Data Deduplication in a Virtual Tape Library Environment
|
|
- Beatrix Eaton
- 8 years ago
- Views:
Transcription
1 Data Deduplication in a Virtual Tape Library Environment Mathias Defiebre IBM Lab Services mathias.defiebre@de.ibm.com STG Technical Conferences 2010
2 Agenda Data Deduplication Overview Data Deduplication Theory Data Deduplication Approaches in Practice Data Deduplication Considerations and Value Proposition TS7650 ProtecTIER Deduplication Gateway TS7650 ProtecTIER Deduplication Appliance Series A look in the Future Links 2
3 Data Deduplication Overview 3
4 Data Deduplication Overview With Data Deduplication repeated instances of identical data are identified and stored only once Identical data is referenced to a single instance Saves storage capacity and network bandwidth Data Deduplication is a feature of a storage device or an application VTL, NAS-Box, backup application Data Deduplication requires an I/O protocol FCP, iscsi, CIFS, NFS, API, Tape Library Emulation Data Deduplication does not always make sense Not all data can be deduplicated well May interfere or work together with other technologies like compression, encryption or with data security requirements Data Deduplication is transparent To end-users and applications 4
5 Data Deduplication Theory 5
6 Data Deduplication Process (simplified) Data Object / Stream Data object or stream is subject for deduplication (1) Data object is split in chunks (fixed or variable size) Data Chunking A B C D A E F F D (2) For each junk an identity characteristic is determined Identity Determination A B C D E F (3a) Identical Chunks are referenced (pointer, reference) (3b) Non-identical chunks (single instances) are stored unique Determining Duplicates Identical Chunks 6
7 Methods for Data Chunking Data Object / Stream 1. File based One chunk is one file, most appropriate for file systems 2. Block based Data object is chunked into blocks of fixed or variable size Used by block storage devices 3. Format aware (Content aware) Understands explicit data formats and chunks data objects according to the format Example: Breaking a PowerPoint presentation into separate slides 4. Format agnostic (Content agnostic) Chunking is based on an algorithm that looks for logical breaks or similar elements within a data object/stream Chunking method influences dedupe ratio 7
8 Methods for Determining Duplicates A B C D A E F F D 1. Hashing Calculate a hash (MD-5, SHA-256) for each data chunk Compare hash with hash of existing data A B C D Identical hash means most likely identical data Hash Collision: Identical hash but non-identical data Must be prevented through secondary comparison (additional metadata, second hash method, additional binary comparison) E F 2. Binary Comparison Compare all bits of similar chunks 3. Delta Differencing Computes a delta between two similar chunks of data where one chunk is the baseline and the second is the delta Since each delta is unique there is no possibility of collision To reconstruct the original chunk the delta(s) have to be re-applied to the baseline chunk 8
9 Data Deduplication Architectures Client Server Storage Device LAN LAN or SAN Client-side + Reduces load on Server + Reduces bandwidth on LAN Adds load to Client No cross-correlation among multiple clients Server-side + Allows cross-correlation among multiple Clients Adds load to Server Storage-side + Transparent to Clients and Servers + Reduces load on Server and Clients Adds load to Storage Device 9
10 Data Deduplication Processing Time In-line: Data is deduplicated before it is actually stored + Requires less storage capacity Potential decrease of I/O performance Post-processing: Data is first stored and deduplicated later in the background + Better Performance expected Requires more storage capacity to temporarily store the data Data is written, read and written again thus more I/O intensive Deduplication window must be coordinated with backup window Combination of In-Line and Post-processing In-line as long as performance can be satisfied then switch to Post-processing 10
11 Data Deduplication Approaches in Practise 11
12 Practical Approaches Overview Practical approaches combine Chunking Method Method for Determining/Checking Identity Common Practical Approaches Identity Check Chunking Hashing Delta Diff Binary Diff Fixed/Variable Block Size Format Aware Format Agnostic Hash based Content Aware HyperFactor 12
13 Hash Based Approach 1. Slice data into chunks (fixed or variable) A B C D E 2. Generate Hash per chunk A h B h C h D h E h 3. Compare hashes with hash table Hash Value Storage locations Object References 4. For identical hashes store reference, otherwise store chunk and update hash table 13
14 Assessment for Hash Based Approach Hash-Collisions must be handled More overhead, especially for in-line deduplication Requires a hash table to store hashes for all chunks Hash table will grow with data volume Hash Table must be quickly searchable and accessible Growing hash table may become a performance bottleneck (doesn t fit into RAM) Scalability issues Hash table must be protected One copy might not be sufficient Example: Chunk size of 8KB, each hash is 20 bytes long With a 1 TB repository: 1 TByte repository has ~134,000,000 chunks of 8 KB each Need pointers scheme to reference inside 1 TByte Hash table requires ~2.5 GB of memory no issue With a 100 TB repository: Hash table requires ~250 GB of memory performance!!! 14
