Backup Appliances: When to Choose Them, When to Avoid Them. Whitepaper. WD Business Storage Solutions
|
|
- Claud Barber
- 8 years ago
- Views:
Transcription
1 Backup Appliances: When to Choose Them, When to Avoid Them Whitepaper WD Business Storage Solutions
2 Contents Contents... 2 Executive Summary... 3 The Evolution of Backup - Traditional Strategies and the Causes of Data Loss... 4 The Backup Imperative... 4 Causes of Data Loss... 4 Types of Backup and Considerations... 4 Business Requirements, Deployment Preferences... 5 Network Backups: Reducing Cost, Simplifying Management... 6 PBBA Overview... 8 Alternative Backup Methods... 9 Choosing the Right Backup Appliance (1) Levels of Technical Expertise (2) Speed of Provisioning (3) Physical Security and Malware Isolation (4) Integration of Additional Services - Seed and Feed Technology (5) Fully-Engineered Solutions (6) Flexible Configuration (7) Technical Support Throats to Choke When are PBBAs Not the Best Solution? The Bottom Line Summary and Conclusion WD Arkeia Page 2 of 17
3 Executive Summary From a small office environment to the most expansive of enterprises, backing up data is important simply because data is important. This white paper reviews the evolution of data backup technology following the migration from direct-to-tape to tape-to-disk and, more recently, to disk-to-cloud and defines the genesis of purpose-built backup appliances (PBBAs) among the alternative backup methods of software and virtual appliances. It also explores the various trends leading to the emergence of PBBAs, as well as the dimensions used to evaluate these trends when determining if a PBBA makes sense for a network environment. When it comes to network backup, there is no one-size-fits-all solution. Even the most ideal program implemented today can be outgrown as a company s needs change over time. Considering the variety and complexity of available hardware and software, a best practice is to engage a knowledgeable solution provider, capable of serving as a trusted partner to support a company as it examines the many secure and scalable options that are available to address their network backup requirements. WD Arkeia Page 3 of 17
4 The Evolution of Backup - Traditional Strategies and the Causes of Data Loss The Backup Imperative The single largest cause of data loss is hardware failure which accounts for about 40% of data loss (source: Kroll Ontrack); but a combination of other factors (e.g., human error, software failure, malware and natural disasters) leads to more data being lost overall (see Figure 1). Obviously some hardware failure is due to disk drive malfunction, which can be prevented by using RAID technology, but over 50% of the data lost from hardware failure and all other contributing factors, cannot be prevented by simple solutions such as RAID. Causes of Data Loss The practice of backing up data involves much more than just creating a copy of one s files and folders. True data backup is a solution that allows the clock to be rolled back by establishing restore points, which offer the ability to recover data as it was at a specific date and time in the past. Restore points are invaluable when lost data needs to be recovered. For most companies, as well as individual consumers, having multiple restore points to access and recover data is a wise practice. Types of Backup and Considerations The benefits of restore points in data backup are twofold: Allows data to be restored from a specific day and time. Protect data from the dangers of failure, error or disaster. Figure 1 Causes of Data Loss There are different types of data backup, some created more than 50 years ago. Historically, backups were done to tape. Initially they were made on magnetic, nine-track open-reel setups with separate housings for the tape and take-up reels that required manual mounting and usually needed human operators to change reels (see Figure 2). Later, tape cassettes that conveniently housed both reels inside the same mechanical device were introduced. Figure 2 Tape Backups Managed by autoloaders, libraries of cassette tapes paved the way for automation (see Figure 3). Dozens to hundreds to thousands of cassettes could easily be accessed and returned by robotic arms, offering a very efficient method to perform large data backups to large volumes of tape without requiring human intervention. Figure 3 Cassette Tape Libraries WD Arkeia Page 4 of 17
5 What Is Data Deduplication? Data deduplication is a kind of global compression that looks for commonality across multiple files. By only having to store content once, content that is common across multiple files can be dramatically compressed to reduce storage requirements. Global compression is distinct from local compression and its more familiar algorithms. Local compression strategies target the compression of individual files, and use algorithms like DEFLATE (i.e. zip ), JPEG, or MPEG. Learn More about deduplication and how it works-- Backup to tape is still widely used today by the majority of medium and enterprise-sized businesses as their final backup target. It was less than a decade ago that backups to disk media, via hard disk drives (HDDs) (Figure 4) originally introduced in 1956 by IBM, really began to make sense. Fueled by the prevalence of personal computers emerging in the 1980 s, costs associated with hard disk storage have steadily continued to drop and, as a result made, the feasibility of backup to disk media rapidly gain in popularity. The growing interest in using dedicated solutions such as purpose-built Figure 4 Hard Disk Drive backup appliances (PBBAs) for backup is further evidence of the shift from tape to disk. When evaluating a backup solution, there are a number of things to consider. First you must decide on the preferred backup target: is it target to tape or target to disk? It is important to remember that, whether backups are made to tape or to disk, the safest method is one that includes a data backup that is replicated for off-site storage. In making the backup target decision, PBBAs can be used for either kind of deployment. Business Requirements, Deployment Preferences Next, you ll need to decide on the frequency of your data backed up. What makes the most sense for time and budget constraints: backups that are done hourly, daily or weekly? The more frequently data backup is performed and restore points are established, the less likely it is that data will potentially be lost. The disadvantages of high frequency restore points are that they take system processing and network resources as well as additional storage to maintain the restore points. The third issue to consider is the use of full differential or incremental backup strategies. These different types of backups were created more than 50 years ago to accommodate earlier tape technology and the generally high associated cost of storage. By doing incremental backups, the amount of data that needs to be written to tape is reduced in establishing a restore point, meaning only the files that have been changed since the most recent restore point are backed up. WD Arkeia Page 5 of 17
