Technology Communities |
Data Protection and ManagementJump straight to an abstract:
The Abstracts
Introduction to Data Protection: Backup to Tape, Disk and Beyond
Extending the enterprise backup paradigm with disk-based technologies allow users to significantly shrink or eliminate the backup time window. This tutorial focuses on various methodologies that can deliver an efficient and cost effective disk-to-disk-to-tape (D2D2T) solution. This includes approaches to storage pooling inside of modern backup applications, using disk and file systems within these pools, as well as how and when to utilize deduplication and virtual tape libraries (VTL) within these infrastructures.
Trends in Data Protection and Restoration Technologies
Many disk technologies both old and new are being used to augment tried and true backup and data protection methodologies to deliver better information and application restoration performance. These technologies work in parallel with the existing backup paradigm. This session will discuss many of these technologies in detail. Important considerations of data protection include performance, scale, regulatory compliance, recovery objectives and cost. Technologies include contemporary backup, disk based backups, snapshots, continuous data protection and capacity optimized storage. Detail of these technologies interoperate will be provided as well as best practices recommendations for deployment in today's heterogeneous data centers.
Understanding Data Deduplication
Data deduplication is a space saving technology that is being used to dramatically improve storage efficiency in the datacenter. This technical session will address the question of what data deduplication is, how it is performed, and the architectural choices available today. The topics covered include source and target deduplication, inline and post-processing, fixed length and variable length segmentation, as well as the availability and integrity of deduplicated data, and the complementary use of replication and removable media. It will also explore the factors affecting space reduction ratios relative to specific deduplication techniques.
In the Face of Litigation: Best Practices for Retention, Discovery and Deletion Learning Objectives
Retaining Information for 100 Years Learning Objectives
The Business Case for Database Information Management Databases are the life blood of any organization, but too much data can slow application and reporting performance and tax IT resources. Leveraging database archiving to actively manage the growth of application data is key to managing data for its value, cost and risk to the organization.
A Crash Course in Wide Area Data Replication Replicating data over a WAN sounds pretty straight-forward, but it turns out that there are literally dozens of different approaches, each with its own pros and cons. Which approach is the best? Well, that depends on a wide variety of factors! This tutorial is a fast-paced crash course in the various ways in which data can be replicated and the pros and cons of each major approach. We trace the data path from applications to disk drives and examine all of the points along the way wherein replication logic can be inserted. We look at host based replication (application, database, file system, volume level, and hybrids), SAN replication (disk arrays, virtualization appliances, caching appliances, and storage switches), and backup system replication (block level incremental backup, CDP, and de-duplication). Learning Objectives
|
LoginFeatured Events
|