15 HyperFactor Approach HyperFactor has two indexes HyperFactor Index Restore Index HyperFactor Index used for backup Used to filter out similar elements from the incoming data stream Fixed size of 4 GB, memory resident, synced to disk (repository) periodically Can be restored from repository if lost References up to 1 PB of physical data elements stored in the repository Restore Index used for restore Includes references to physical data elements Dynamic index, growing Stored on disk (repository) 15
16 HyperFactor Approach 1. Look through data stream for similarity and filter similar elements Using HyperFactor Index (fixed size 4 GB) New Data Stream 2. Read elements that are most similar from storage Using Restore Index 3. Binary compare element in stream with element(s) read from storage Element A Element B Element C 4. Identical data is referenced by a new additional entry in the Restore Index - unique data is stored in the repository 16
17 Assessment for HyperFactor No Hash Table required No scalability issues 4 GB Index references up to 1 PB of physical data elements No dependency of data format and application Very flexible, no ongoing development effort due to format changes HyperFactor index always fits into memory Enables enterprise-class high-performance in-line deduplication Eliminates the phenomenon of missed factoring opportunities Looks for similarity between data not on exact chunk matches 17
18 Data Deduplication Considerations and Value Proposition 18
19 Not all Data Dedupe well High Dedupe Ratio expected for... Structured Data Database Files s Low Dedupe Ratio expected for... Unstructured Data Images Videos Voice Data Seismic Data Large collections of small files Some Technologies influence Dedupe Ratio 19
20 Technologies influencing Data Deduplication Compression Archives *.zip (Phil Katz zip: pkzip, pkunzip) *.gz (GNU zip: gzip, gzip -d) Compaction Lotus Notes Database Multiplexing Multiple backup streams to a single tape drive Veritas Backup Exec Computer Associates ARCserve Oracle RMAN multiplexing of backup sets Encryption Above technologies change the data stream making identical data non-identical! 20
21 Example: Data Deduplication and Encryption Data source 1 Important text No encryption Important text Data Data encryption encryption prior prior to to deduplicatioduplication processing processing can can de- subvert subvert data data reduction reduction Data source 2 Important text Encryption key 1 txpt tnatroemi Data Deduplication Data Store Important text txpt tnatroemi Data source 3 Important text Encryption key 2 te tarpixtntom Compression possible te tarpixtntom 1. Three data sources have the same text file 2. After encryption, text files do not match 3. Deduplication processing does not detect redundancy 4. Text files are stored without data reduction 21
22 Dedupe Value Proposition & potential Drawbacks Data Deduplication Value Proposition Disk storage savings Network Bandwidth savings Energy savings (Green IT) Better utilization of existing floor and rack space Increased scalability Data Deduplication Potential Drawbacks Loss of one single data chunk may cause loss of multiple files Repository or Index required to store meta data must be protected requires additional storage capacity may slow down performance Loss of all Index means loss of all data 22
23 TS7650 ProtecTIER Gateway 23
24 ProtecTIER Architecture Overview It s a Tape Library and Drives Virtual Tape Library ProtecTIER Server FC Backup Server ProtecTIER Application Disk Storage System Linux server-based application running on a System x server Emulates a tape library unit, including drives, cartridges, and robotics Uses Fibre Channel (FC) attached disk storage system as the backup medium Has a build-in deduplication engine (HyperFactor) 24
25 STG Technical Conferences 2010 New Data Stream Filter out similar elements (using resident index) Read similar elements from storage and compare HyperFactor Data Storage Memory Resident Index (4 GB, may contain predefined elements) Disk Arrays FC Switch ProtecTIER Server Existing Data Virtual Tape Emulation Backup Servers Restore Index Filtered data Reference identical elements in restore index 25 Store unique elements on storage
26 Dedupe Ratio depends on... Data Change Rate the percentage of data in the incomming backup data stream that is new for ProtecTIER and not already stored physically in the repository Backup Policies # full backups # Inc backups backup frequency data retention period 26
27 ProtecTIER Native Replication Key new feature R2.3 Primary Site Backup Server ProtecTIER Gateway Represented capacity Physical capacity Secondary Site Backup Server ProtecTIER IP replication Significant bandwidth reduction Represented capacity Backup Server ProtecTIER Gateway Physical capacity 27
28 TS7650 ProtecTIER Appliance Series 28
29 TS7650 Appliance Series F05 Base Frame Standalone spindle 450GB (2 drawer) 7TB 100MB/sec F05 Base Frame Standalone spindle 450GB (4 drawer) 18TB 250MB/sec Standalone spindle 450GB (8 drawer) 36TB 450MB/sec 500MB/sec 6.3TB 15.8TB 31.5TB 31.5TB U U U U P U U U U P U U U U P S U U U U P U U U U P U U U U P S U U U U P U U U U P U U U U P S M M M M M m m m m m U U U U P S Appliances or TSSC can 1u be empty space upgraded or TSSC one step 1u empty forward space TSSC... or TSSC or TSSC or TSSC F05 Base Frame EXP810 EXP810 EXP810 DS4700 Clustered spindle 450GB (8 drawer) 36TB 450MB/sec F05 Base Frame EXP810 EXP810 EXP810 DS MB/sec Ethernet Switch (1U) Ethernet Switch (1U) U U U U P U U U U P U U U U U U U U P U U U U P U U U U U U U U P U U U U P U U U U M M M M M m m m m m X3850 M2 3 x 6core, 24GB RAM or TSSC or TSSC U U U U P S P S P S P S WTI Switch Power: Base Power: FC1903 EXP810 DS4700 X3850 M2 3 x 6core, 24GB RAM U U U U P U U U U P U U U U M M M M M m m m m m U U U U P S P S Power: Base Power: FC1903 DS4700 EXP810 EXP810 EXP810 X3850 M2 3 x 6core, 24GB RAM U U U U P U U U U P U U U U U U U U P U U U U P U U U U U U U U P U U U U P U U U U M M M M M m m m m m U U U U P S P S P S P S Power: Base Power: FC1903 DS4700 EXP810 EXP810 EXP810 X3850 M2 3 x 6core, 24GB RAM U U U U P U U U U P U U U U U U U U P U U U U P U U U U U U U U P U U U U P U U U U M M M M M m m m m m U U U U P S P S P S P S Power: Base Power: FC1903 DS4700 EXP810 EXP810 EXP810 X3850 M2 3 x 6core, 24GB RAM U U U U P U U U U P U U U U U U U U P U U U U P U U U U U U U U P U U U U P U U U U M M M M M m m m m m U U U U P S P S P S P S 29
