Data Management


Material on this page is intended solely for the purpose of content review by SNIA members. Tutorial material may be read and commented upon by any SNIA member, but may not be saved, printed, or otherwise copied, nor may it be shared with non-members of the SNIA. Tutorial managers are responsible for responding to all comments made during the open review period. No responses will be given to comments made outside the open review period.

Jump straight to an abstract:

The Abstracts

Introduction to Data Protection:  Backup to Tape, Disk and Beyond

Jason Iehl Download

Extending the enterprise backup paradigm with disk-based technologies allow users to significantly shrink or eliminate the backup time window.  This tutorial focuses on various methodologies that can deliver an efficient and cost effective disk-to-disk-to-tape (D2D2T) solution.  This includes approaches to storage pooling inside of modern backup applications, using disk and file systems within these pools, as well as how and when to utilize virtual tape libraries (VTL) within these infrastructures.  Learning Objectives:

Learning Objectives:

  1. Get a basic grounding in backup and restore technology including tape, disk, virtual tape and replcation technologies
  2. Compare and contrast backup and restore alternatives to achieve data protection and data recovery,
  3. Identify and define backup and restore operations and terms.

Trends in Data Protection and Restoration Technologies

Michael Rowan Download

Many disk based data protection technologies, both old and new, are being used to augment tried and true backup methodologies to deliver better information and application restoration performance.  These technologies work in parallel to the existing backup paradigm, either synergistically or completely orthogonally.    This session will discuss many of these technologies in detail, including snapshots, full-copy snapshots (mirror-splits), differential snapshots, and small aperture snapshots (SAS), backup to disk, deduplication, virtual tape libraries (VTL), as well as continuous data protection (CDP) in its various forms.  Detail about how these technologies operate will be provided as well as best practices recommendations for deployment in today's heterogeneous data centers.  

Learning Objectives:

  1. Understand legacy and contemporary storage technologies that provide advanced data protection
  2. Compare and contrast advanced data protection alternatives,
  3. Gain insights into emerging DP technologies.

Identifying and Eliminating Backup System Bottlenecks:  Taking Your Existing Backup System to the Next Level

Jacob Farmer Download

Identifying and Eliminating Backup System Bottlenecks: Taking Your Existing Tape Backup System to the Next Level -- This tutorial reveals the obvious and not-so-obvious bottlenecks found in enterprise backup systems and offers practical examples for applying the technologies described in the Data Protection tutorials to achieve one's performance objectives.  The goal of this session is to illustrate how one can take an existing backup system to the next level by integrating a combination of modern backup techniques and low-cost disk.  We start with the assumption that the end user has made a sizable investment in his/her enterprise backup system and is looking for a road map for affordable growth in both performance and capacity.  We also assume that tape is here to stay (at least for now) and that the ultimate goal is to get data on tape for off-site removal.  Topics include balancing the use of the LAN and SAN for backup traffic, ILM helping or hindering, achieving maximum performance from tape, disk staging with ordinary disk, de-duplication, block-level differencing, and virtual tape.  The take home message is that you cannot simply buy your way out of backup system headaches, you must design your way out. 

Learning Objectives:

  1. To understand the underlying challenges to building a scalable backup system. Once you undersdtand the root causes of poor backup performance, you have the means to set realistic goals and achieve them.
  2. To understand the various ways in which disk can be integrated into an existing backup system to deliver superior performance and reliability.  A little disk can go a long way.
  3. To be able to compare and contrast the major architectural paradigms in enterprise backup and recovery.

Deduplication Methods for Achieving Data Efficiency

Devin Hamilton Download

Deduplication has become a very popular topic in the industry because of the potentially large reduction in cost and increase in efficiency it offers.  Deduplication technologies are being promoted at various points within the storage network including source deduplication, deduplication of data in transit, and deduplication at the storage destination.  Deduplication technologies are also being promoted in all tiers: backup, archiving, and primary storage.  Each of these storage use cases represents a unique set of challenges. Implementing any deduplication technology has major implications for scale, performance, and functionality.  Deduplication also has long term legal and compliance implications for records management.  This session will review various deduplication technologies available and the implications of each.

