Data Protection and Management

 

Material on this page is intended solely for the purpose of content review by SNIA members. Tutorial material may be read and commented upon by any SNIA member, but may not be saved, printed, or otherwise copied, nor may it be shared with non-members of the SNIA. Tutorial managers are responsible for responding to all comments made during the open review period. No responses will be given to comments made outside the open review period.

Jump straight to an abstract:

The Abstracts

Advanced Data Reduction Concepts
Thomas Rivera
Download

The two most prevalent forms of data reduction, compression and deduplication, have become widespread in many types and tiers of data storage.  This tutorial assumes a basic understanding of compression and deduplication and covers advanced topics that attendees will find helpful in understanding today’s expanded applications of these as well as other data reduction technologies.

Learning Objectives

  • Have a clear understanding of current data reduction design  trends. 
  • Have the ability to discern between various deduplication design approaches and strengths. 
  • Recognize where compression and/or deduplication may and may not fit in their storage environment.

The Changing Role of Data Protection in a Virtualized World
Gene Nagle
Thomas Rivera

Download

Backup administrators who have grown accustomed to traditional batch-oriented backup using a single local system are seeing their world change very quickly these days.  Virtualized data centers with cloud computing and resilient, self-healing local and cloud storage combined with existing in-house systems are demanding completely new strategies for data protection.  And even the functions and responsibilities of data protection administrators are changing at a fast pace.    This tutorial presents the rapid changes and challenges in data protection brought about by storage, both local and cloud, that combines protection such as "time machines" (snapshots and versioning) with primary and secondary repositories.  Following from those changes, the discussion will include methods being used by backup administrators as both temporary and long-term solutions to cope with these changes and to maximize their potential benefits.

Learning Objectives

  • Understand the differences between data protection in traditional environments versus in virtualized environments. 
  • Consider multiple examples of data protection challenges in environments where virtualization and cloud-based storage and computing are increasingly used. 
  • Come away with some useful best practices for coping with the challenges brought on by new responsibilities and functions in data protection.