30 A look in the Future... 30
31 A look in the Future Some observations from the VTL and Dedupe Market Vendors converge to a common point Scalable appliances with multiple I/O interfaces (FCP, iscsi, CIFS, NFS, Library Emulation) Replication becomes more and more commodity Replication benefits from deduped data Intelligent storage devices will be tighly integrated with 3rd party backup applications e.g. controlling & monitoring replication from a backup application 31
32 Links 32
33 Links I TS7650G ProtecTIER Deduplication Gateway TS7650 ProtecTIER Deduplication Appliance Whitepaper: IBM Data Deduplication Strategy and Operations ger/ibm+tivoli+storage+manager+v6.1+data+deduplication+strate gy+and+operations Redbook: The IBM System Storage TS7650G and TS7650 ProtecTIER Servers 33
34 Links II TS7650G ProtecTIER Implementation Workshops IBMer: oursenum=ss92e1de&deeplinkredirect=false Business Partner: ibm.com/jct03001c/services/learning/ites.wss/de/de?pageType= course_description&includenotscheduled=y&coursecode=ss92e1 DE 34
35 Storage Competence at the Mainz Location IBM Germany s fourth largest location offers you a broad portfolio of IBM System Storage Services IBM Dynamic Infrastructure Leadership Center for Information Infrastructure Business, Channel & Skill Enablement & Training DI Education & Briefings Demos & Showcases IT Transformation Roadmaps & Workshops BP Certification IBM European Storage Competence Center & Systems Lab Europe Business, Channel & Skill Enablement & Training End-to-end client support Workshops Solution Design Lab Services Customer Relationship Management IBM Executive Briefing Center & TMCC Business, Channel & Skill Enablement & Training Customer and Group Briefings Product & SW Demos Integrated Solution Demos Exhibition Support & Organization IBM STG Europe Storage Software Development Software Development Storage & Tape Linux Mainframe File Systems 35
36 IBM System Storage Solutions Center of Excellence We offer technical support from the planning phase through well after installation Our Services Client Briefings & Education Systems Lab Services & Training Customized Workshops System Storage Demos Advanced Technical Support Solution Design Proof of Concepts Benchmarks Product Field Engineering Our Expertise Skilled technical storage experts covering the whole IBM System Storage Portfolio Information Infrastructure: Compliance Availability Retention Security HW / SW & Performance Our Systems Lab Europe 1500 sqm lab space IBM & heterogenous hardware 36
37 Hindi Hebrew Simplified Chinese Gracias Russian Thank You Spanish Arabic Tak English Obrigado Brazilian Portuguese Grazie Italian Danish Korean Danke German Merci French Tamil Japanese Traditional Chinese Thai 37
38 Disclaimer I STG Technical Conferences 2010 Copyright 2009 by International Business Machines Corporation. No part of this document may be reproduced or transmitted in any form without written permission from IBM Corporation. The performance data contained herein were obtained in a controlled, isolated environment. Results obtained in other operating environments may vary significantly. While IBM has reviewed each item for accuracy in a specific situation, there is no guarantee that the same or similar results will be obtained elsewhere. These values do not constitute a guarantee of performance. The use of this information or the implementation of any of the techniques discussed herein is a customer responsibility and depends on the customer's ability to evaluate and integrate them into their operating environment. Customers attempting to adapt these techniques to their own environments do so at their own risk. Product data has been reviewed for accuracy as of the date of initial publication. Product data is subject to change without notice. This information could include technical inaccuracies or typographical errors. IBM may make improvements and/or changes in the product(s) and/or program(s) at any time without notice. Any statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Any reference to an IBM Program Product in this document is not intended to state or imply that only that program product may be used. Any functionally equivalent program, that does not infringe IBM's intellectually property rights, may be used instead. It is the user's responsibility to evaluate and verify the operation of any on-ibm product, program or service. 38