Best Practices for Long-term Retention of Digital Information

Michael Peterson and Gary Zasman Download

Compliance, legal, business, discovery, and security risk have changed the value and risk of owning and administrating information within the datacenter. Old approaches to   retaining, preserving, and disposing of information in multiple isolated and 'siloed'   'electronic archives' no longer meet today's requirements for reduced operating costs, scale,   and high efficiencies. This presentation highlights new work being spearheaded by the SNIA's   Data Management Forum to produce a reference architecture for best practices in long-term digital information retention based on information-lifecycle-management methods. 

Learning Objective:
Learn the requirements for long-term retention from the 100-Year archive requirements Study.

Records Managers and Storage Managers Speak:  Get the Real Story Behind ILM

Moderator: John Webster.  Panelists:  Jenny Jolinski, Wendy Betts, Lynn P. Herbert, Marty LeFebvre Download

This session features a panel of records managers from ARMA and storage managers from the SNIA End User Council. They'll discuss the differences of between their roles, offer their perspective on issues like Sarbanes-Oxley and HIPAA, take your questions, and show how, together, you can help address company business problems. 

Learning Objectives:

  1. Understanding the roles and responsibilities of records managers.
  2. Understanding the roles and responsibilities of IT managers as they work with records and records managers.

The Secret Sauce of ILM

Bob Rogers Download

Does Information Lifecycle Management (ILM) seem large and fuzzy with the promise of lots of work for little return?  It may be a bunch of work, but the little return part is a fallacy that has been disproven in many large data centers.  This session will focus on how you can "kick butt" with ILM, achieve expectations from your project, set reasonable objectives, and get cooperation and assistance along the way.    Sound too good to be true?  This session was developed by SNIA's Professional Services ILM Task Group.  There are plenty of "real-life" examples that have been gathered from among your peers. 

Learning Objectives:

  1. Setting goals and expectations for an ILM project
  2. How to get cooperation from your peers and funding from your management.
  3. How to design a service catalog for information assets.

Classification:  The Cornerstone for Compliance and Cost-driven Information Management

Edgar St.Pierre and Sheila Childs  Download

Without a clear understanding of all the information under management in your environment, it is impossible to get a handle on information growth, compliance-related risk mitigation and information management costs.  The practice of information classification is fundamental to an effective information-centric ILM strategy.  Information classification requires that I.T. administrators work with Line-of-Business and knowledge workers to gain an understanding of the data to be managed.  Once a clear set of goals and policies are established you can efficiently organize your information into tiers of service that will meet the performance, protection, and compliance requirements of your business.

Learning Objective:
This session will explore the different types of classification methodologies and techniques used to drive data placement and service delivery today, and how that relates to the delivery of a multi-tiered service catalog.

Storage Considerations for Database Archiving

Julie Lockner

Download

The concept of maintaining a long-term archive is not new, but application data introduces many new challenges. According to the SNIA Archive Task Force 100 Year Archive Requirements Survey, over 81% of respondents feel database data is the most at risk. Database data is vulnerable to loss due to the decay and obsolescence of the media on which it is stored, and becomes inaccessible and unreadable when software needed to interpret it becomes obsolete and is lost. The way in which you might implement ILM or tiered storage is different when applied to application data. This tutorial will discuss archiving strategies and long term implications of how database data should be stored and accessed. 

Learning Objectives:

  1. Attendees will be provided with an overview of the options and common practices for tiering database data and the types of media that should be used based on the information being stored.
  2. Attendees will get an in-depth understand of archiving in the context of ERP applications. Participants will be provided with an overview of the standard archiving functions available in ERP applications and other database archiving technologies available in the marketplace.
  3. Finally, Lockner will discuss other architectural considerations when deploying database archiving and how it impacts other IT functions such as backup and recovery.

Social and MultiMedia


Videos

Webcasts

Blog

Podcasts

        SNIA on Facebook   SNIA on Twitter   SNIA on LinkedIn

Login




Forgot your password? Is your company a member?
Get your login here!
Nonmembers join here

Featured Events

View more SNIA Events>