6 Gartner Group Predictions Through 2015, disk-to-disk-to-tape (D2D2T) backup will remain the predominant strategy for large enterprises. By the end of 2016, 40% of large enterprises, up from 20% at year-end 2012, will have eliminated tape for operational recovery. Between 2012 and 2016, one-third of organizations will change backup vendors due to frustration over cost, complexity and/or capability. By 2016, at least 20% of large enterprises will abandon backup/recovery solutions using a traditional methodology and adopt those that employ only snapshot and replication techniques, up from less than 7% today. Gartner Group, Strategic Planning Assumptions/Magic Quadrant paper, June Incremental backups make it possible to have many more restore points with the same volume of data than one might normally be able to have. The downside of performing incremental backups, in the instance of tape, is that it can slow the recovery process. This occurs because, rather than restoring tapes with only the data that is to be recovered, you may have to mount many different tapes, taking only a small amount of data off of each tape in the data restoration process. Today when using backup to disk, the concept of full differential or incremental backups is almost no longer relevant, since deduplication technologies make every backup effectively an incremental backup in terms of volume. When it comes to backup time, however, relying on incremental as a backup strategy still makes sense since the method of data access during the backup process looks at the file level where deduplication backup is done at the block level. The final point to consider when deploying a backup solution is where the backed-up data will physically be stored. Some businesses still do backups and backup storage on-site. This practice is risky. It cannot be stressed strongly enough that a backup cannot be depended upon unless it is stored off site. If a workplace or business is destroyed due to natural disaster, theft or even simple human error, no one wants to lose the backup data at the same time as vital production data is lost. Network Backups: Reducing Cost, Simplifying Management Another technology that has significantly impacted data backup is networking. The industry is moving away from the original standard of using one tape device to back up a single computer. This one-to-one pairing only made sense when things are expensive. Over the years, as the cost of computers was reduced and proliferated while mechanically-complex tape drives were not, a new method was found to reduce the cost of backing up the expanding number of multiple machines. The answer was provided by network technology. A single backup server could now connect to hundreds of machines and access the data from all of the systems on the network during the backup process, storing it on a single target. The purpose of network backup is to both reduce the cost of performing backups and to simplify its management by limiting deployments to a single backup server per each local area network (LAN). WD Arkeia Page 6 of 17
7 The trends mentioned earlier have driven the cause for purpose-built backup appliance (PBBA) adoption with the transition from tape to disk, in particular, being an essential element leading to their increasing favor with small and mid-sized business applications. Purpose-built backup appliances exist today because hard drives have become both efficient and effective targets for backups. All physical PBBAs have hard disk drives in them; some have both hard drives and tape drives inside. The change in business requirements is directly impacting the drive toward PBBA adoption. In the past, most companies had only a single data center with all backups performed there by a dedicated skilled IT staff in that one location. Today, most companies have multiple offices where data is created and each of these offices requires its own backup infrastructure. This is one of the significant motivations for the use of PBBAs delivering backup solutions in environments that do not have heavy technical expertise readily available. Another trend relevant to network backup and to other product categories is the increasing preference within IT organizations of purchasing appliances from a single vendor rather than building their own solutions. Buying an appliance from a single vendor makes it faster to deploy a solution as well as simpler to support. It is also a reflection of the One Throat to Choke preference in keeping things accountable to a single vendor when issues arise. An extra point in favor of PBBAs is the potential of having additional features provided by the PBBA vendors. Companies such as WD, for instance, deliver certain PBBAs with network boot for bare metal recovery and network link aggregation. WD Arkeia Page 7 of 17
8 IDC Tracks Continued Growth of PBBA Market According to the International Data Corporation (IDC) Worldwide Quarterly Purpose-Built Backup Appliance Tracker worldwide purpose-built backup appliance (PBBA) factory revenues posted a 6.7% yearover-year increase, totaling $713.5 million, in the third quarter of 2013 (3Q13). In addition, the total PBBA open systems market grew 6.9% year over year in 3Q13, with revenues totaling $622.7 million. Total worldwide PBBA capacity shipped reached 383,153 terabytes, growing a scant 2.4% year over year. "The total worldwide PBBA market continued to experience growth despite a challenging macroeconomic environment." Robert Amatruda, Research Director, Data Protection and Recovery. "PBBA solutions are being embraced by customers of all sizes as a turnkey, simplified approach to data protection and recovery." IDC defines a purpose-built backup appliance (PBBA) as a standalone disk-based solution that utilizes software, disk arrays, server engine(s), or nodes that are used for a target for backup data and specifically data coming from a backup application (e.g., NetWorker, NetBackup, TSM, and Backup Exec) or can be tightly integrated with the backup software to catalog, index, schedule, and perform data movement. The PBBA products are deployed in standalone configurations or as gateways. PBBA solutions deployed in a gateway configuration connect to and store backup data on general-purpose storage. Here, the gateway device is serving as the component that is purpose built solely for backup and not for supporting any other workload or application. Regardless of packaging (as an appliance or gateway), PBBAs can have multiple interfaces or protocols. Also, PBBAs often can provide and receive replication to or from remote sites and a secondary PBBA for the purpose of disaster recovery (DR). (source: IDC press release, 19 Dec 2013) PBBA