39 Disclaimer II STG Technical Conferences 2010 THE INFORMATION PROVIDED IN THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IBM EXPRESSLY DISCLAIMS ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT. IBM shall have no responsibility to update this information. IBM products are warranted according to the terms and conditions of the agreements (e.g. IBM Customer Agreement, Statement of Limited Warranty, International Program License Agreement, etc.) under which they are provided. IBM is not responsible for the performance or interoperability of any non-ibm products discussed herein. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents or copyrights. Inquiries regarding patent or copyright licenses should be made, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY U.S.A. 39
40 Trademarks STG Technical Conferences 2010 The following terms are trademarks or registered trademarks of the IBM Corporation in either the United States, other countries or both. IBM, TotalStorage, zseries, pseries, xseries, S/390, ES/9000, AS/400, RS/6000 z/os, z/vm, VM/ESA, OS/390, AIX, DFSMS/MVS, OS/2, OS/400, ESCON, Tivoli iseries, ES/3090, VSE/ESA, TPF, DFSMSdfp, DFSMSdss, DFSMShsm, DFSMSrmm, FICON, ProtecTIER, XIV Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Other company, product, and service names mentioned may be trademarks or registered trademarks of their respective companies. 40
Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide
Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide This IBM Redbooks Solution Guide provides an overview of how data backup and
More informationIBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management hitzler@de.ibm.com
IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management hitzler@de.ibm.com Why Snapshots Are Useful for Backup Faster backups without taking applications
More informationThe safer, easier way to help you pass any IT exams. Exam : 000-115. Storage Sales V2. Title : Version : Demo 1 / 5
Exam : 000-115 Title : Storage Sales V2 Version : Demo 1 / 5 1.The IBM TS7680 ProtecTIER Deduplication Gateway for System z solution is designed to provide all of the following EXCEPT: A. ESCON attach
More informationArwed Tschoeke, Systems Architect tschoeke@de.ibm.com IBM Systems and Technology Group
Virtualization in a Nutshell Arwed Tschoeke, Systems Architect tschoeke@de.ibm.com and Technology Group Virtualization Say What? Virtual Resources Proxies for real resources: same interfaces/functions,
More informationNew!! - Higher performance for Windows and UNIX environments
New!! - Higher performance for Windows and UNIX environments The IBM TotalStorage Network Attached Storage Gateway 300 (NAS Gateway 300) is designed to act as a gateway between a storage area network (SAN)
More informationIBM Systems and Technology Group Technical Conference
IBM TRAINING IBM STG Technical Conference IBM Systems and Technology Group Technical Conference Munich, Germany April 16 20, 2007 IBM TRAINING IBM STG Technical Conference E72 Storage options and Disaster
More informationData Deduplication: An Essential Component of your Data Protection Strategy
WHITE PAPER: THE EVOLUTION OF DATA DEDUPLICATION Data Deduplication: An Essential Component of your Data Protection Strategy JULY 2010 Andy Brewerton CA TECHNOLOGIES RECOVERY MANAGEMENT AND DATA MODELLING
More informationProtecting Information in a Smarter Data Center with the Performance of Flash
89 Fifth Avenue, 7th Floor New York, NY 10003 www.theedison.com 212.367.7400 Protecting Information in a Smarter Data Center with the Performance of Flash IBM FlashSystem and IBM ProtecTIER Printed in
More informationCS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher
More informationSHARE Lunch & Learn #15372
SHARE Lunch & Learn #15372 Data Deduplication Makes It Practical to Replicate Your Tape Data for Disaster Recovery Scott James VP Global Alliances Luminex Software, Inc. Randy Fleenor Worldwide Data Protection
More informationActual trends in backup protection solution IBM Backup Products and Services
Actual trends in backup protection solution IBM Backup Products and Services Gražvydas Govaras IT Architektas 2013-03-19 Tivoli Storage Manager Fastback Continuos Data Protection solution for Windows and
More informationMaximizing Backup and Restore Performance of Large Databases
Maximizing Backup and Restore Performance of Large Databases - 1 - Forward (from Meta Group) Most companies critical data is being stored within relational databases. Over 90% of all mission critical systems,
More informationUNDERSTANDING DATA DEDUPLICATION. Tom Sas Hewlett-Packard
UNDERSTANDING DATA DEDUPLICATION Tom Sas Hewlett-Packard SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
More informationIBM CommonStore email Archiving Preload Solution
Designed to simplify e-mail archiving to help support data protection, governance and compliance IBM CommonStore email Archiving Preload Solution Highlights This solution can help small to This end-to-end
More informationCreating a Cloud Backup Service. Deon George
Creating a Cloud Backup Service Deon George Agenda TSM Cloud Service features Cloud Service Customer, providing a internal backup service Internal Backup Cloud Service Service Provider, providing a backup
More informationDatabase lifecycle management
Lotus Expeditor 6.1 Education IBM Lotus Expeditor 6.1 Client for Desktop This presentation explains the Database Lifecycle Management in IBM Lotus Expeditor 6.1 Client for Desktop. Page 1 of 12 Goals Understand
More informationData Deduplication and Tivoli Storage Manager
Data Deduplication and Tivoli Storage Manager Dave Cannon Tivoli Storage Manager rchitect Oxford University TSM Symposium September 2007 Disclaimer This presentation describes potential future enhancements
More informationUNDERSTANDING DATA DEDUPLICATION. Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s.
