TECHNICAL BRIEF. Primary Storage Compression with Storage Foundation 6.0
|
|
- Iris Carter
- 8 years ago
- Views:
Transcription
1 TECHNICAL BRIEF Primary Storage Compression with Storage Foundation 6.0
2
3 Technical Brief Primary Storage Compression with Storage Foundation 6.0 Contents Introduction... 4 What is Compression?... 4 Differentiators... 4 Compression Targets... 5 Tools/Reporting... 5 Performance... 5
4 Introduction Primary Storage, the first line in maintaining your company s mission critical data, is under increasing pressures in today s IT environment. Unstructured data generated by both end-users and applications is growing exponentially, increasing in size with more complex applications, and stored longer to align to more stringent retention requirements. This can include anything from: spreadsheets from the CFO; PowerPoints from the sales managers; and archive log files from Oracle databases. Symantec and Storage Foundation 6.0 enable customers to maximize the primary storage they already have to reduce complexity and improve optimization through host-based compression. Enabling compression at the filesystem layer enables storage savings on top of any storage and removes complex and expensive appliances associated with primary compression. What is Compression? Storage Foundation 6.0 File Compression is performed without needing any application changes and with minimal overhead. Compression is controlled through a CLI at the directory or file level and executed out-of-band, or after the write. Once compression is enabled, directories and files will begin to have a mix of compressed and uncompressed data blocks. This is managed automatically by the File System and uncompressed data will be compressed during the next sweep. When dealing with compressed files, there are four main actions to consider: 1) Compression: When initiated, the compression engine will look at the data in 1M blocks, determine which extents can be compressed, and compresses those extents using the gzip compression algorithm. 2) Reading: Compression in Storage Foundation does not change the file extension, allowing users and applications to use files normally. When opened, only those blocks to be read will be uncompressed in memory, not on disk. While a performance impact will be seen on initial read, subsequent reads may perform better as the data come directly from cache. 3) Writing: When modifying files, only those blocks with changed data will be expanded on disk, not the entire file. 4) Backup: Back-up programs that read files through the namespace will not be aware of the compressed file. When read, the file-system will be aware of any compressed extents, and un-compress them to be backed up. Figure 1 - File extents compressed in blocks Differentiators - No hardware dependencies: Compression within Storage Foundation 6.0 works in-place on any supported storage. It is supported on Storage Foundation Standard and Enterprise licenses. 4
5 - Inode maintenance: Unlike gzip or other compression tools, inode numbers and file extensions are maintained. This allows users and applications to continue without changing their behavior. - Metadata consistency: Compression does not modify the metadata of files and directories, allowing for consistent and accurate life-cycle management. Compression Targets - Database Archive logs o Oracle best practices recommend archive logs for database recovery o As databases age and used strictly for reads, log files go stale and unchanged. - Unstructured Data o Studies indicate 90% of user-created data is never accessed after creation. o Increased regulatory restrictions leads to longer term storage. Tools/Reporting To the end user, the file and folders will look exactly the same, for the storage admin a new CLI has been introduced in 6.0 to report physical vs logical consumption, blocks used, % of extents compressed, and the compression ratio. In Figure 2, bigfile is shown using both the ls command and the vxcompress command. The ls command shows the number of blocks used (1797) and the logical size of the file (5.6 MB). The vxcompress identifies compression ratio, compression type, and the percentage of compressed extents. Figure 2 - Compressed File Performance How well a system handles the compression and un-compression of files is a key metric in deciding which data types can be compressed at which stage in its lifecycle. Compression is CPU heavy and the CPU load should be considered carefully. Reading from compressed files can also result in performance degradation due to the increased I/O. However, with multi-core CPUs becoming standard in large enterprises, CPU time should be readily available. The total space savings and time to compress/uncompress will vary greatly depending on: server type; server load; file type; and compression settings. Figure 3 illustrates results from sample configurations, however, individual investigation is recommended for specific use-cases. Figure 3 - Compression Ratio Examples Data Type Platform Original Size Savings CPU Usage Unstructured (80,000 Solaris Sparc 10 5 GB 70% files) Oracle archive log Linux RHES 18 GB 60% 1 CPU: 6% 4 CPU: 20% 5
6 About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at For specific country offices and contact numbers, please visit our website. For product information in the U.S., call tollfree 1 (800) Symantec Corporation World Headquarters 350 Ellis Street Mountain View, CA USA 1 (800)
Enterprise Vault 11 Feature Briefing
Enterprise Vault 11 Feature Briefing Enterprise Vault SCOM Enhancements This document is about the new Enterprise Vault SCOM enhancements introduced in Enterprise Vault 11. If you have any feedback or
More informationSymantec Backup Exec 2010
Reliable Backup and Recovery Designed for Your Growing Business Overview delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualization
Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationInstant Recovery for VMware
NETBACKUP 7.6 FEATURE BRIEFING INSTANT RECOVERY FOR VMWARE NetBackup 7.6 Feature Briefing Instant Recovery for VMware Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature
More informationCloud Storage Backup for Storage as a Service with AT&T
WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,
More informationSymantec Backup Exec 2012 Licensing Guide
REPORT: SYMANTEC BACKUP EXEC 2012 LICENSING GUIDE........................................ Symantec Backup Exec 2012 Licensing Guide Who should read this paper Use this guide to learn how to license Symantec
More informationSolution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments
Unified Information Management for Complex Windows Environments The Explosion of Unstructured Information It is estimated that email, documents, presentations, and other types of unstructured information
More informationDatabase Storage Management with Veritas Storage Foundation by Symantec Manageability, availability, and superior performance for databases
Database Storage Management with Veritas Storage Foundation by Symantec Manageability, availability, and superior performance for databases Solution Brief: Database Storage Management Database Storage
More informationWhite Paper: Whole Disk Encryption
How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................
