Doc. Code. OceanStor VTL6900 Technical White Paper. Issue 1.1. Date Huawei Technologies Co., Ltd.

Size: px
Start display at page:

Download "Doc. Code. OceanStor VTL6900 Technical White Paper. Issue 1.1. Date 2012-07-30. Huawei Technologies Co., Ltd."

Transcription

1 Doc. Code OceanStor VTL6900 Technical White Paper Issue 1.1 Date Huawei Technologies Co., Ltd.

2

3 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Website: Huawei Industrial Base Bantian, Longgang Shenzhen People's Republic of China Tel: Fax: iii

4

5 OceanStor Contents Contents 1 Executive Summary... vii 2 Introduction Solution Deduplication Introduction to Deduplication Deduplication Principle of the VTL High Availability Cluster Introduction to the High Availability Cluster High Availability of the VTL IP Replication Tape Caching Data Migration Policies Space Reclamation Policy Tape Encryption Energy Saving and Consumption Reduction Energy Saving by Deduplication Energy Saving by Disk Spin-Down Experience Typical Application and Benefit to Customers VTL Backup System Conclusion Acronyms and Abbreviations v

6

7 OceanStor 1 Executive Summary 1 Executive Summary This document describes the problems facing mid-range and high-end customers when they select virtual tape library (VTL) products. By analyzing the key technical features, application scenarios, solutions, and customer values of the VTL6900 virtual tape library (the VTL6900 for short), this document comes into the conclusion that the VTL6900 can properly solve the problems facing high-end, mid-range and low-range customers. vii

8

9 OceanStor 2 Introduction 2 Introduction With the explosive data increase, the backup and recovery speeds of traditional tape backup systems cannot meet the backup requirements of customers. As disk technologies develop rapidly, the capacity of disk media greatly increases, and the price of disk storage devices significantly decreases in the unit capacity. Backup systems that use Serial Advanced Technology Attachment (SATA) disks are widely deployed in IT environments of customers and gain favor from customers with the high backup and recovery performance. VLT products are representatives of the backup systems. VTL products inherit advantages such as high performance, easy maintenance, and cutting-edge mature media management of disk devices. Therefore, they keep a good development trend since the launching and have bright market prospects. For mid-range and high-end customers, the data amount involved in one time of full backup may reach tens of terabytes. Provided that the backup window is eight hours, the backup system must provide a backup rate of at least 1000 Mbit/s. Provided that incremental backup is performed once a day, full backup is performed once a week, and the storage period is three months, the storage capacity of backup devices must reach hundreds of terabytes. The construction, operation, and management of such a large-scale disk backup system require large investments in storage, power consumption, and management. In addition, mid-range and high-end customers have high requirements for the availability of both production systems and backup systems. Common single-engine VTL products cannot meet the high availability requirements. To sum up, problems facing mid-range and high-end customers when they select VTL products include low performance, insufficient capacity, high power consumption, and low availability of backup systems. 2-1

10

11 OceanStor 3 Solution 3 Solution The VTL6900 is oriented at mid-range and high-end customers. It uses deduplication, high availability clusters, and disk spin-down to solve the problems facing customers. This chapter describes three features of the VTL6900, including deduplication, high availability clusters, IP replication,tape caching and energy saving and consumption reduction. 3.1 Deduplication Introduction to Deduplication The deduplication technology eliminates repetitive data through hardware or software to reduce the occupied storage space. In a backup system, data is transferred from a backup client (source end) to a backup device (destination end) under the control of the backup server. Based on the location where deduplication is performed, deduplication is divided into the deduplication at the source end and deduplication at the destination end. In the deduplication at the source end, a backup client processes data before transferring the data to a backup device. It aims to eliminate repetitive data and send unique data to the backup device. In the deduplication at the destination end, a backup client transfers data to a backup device without processing the data. After receiving the data, the backup device performs deduplication. Based on the time when deduplication is performed, deduplication at the destination end is divided into in-line deduplication and post processing deduplication). In the in-line deduplication, a backup device performs deduplication while receiving backup data. The deduplication is complete when the backup data reception is complete. In the post processing deduplication, a backup device performs deduplication after the backup is complete, that is, the backup device receives all backup data and then performs deduplication against the received backup data at a specified time point. With a common purpose of eliminating repetitive data, all types of deduplication have to compare new data with existing data to determine whether the new data is repetitive. Repetitive data can be identified using two methods: index-based comparison and content-based comparison. The former one identifies repetitive data by comparing data indexes, while the latter one identifies repetitive data by directly comparing data. The system divides data into fixed-length or variable-length data blocks. A unique value is calculated for each data block based on the specified algorithm, and the unique value is the index of the corresponding data block. The index storage space is much smaller than the data block storage 3-1