UNDERSTANDING DATA DEDUPLICATION Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual
More informationImplementing Tivoli Storage Manager on Linux on System z
IBM Software Group Implementing Tivoli Storage Manager on Linux on System z Laura Knapp ljknapp@us.ibm.com 2006 Tivoli Software 2006 IBM Corporation Agenda Why use Linux on System z for TSM TSM Some basics
More informationLong-Distance Configurations for MSCS with IBM Enterprise Storage Server
Long-Distance Configurations for MSCS with IBM Enterprise Storage Server Torsten Rothenwaldt IBM Germany Presentation 2E06 Agenda Cluster problems to resolve in long-distance configurations Stretched MSCS
More informationSTORAGE. Buying Guide: TARGET DATA DEDUPLICATION BACKUP SYSTEMS. inside
Managing the information that drives the enterprise STORAGE Buying Guide: DEDUPLICATION inside What you need to know about target data deduplication Special factors to consider One key difference among
More informationEMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
More informationReducing Backups with Data Deduplication
The Essentials Series: New Techniques for Creating Better Backups Reducing Backups with Data Deduplication sponsored by by Eric Beehler Reducing Backups with Data Deduplication... 1 Explaining Data Deduplication...
More informationEMC DATA DOMAIN OPERATING SYSTEM
ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read
More informationUNDERSTANDING DATA DEDUPLICATION. Thomas Rivera SEPATON
UNDERSTANDING DATA DEDUPLICATION Thomas Rivera SEPATON SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
More informationVirtual Tape Library Solutions by Hitachi Data Systems
O V E R V I E W Virtual Tape Library Solutions by Hitachi Data Systems Hitachi Data Systems Virtual Tape Library Solutions by Hitachi Data Systems Enterprise data centers face a growing problem in data
More information<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures
1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage
More informationWHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression
WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression Sponsored by: Oracle Steven Scully May 2010 Benjamin Woo IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA
More informationDeltaStor Data Deduplication: A Technical Review
White Paper DeltaStor Data Deduplication: A Technical Review DeltaStor software is a next-generation data deduplication application for the SEPATON S2100 -ES2 virtual tape library that enables enterprises
More informationUniversal Backup Device The Essential Facts of UBD
Information Technology Solution Brief Universal Backup Device The Essential Facts of UBD Fibre Channel Disk to Disk Backup for IBM Power Systems Copyright (c)2014 Electronic Storage Corporation Information
More informationBusiness Resilience for the On Demand World Yvette Ray Practice Executive Business Continuity and Resiliency Services
Business Resilience for the On Demand World Yvette Ray Practice Executive Business Continuity and Resiliency Services What s on the minds of 450 of the world s leading CEOs 2 CEO needs Revenue growth with
More informationData Deduplication in Tivoli Storage Manager. Andrzej Bugowski 19-05-2011 Spała
Data Deduplication in Tivoli Storage Manager Andrzej Bugowski 19-05-2011 Spała Agenda Tivoli Storage, IBM Software Group Deduplication concepts Data deduplication in TSM 6.1 Planning for data deduplication
More informationGet Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : E22-290 Title : EMC Data Domain Deduplication, Backup and Recovery Exam Version : DEMO 1.A customer has a Data Domain system with
More informationIBM Storage Virtualization Value to you. IBM Storage Virtualization Value to you
IBM Storage Virtualization Value to you IBM Storage Virtualization Value to you Page 2 Table of Contents 1. SVC can help keep your applications running... 3 2. SVC can help reduce the cost and complexity
More informationIBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
More informationIBM WebSphere Data Interchange V3.3
IBM Software Group IBM WebSphere Data Interchange V3.3 This presentation will present an overview of the WebSphere Data Interchange product. IBM Software Group Page 1 of 14 Agenda IBM Software Group Electronic
More informationEmulex 8Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide
Emulex 8Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide The Emulex 8Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter enables high-performance connection
More informationQuantum StorNext. Product Brief: Distributed LAN Client
Quantum StorNext Product Brief: Distributed LAN Client NOTICE This product brief may contain proprietary information protected by copyright. Information in this product brief is subject to change without
More informationCS z/os Network Security Configuration Assistant GUI
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Network Security Configuration Assistant GUI 1 Security configuration agenda CS z/os configuration GUI overview Network
More informationLDA, the new family of Lortu Data Appliances
LDA, the new family of Lortu Data Appliances Based on Lortu Byte-Level Deduplication Technology February, 2011 Copyright Lortu Software, S.L. 2011 1 Index Executive Summary 3 Lortu deduplication technology
More informationIBM Infrastructure Suite for z/vm and Linux
IBM Infrastructure Suite for z/vm and Linux Tracy Dean, IBM tld1@us.ibm.com October 2015 Agenda Solution introduction Solution details Summary, contacts, and more information 2 IBM Infrastructure Suite
More informationCost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved.