More informationSymantec Desktop and Laptop Option 7.6
Automated protection for desktops and laptops Data Sheet: Backup and Disaster Recovery Overview With the majority of business-critical information residing outside the data centers or on off corporate
More informationEnterprise Vault 10 Feature Briefing
Enterprise Vault 10 Feature Briefing Nirvanix Cloud Storage This document is one of a set of Feature Briefings which detail major new or changed features in Enterprise Vault 10. This document covers the
More informationNetBackup Best Practice Using Tape Storage with Deduplicating Disk Storage
NetBackup Best Practice Using Tape Storage with Deduplicating Disk Storage This document looks at best practices around creating multiple copies of backups on a mixture of tape and deduplicating disk storage.
More informationSymantec NetBackup 7 Clients and Agents
Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency
More informationUnderstanding the Value of Symantec Managed Enterprise Vault
REPORT: UNDERSTANDING THE VALUE OF SYMANTEC MANAGED.......... ENTERPRISE........... VAULT................... Understanding the Value of Symantec Managed Enterprise Vault Who should read this paper IT managers
More informationSymantec NetBackup 7.5 What s New and Version Comparison Matrix
Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single
More informationWHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression
WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression Sponsored by: Oracle Steven Scully May 2010 Benjamin Woo IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA
More informationSymantec NetBackup Snapshots, Continuous Data Protection, and Replication
Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Technical Brief: Symantec NetBackup Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Contents Overview...............................................................................................
More informationWHITE PAPER: customize. Best Practice for NDMP Backup Veritas NetBackup. Paul Cummings. January 2009. Confidence in a connected world.
WHITE PAPER: customize DATA PROTECTION Confidence in a connected world. Best Practice for NDMP Backup Veritas NetBackup Paul Cummings January 2009 Best Practice for NDMP Backup Veritas NetBackup Contents
More informationDirect virtual machine creation from backup with BMR
NETBACKUP 7.6 FEATURE BRIEFING DIRECT VIRTUAL MACHINE CREATION FROM BACKUP WITH BMR NetBackup 7.6 Feature Briefing Direct virtual machine creation from backup with BMR Version number: 1.0 Issue date: 5
More informationrecovery at a fraction of the cost of Oracle RAC
Concurrent data access and fast failover for unstructured data and Oracle databases recovery at a fraction of the cost of Oracle RAC Improve application performance and scalability - Get parallel processing
More informationSymantec Backup Exec 2012
Better backup for all Data Sheet: Backup and Disaster Recovery Overview is one integrated product that protects virtual and physical environments, simplifies both backup and disaster recovery, and recovers
More informationHow Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
More informationSymantec NetBackup 5000 Appliance Series
A turnkey, end-to-end, global deduplication solution for the enterprise. Data Sheet: Data Protection Overview Symantec NetBackup 5000 series offers your organization a content aware, end-to-end, and global
More informationEnterprise Vault Whitepaper Configuring a NAS device as Enterprise Vault storage
Enterprise Vault Whitepaper Configuring a NAS device as Enterprise Vault storage This document provides background and guidance on how configure Symantec Enterprise Vault with generic Network Attached
More informationBackup Exec 15: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT SQL........................................ Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
More informationVeritas Replicator from Symantec
Data replication across multi-vendor storage for cost effective disaster recovery Data Sheet: Disaster Recovery Overviewview provides organizations with a comprehensive solution for heterogeneous data
More informationSymantec Enterprise Vault for Lotus Domino
Symantec Enterprise Vault for Lotus Domino Store, Manage and Discover Critical Business Information Overview Industry-leading email archiving for Lotus Domino With the recognition that email has become
More informationMayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation
Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup
More informationSymantec NetBackup 5220
A single-vendor enterprise backup appliance that installs in minutes Data Sheet: Data Protection Overview is a single-vendor enterprise backup appliance that installs in minutes, with expandable storage
More informationSymantec NetBackup 7.1 What s New and Version Comparison Matrix
Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk
More informationData Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
More informationVirtual Machine Protection with Symantec NetBackup 7
Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing to embrace the promise of virtualization for
More informationPST Migration with Enterprise Vault 8.0: Part 1 - Solution Overview. Author: Andy Joyce, EV Technical Product Management Date: April, 2009
WHITE PAPER: TECHNICAL PST Migration with Enterprise Vault 8.0: Part 1 - Solution Overview Author: Andy Joyce, EV Technical Product Management Date: April, 2009 White Paper: Symantec Technical PST Migration
More informationBackup Exec 2014: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SQL........................................ Backup Exec 2014: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
More informationHow Endpoint Encryption Works
WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint
More informationSymantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
More informationData Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,
More informationEnterprise Vault Whitepaper Managing SharePoint Migrations with Enterprise Vault
Enterprise Vault Whitepaper Managing SharePoint Migrations with Enterprise Vault This document provides information on how to use Enterprise Vault to migrate existing SharePoint configurations to a newer
More informationWhite Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
More informationSymantec Enterprise Vault
Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email
More informationSymantec NetBackup deduplication general deployment guidelines
TECHNICAL BRIEF: SYMANTEC NETBACKUP DEDUPLICATION GENERAL......... DEPLOYMENT............. GUIDELINES.................. Symantec NetBackup deduplication general deployment guidelines Who should read this
More informationSymantec Workspace Streaming 6.1
Workspace Management: Simplify IT Organizations Data Sheet: Endpoint Virtualization Overview As IT organizations today face the reality of managing an increasingly complex mix of desktops, laptops, and
More informationW H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers
W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...
More informationWHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server White Paper: Enterprise Security Symantec
More informationWHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview
WHITE PAPER: TECHNICAL OVERVIEW NetBackup Desktop Laptop Option Technical Product Overview Mayur Dewaikar, Sr. Technical Product Manager NetBackup Platform Symantec Technical Network White Paper EXECUTIVE
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationSymantec NetBackup 7.5 for VMware
V-Ray visibility into virtual machine protection Solution Overview: Data Protection Overview There is little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped
More informationSymantec NetBackup 7.5 Clients and Agents
Complete protection for your information-driven enterprise Data Sheet: Data Protection Overviewview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to
More informationCloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.
WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read
More informationNetApp Data Compression and Deduplication Deployment and Implementation Guide
Technical Report NetApp Data Compression and Deduplication Deployment and Implementation Guide Clustered Data ONTAP Sandra Moulton, NetApp April 2013 TR-3966 Abstract This technical report focuses on clustered
More informationAdministration of Veritas Storage Foundation High Availability 5.0 for Windows
Administration of Veritas Storage Foundation High Availability 5.0 for Windows Study Guide The following tables list the Symantec Certification exam objectives for the Administration of Veritas Storage
More informationConfidence in the Cloud Five Ways to Capitalize with Symantec
Five Ways to Capitalize with Symantec Solution Brief: Confidence in the Cloud Confidence in the Cloud Contents Overview...............................................................................................
More informationProposal for Virtual Private Server Provisioning
Interpole Solutions 1050, Sadguru Darshan, New Prabhadevi Road, Mumbai - 400 025 Tel: 91-22-24364111, 24364112 Email : response@interpole.net Website: www.interpole.net Proposal for Virtual Private Server
More informationVeritas NetBackup 6.0 Database and Application Protection
Veritas NetBackup 6.0 Database and Application Protection Innovative data protection When it comes to database and application recovery, Symantec has a clear goal in mind simplify the complexity of database
More informationProtect Microsoft Exchange databases, achieve long-term data retention
Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...
