Data Protection and Management

Jump straight to an abstract:

The Abstracts

Introduction to Data Protection:  Backup to Tape, Disk and Beyond
Jason Iehl

Extending the enterprise backup paradigm with disk-based technologies allow users to significantly shrink or eliminate the backup time window.  This tutorial focuses on various methodologies that can deliver an efficient and cost effective disk-to-disk-to-tape (D2D2T) solution.  This includes approaches to storage pooling inside of modern backup applications, using disk and file systems within these pools, as well as how and when to utilize deduplication and virtual tape libraries (VTL) within these infrastructures.

Learning Objectives

  • Identify and define backup and restore operations and terms
  • Compare and contrast backup and restore alternatives to achieve data protection and data recovery.
  • Get a basic grounding in backup and restore technology including tape, disk, deduplication, virtual tape and replication technologies.

Trends in Data Protection and Restoration Technologies
Michael Fishman

Many disk technologies both old and new are being used to augment tried and true backup and data protection methodologies to deliver better information and application restoration performance.  These technologies work in parallel with the existing backup paradigm.  This session will discuss many of these technologies in detail. Important considerations of data protection include performance, scale, regulatory compliance, recovery objectives and cost. Technologies include contemporary backup, disk based backups, snapshots, continuous data protection and capacity optimized storage.   Detail of these technologies interoperate will be provided as well as best practices recommendations for deployment in today's heterogeneous data centers.

Learning Objectives

  • Understand legacy and contemporary storage technologies that provide advanced data protection
  • Compare and contrast advanced data protection alternatives
  • Gain insights into emerging DP technologies

Understanding Data Deduplication
Daniel Budiansky
Larry Freeman


Data deduplication is a space saving technology that is being used to dramatically improve storage efficiency in the datacenter.  This technical session will address the question of what data deduplication is, how it is performed, and the architectural choices available today. The topics covered include source and target deduplication, inline and post-processing, fixed length and variable length segmentation, as well as the availability and integrity of deduplicated data, and the complementary use of replication and removable media.  It will also explore the factors affecting space reduction ratios relative to specific deduplication techniques.

Learning Objectives

  • Understand the differences between various deduplication methodologies
  • Identify the impact of data deduplication on replication and the use of removable media
  • Correlate data deduplication to the space reduction effects that are achieved

In the Face of Litigation:  Best Practices for Retention, Discovery and Deletion
Michael Peterson

The new amendments to the Federal Rules of Civil Procedures, FRCP, have changed the face of the business risk of retaining information in an uncontrolled manner. eDiscovery requirements to produce legally and forensically authentic information impact IT and storage operations in ways you may have never considered. This presentation discusses the risks of long-term retention and deletion in the face of the many challenges catalyzed by the new amendments to the FRCP. It will update you on current requirements and best practices and how they affect the management of your storage resources and information assets.

Learning Objectives

  • How does FRCP affect your organization and its storage practices
  • What are appropriate best practices for retention and deletion considering FRCP
  • How work underway within SNIA will help

Retaining Information for 100 Years
Mary Baker
Roger Cummings


Many organizations now have a requirement to preserve large volumes of digital content indefinitely into the future, and to maintain access for reasons such as medical treatment decisions, retention of intellectual property, and appreciation of cultural and scientific history. Frequent news stories cover organizations' failures to be able to do this, such as the near loss of original video/data of the first moon landing, eventually recovered from a set of 14-inch tape reels found in a dusty Australian basement.    This session will focus on the most important questions in long-term digital preservation and will demonstrate why it is still so difficult. We will propose how the storage industry can help its customers preserve and use their digital content over the lifetimes that they expect from past experience with physical and analog assets, lifetimes that can greatly exceed those of any single digital storage device or storage technology.

Learning Objectives

  • Understand the threats to long-term digital content and how these threats differ from those associated with analog content and short-term digital assets.
  • Identify current Best Practices, developed within SNIA and other organizations, for addressing these threats.
  • List some of the unsolved problems in long-term digital preservation and identify opportunities for further progress.

The Business Case for Database Information Management
Gary Zasman
Julie Lockner


Databases are the life blood of any organization, but too much data can slow application and reporting performance and tax IT resources. Leveraging database archiving to actively manage the growth of application data is key to managing data for its value, cost and risk to the organization.

  • Learning Objectives
  • Introduction to DB Archiving
  • Infrastructure and Architecture Considerations
  • How to get started

A Crash Course in Wide Area Data Replication
Jacob Farmer

Replicating data over a WAN sounds pretty straight-forward, but it turns out that there are literally dozens of different approaches, each with its own pros and cons.  Which approach is the best?  Well, that depends on a wide variety of factors! This tutorial is a fast-paced crash course in the various ways in which data can be replicated and the pros and cons of each major approach.  We trace the data path from applications to disk drives and examine all of the points along the way wherein replication logic can be inserted.  We look at host based replication (application, database, file system, volume level, and hybrids), SAN replication (disk arrays, virtualization appliances, caching appliances, and storage switches), and backup system replication (block level incremental backup, CDP, and de-duplication).

Learning Objectives

  • Attendees will learn about different ways to replicate data and how to match business needs to replication technology.
  • Attendees will get a good overview of the terminology of data replication as well as most of the key concepts.
  • Attendees will learn how other storage technologies such as snapshots, backups, SAN storage, and application-failover can integrate with replication solutions