12 3 Solution OceanStor space. Therefore, index-based comparison can be directly performed within the memory space, providing a higher efficiency than content-based comparison. At present, index-based comparison has been widely applied to various deduplication technologies Deduplication Principle of the VTL6900 The VTL 6900 supports both post processing deduplication and in-line deduplication. SIR stands for single instance repository. Post Processing Deduplication Index-based comparison is applied to the post processing deduplication supported by the VTL6900. Figure 3-1 Principle of post processing deduplication In post processing deduplication, the VTL6900 software consists of two modules: VTL module and SIR module. The storage space of the VTL6900 is logically divided into two parts, which are respectively occupied by the VTL module and SIR module. The VTL storage space is also called cache, and the SIR storage space is also called repository. After receiving the backup data, the VTL6900 stores it in the VTL storage space. The SIR module obtains the backup data at a specified time point, when the backup is complete, or when the storage level reaches the specified value, and compares the backup data with existing data blocks in the SIR storage space. The SIR module divides original backup data into kilobyte-size data blocks and calculates a hash value (also called an index) for each data block based on the secure hash algorithm 1 (SHA-1). By comparing the hash values of new data blocks and those of existing data blocks, the SIR module identifies repetitive data blocks. Repetitive data blocks will be discarded, with pointers to the data blocks retained. Unique new data blocks will be stored in the SIR storage space. See Figure 3-1. On the VTL6900, the physical machine that runs VTL software module applications and the VTL software module applications constitute the VTL engine. The physical machine that runs SIR software module applications and the SIR software module applications constitute the SIR engine. The VTL engine must be configured to provide external VTL services. The SIR engine is optional and is used to provide the deduplication function. The VTL engine and SIR engine can be integrated into one engine or deployed independently. When an independent SIR engine is configured, the VTL6900 can support a maximum of three SIR clusters that work in 2+1 redundancy mode. 3-2

13 OceanStor 3 Solution Figure 3-2 Original virtual tape data on the VTL6900 Before the SIR engine performs deduplication, backup data is stored on virtual tapes in the VTL storage space, as shown in Figure 3-2. After the deduplication is complete, data stored on the virtual tapes is replaced with pointers, and the virtual tapes are called virtual index tapes (VITs). Each pointer points to a single-instance data block in the SIR storage space. The released VTL storage space is used to store new backup data. See Figure 3-3. Figure 3-3 Data distribution on the VTL6900 after the deduplication Figure 3-4 Usage of VTL6900 storage space in post processing deduplication As described in the preceding part, in post processing deduplication, the storage space of the VTL6900 is logically divided into the VTL storage space and SIR storage space, that is, cache and repository. The SIR storage space is further divided into the SIR data disk and SIR index disk. See Figure 3-4. The SIR data disk is used to store unique data blocks after the 3-3

14 3 Solution OceanStor In-line Deduplication deduplication. New backup data stored in the cache is compared with data blocks on the SIR data disk, to identify repetitive data. The SIR index disk is used to store the indexes (namely SHA-1 hash values) of all data blocks on the SIR data disk. The capacity of the SIR index disk increases with the capacity of the SIR data disk. The SIR module reads all indexes (index table) from the SIR index disk and writes them to the memory of the SIR engine, providing quick search in the index table. The required memory capacity of the SIR engine increases with the capacity of the SIR index disk. Index-based comparison is applied to the in-line deduplication supported by the VTL6900. Figure 3-5 shows the in-line deduplication process. Figure 3-5 Principle of in-line deduplication In in-line deduplication, the VTL6900 software consists of two modules: VTL module and SIR module. When the VTL6900 receives backup data, the In-line Parser divides the original backup data into kilobyte-size data blocks and calculates a hash value (also called index) for each data block by using the SHA-1 algorithm. Meanwhile, the SIR module compares the hash values of new data blocks and those of existing data blocks to identify repetitive data blocks. Repetitive data blocks will be discarded, with pointers to the data blocks retained. Unique new data blocks will be stored in the SIR storage space. 3-4

15 OceanStor 3 Solution Figure 3-6 Usage of VTL6900 storage space in inline deduplication If errors occur during the backup in in-line deduplication, most backup software will write the backup data to a new tape. If errors occur at the beginning of the backup in in-line deduplication, post processing deduplication will be triggered instead. 3.2 High Availability Cluster Introduction to the High Availability Cluster If a node in a high availability cluster becomes faulty and cannot work properly, another node in the high availability cluster will take over the work of the faulty node. A high availability cluster consists of an active node and standby nodes. The active node is a node that is executing tasks. A standby node is a backup of the active node. When the active node becomes faulty, a standby node will take over the work of the active node. A high availability cluster is implemented based on resource switchover. The resource refers to the collection of information concerning the work taken over by a standby node when the active node in a high availability cluster becomes faulty. The standby node operates properly after taking over the resource of the faulty node, minimizing the impacts on the client. The monitoring and takeover of the resource is implemented based on high availability software. All operating systems provide high availability software, and most vendors develop their own high availability software. High availability software enables standby nodes to monitor the status of the active node. Once a fault is detected, a standby node forcibly takes over the work of the active node and continues to provide services. 3-5