More informationTurnkey Deduplication Solution for the Enterprise
Symantec NetBackup 5000 Appliance Turnkey Deduplication Solution for the Enterprise Mayur Dewaikar Sr. Product Manager, Information Management Group White Paper: A Deduplication Appliance Solution for
More informationBackup Exec 15: Deduplication Option
TECHNICAL BRIEF: BACKUP EXEC 15: DEDUPLICATION OPTION........................................ Backup Exec 15: Deduplication Option Who should read this paper Technical White Papers are designed to introduce
More informationManaging your Red Hat Enterprise Linux guests with RHN Satellite
Managing your Red Hat Enterprise Linux guests with RHN Satellite Matthew Davis, Level 1 Production Support Manager, Red Hat Brad Hinson, Sr. Support Engineer Lead System z, Red Hat Mark Spencer, Sr. Solutions
More informationBackup Exec 2010: Archiving Options
Backup Exec 2010: Archiving Options White Paper: Backup Exec 2010: Archiving Options Backup Exec 2010: Archiving Options Contents Introduction............................................................................................
More informationPerformance Characteristics of VMFS and RDM VMware ESX Server 3.0.1
Performance Study Performance Characteristics of and RDM VMware ESX Server 3.0.1 VMware ESX Server offers three choices for managing disk access in a virtual machine VMware Virtual Machine File System
More informationVirtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:
More informationSymantec Managed PKI for SSL Support Overview. How to get quick and convenient customer support
WHITE PAPER: SYMANTEC MANAGED PKI FOR SSL SUPPORT OVERVIEW Symantec Managed PKI for SSL Support Overview How to get quick and convenient customer support Symantec Managed PKI for SSL Support Overview CONTENTS
More informationSolution Brief: Enterprise Security
Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................
More informationConsulting Services for Veritas Storage Foundation
Reducing the complexity of enterprise storage management The continued explosive growth in corporate data, combined with the proliferation of disparate storage management tools and technologies, has created
More informationTaking the Leap to Virtualization
WHITE PAPER: TAKING THE LEAP TO VIRTUALIZATION........................................ Taking the Leap to Virtualization Who should read this paper Midsized Business IT Directors, IT Managers and IT Administration
More informationSQL Server Solutions GETTING STARTED WITH. SQL Safe Backup
SQL Server Solutions GETTING STARTED WITH SQL Safe Backup Purpose of this document Due to its depth and potential for customization, there are often parts of SQL Safe Backup that are overlooked during
More informationOptimizing the Data Center for Today s State & Local Government
WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S STATE...... &.. LOCAL...... GOVERNMENT.......................... Optimizing the Data Center for Today s State & Local Government Who should read this
More informationReal-time Compression: Achieving storage efficiency throughout the data lifecycle
Real-time Compression: Achieving storage efficiency throughout the data lifecycle By Deni Connor, founding analyst Patrick Corrigan, senior analyst July 2011 F or many companies the growth in the volume
More informationAltiris IT Management Suite 7.1 from Symantec
Altiris IT Management Suite 7.1 from Achieve a new level of predictability Data Sheet: Endpoint Management Overviewview Change is inevitable for IT and it comes from several sources: changing needs from
More informationData Sheet: Storage Management Veritas CommandCentral Storage 5.1 Centralized visibility and control across heterogeneous storage environments
Centralized visibility and control across heterogeneous storage environments Overview Veritas CommandCentral Storage is an industry standard based, comprehensive software solution that seamlessly integrates
More informationSymantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses
WHITE PAPER: LICENSE MANAGEMENT........................................ Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses Who should read this paper IT organizations that
More informationVERITAS Database Edition 2.1.2 for Oracle on HP-UX 11i. Performance Report
VERITAS Database Edition 2.1.2 for Oracle on HP-UX 11i Performance Report V E R I T A S W H I T E P A P E R Table of Contents Introduction.................................................................................1
More informationBest Practices for Using Symantec Online Storage for Backup Exec
WHITE PAPER: xxxxxx Data Protection [00-Cover_Bar] Best Practices for Using Symantec Online Storage for Backup Exec Confidence in a connected world. White Paper: Data Protection Best Practices for Using
More informationData Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Trusted and proven email archiving Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage, and
More informationSystem Requirements Table of contents
Table of contents 1 Introduction... 2 2 Knoa Agent... 2 2.1 System Requirements...2 2.2 Environment Requirements...4 3 Knoa Server Architecture...4 3.1 Knoa Server Components... 4 3.2 Server Hardware Setup...5
More informationBackup Exec 2014: Deduplication Option
TECHNICAL BRIEF: BACKUP EXEC 2014: DEDUPLICATION OPTION........................................ Backup Exec 2014: Deduplication Option Who should read this paper Technical White Papers are designed to
More informationSymantec Backup Exec 11d for Windows Servers New Encryption Capabilities
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities White Paper: Enterprise Security Symantec Backup Exec 11d for Windows Servers Contents Executive
More informationData Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review
Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the
More informationEndpoint Virtualization. Workspace Management: Simplify IT Organizations. Data Sheet Symantec TM Workspace Streaming 6.1
Data Sheet Symantec TM Workspace Streaming 6.1 Workspace Management: Simplify IT Organizations Overview As IT organizations today face the reality of managing an increasingly complex mix of desktops, laptops,
More informationHow To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
More informationLDA, the new family of Lortu Data Appliances
LDA, the new family of Lortu Data Appliances Based on Lortu Byte-Level Deduplication Technology February, 2011 Copyright Lortu Software, S.L. 2011 1 Index Executive Summary 3 Lortu deduplication technology
More informationSymantec Workspace Virtualization 7.6
Simplifies application packaging and delivery, eliminates application conflicts, supports normal visibility Data Sheet: Endpoint Management Improve the control and management of your organization s endpoints
More informationSAP HANA In-Memory Database Sizing Guideline
SAP HANA In-Memory Database Sizing Guideline Version 1.4 August 2013 2 DISCLAIMER Sizing recommendations apply for certified hardware only. Please contact hardware vendor for suitable hardware configuration.
More informationSymantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
More informationRunning VirtualCenter in a Virtual Machine
VMWARE TECHNICAL NOTE VirtualCenter 2.x Running VirtualCenter in a Virtual Machine Running VirtualCenter in a virtual machine is fully supported by VMware to the same degree as if it were installed on
More informationBest Practices on monitoring Solaris Global/Local Zones using IBM Tivoli Monitoring
Best Practices on monitoring Solaris Global/Local Zones using IBM Tivoli Monitoring Document version 1.0 Gianluca Della Corte, IBM Tivoli Monitoring software engineer Antonio Sgro, IBM Tivoli Monitoring
More informationAltiris IT Management Suite 7.1 from Symantec
Altiris IT 7.1 Achieve a new level of predictability Overviewview Change is inevitable for IT and it comes from several sources: changing needs from lines of business, managing and supporting too many
More informationConfidence in a connected world. Veritas NetBackup 6.5 for VMware 3.x Best Practices
WHITE PAPER: Best Practices Confidence in a connected world. Veritas NetBackup 6.5 for VMware 3.x Best Practices White Paper: Best Practices Veritas NetBackup 6.5 for VMware 3.x Best Practices November
More informationReference Guide WindSpring Data Management Technology (DMT) Solving Today s Storage Optimization Challenges
Reference Guide WindSpring Data Management Technology (DMT) Solving Today s Storage Optimization Challenges September 2011 Table of Contents The Enterprise and Mobile Storage Landscapes... 3 Increased
More informationHardware Configuration Guide
Hardware Configuration Guide Contents Contents... 1 Annotation... 1 Factors to consider... 2 Machine Count... 2 Data Size... 2 Data Size Total... 2 Daily Backup Data Size... 2 Unique Data Percentage...
More informationData Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery
Data replication for disaster recovery Overview Veritas Volume Replicator provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable recovery of critical
More informationEMC DATA DOMAIN OPERATING SYSTEM
ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read
More informationAn Oracle White Paper January 2012. Advanced Compression with Oracle Database 11g
An Oracle White Paper January 2012 Advanced Compression with Oracle Database 11g Oracle White Paper Advanced Compression with Oracle Database 11g Introduction... 3 Oracle Advanced Compression... 4 Compression
More informationRed Hat Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure.
More informationWHITE PAPER. Effectiveness of Variable-block vs Fixedblock Deduplication on Data Reduction: A Technical Analysis
WHITE PAPER Effectiveness of Variable-block vs Fixedblock Deduplication on Data Reduction: A Technical Analysis CONTENTS Executive Summary... 3 Fixed vs. Variable-block Deduplication... 3 Test Configuration...
More informationA Symantec Connect Document. A Total Cost of Ownership Viewpoint
A Symantec Connect Document Two-Factor Authentication A Total Cost of Ownership Viewpoint White Paper: Two-Factor Authentication: A TCO Viewpoint Two-Factor Authentication Contents Introduction............................................................................................
More informationRed Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform
More informationProduct Overview. Initial Seeding
Product Overview Initial Seeding After installing POPI Online Backup software on your servers, you can start backing up data to our secure cloud service over the Internet. Copying large amounts of data
More informationWhat s New in Ghost Solution Suite 3.0
What s New in Ghost Solution Suite 3.0 This document highlights some of the most impactful new features of Ghost Solution Suite 3.0 For more comprehensive information, please view the Ghost Solution Suite
More informationAnonymizing Filesystem Metadata for Analysis
Anonymizing Filesystem Metadata for Analysis Chris Xin Symantec 2006 Symantec Corporation, All Rights Reserved Challenges of Filesystem Analysis Real-time live-system monitoring is difficult. performance
More information