Overview The term purpose-built backup appliance or PBBA was coined several years ago by International Data Corporation (IDC) analyst Robert Amatruda on his observation that these unique types of backup appliances were not only an anomaly but they were becoming a product category in and of themselves. The first PBBA was delivered in 2006 by Avamar Technologies that today is part of EMC. The second PBBA was delivered in 2007 by Arkeia now owned by WD - and since then many more companies have started to deliver these types of network backup solutions. Taking a closer look, what defines purpose-built backup appliances and how are they used? Purpose-built backup appliances (PBBAs) are stand-alone, disk-based backup servers that use disk arrays, software, and server engines/nodes as integrated storage targets for backup data and replicated backup data. Features include data compression, deduplication, encryption, remote replication and interfaces for support. PBBAs are always connected to a network in order to access the machines they are to protect and well-designed backup appliances preclude the running of other workloads or additional software. On one hand this can be seen as a limitation of PBBAs but it is also the reason why they are such reliable backup servers. PBBAs are significant since their hardware is fine-tuned expressly for one application: data backup. Everything in a PBBA, all the technologies from connectivity, to disk storage to the CPU necessary for de-dupe processing, to the use of tape drives, hard disk drives or SSDs all of the components involved are engineered to deliver a complete and perfectly-balanced backup server. It is important to note that while they may appear to be the same, PBBAs are not all-purpose servers and users are generally precluded from installing custom applications on them. PBBAs can be deployed in standalone self-contained systems or function as gateways connecting to shared storage such as a storage area network (SAN) Some PPBAs, such as those produced by WD Arkeia, offer integrated tape drives that allow businesses to take the backed up data off-site at the completion of the backup process Some PBBAs have incorporated SSDs that store the backup catalog that enhances the deduplication performance WD Arkeia Page 8 of 17
9 Alternative Backup Methods Other than PBBAs, there are two additional modes whereby backup servers can be effectively deployed in a network: Software Application (SW) Virtual Appliance (VA) Because PBBAs have only existed since 2006, the most universal solution prior to the use of PBBSs was backup using a software application. With software backups, a company would typically license the backup software, buy the necessary hardware, provide and configure an operating system (OS) and then install the backup server before being able to initiate the backup process. Subsequent to PBBAs, another viable option is the delivery of backup servers as virtual appliances. Virtual appliances take the firmware that would otherwise exist within a PBBA along with a pre-configured operating system and deploy it on a hypervisor, by way of either Microsoft Hyper-V, VMware vsphere, or another brand of hypervisor. Depending on the network backup requirements and preferences of a particular business, each deployment method offers its own mix of features, benefits and limitations. WD Arkeia Page 9 of 17
10 Choosing the Right Backup Appliance There are seven essential areas to consider when determining how each of the three backup solutions match up with the dimensions important in the decision making process: 1. Levels of Technical Expertise 2. Speed of Provisioning 3. Physical Security and Malware Isolation 4. Integration of Additional Services 5. Fully-engineered Solutions 6. Flexible Configuration 7. Technical Support Throats to Choke (1) Levels of Technical Expertise Looking at levels of technical expertise, PBBAs rank well, requiring little expertise to set up, deploy and maintain. One can effectively plug them in, set an IP address, install the necessary agents, and start a backup. PBBAs are the easiest of the three, whereas a software application by comparison requires the most technical expertise to deploy. In establishing a software-based backup server, one has to identify and acquire the hardware, the OS, install the software, configure the storage, and install the agents all before the process of backing up data can commence. Software backup applications require a lot of work even when there are teams present to support the deployment process. In the middle, between the two backup solutions is that of the virtual appliance, requiring a bit more expertise than PBBAs but not so much as software. Table 1 Required Levels of Expertise to Deploy PBBA Software Application (SW) Virtual Appliance (VA) Low High Moderate Plug it In Install Software Deploy on Hypervisor Set IP Address Install OS Configure Storage Start Backup Install Backup Software Set IP Address Configure Storage Start Backup Start Backup WD Arkeia Page 10 of 17
11 (2) Speed of Provisioning In the evaluation of the best backup method for deployment, speed of provisioning is another important factor. PBBAs take a little time and require a few physical steps to deploy. This makes them slower than deploying VAs for backup. Managed Service Providers (MSPs) have broadly adopted VAs because they can be deployed effectively on demand. This makes sense for data centers that have multiple LANs and very large numbers of distinct customers that need to be protected. The slowest one of the three methods for speed in provisioning is software. Table 2 Speed of Provisioning PBBA Software Application (SW) Virtual Appliance (VA) Moderate Slowest Fastest Fast but Requires Some Physical Steps Manual Process Roll Your Own Can be Scripted Remote Deployments Possible (3) Physical Security and Malware Isolation Physical security and malware isolation is another critical consideration in backup deployment options. PBBAs rank high since they have the advantage of being on dedicated hardware running a hardened operating system. The term hardened OS is derived from the fact that, in tuning it for specific use in a PBBA, all of the services not necessary for a backup server are terminated at startup. Since all of the other services, such as the processes that listen to ports are turned off with PBBAs, by virtue of having the hardware physically separate and by having a hardened OS, the machine and data are much better protected than they would otherwise be. The least secure are software applications because they are deployed on shared hardware and are most often deployed on standard or existing operating systems that perform other functions outside of data backups. This makes them vulnerable to malware. Virtual appliances are in the middle, having some, but not all, of the risk. Table 3 Security Levels and Malware Isolation PBBA Software Application (SW) Virtual Appliance (VA) High Low Moderate Shared/Dedicated Hardware Shared/Dedicated Hardware Shared Hardware Hardened OS Standard OS Hardened OS WD Arkeia Page 11 of 17