16 3 Solution OceanStor This section is prepared by referring to the Storage Overview High Availability of the VTL6900 Both VTL and SIR software modules of the VTL6900 support the high availability feature. That is, the high availability design is applied to both the VTL engine and SIR engine. High Availability of the VTL Engine The VTL6900 supports two VTL engines, which can work in bidirectional active-standby mode (bidirectional failover). Figure 3-7 High availability configuration of the VTL engines As shown in Figure 3-7, when VTL A and VTL B operate properly, both of them provide external VTL services. In unidirectional failover mode, provided that VTL A is the active node and VTL B is the standby node, VTL B monitors the status of VTL A and takes over the work of VTL A if VTL A becomes faulty. However, if VTL B becomes faulty, VTL A does not take over the work of VTL B. In bidirectional failover mode, VTL A and VTL B monitor each other. If either of them becomes faulty, the other VTL takes over the work of the faulty VTL and provides external VTL services. As shown in Figure 3-7, VTL A consists of the VTL A software application and VTL A physical machine, and VTL B consists of the VTL B software application and VTL B physical machine. If the work of VTL A is taken over by VTL B, the VTL A software application that runs on the VTL A physical machine before the takeover will run on the VTL B physical 3-6

17 OceanStor 3 Solution machine after the takeover. After the takeover, the VTL A software application accesses the original storage memory (VTL storage memory) through the shared storage and continues to provide VTL services for the original backup server through the standby host port. The shared storage functions as follows: Both the VTL A physical machine and VTL B physical machine are connected to the storage unit of the VTL6900 through physical channels. When running on the VTL B physical machine, the VTL A software application can still access its original storage memory by using the physical channel of the VTL B physical machine. The standby host port functions as follows (take the fiber channel [FC] as an example): VTL A provides external VTL services by using FC port Target wwpn1. Correspondingly, VTL B provides an FC port Standby wwpn3 as a standby port for Target wwpn1. In actual configurations, FC ports Target wwpn1 and Standby wwpn3 are connected to the backup server of the VTL A through FC channels. When running on the VTL B physical machine, the VTL A software application can still provide VTL services for its original backup server by using port Standby wwpn3. In bidirectional failover mode, VTL A and VTL B software applications monitor the status of each other through the heartbeat network. If either of them cannot provide external VTL services properly due to software, hardware, or channel (connected to the storage unit) faults, failover will be automatically triggered. The normal node will take over the work of the faulty node. The takeover process takes about four minutes. After the faulty node recovers, failback will be triggered automatically (or manually), and the takeover terminates. High Availability of the SIR Engine The VTL6900 supports three SIR engines. Two of the SIR engines function as active nodes, and the rest one functions as the standby node. Figure 3-8 High availability configuration of the SIR engines As shown in Figure 3-8, high availability configurations of SIR engines are different from those of VTL engines. A standby SIR engine is configured. The SIR software application on the standby SIR engine monitors the status of the active SIR engines through the heartbeat network. When SIR 1 (or SIR 2) becomes faulty, for example, SIR 1 (or SIR 2) cannot provide deduplication services due to software, hardware, or physical channel (connected to the SIR storage memory), failover is automatically triggered. In this case, the standby SIR engine powers off SIR 1 through an Intelligent Platform Management Interface (IPMI) instruction and takes over the work of SIR 1. The SIR 1 software application will run on the 3-7

18 3 Solution OceanStor standby SIR physical machine. After SIR 1 recovers, it automatically functions as the standby SIR engine after being powered on. In the high availability configurations of SIR engines, all SIR engines can access the SIR storage memory through physical channels. Each SIR engine can access its own storage unit and the storage units of other SIR engines. This ensures that all SIR software applications can access their own storage units when they run on any SIR physical machines. In addition, all SIR engines are interconnected with VTL engines through physical channels. Therefore, SIR engines can read original backup data from the VTL storage memory for deduplication, and VTL engines can read data from the SIR storage memory for recovery. Generally, the physical connections of all SIR engines are the same, ensuring free switchover between the active and standby nodes. Moreover, SIR software modules also provide the high performance feature. In high availability configurations, three SIR engines of the VTL6900 work in 2+1 active-standby mode. During actual operation, the two active SIR engines perform deduplication. They constitute a high performance cluster, improving the deduplication performance and efficiency. The VTL6900 also supports the configuration of one SIR engine or two SIR engines. In this case, the SIR engines do not provide the high availability feature. When two SIR engines are configured, they constitute a high performance cluster. 3.3 IP Replication Replication is a common technology used for disaster recovery. Data replication refers to copying data from one medium onto another medium and generating a data copy by using the data replication software. The traditional disaster recovery generally uses the transportation method. The backup software copies data onto a physical tape library, and the physical tape library is transported to a remote place for preservation. During the transportation, tapes may get lost or damaged; thus, the effect of disaster recovery cannot be ensured. Over an IP network, the local VTL6900 copies data on virtual tapes to the remote VTL6900. Through this method, the VTL6900 utilizes the convenience and high speed of the network to save the transportation cost. The local VTL6900 encrypts the tape data by using the encryption algorithm before data transfer. Then the remote VTL6900 decrypts the data after receiving it. As a result, the data security during transfer is ensured. The VTL6900 provides four options for the IP replication: Remote Copy Automatic Replication IP Replication Replication upon De-duplication. Among the four options, three support automatic replication and one supports manual replication. Table 3-1 lists the four options of IP replication. 3-8