Cost Effective Backup with Deduplication Agenda Today s Backup Challenges Benefits of Deduplication Source and Target Deduplication Introduction to EMC Backup Solutions Avamar, Disk Library, and NetWorker
More informationWHY DO I NEED FALCONSTOR OPTIMIZED BACKUP & DEDUPLICATION?
WHAT IS FALCONSTOR? FalconStor Optimized Backup and Deduplication is the industry s market-leading virtual tape and LAN-based deduplication solution, unmatched in performance and scalability. With virtual
More informationLisa Gundy IBM Corporation. Wednesday, March 12, 2014: lisat@us.ibm.com. 11:00 AM 12:00 PM Session 15077
Continuing the understanding of IBM Copy Services: Peer-to-Peer-Remote-Copy (PPRC) and Point in Time Copy (FlashCopy) for High Availability (HA) and Disaster Recovery (DR) Lisa Gundy IBM Corporation lisat@us.ibm.com
More informationIBM System Storage DR550
An innovative information-retention solution IBM System Storage DR550 Highlights Repository for all kinds of Offers low TCO by using multiple content structured and storage tiers (disk, tape, unstructured
More informationCommunications Server for Linux
Communications Server for Linux SNA connectivity ^business on demand software Multiple types of connectivity exist within the Communications Server for Linux. CSLinux_snaconn.ppt Page 1 of 10 SNA connectivity
More informationQLogic 4Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide
QLogic 4Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide The QLogic 4Gb Fibre Channel Expansion Card (CIOv) for BladeCenter enables you to quickly and simply
More informationUsing HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup
Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP
More informationz/os V1R11 Communications Server system management and monitoring
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North
More informationTape. Emerging Storage Technology Panel IEEE/NASA Conference MSST2008 September 25, 2008
Tape IBM Tape Systems Emerging Storage Technology Panel IEEE/NASA Conference MSST2008 September 25, 2008 Glen Jaquette IBM Distinguished Engineer / Architect Tape Drives, Automation, & Subsystems 2008
More informationData Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key
More informationUniversal Backup Device with
Universal Backup Device with Fibre Channel Disk to Disk Backup with Affordable Deduplication and Replication for IBM Power Systems Executive Overview Copyright (c)2015 Electronic Storage Corporation Universal
More informationRedbooks Redpaper. IBM TotalStorage NAS Advantages of the Windows Powered OS. Roland Tretau
Redbooks Redpaper Roland Tretau IBM TotalStorage NAS Advantages of the Windows Powered OS Copyright IBM Corp. 2002. All rights reserved. ibm.com/redbooks 1 What is Network Attached Storage (NAS) Storage
More informationStep by Step Guide To vstorage Backup Server (Proxy) Sizing
Tivoli Storage Manager for Virtual Environments V6.3 Step by Step Guide To vstorage Backup Server (Proxy) Sizing 12 September 2012 1.1 Author: Dan Wolfe, Tivoli Software Advanced Technology Page 1 of 18
More informationEMC Disk Library with EMC Data Domain Deployment Scenario
EMC Disk Library with EMC Data Domain Deployment Scenario Best Practices Planning Abstract This white paper is an overview of the EMC Disk Library with EMC Data Domain deduplication storage system deployment
More informationCross-Platform Access
Virtualize Cross-Platform Access to Protect Linux on System z Data Copyright 2010 INNOVATION Data Processing. All rights reserved. 1 Purpose This session will offer through interactive discussion the opportunity
More informationEMC DATA DOMAIN OVERVIEW. Copyright 2011 EMC Corporation. All rights reserved.