12 (4) Integration of Additional Services - Seed and Feed Technology Getting backup sets off-site has traditionally been accomplished by using tapes on trucks. The practice of using Seed and Feed is a technology offered by WD Arkeia to move backup sets off-site using physical media in the form of hard drives. When using hard drives instead of tape, moving backup sets off-site via disk is generally done over the wide area network (WAN) and one concern is bandwidth limitations which can be very expensive. Seed and Feed is a technology that lets a backup set be exported from one backup server and shipped either via sneaker-net (on foot) or by way of a common carrier like FedEx or UPS to a remote location. On arrival, the backup set is then imported onto the backup server at that remote location. Seed and Feed uses USB connected portable media as an alternative to using a WAN. This practice is very cost effective since many large volumes of data can be moved quickly, and while the latency is high, the bandwidth is also very high. Nightly backups can be sent over the network while big backups, like the first backup or those for disaster recovery, are done by sending USB-connected hard drives. PBBAs are an obvious choice to implement Seed and Feed technology since both software applications and virtual appliances require significantly more effort in the securing of off-site data backup delivery. Table 4 Integration of Additional Services PBBA Software Application (SW) Virtual Appliance (VA) Seed and Feed (Ideally-Suited) Some Effort to Implement Some Effort to Implement USB Ports fully managed automatically Based on the OS, without integration in the product Network boot mode for Bare Metal Recovery Network link aggregation RAID management (5) Fully-Engineered Solutions Distinctive from both software and virtual appliance backup applications, PBBAs offer an out-of-the-box backup solution that can be up and running in a matter of hours. In addition to having system components specifically tested and certified for reliable network backup, purpose-built backup appliances have the advantage of using a hardened operating system, meaning that only the elements needed to do specific backup and recovery functions are enabled. Both software applications and virtual appliances have to work with operating systems shared among a variety of components that perform other tasks. This can limit and sometimes adversely impact backup performance. WD Arkeia Page 12 of 17
13 Table 5 Fully-Engineered Solutions PBBA Software Application (SW) Virtual Appliance (VA) Yes No No Hardened OS Build Your Own Build Your Own Enterprise-grade Components Yes Build Your Own SSD Yes Build Your Own Redundant Everything Yes Build Your Own Ready for Tape Device Yes Build Your Own Tested and Certified System Components Yes (6) Flexible Configuration Another important criteria when evaluating PBBAs is the flexibility of configuration. To truly customize a backup solution, using a software application is the best way to go since it offers the greatest amount of flexibility. Table 6 Configuration Flexibility PBBA Software Application (SW) Virtual Appliance (VA) PBBA Software Application Virtual Appliance Low High Moderate Pre-configured Appliances Infinite Flexibility Less Flexible than Software Limited Customization Possible Greater Flexibility than PBBA Licenses per PBBA Different Hardware with Same License WD Arkeia Page 13 of 17
14 (7) Technical Support Throats to Choke The final consideration in selecting a PBBA is a business preference for the number of vendors to address when issues arise. Choosing PBBAs offer the simplest route to take since, with their deployment, there is a single vendor that provides a total backup solution and thus a single vendor to contact if issues arise. The selection of virtual appliances involves interaction with several vendors for the backup solution and therefore contact with a few different companies will be necessary if a company requires support. When using a software application for backup, many vendors play different roles to arrive at the backup solution. As a result, there can be a variety of vendor throats to choke when a company is experiencing problems and needs technical help. Table 7 Tech Support Vendors to Access PBBA Software Application (SW) Virtual Appliance (VA) One (Hardware, OS and Application) Many Several Table 8 Backup Solution Summary Criteria PBBA Software Application Virtual Appliance (VA) Required Tech Expertise Low High Moderate Speed of Provisioning Moderate Slow Fastest Physical Security and Malware High Low Moderate Integration of Additional Services High Low Moderate Integration of Additional Services High Low Moderate Fully Engineered Solution Yes No No Flexible Configuration Low High Moderate WD Arkeia Page 14 of 17
15 When are PBBAs Not the Best Solution? Businesses requiring a very high level of customization might find that PBBAs are not the best method of network data backup deployment. For example, some larger deployments might want to integrate the backup solution within a more global storage solution and using the command-line interface to build scripts, it is possible to embed a backup engine, such as the one available from WD Arkeia, into such a solution. Companies with rapidly growing volumes of data that are unsure about the technologies they will rely on in the future for their IT infrastructure might prefer to consider a software deployment which allows them the flexibility of moving backup licenses from one hardware platform to another. Another consideration when deploying a PBBA is cost. Typically, PPBAs carry a much higher upfront cost, since they are both a hardware and software solution. Budget conscious buyers who already have available hardware may find a software deployment a much more cost-effective solution. WD Arkeia Page 15 of 17
16 The Bottom Line When evaluating different options for network backup, striking a balance of budget resources versus capabilities is key. Using PBBAs can offer meaningful savings of both time and money and the built-in feature sets streamline the backup process. This is demonstrated by the improved productivity of IT staff who do not have to spend additional hours on data backup/recovery, and by end-users who no longer have to wait as long during data recovery processes. Using PBBAs offers secure, affordable network backup even for companies with limited technical expertise. WD Arkeia Page 16 of 17
