Presentations and Tutorials


 


DPCO Presentations and Tutorials Date

 

Deduplication's Role in Disaster Recovery

 

Spring 2011
Advanced Deduplication Concepts

 

Fall 2010
Deduplication's Role in Disaster Recovery

 

Fall 2010
Understanding Data Deduplication

 

Spring 2010
Introduction to Data Protection: Backup to Tape, Disk and Beyond

 

Spring 2010
Deduplication's Role in Disaster Recovery

 

Spring 2010
The Business Value of Data Deduplication

 

Fall 2009
SNIA Tutorial - Understanding Data Deduplication

 

Spring 2009
All SNIA Tutorials from Spring 2009

 

Spring 2009
Introduction to Data Protection:  Backup to Tape, Disk and Beyond
Extending the enterprise backup paradigm with disk-based technologies allow users to significantly shrink or eliminate the backup time window.  This tutorial focuses on various methodologies that can deliver an efficient and cost effective disk-to-disk-to-tape (D2D2T) solution.  This includes approaches to storage pooling inside of modern backup applications, using disk and file systems within these pools, as well as how and when to utilize virtual tape libraries (VTL) within these infrastructures.

 

Fall 2008
Trends in Data Protection and Restoration Technologies
Many disk technologies, both old and new, are being used to augment tried and true backup methodologies to deliver better information and application restoration performance. These technologies work in parallel to the existing backup paradigm, either synergistically or completely orthogonally. This session will discuss many of these technologies in detail, including snapshots, full-copy snapshots (mirror-splits), small aperture snapshots (SAS), Virtual Tape Libraries (VTL), as well as continuous data protection (CDP) in its various forms. Detail about how these technologies operate will be provided as well as best practices recommendations for deployment in today's heterogeneous data centers.

 

Fall 2008
Deduplication Methods for Achieving Data Efficiency
Deduplication has become a very popular topic in the industry because of the potentially large reduction in cost and increase in efficiency it offers.  Deduplication technologies are being promoted at various points within the storage network including source deduplication, deduplication of data in transit, and deduplication at the storage destination.  Deduplication technologies are also being promoted in all tiers: backup, archiving, and primary storage.  Each of these storage use cases represents a unique set of challenges. Implementing any deduplication technology has major implications for scale, performance, and functionality.  Deduplication also has long term legal and compliance implications for records management.  This session will review various deduplication technologies available and the implications of each.

 

Fall 2008
The Cornerstone for Compliance and Cost-Driven Information Management
Without a clear understanding of all the information under management in your environment, it is impossible to get a handle on information growth, compliance-related risk mitigation and information management costs.The practice of information classification is fundamental to an effective information-centric ILM strategy.Information classification requires that I.T. administrators work with Line-of-Business and knowledge workers to gain an understanding of the data to be managed.Once a clear set of goals and policies are established you can efficiently organize your information into tiers of service that will meet the performance, protection, and compliance requirements of your business.
 
Fall 2008
The Secret Sauce of ILM, The Professional Assessment
Does Information Lifecycle Management (ILM) seem large and fuzzy with the promise of lots of work for little return?  It may be a bunch of work, but the little return part is a fallacy that has been disproven in many large data centers.  This session will focus on how you can “kick butt” with ILM, achieve expectations from your project, set reasonable objectives, and get cooperation and assistance along the way.    Sound too good to be true?  This session was developed by SNIA's Professional Services ILM Task Group.  There are plenty of "real-life" examples that have been gathered from among your peers.

 

Fall 2008
Compliance Storage:  The risk of retention and deletion in the face of FRCP
The new amendments to the Federal Rules of Civil Procedures, FRCP, have changed the face of the business risk of retaining information in an uncontrolled manner. eDiscovery requirements to produce legally and forensically authentic information impact IT and storage operations in ways you may have never considered. This presentation will update you on current requirements and best practices and how they affect the management of your storage resources and information assets.

 

Fall 2008
Retaining Information for 100 Years
Many organizations now have a requirement to preserve large volumes of digital content indefinitely into the future, and to maintain access to that content for medical treatment decisions, e-discovery, appreciation ofcultural and scientific history etc. Frequent news stories cover organizations' failure to be able to do this, such as the near loss of original video and data of the first Moon landing, eventually recovered from a set of 14-inch tape reels found in dusty Australian basement.This session will focus on the most important questions in long-term digital preservation, and understand why it is still so difficult. Suggestions will be made as to how the storage industry can allow its customers to keep and make use of their digital content over the lifetimes that they expect from past experience with physical and analog assets, lifetimes that can greatly exceed those of any single digital storage device or storage technology.

