and skills at selecting the appropriate methodology.

    Learning Objectives

    • Identify key ILM disciplines and process in the context of their execution in the infrastructure
    • Determine the most effective ILM assessment strategy for a given scenario
    • Understand relationship of maturity to information disciplines

    Social and MultiMedia


    Videos

    Webcasts

    Blog

    Podcasts

            SNIA on Facebook   SNIA on Twitter   SNIA on LinkedIn

    Login




    Forgot your password? Is your company a member?
    Get your login here!
    Nonmembers join here

    Featured Events

    View more SNIA Events>