17 Summary and Conclusion Rather than reinventing the wheel when it comes to network backup, purpose-built backup appliances are a best choice for companies that want solid backup functionality from a fully-engineered, out-of-the-box solution with seed and feed functionality that offers malware isolation and maximum security. This is especially true for companies that do not have advanced IT staff always on-site or accessible to handle issues that arise during backup, restore or disaster recovery situations. When evaluating the plethora of available network backup options on the market today, it is important to think about current requirements balanced with what might be needed for backup in the future. For example, a small company taking advantage of a PBBA right now for its data backup might want to delve into virtualization in the near future, in which case moving to a virtual appliance model for backup could be advisable. Or, as a company grows and diversifies it might desire a greater level of customization and when this happens, moving to a software-based backup solution could be a better choice. The key in determining the best backup solution is selecting a partner that excels in providing service and support in all three options: purpose-built backup appliances; software backup; and virtual appliance backup. Companies such as Western Digital, with the variety of options from WD Arkeia, offer backup solutions that range from PBBAs to servers that use software applications and an array of virtual appliance backup methods that can be optimized to fit the backup deployment needs and budgetary requirements unique to each business today and in the future. For service and literature: Western Digital, WD, and the WD logo are registered trademarks of Western Digital Technologies, Inc. in the U.S. and other countries, and WD Arkeia and Progressive Deduplication are trademarks of Western Digital Technologies, Inc.in the U.S. and other countries. Other marks may be mentioned herein that belong to other companies. Product specifications subject to change without notice Western Digital Technologies, Inc. All rights reserved A00 May 2014 WD Arkeia Page 17 of 17
Hybrid Business Cloud Backup
Hybrid Business Cloud What it is. What it s good for. Tom Gallivan Vice President of Sales February 25 th, 2014 2 AGENDA Hybrid Business Cloud 1 2 3 4 5 Data Loss and Cloud vs. Hybrid Business Cloud Sizing
More informationSymantec Backup Appliances
Symantec Backup Appliances End-to-end Protection for your backup environment Stefan Redtzer Sales Manager Backup Appliances, Nordics 1 Today s IT Challenges: Why Better Backup is needed? Accelerated Data
More informationSYMANTEC NETBACKUP APPLIANCE FAMILY OVERVIEW BROCHURE. When you can do it simply, you can do it all.
SYMANTEC NETBACKUP APPLIANCE FAMILY OVERVIEW BROCHURE When you can do it simply, you can do it all. SYMANTEC NETBACKUP APPLIANCES Symantec understands the shifting needs of the data center and offers NetBackup
More informationBusiness-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance
Intel Xeon processor Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance The easy solution for backup to disk with deduplication Intel Inside. Powerful Solution Outside. If
More informationEvery organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its
DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business
More informationTurnkey Deduplication Solution for the Enterprise
Symantec NetBackup 5000 Appliance Turnkey Deduplication Solution for the Enterprise Mayur Dewaikar Sr. Product Manager, Information Management Group White Paper: A Deduplication Appliance Solution for
More informationDelivering Performance and Value through Multiple Deduplication Pools
SOLUTION BRIEF: SYMANTEC NETBACKUP........................................ Delivering Performance and Value through Multiple Deduplication Pools Who should read this paper - Directors of IT and IT Managers
More informationSolution Overview. Business Continuity with ReadyNAS
Business Continuity with ReadyNAS What is ReadyNAS? ReadyNAS is a family of network storage solutions for small and medium businesses, workgroups, and remote/home offices. ReadyNAS delivers unified storage
More informationDisaster Recovery Strategies: Business Continuity through Remote Backup Replication
W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication
More informationBusiness-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance
Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance The easy solution for backup to disk with deduplication If you rethink your backup strategy, then think of ETERNUS CS800
More informationBackup in a Data Driven World: Affordable Backup Options for Home and SMB
1 A NEW NAS Experience a white paper Backup in a Data Driven World: Affordable Backup Options for Home and SMB September 2009 Table of Contents 2 Introduction 3 What is NAS? 3 Backup Methods and Features
More informationTotal Cost of Ownership Analysis
Total Cost of Ownership Analysis Abstract A total cost of ownership (TCO) analysis can measure the cost of acquiring and operating a new technology solution against a current installation. In the late
More informationHow To Get A Storage And Data Protection Solution For Virtualization
Smart Storage and Modern Data Protection Built for Virtualization Dot Hill Storage Arrays and Veeam Backup & Replication Software offer the winning combination. Veeam and Dot Hill Solutions Introduction
More informationDEDUPLICATION BASICS
DEDUPLICATION BASICS 4 DEDUPE BASICS 12 HOW DO DISASTER RECOVERY & ARCHIVING FIT IN? 6 WHAT IS DEDUPLICATION 14 DEDUPLICATION FOR EVERY BUDGET QUANTUM DXi4000 and vmpro 4000 8 METHODS OF DEDUPLICATION
More informationLet s Build a Better Backup
Let s Build a Better Backup TABLE OF CONTENTS Introduction 03 Why Protect your Data? 04 3C s of Data Protection 05 9 Steps to Building a Better Backup 06 Telsist Builds Better Backups 08 1 FRUSTRATED?
More informationCloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.
WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read
More informationProtect Microsoft Exchange databases, achieve long-term data retention
Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...
More informationUsing HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup
Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP
More informationWhat You Need to Know NOW about Next Generation Data Protection. Kenny Wong Senior Consultant June 2015
What You Need to Know NOW about Next Generation Data Protection Kenny Wong Senior Consultant June 2015 The Changing Face of Data Protection Changing computing infrastructure Data protection silos Application
More informationMoving beyond tape backup.
IBM Global Services January 2008 Moving beyond tape backup. Addressing the data protection challenges for midsize businesses Page 2 Contents 2 Introduction 2 Data protection challenges 2 Under resourced
More informationData Protection Report 2008 Best Practices in Data Backup & Recovery
Data Protection Report 2008 Best Practices in Data Backup & Recovery Prepared for: Executive Summary Data is growing at an incredible rate. As a result, the demands of data protection increase as well.