19 OceanStor 3 Solution Table 3-1 Four options of IP replication O p t i o n A u t o R e p l i c a t i o n R e m o t e C o p y I P R e p l i c a t i o n T y p e A u t o m a t i c M a n u a l A u t o m a t i c Description When a virtual tape is exported from the VTL, the system automatically copies the data on the virtual tape to another VTL6900. The data on a virtual tape is copied to another VTL as required. Within the specified interval and according to the user-defined policy, the changed data on the primary virtual tape is copied to the same or another VTL. 3-9

20 3 Solution OceanStor O p t i o n R e p l i c a t i o n u p o n D e - d u p l i c a t i o n T y p e A u t o m a t i c Description When the de-duplication function is enabled, the deletion policy is integrated with the replication policy. The changed data is copied to another VTL6900 according to the replication policy. These four options differ mainly in the replication triggering mechanism. Auto Replication is triggered by the backup software. If the VTL is set Auto Replication, the replication of the virtual tape is triggered when the VTL receives the eject command from the backup software (For a physical tape library, the eject command for the backup software means to eject the tape out of the physical tape library; for a virtual tape library, this command means to put the virtual tape into the virtual vault). Remote Copy is triggered manually. The user can copy the data on the selected disk to the VTL6900 in the disaster recovery center. Then, the VTL6900 in the disaster recovery center allocates the space equal to that of the source tape to the target disk, and sets the same barcode. When the copy is complete, the system automatically promotes the disk to the virtual vault of the remote VTL6900 for future use. Through the Remote Copy function, the whole virtual tape can be copied to the remote VTL6900, without the need of creating a new virtual tape in the remote VTL6900. Before the copy, any virtual tape 3-10

21 OceanStor 3 Solution in the remote VTL6900 must not have the same name as any virtual tape in the local VTL6900. IP Replication is triggered based on the policy. The policy can be: Data increment-based replication policy. The VTL6900 can identify the amount of the data backed up to the tape each time. If the data increment exceeds the pre-set threshold, the replication is automatically triggered after the copy. Time point-based replication. The user can specify the time point for the first replication and the replication interval for each virtual tape. Then, the data on the virtual tape will be copied according to the specified time point. The remote virtual tape that adopts IP Replication must be promoted manually before use. Replication upon De-duplication is manually triggered based on the policy. The triggering condition can be the specific date or time point, or upon the completion of the backup operation. The local VTL6900 transfers the data after de-duplication to the remote VTL6900 over an IP network. After de-duplication, data blocks instead of data are transferred during the IP replication. The bandwidth occupation decreases and the transfer efficiency increases. As a result, the remote data-level disaster recovery can be implemented with low costs, easy deployment, and high efficiencies. The remote IP replication has the following scenarios: One VTL6900 copies data to the remote VTL6900. Figure 3-9 Networking of one-to-one remote disaster recovery Multiple VTL6900s copy data to the remote VTL

22 3 Solution OceanStor Figure 3-10 Networking of many-to-one remote disaster recovery 3.4 Tape Caching Tape Caching is an advanced function of the VTL6900. This function uses the high-speed VTL6900 as the high-speed cache of the physical tape library. The backup data is written to the VTL6900 first. After the backup operation is complete, the VTL6900 migrates the backup data to the physical tape library according to the preset policy. In this way, the hierarchical storage architecture forms. The VTL6900 can shorten the backup window and quickly recover data. Physical tape libraries are suitable for large-capacity offline data. Therefore, the VTL6900 can be combined with physical tape libraries to implement the hierarchical storage. The principles of the hierarchical storage include: The data that needs to be archived for a long time is stored on the physical tape libraries. The frequently-used data is stored in the VTL. The VTL takes over the physical tape libraries. Physical tape libraries have the slow backup speed and disks are unsuited for seldom-accessed data for a long time. The hierarchical storage eliminates the shortcomings of physical tape libraries and disks. Figure 3-11 shows the networking of the hierarchical storage. 3-12

23 OceanStor 3 Solution Figure 3-11 Networking of the hierarchical storage Data can be recovered directly from the VTL or physical tape library. To fully utilize the high-speed cache, the VTL6900 provides various migration triggering policies and space reclaiming policies Data Migration Policies Tape Caching provides two policies for triggering data migration between the VTL6900 and the physical tape library: 1) time-based migration; 2) intelligent migration. Table 3-2 and Table 3-3 list the two policies. Table 3-2 Time-based migration policy Policy Name Certain time point each day Certain time point each week Description Migration is performed in a one-day cycle. The VTL6900 starts data migration at the specified time point each day. Migration is performed in a one-week cycle. The VTL6900 starts data migration at the specified time point each day from Monday to Saturday. Table 3-3 Intelligent migration policy Policy Name And/Or Description Conjunction/disjunction of the intelligent policy. The option And means migration is triggered only when all conditions are met; or means that migration is triggered when any condition is met. Data period storage Migration is triggered when the backup data is stored on the VTL6900 for a specified period. 3-13