 

Fall 2008
Best Practices for Long-Term Retention of Digital Information
Compliance, legal, business, discovery, and security risk have changed the value and risk of owning and administrating information within the datacenter. Old approaches to   retaining, preserving, and disposing of information in multiple isolated and 'siloed'   'electronic archives' no longer meet today's requirements for reduced operating costs, scale,   and high efficiencies. This presentation highlights new work being spearheaded by the SNIA's   Data Management Forum to produce a reference architecture for best practices in long-term digital information retention based on information-lifecycle-management methods.

 

Spring 2008
Identifying and Eliminating Backup System Bottlenecks
This tutorial reveals the obvious and not-so-obvious bottlenecks found in enterprise backup systems and offers practical examples for applying the technologies described in the Data Protection tutorials to achieve one's performance objectives.  The goal of this session is to illustrate how one can take an existing backup system to the next level by integrating a combination of modern backup techniques and low-cost disk.  We start with the assumption that the end user has made a sizable investment in his/her enterprise backup system and is looking for a road map for affordable growth in both performance and capacity.  We also assume that tape is here to stay (at least for now) and that the ultimate goal is to get data on tape for off-site removal.  Topics include balancing the use of the LAN and SAN for backup traffic, ILM helping or hindering, achieving maximum performance from tape, disk staging with ordinary disk, de-duplication, block-level differencing, and virtual tape.  The take home message is that you cannot simply buy your way out of backup system headaches, you must design your way out.

 

Spring 2008
Storage Considerations and Requirements for Database Archiving
The concept of maintaining a long-term archive is not new, but application data introduces many new challenges. According to the SNIA Archive Task Force 100 Year Archive Requirements Survey, over 81% of respondents feel database data is the most at risk. Database data is vulnerable to loss due to the decay and obsolescence of the media on which it is stored, and becomes inaccessible and unreadable when software needed to interpret it becomes obsolete and is lost. The way in which you might implement ILM or tiered storage is different when applied to application data. This tutorial will discuss archiving strategies and long term implications of how database data should be stored and accessed.

 

Spring 2008
Information-Centric Policy Management
As enterprises deal with accelerating information growth rates and growing complexity in the data center, one strategy that has proven effective in addressing scalability and effectiveness is the use of IT Service Management – applied from any one of many different disciplines including ITIL, itSMF, CobiT, and others. This has been especially true as it relates to storage service management and its relation to tiers of storage. This tutorial will look at how this same framework can be used effectively for information management-related policies.

 

Fall 2007
Archiving and Compliance Infrastructure
The tutorial provides a view into the compelling events driving the implementation of archiving and compliance. It looks at the role of process in compliance, and introduces the concept and details of compliance archiving infrastructures.

 

Fall 2007
Trends in Data Protection -- CDP and VTL
Many disk based data protection technologies, both old and new, are being used to augment tried and true backup methodologies to deliver better information and application restoration performance.  These technologies work in parallel to the existing backup paradigm, either synergistically or completely orthogonally.    This session will discuss many of these technologies in detail, including snapshots, full-copy snapshots (mirror-splits), differential snapshots, and small aperture snapshots (SAS), backup to disk, deduplication, virtual tape libraries (VTL), as well as continuous data protection (CDP) in its various forms.  Detail about how these technologies operate will be provided as well as best practices recommendations for deployment in today's heterogeneous data centers. 

 

Fall 2007
Disk and Tape Backup Methodologies
Extending the enterprise backup paradigm with disk-based technologies allow users to significantly shrink or eliminate the backup time window. This tutorial focuses on various methodologies that can deliver an efficient and cost effective disk-to-disk-to-tape (D2D2T) solution. This includes approaches to storage pooling inside of modern backup applications, using disk and file systems within these pools, as well as how and when to utilize virtual tape libraries (VTL) within these infrastructures.

 

Fall 2007
Solving the Coming Archive Crisis
The volume of digital information being kept online for long term is overwhelming and leading to a crisis of cost and complexity. New methods, practices, and standards are required to deal with the avalanche.
 
Fall 2007