More informationDell PowerVault DL Backup to Disk Appliance Powered by CommVault. Centralized data management for remote and branch office (Robo) environments
Dell PowerVault DL Backup to Disk Appliance Powered by CommVault Centralized data management for remote and branch office (Robo) environments Contents Executive summary Return on investment of centralizing
More informationStorage Backup and Disaster Recovery: Using New Technology to Develop Best Practices
Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,
More informationIBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
More informationData Backup Options for SME s
Data Backup Options for SME s As an IT Solutions company, Alchemy are often asked what is the best backup solution? The answer has changed over the years and depends a lot on your situation. We recognize
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T Optimizing Ap p r oaches to E n t e r p rise B ackup a n d R e c o ve r y August 2014 Adapted from Worldwide Disk-Based Data Protection and Recovery 2013 2017
More informationDisk-to-Disk-to-Offsite Backups for SMBs with Retrospect
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use
More informationFlexible backups to disk using HP StorageWorks Data Protector Express white paper
Flexible backups to disk using HP StorageWorks Data Protector Express white paper A powerful and simple way to combine the advantages of disk and tape backups to improve backup efficiency, reduce data
More informationAvailability and Disaster Recovery: Basic Principles
Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer
More informationBringing the edge to the data center a data protection strategy for small and midsize companies with remote offices. Business white paper
Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices Business white paper Table of contents Data protection synonymous with business success...
More informationProtecting your Data in a New Generation Virtual and Physical Environment
Protecting your Data in a New Generation Virtual and Physical Environment Read this white paper to learn how you can easily and safely protect your data in a new generation virtual and physical IT environment,
More informationTake Advantage of Data De-duplication for VMware Backup
Take Advantage of Data De-duplication for VMware Backup Lauren Whitehouse Analyst, Enterprise Strategy Group Tom Martin Avamar Product Management, EMC Mike Zolla Avamar Chief Architect, EMC 1 EMC Avamar
More informationWHITE PAPER. www.fusionstorm.com. The Double-Edged Sword of Virtualization:
WHiTE PaPEr: Easing the Way to the cloud: 1 WHITE PAPER The Double-Edged Sword of Virtualization: Solutions and Strategies for minimizing the challenges and reaping the rewards of Disaster recovery in
More informationEMC Data Domain Boost for Oracle Recovery Manager (RMAN)
White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with
More informationEfficient Backup with Data Deduplication Which Strategy is Right for You?
Efficient Backup with Data Deduplication Which Strategy is Right for You? Rob Emsley Senior Director, Product Marketing CPU Utilization CPU Utilization Exabytes Why So Much Interest in Data Deduplication?
More informationCost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved.
Cost Effective Backup with Deduplication Agenda Today s Backup Challenges Benefits of Deduplication Source and Target Deduplication Introduction to EMC Backup Solutions Avamar, Disk Library, and NetWorker
More informationBackup Software? Article on things to consider when looking for a backup solution. 11/09/2015 Backup Appliance or
11/09/2015 Backup Appliance or Backup Software? Article on things to consider when looking for a backup solution. Ray Quattromini FORTUNA POWER SYSTEMS LTD T: 01256 782030 E: RAY@FORTUNADATA.COM W: WWW.FORTUNADATA.COM
More informationRecoverPoint for Virtual Machines Richard Schmidt Backup Recovery SE
RecoverPoint for Virtual Machines Richard Schmidt Backup Recovery SE 1 Data Protection Continuum Availability, Replication, Backup And Archive Applications Have Different Data Protection Requirements Availability
More informationEMC BACKUP MEETS BIG DATA
EMC BACKUP MEETS BIG DATA Strategies To Protect Greenplum, Isilon And Teradata Systems 1 Agenda Big Data: Overview, Backup and Recovery EMC Big Data Backup Strategy EMC Backup and Recovery Solutions for
More informationLeveraging Virtualization for Disaster Recovery in Your Growing Business
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
More informationCA ARCserve Family r15
CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing
More informationMANAGED SERVICE PROVIDERS SOLUTION BRIEF
MANAGED SERVICE PROVIDERS SOLUTION BRIEF The Assured Recovery Services Platform The data protection world has drastically changed in the past few years. Protection and recovery of data and systems has
More informationEMC Integrated Infrastructure for VMware
EMC Integrated Infrastructure for VMware Enabled by EMC Celerra NS-120 Reference Architecture EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000
More informationBarracuda Backup. Michael Ulrich Channel Sales Manager Switzerland
Barracuda Backup Michael Ulrich Channel Sales Manager Switzerland What does this fish make? Barracuda provides Security and Storage solutions that simplify IT for organizations of all sizes Our vision
More informationReducing Backups with Data Deduplication
The Essentials Series: New Techniques for Creating Better Backups Reducing Backups with Data Deduplication sponsored by by Eric Beehler Reducing Backups with Data Deduplication... 1 Explaining Data Deduplication...
More informationUniversal Backup Device with
Universal Backup Device with Fibre Channel Disk to Disk Backup with Affordable Deduplication and Replication for IBM Power Systems Executive Overview Copyright (c)2015 Electronic Storage Corporation Universal
More informationEMC VELOCITY BACKUP & RECOVERY SPECIALTY SIMPLE. PREDICTABLE. PROFITABLE.