24 3 Solution OceanStor Policy Name Watermark After backup (tape space used out) Postponed to a certain time point Description Migration is triggered when the usage of the disk space of the VTL6900 reaches 90%. Migration is triggered after each backup. "Tape space used out" is the additional policy for "after backup". If the two options are chosen, the VTL6900 checks the usage of the virtual tape when a virtual tape is ejected out of the tape drive. If the space of this tape is used out, migration is triggered. Migration is postponed to a specific time point after the condition is met this time. This policy must be used together with the preceding three policies. When the condition of any preceding policy is met, migration can be postponed to a specific time point. The time-based migration policy and intelligent migration policy cannot be used simultaneously. For the time-based migration policy, "Certain time point each day" and "Certain time point each week" cannot be used at the same time. The user can only select either for the condition of triggering migration. Multiple options of the intelligent policy can be chosen simultaneously. The options can be combined to meet different requirements of migration Space Reclamation Policy To fully utilize the cache, the VTL6900 provides two space reclamation policies to ensure the space utilization: 1) intelligent reclamation; 2) reclamation upon de-duplication. Table 3-4 lists the reclamation methods. Table 3-4 Reclamation methods Policy Name Intelligent reclamation Reclamation upon de-duplication Description The space occupied by the virtual tapes of the VTL6900 used as the cache is reclaimed. That is, the data on these virtual tapes is deleted and only the indexes to the physical tapes are reserved. Through the de-duplication algorithm, the duplicate data is deleted to release the storage space of the VTL6900. Table 3-5 lists the methods of triggering space reclamation. Table 3-5 Methods of triggering space reclamation Policy Name Description 3-14

25 OceanStor 3 Solution Policy Name Immediate reclamation Watermark Description After the migration is complete, the space originally occupied by the migrated data is reclaimed. When the remaining disk space accounts for less than 10% of the total space, the space originally occupied by the migrated data is reclaimed. This trigger method is available only under intelligent reclamation. Users do not need to worry about data loss. The VTL6900 only reclaims the space originally occupied by the migrated data. The space occupied by the other data will not be reclaimed. Thus, the data security and consistency are ensured. 3.5 Tape Encryption To ensure the security of the data stored on tapes, the VTL6900 encrypts tapes when data is transferred to physical tape libraries. Figure 3-12 Tape encryption The tape encryption function of the VTL6900 uses the 256-bit Advanced Encryption Standard (AES) encryption algorithm. The user can create one or more tape keys to encrypt the data exported to physical tapes and decrypt the data imported to virtual tapes. The data on the tape library is inaccessible unless the correct key has been used to decrypt the data. Moreover, the user can set passwords for each key. Only when the correct password is provided can the key name, password, and password hint be changed and can the key be deleted and exported. When data is being exported to a physical tape library or during the IP replication, the user can employ a created key to encrypt the data, thus ensuring the security of the tape data. Even if tapes are lost or stolen or data packets are intercepted during the transportation, the user does not need to worry the data security. If the correct key is not used, the data on tapes are totally inaccessible. 3-15

Technical White Paper for the Oceanspace VTL6000

Technical White Paper for the Oceanspace VTL6000 Document No. Technical White Paper for the Oceanspace VTL6000 Issue V2.1 Date 2010-05-18 Huawei Symantec Technologies Co., Ltd. Copyright Huawei Symantec Technologies Co., Ltd. 2010. All rights reserved.

More information

WHY DO I NEED FALCONSTOR OPTIMIZED BACKUP & DEDUPLICATION?

WHY DO I NEED FALCONSTOR OPTIMIZED BACKUP & DEDUPLICATION? WHAT IS FALCONSTOR? FalconStor Optimized Backup and Deduplication is the industry s market-leading virtual tape and LAN-based deduplication solution, unmatched in performance and scalability. With virtual

More information

OceanStor 9000 InfoProtector Technical White Paper. Issue 01. Date 2014-02-13 HUAWEI TECHNOLOGIES CO., LTD.

OceanStor 9000 InfoProtector Technical White Paper. Issue 01. Date 2014-02-13 HUAWEI TECHNOLOGIES CO., LTD. OceanStor 9000 InfoProtector Technical White Paper Issue 01 Date 2014-02-13 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may

More information

HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. HUAWEI OceanStor 9000 Load Balancing Technical Issue 01 Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may be

More information

Management Plug-in (For Microsoft System Center) White Paper

Management Plug-in (For Microsoft System Center) White Paper Management Plug-in (For Microsoft System Center) Issue 02 Date 2015-04-25 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

EMC Disk Library with EMC Data Domain Deployment Scenario

EMC Disk Library with EMC Data Domain Deployment Scenario EMC Disk Library with EMC Data Domain Deployment Scenario Best Practices Planning Abstract This white paper is an overview of the EMC Disk Library with EMC Data Domain deduplication storage system deployment

More information

EMC DATA DOMAIN OVERVIEW. Copyright 2011 EMC Corporation. All rights reserved.