EMC DATA DOMAIN OVERVIEW 1 2 With Data Domain Deduplication Storage Systems, You Can WAN Retain longer Keep backups onsite longer with less disk for fast, reliable restores, and eliminate the use of tape
More informationBackup Software Data Deduplication: What you need to know. Presented by W. Curtis Preston Executive Editor & Independent Backup Expert
Backup Software Data Deduplication: What you need to know Presented by W. Curtis Preston Executive Editor & Independent Backup Expert When I was in the IT Department When I started as backup guy at $35B
More informationDemystifying Deduplication for Backup with the Dell DR4000
Demystifying Deduplication for Backup with the Dell DR4000 This Dell Technical White Paper explains how deduplication with the DR4000 can help your organization save time, space, and money. John Bassett
More informationEMC Data de-duplication not ONLY for IBM i
EMC Data de-duplication not ONLY for IBM i Maciej Mianowski EMC BRS Advisory TC May 2011 1 EMC is a TECHNOLOGY company EMC s focus is IT Infrastructure 2 EMC Portfolio Information Security Authentica Network
More informationSHARE in Pittsburgh Session 15591
Top 10 Things You Should Be Doing On Your HMC But You're NOT You Probably Are Tuesday, August 5th 2014 Jason Stapels HMC Development jstapels@us.ibm.com Agenda Setting up HMC for Remote Use Securing User
More informationDisaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series
Redpaper Alex Osuna Bert Jonker Richard Waal Henk Vonk Peter Beijer Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series Introduction This IBM Redpaper gives a example of procedures
More informationQLogic 8Gb FC Single-port and Dual-port HBAs for IBM System x IBM System x at-a-glance guide
QLogic 8Gb FC Single-port and Dual-port HBAs for IBM System x IBM System x at-a-glance guide The QLogic 8Gb FC Single-port and Dual-port HBA for IBM System x are PCI Express 2.0 x8 8Gb Fibre Channel adapters
More informationImplementing IBM Storage Data Deduplication Solutions
Front cover Implementing IBM Storage Data Deduplication Solutions Fitting deduplication into your enterprise environment Adding deduplication to your storage hierarchy Gaining the space benefits of IBM
More informationSales Tool. Summary DXi Sales Messages November 2009 6 NOVEMBER 2009. ST00431-v06
Summary DXi Sales Messages November 2009 6 NOVEMBER 2009 ST00431-v06 Notice This Sales Tool contains proprietary information protected by copyright. Information in this Sales Tool is subject to change
More informationBrocade Enterprise 20-port, 20-port, and 10-port 8Gb SAN Switch Modules IBM BladeCenter at-a-glance guide
Brocade Enterprise 20-port, 20-port, and 10-port 8Gb SAN Switch Modules IBM BladeCenter at-a-glance guide The Brocade Enterprise 20-port, 20-port, and 10-port 8 Gb SAN Switch Modules for IBM BladeCenter
More informationNetworking Trends and Directions
Networking Trends and Directions Geordy Korte Wednesday March 13 2013 BM Corporation Notices This information was developed for products and services offered in the U.S.A. Note to U.S. Government Users
More informationADVANCED DEDUPLICATION CONCEPTS. Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions
ADVANCED DEDUPLICATION CONCEPTS Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and
More information3Gen Data Deduplication Technical
3Gen Data Deduplication Technical Discussion NOTICE: This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change without notice and
More informationz/os V1R11 Communications Server System management and monitoring Network management interface enhancements
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server System management and monitoring Network management interface enhancements z/os Communications
More informationEMC Integrated Infrastructure for VMware
EMC Integrated Infrastructure for VMware Enabled by Celerra Reference Architecture EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000 www.emc.com
More informationEMC Integrated Infrastructure for VMware
EMC Integrated Infrastructure for VMware Enabled by EMC Celerra NS-120 Reference Architecture EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000
More informationTechnology Fueling the Next Phase of Storage Optimization
White Paper HP StoreOnce Deduplication Software Technology Fueling the Next Phase of Storage Optimization By Lauren Whitehouse June, 2010 This ESG White Paper was commissioned by Hewlett-Packard and is
More informationUN 4013 V - Virtual Tape Libraries solutions update...
UN 4013 V - Virtual Tape Libraries solutions update... - a Unisys storage partner Key issues when considering virtual tape Connectivity is my platform supported by whom? (for Unisys environments, MCP,
More informationEfficient Backup with Data Deduplication Which Strategy is Right for You?
Efficient Backup with Data Deduplication Which Strategy is Right for You? Rob Emsley Senior Director, Product Marketing CPU Utilization CPU Utilization Exabytes Why So Much Interest in Data Deduplication?
More informationHP StoreOnce & Deduplication Solutions Zdenek Duchoň Pre-sales consultant
DISCOVER HP StoreOnce & Deduplication Solutions Zdenek Duchoň Pre-sales consultant HP StorageWorks Data Protection Solutions HP has it covered Near continuous data protection Disk Mirroring Advanced Backup
More informationUPSTREAM for Linux on System z
PRODUCT SHEET UPSTREAM for Linux on System z UPSTREAM for Linux on System z UPSTREAM for Linux on System z is designed to provide comprehensive data protection for your Linux on System z environment, leveraging
More informationWHITE PAPER: customize. Best Practice for NDMP Backup Veritas NetBackup. Paul Cummings. January 2009. Confidence in a connected world.
WHITE PAPER: customize DATA PROTECTION Confidence in a connected world. Best Practice for NDMP Backup Veritas NetBackup Paul Cummings January 2009 Best Practice for NDMP Backup Veritas NetBackup Contents
More informationManaged Services - A Paradigm for Cloud- Based Business Continuity
Managed Services - A Paradigm for Cloud- Based Business Continuity Ron McCracken IBM 6 February 2013 Session Number 12993 Agenda This session is intended to expose key requirements for support of enterprise
More informationBackups in the Cloud Ron McCracken IBM Business Environment
Backups in the Cloud Ron McCracken IBM August 8, 2011 Session 9844 Legal Information The following are trademarks of the International Business Machines Corporation in the United States and/or other countries.