EMC VELOCITY BACKUP & RECOVERY SPECIALTY SIMPLE. PREDICTABLE. PROFITABLE. TRANSFORM YOUR CUSTOMER S BACKUP AND YOUR PROFITABILITY EMC s Velocity Solution Provider Program is an award-winning, competency-based
More informationSymantec NetBackup 7.1 What s New and Version Comparison Matrix
Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk
More informationQuantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication
PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this
More informationCISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR
PERFORMANCE BRIEF CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR INTRODUCTION Enterprise organizations face numerous challenges when delivering applications and protecting critical
More informationEight Considerations for Evaluating Disk-Based Backup Solutions
Eight Considerations for Evaluating Disk-Based Backup Solutions 1 Introduction The movement from tape-based to disk-based backup is well underway. Disk eliminates all the problems of tape backup. Backing
More informationNETGEAR ReadyRECOVER Offsite Data Protection: Replication Overview and Configuration Guide
NETGEAR ReadyRECOVER Offsite Data Protection: Replication Overview and Configuration Guide Table of Contents NETGEAR ReadyRECOVER Offsite Data Protection... 1 Table of Contents... 2 ReadyRECOVER Introduction...
More informationVirtual Machine Protection with Symantec NetBackup 7
Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing to embrace the promise of virtualization for
More informationBackup and recovery as agile as the virtual machines being protected
hosted by Mario Blandini @ Drobo Backup and recovery as agile as the virtual machines being protected Approaches and architectures for protecting VMware virtual machines using image-based backup Special
More informationTape or Disk Backup Which is Best?
WHITE PAPER Disk-to-Disk-to-Tape Strategy Guide How often are we reminded that what goes around comes around? This can be said for the fashion industry, but does it hold true for technology? It does, and
More informationHow To Backup With Ec Avamar
BACKUP AND RECOVERY FOR MICROSOFT-BASED PRIVATE CLOUDS LEVERAGING THE EMC DATA PROTECTION SUITE A Detailed Review ABSTRACT This white paper highlights how IT environments which are increasingly implementing
More informationAffordable Remote Data Replication
SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted
More informationSymantec NetBackup 7.5 for VMware
V-Ray visibility into virtual machine protection Solution Overview: Data Protection Overview There is little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped
More informationSTRATEGIC PLANNING ASSUMPTION(S)
STRATEGIC PLANNING ASSUMPTION(S) By 2016, one-third of organizations will change backup vendors due to frustration over cost, complexity and/or capability. By 2014, 80% of the industry will choose disk-based
More informationFuture-Proofed Backup For A Virtualized World!
! Future-Proofed Backup For A Virtualized World! Prepared by: Colm Keegan, Senior Analyst! Prepared: January 2014 Future-Proofed Backup For A Virtualized World Like death and taxes, growing backup windows
More informationBackup and Recovery for VMware Using EMC Data Domain Deduplication Storage
Best Practices Planning Abstract VMware offers extraordinary benefits, but it can come at the cost of extra storage, backup resources, and administrative challenges. EMC Data Domain deduplication storage
More informationDell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell
Dell PowerVault DL2200 & BE 2010 Power Suite Owen Que Channel Systems Consultant Dell Dell PowerVault DL2200 powered by Symantec Backup Exec 2010 1 Replace Tape with Deduplication Customer Storage Challenge
More informationBackup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
More informationETERNUS CS800 data protection appliance featuring deduplication to protect your unique data
data protection appliance featuring deduplication to protect your unique data Just for a moment imagine your daily business from a different perspective We lift you up where you belong Forget the constraints
More informationVirtualization. Disaster Recovery. A Foundation for Disaster Recovery in the Cloud
Technology Paper Disaster Acronym: DR The process, policies, and procedures that enable a business to recover data and systems after a disaster. A Foundation for Disaster in the Cloud Introduction Virtualization
More informationEvaluation of Enterprise Data Protection using SEP Software
Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &
More informationThe next generation, proven, affordable way to protect business using disk-based recovery
REAL-TIME RECOVERY The next generation, proven, affordable way to protect business using disk-based recovery StorageCraft Technology Corporation Leading the Way to Safer Computing 2006 StorageCraft Technology
More informationIBM Tivoli Storage Manager
Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing
More informationVMware Virtual SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014
VMware SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014 VMware SAN Backup Using VMware vsphere Table of Contents Introduction.... 3 vsphere Architectural Overview... 4 SAN Backup
More information<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures
1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage
More informationBackupAssist Common Usage Scenarios
WHITEPAPER BackupAssist Version 5 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Table of Contents Introduction... 3 Disaster recovery for 2008, SBS2008 & EBS 2008... 4 Scenario 1: Daily backups with
More informationBUSINESSES NEED TO MAXIMIZE PRODUCTIVITY, LOWER COSTS AND DECREASE RISKS EVERY DAY.
NSA Cloud Suite Powered by BUSINESSES NEED TO MAXIMIZE PRODUCTIVITY, LOWER COSTS AND DECREASE RISKS EVERY DAY. In this age of information, this means you need your servers, desktops and applications up
More informationDeduplication and Beyond: Optimizing Performance for Backup and Recovery
Beyond: Optimizing Gartner clients using deduplication for backups typically report seven times to 25 times the reductions (7:1 to 25:1) in the size of their data, and sometimes higher than 100:1 for file
More informationIBM Tivoli Storage Manager Suite for Unified Recovery
IBM Tivoli Storage Manager Suite for Unified Recovery Comprehensive data protection software with a broad choice of licensing plans Highlights Optimize data protection for virtual servers, core applications
More informationSymantec NetBackup 7.5 What s New and Version Comparison Matrix
Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single
More informationWhitepaper. NexentaConnect for VMware Virtual SAN. Full Featured File services for Virtual SAN
Whitepaper NexentaConnect for VMware Virtual SAN Full Featured File services for Virtual SAN Table of Contents Introduction... 1 Next Generation Storage and Compute... 1 VMware Virtual SAN... 2 Highlights
More informationWHITE PAPER: customize. Best Practice for NDMP Backup Veritas NetBackup. Paul Cummings. January 2009. Confidence in a connected world.