EMC DATA DOMAIN OVERVIEW. Copyright 2011 EMC Corporation. All rights reserved. EMC DATA DOMAIN OVERVIEW 1 2 With Data Domain Deduplication Storage Systems, You Can WAN Retain longer Keep backups onsite longer with less disk for fast, reliable restores, and eliminate the use of tape

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

Get Success in Passing Your Certification Exam at first attempt!

Get Success in Passing Your Certification Exam at first attempt! Get Success in Passing Your Certification Exam at first attempt! Exam : E22-290 Title : EMC Data Domain Deduplication, Backup and Recovery Exam Version : DEMO 1.A customer has a Data Domain system with

More information

STORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER

STORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER STORAGE CENTER DATASHEET STORAGE CENTER Go Beyond the Boundaries of Traditional Storage Systems Today s storage vendors promise to reduce the amount of time and money companies spend on storage but instead

More information

Oceanspace Series Storage Product Technical White Paper for the WORM

Oceanspace Series Storage Product Technical White Paper for the WORM Technical White Paper for the WORM Issue 01 Release Date 2009-12-01 Huawei Symantec Technologies Co., Ltd. Copyright Chengdu Huawei Symantec Technologies CO., Ltd. 2010. All rights reserved. No part of

More information

Huawei Business Continuity and Disaster Recovery Solution

Huawei Business Continuity and Disaster Recovery Solution Huawei Business Continuity and Disaster Recovery Solution Contents 01 Great Challenges to Business Continuity and Disaster Recovery 02 Huawei Business Continuity and Disaster Recovery Solution 02 Application

More information

OceanStor UDS Massive Storage System Technical White Paper Reliability

OceanStor UDS Massive Storage System Technical White Paper Reliability OceanStor UDS Massive Storage System Technical White Paper Reliability Issue 1.1 Date 2014-06 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted

More information

Huawei OceanStor Backup Software Technical White Paper for NetBackup

Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei Page 1 of 14 Copyright Huawei. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

HUAWEI OceanStor 18000 Series Enterprise Storage System Disaster Recovery White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01.

HUAWEI OceanStor 18000 Series Enterprise Storage System Disaster Recovery White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. HUAWEI OceanStor 18000 Series Enterprise Storage System Issue 01 Date 2013-12-30 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any

More information

EMC BACKUP MEETS BIG DATA

EMC BACKUP MEETS BIG DATA EMC BACKUP MEETS BIG DATA Strategies To Protect Greenplum, Isilon And Teradata Systems 1 Agenda Big Data: Overview, Backup and Recovery EMC Big Data Backup Strategy EMC Backup and Recovery Solutions for

More information

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

Huawei N2000 NAS Storage System Technical White Paper

Huawei N2000 NAS Storage System Technical White Paper Huawei N2000 NAS Storage System Technical White Paper Issue 2.1 Date 2012-10-19 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any

More information

Accelerating Backup/Restore with the Virtual Tape Library Configuration That Fits Your Environment

Accelerating Backup/Restore with the Virtual Tape Library Configuration That Fits Your Environment Accelerating Backup/Restore with the Virtual Tape Library Configuration That Fits Your Environment A WHITE PAPER Abstract: Since VTL uses disk to back up data, it eliminates the media and mechanical errors

More information

Symantec NetBackup 5220

Symantec NetBackup 5220 A single-vendor enterprise backup appliance that installs in minutes Data Sheet: Data Protection Overview is a single-vendor enterprise backup appliance that installs in minutes, with expandable storage

More information

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,

More information

Tiered Data Protection Strategy Data Deduplication. Thomas Störr Sales Director Central Europe November 8, 2007

Tiered Data Protection Strategy Data Deduplication. Thomas Störr Sales Director Central Europe November 8, 2007 Tiered Data Protection Strategy Data Deduplication Thomas Störr Sales Director Central Europe November 8, 2007 Overland Storage Tiered Data Protection = Good = Better = Best! NEO / ARCvault REO w/ expansion

More information

Cost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved.