More informationAn Oracle White Paper September 2013. Lowering Storage Costs with the World's Fastest, Highest Capacity Tape Drive
An Oracle White Paper September 2013 Lowering Storage Costs with the World's Fastest, Highest Capacity Tape Drive Executive Overview... 1 Introduction... 1 Unmatched Capacity and Performance... 3 Lowering
More informationDATASHEET FUJITSU ETERNUS CS800 DATA PROTECTION APPLIANCE
DATASHEET FUJITSU ETERNUS CS800 DATA PROTECTION APPLIANCE ETERNUS CS800 IS A TURNKEY DATA PROTECTION APPLIANCE WITH DEDUPLICATION FOR MIDRANGE ENVIRONMENTS The ETERNUS CS solution family offers an outstanding
More informationUsing HP StoreOnce Backup systems for Oracle database backups
Technical white paper Using HP StoreOnce Backup systems for Oracle database backups Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key features and benefits 2 HP StoreOnce
More informationIBM RDX USB 3.0 Disk Backup Solution IBM Redbooks Product Guide
IBM RDX USB 3.0 Disk Backup Solution IBM Redbooks Product Guide The new IBM Removable Disk EXchange (RDX) USB 3.0 removable disk backup solution is designed to address your increasing capacity and backup
More informationData Deduplication and Tivoli Storage Manager
Data Deduplication and Tivoli Storage Manager Dave annon Tivoli Storage Manager rchitect March 2009 Topics Tivoli Storage, IM Software Group Deduplication technology Data reduction and deduplication in
More informationHP StoreOnce: reinventing data deduplication
HP : reinventing data deduplication Reduce the impact of explosive data growth with HP StorageWorks D2D Backup Systems Technical white paper Table of contents Executive summary... 2 Introduction to data
More informationIBM Tivoli Service Request Manager 7.1
IBM Tivoli Service Request Manager 7.1 Using the e-mail listener and workflow to generate, query, update, and change the status of tickets Updated September 29, 2009 IBM Tivoli Service Request Manager
More informationIBM System Storage Executive Briefing Center Topics (Tucson)
The following Session Abstracts are provided to assist you when selecting topics in the Visitor Information Sheet (VIS). If you have any amplifying information please put those comments in the topics section
More informationSeriously: Tape Only Backup Systems are Dead, Dead, Dead!
Seriously: Tape Only Backup Systems are Dead, Dead, Dead! Agenda Overview Tape backup rule #1 So what s the problem? Intelligent disk targets Disk-based backup software Overview We re still talking disk
More informationIBM Storage Server. Installing the IBM storage server
IBM Storage Server The IBM storage server combines IBM hardware technology with the Microsoft Storage Server 2003 R2 product to create an affordable and optimized network-attached file server solution
More informationIBM Tivoli Web Response Monitor
IBM Tivoli Web Response Monitor Release Notes Version 2.0.0 GI11-4068-00 +---- Note ------------------------------------------------------------+ Before using this information and the product it supports,
More informationProtect Microsoft Exchange databases, achieve long-term data retention
Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...
More informationTechnical White Paper for the Oceanspace VTL6000
Document No. Technical White Paper for the Oceanspace VTL6000 Issue V2.1 Date 2010-05-18 Huawei Symantec Technologies Co., Ltd. Copyright Huawei Symantec Technologies Co., Ltd. 2010. All rights reserved.
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! http://www.pass4test.com We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 000-061 Title : IBM Dynamic Infrastructure Technical Support Leader Vendors
More informationClearPath Storage Update Data Domain on ClearPath MCP
ClearPath Storage Update Data Domain on ClearPath MCP Ray Blanchette Unisys Storage Portfolio Management Jose Macias Unisys TCIS Engineering September 10, 2013 Agenda VNX Update Customer Challenges and
More informationDataPower z/os crypto integration
New in version 3.8.0 DataPower z/os crypto integration Page 1 of 14 DataPower z/os crypto integration NSS performs requested key operation using certificates and keys stored in RACF RACF Administrator
More informationEffective Planning and Use of IBM Tivoli Storage Manager V6 and V7 Deduplication
Effective Planning and Use of IBM Tivoli Storage Manager V6 and V7 Deduplication 02/17/2015 2.1 Authors: Jason Basler Dan Wolfe Page 1 of 52 Document Location This is a snapshot of an on-line document.
More informationEonStor DS remote replication feature guide
EonStor DS remote replication feature guide White paper Version: 1.0 Updated: Abstract: Remote replication on select EonStor DS storage systems offers strong defense against major disruption to IT continuity,
More informationManage rapid NAS data growth while reducing storage footprint and costs
IBM Systems and Technology White Paper System Storage Manage rapid NAS data growth while reducing storage footprint and costs IBM Random Access Compression Engine operates in real time without performance
More informationCopyright 2015 EMC Corporation. All rights reserved. 1
Copyright 2015 EMC Corporation. All rights reserved. 1 DATA DOMAIN BOOST: UNMATCHED SPEED & CONTROL PHILIP FOTE & GENE MAXWELL Copyright 2015 EMC Corporation. All rights reserved. 2 TWEET US! Are you already
More information