WHITE PAPER: customize DATA PROTECTION Confidence in a connected world. Best Practice for NDMP Backup Veritas NetBackup Paul Cummings January 2009 Best Practice for NDMP Backup Veritas NetBackup Contents
More informationdeduplication s Drives Efficient Backup and Recovery
tech dossier Deduplication Drives Efficient Backup and Recovery inside: Rethinking backup and recovery improving remote site backups optimizing storage strategies deduplication s business imperatives With
More informationBACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late.
BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS Disasters happen. Don t wait until it s too late. OVERVIEW It s inevitable. At some point, your business will experience data loss. It could
More informationPrivate vs. Public: Cloud Backup
Tech Brief Private vs. Public: Cloud Backup What You Need To Know With more and more MSPs looking to add cloud backup? services, the decision to build a private or to buy a public cloud requires a close
More informationBackup and Archiving Explained. White Paper
Backup and Archiving Explained White Paper Backup vs. Archiving The terms backup and archiving are often referenced together and sometimes incorrectly used interchangeably. While both technologies are
More informationProtect Data... in the Cloud
QUASICOM Private Cloud Backups with ExaGrid Deduplication Disk Arrays Martin Lui Senior Solution Consultant Quasicom Systems Limited Protect Data...... in the Cloud 1 Mobile Computing Users work with their
More informationHelping MSPs protect Data Center resources
Helping MSPs protect Data Center resources Due to shrinking IT staffing and budgets, many IT organizations are turning to Service Providers for hosting of business-critical systems and applications (i.e.
More informationEverything you need to know about flash storage performance
Everything you need to know about flash storage performance The unique characteristics of flash make performance validation testing immensely challenging and critically important; follow these best practices
More informationPROTECTING ALL YOUR DATA AND APPLICATIONS, ALL THE TIME.
PROTECTING ALL YOUR DATA AND APPLICATIONS, ALL THE TIME. THE COST OF DOWNTIME $42,000 per hour of a network outage (Source, Gartner Group) $4,000 per data loss (Source, Pepperdine University) 80% of all
More informationBusiness Continuity: Choosing the Right Technology Solution
Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail
More informationBackup Exec 3600 Appliances Partner Overview. Backup Exec 3600 Appliance Partner Overview
Backup Exec 3600 Appliances Partner Overview 1 Appliance Market Opportunity IDC sees Purpose Built Backup Appliances (PBBA) as becoming a preferred deployment option for many companies and as a significant
More informationEMC NETWORKER AND DATADOMAIN
EMC NETWORKER AND DATADOMAIN Capabilities, options and news Madis Pärn Senior Technology Consultant EMC madis.parn@emc.com 1 IT Pressures 2009 0.8 Zettabytes 2020 35.2 Zettabytes DATA DELUGE BUDGET DILEMMA
More informationDell Data Protection Managed Service Provider Program
Dell Data Protection Managed Service Provider Program Grow your business in the data protection marketplace, a sector that Gartner estimates will see 40 percent of organizations augmenting or changing
More informationOvercoming Backup & Recovery Challenges in Enterprise VMware Environments
Overcoming Backup & Recovery Challenges in Enterprise VMware Environments Daniel Budiansky Enterprise Applications Technologist Data Domain Dan Lewis Manager, Network Services USC Marshall School of Business
More informationMaximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing
1 Maximize Your Virtual Environment Investment with EMC Avamar Rob Emsley Senior Director, Product Marketing 2 Private Cloud is the Vision Virtualized Data Center Internal Cloud Trusted Flexible Control
More informationUniversal Backup Device The Essential Facts of UBD
Information Technology Solution Brief Universal Backup Device The Essential Facts of UBD Fibre Channel Disk to Disk Backup for IBM Power Systems Copyright (c)2014 Electronic Storage Corporation Information
More informationSymantec Backup Exec 2012
Better backup for all Data Sheet: Backup and Disaster Recovery Overview is one integrated product that protects virtual and physical environments, simplifies both backup and disaster recovery, and recovers
More informationIntroducing Arcserve Unified Data Protection
Introducing Arcserve Unified Data Protection Arcserve UDP is based on a next generation unified architecture for both virtual and physical environments. Its unmatched breadth, ease of use, and Assured
More information5 KEY BACKUP FEATURES TO ENSURE A SUCCESSFUL BACKUP REDESIGN
5 KEY BACKUP FEATURES TO ENSURE A SUCCESSFUL BACKUP REDESIGN BY JEROME WENDT, DCIG There are five key features that all backup software must now possess to ensure organizations successfully execute on
More informationNear-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper
Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper bex30102507wpor Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies Introduction Are you a database administrator
More informationEMC PERSPECTIVE. An EMC Perspective on Data De-Duplication for Backup
EMC PERSPECTIVE An EMC Perspective on Data De-Duplication for Backup Abstract This paper explores the factors that are driving the need for de-duplication and the benefits of data de-duplication as a feature
More informationBoost your storage buying power... use ours!
TM TM Data Sheets : White Papers : Case Studies For over a decade Coolspirit have been supplying the UK s top organisations with storage products and solutions so be assured we will meet your requirements
More informationHYBRID CLOUD BACKUP 101. Top Five Benefits of Cloud-Connected Appliances
HYBRID CLOUD BACKUP 101 Top Five Benefits of Cloud-Connected Appliances Hybrid cloud backup solutions will grow at a compounded average a growth rate of more than 80%. TANEJA GROUP 02 Introduction Most
More information