Cost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved. Cost Effective Backup with Deduplication Agenda Today s Backup Challenges Benefits of Deduplication Source and Target Deduplication Introduction to EMC Backup Solutions Avamar, Disk Library, and NetWorker

More information

EMC NETWORKER AND DATADOMAIN

EMC NETWORKER AND DATADOMAIN EMC NETWORKER AND DATADOMAIN Capabilities, options and news Madis Pärn Senior Technology Consultant EMC madis.parn@emc.com 1 IT Pressures 2009 0.8 Zettabytes 2020 35.2 Zettabytes DATA DELUGE BUDGET DILEMMA

More information

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP

More information

Identifying the Hidden Risk of Data De-duplication: How the HYDRAstor Solution Proactively Solves the Problem

Identifying the Hidden Risk of Data De-duplication: How the HYDRAstor Solution Proactively Solves the Problem Identifying the Hidden Risk of Data De-duplication: How the HYDRAstor Solution Proactively Solves the Problem October, 2006 Introduction Data de-duplication has recently gained significant industry attention,

More information

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read

More information

LDA, the new family of Lortu Data Appliances

LDA, the new family of Lortu Data Appliances LDA, the new family of Lortu Data Appliances Based on Lortu Byte-Level Deduplication Technology February, 2011 Copyright Lortu Software, S.L. 2011 1 Index Executive Summary 3 Lortu deduplication technology

More information

EonStor DS remote replication feature guide

EonStor DS remote replication feature guide EonStor DS remote replication feature guide White paper Version: 1.0 Updated: Abstract: Remote replication on select EonStor DS storage systems offers strong defense against major disruption to IT continuity,

More information

The safer, easier way to help you pass any IT exams. Exam : 000-115. Storage Sales V2. Title : Version : Demo 1 / 5

The safer, easier way to help you pass any IT exams. Exam : 000-115. Storage Sales V2. Title : Version : Demo 1 / 5 Exam : 000-115 Title : Storage Sales V2 Version : Demo 1 / 5 1.The IBM TS7680 ProtecTIER Deduplication Gateway for System z solution is designed to provide all of the following EXCEPT: A. ESCON attach

More information

Turnkey Deduplication Solution for the Enterprise

Turnkey Deduplication Solution for the Enterprise Symantec NetBackup 5000 Appliance Turnkey Deduplication Solution for the Enterprise Mayur Dewaikar Sr. Product Manager, Information Management Group White Paper: A Deduplication Appliance Solution for

More information

Whitepaper Continuous Availability Suite: Neverfail Solution Architecture

Whitepaper Continuous Availability Suite: Neverfail Solution Architecture Continuous Availability Suite: Neverfail s Continuous Availability Suite is at the core of every Neverfail solution. It provides a comprehensive software solution for High Availability (HA) and Disaster

More information

OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006

OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006 OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006 EXECUTIVE SUMMARY Microsoft Exchange Server is a disk-intensive application that requires high speed storage to deliver

More information

Protecting Information in a Smarter Data Center with the Performance of Flash

Protecting Information in a Smarter Data Center with the Performance of Flash 89 Fifth Avenue, 7th Floor New York, NY 10003 www.theedison.com 212.367.7400 Protecting Information in a Smarter Data Center with the Performance of Flash IBM FlashSystem and IBM ProtecTIER Printed in

More information

VMware vsphere Data Protection 6.0

VMware vsphere Data Protection 6.0 VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

StoneFly SCVM TM for ESXi

StoneFly SCVM TM for ESXi StoneFly TM for ESXi Add StoneFly Storage Concentrator Virtual Machine () to your VMware ESXi Server and the possibilities are endless! Reduce your CapEx and OpEx by optimized utilization of servers and

More information

Understanding EMC Avamar with EMC Data Protection Advisor

Understanding EMC Avamar with EMC Data Protection Advisor Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection

More information

Refreshing Your Data Protection Environment with Next-Generation Architectures

<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures 1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage

More information

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything BlueArc unified network storage systems 7th TF-Storage Meeting Scale Bigger, Store Smarter, Accelerate Everything BlueArc s Heritage Private Company, founded in 1998 Headquarters in San Jose, CA Highest

More information

Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide

Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide This IBM Redbooks Solution Guide provides an overview of how data backup and

More information

HUAWEI Tecal E6000 Blade Server

HUAWEI Tecal E6000 Blade Server HUAWEI Tecal E6000 Blade Server Professional Trusted Future-oriented HUAWEI TECHNOLOGIES CO., LTD. The HUAWEI Tecal E6000 is a new-generation server platform that guarantees comprehensive and powerful

More information

VRRP Technology White Paper

VRRP Technology White Paper Issue 01 Date 2012-08-31 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Cloud-integrated Storage What & Why

Cloud-integrated Storage What & Why Cloud-integrated Storage What & Why Table of Contents Overview...3 CiS architecture...3 Enterprise-class storage platform...4 Enterprise tier 2 SAN storage...4 Activity-based storage tiering and data ranking...5

More information

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6 (Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means

More information

UNDERSTANDING DATA DEDUPLICATION. Tom Sas Hewlett-Packard

UNDERSTANDING DATA DEDUPLICATION. Tom Sas Hewlett-Packard UNDERSTANDING DATA DEDUPLICATION Tom Sas Hewlett-Packard SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material

More information

Hitachi s Midrange Disk Array as Platform for DLCM Solution

Hitachi s Midrange Disk Array as Platform for DLCM Solution Hitachi Review Vol. 54 (2005), No. 2 87 Hitachi s Midrange Disk Array as Platform for DLCM Solution Teiko Kezuka Ikuya Yagisawa Azuma Kano Seiki Morita OVERVIEW: With the Internet now firmly established

More information

HUAWEI USG2000&5000 Series Unified Security Gateway Traffic Control White Paper

HUAWEI USG2000&5000 Series Unified Security Gateway Traffic Control White Paper Doc. code HUAWEI USG2000&5000 Series Unified Security Gateway Traffic Control White Paper Issue 1.0 Date 2014-08-21 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2012. All rights

More information

DXi Accent Technical Background

DXi Accent Technical Background TECHNOLOGY BRIEF NOTICE This Technology Brief contains information protected by copyright. Information in this Technology Brief is subject to change without notice and does not represent a commitment on

More information

Backup and Recovery Redesign with Deduplication

Backup and Recovery Redesign with Deduplication Backup and Recovery Redesign with Deduplication Why the move is on September 9, 2010 1 Major trends driving the transformation of backup environments UNABATED DATA GROWTH Backup = 4 to 30 times production

More information

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this

More information

Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance

Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance Intel Xeon processor Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance The easy solution for backup to disk with deduplication Intel Inside. Powerful Solution Outside. If

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM

IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM Note: Before you use this

More information

HUAWEI OceanStor Enterprise Storage System Success Cases

HUAWEI OceanStor Enterprise Storage System Success Cases Copyright Huawei Technologies Co., Ltd. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies

More information

StorageTek Virtual Library Extension (VLE) a Single Common-Management Tieredstorage

StorageTek Virtual Library Extension (VLE) a Single Common-Management Tieredstorage Enterprise Servers, Storage and Business Continuity StorageTek Virtual Library Extension (VLE) a Single Common-Management Tieredstorage Infrastructure Josh Krischer December 2010 2010 Josh Krischer & Associates.

More information

White Paper on Video Wall Display Technology in Videoconferencing HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-2-23

White Paper on Video Wall Display Technology in Videoconferencing HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-2-23 White Paper on Video Wall Display Technology in Videoconferencing Issue 01 Date 2012-2-23 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted

More information

Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance

Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance The easy solution for backup to disk with deduplication If you rethink your backup strategy, then think of ETERNUS CS800

More information

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of

More information

Preface... 1. Introduction... 1 High Availability... 2 Users... 4 Other Resources... 5 Conventions... 5

Preface... 1. Introduction... 1 High Availability... 2 Users... 4 Other Resources... 5 Conventions... 5 Table of Contents Preface.................................................... 1 Introduction............................................................. 1 High Availability.........................................................

More information

Identifying the Hidden Risk of Data Deduplication: How the HYDRAstor TM Solution Proactively Solves the Problem

Identifying the Hidden Risk of Data Deduplication: How the HYDRAstor TM Solution Proactively Solves the Problem Identifying the Hidden Risk of Data Deduplication: How the HYDRAstor TM Solution Proactively Solves the Problem Advanced Storage Products Group Table of Contents 1 - Introduction 2 Data Deduplication 3

More information

XenData Archive Series Software Technical Overview

XenData Archive Series Software Technical Overview XenData White Paper XenData Archive Series Software Technical Overview Advanced and Video Editions, Version 4.0 December 2006 XenData Archive Series software manages digital assets on data tape and magnetic

More information

High Availability Databases based on Oracle 10g RAC on Linux

High Availability Databases based on Oracle 10g RAC on Linux High Availability Databases based on Oracle 10g RAC on Linux WLCG Tier2 Tutorials, CERN, June 2006 Luca Canali, CERN IT Outline Goals Architecture of an HA DB Service Deployment at the CERN Physics Database

More information

End-to-end Data integrity Protection in Storage Systems

End-to-end Data integrity Protection in Storage Systems End-to-end Data integrity Protection in Storage Systems Issue V1.1 Date 2013-11-20 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in

More information

Reducing Backups with Data Deduplication

Reducing Backups with Data Deduplication The Essentials Series: New Techniques for Creating Better Backups Reducing Backups with Data Deduplication sponsored by by Eric Beehler Reducing Backups with Data Deduplication... 1 Explaining Data Deduplication...

More information

Sales Tool. Summary DXi Sales Messages November 2009 6 NOVEMBER 2009. ST00431-v06

Sales Tool. Summary DXi Sales Messages November 2009 6 NOVEMBER 2009. ST00431-v06 Summary DXi Sales Messages November 2009 6 NOVEMBER 2009 ST00431-v06 Notice This Sales Tool contains proprietary information protected by copyright. Information in this Sales Tool is subject to change

More information

Long term retention and archiving the challenges and the solution

Long term retention and archiving the challenges and the solution Long term retention and archiving the challenges and the solution NAME: Yoel Ben-Ari TITLE: VP Business Development, GH Israel 1 Archive Before Backup EMC recommended practice 2 1 Backup/recovery process

More information

White. Paper. Improving Backup Effectiveness and Cost-Efficiency with Deduplication. October, 2010

White. Paper. Improving Backup Effectiveness and Cost-Efficiency with Deduplication. October, 2010 White Paper Improving Backup Effectiveness and Cost-Efficiency with Deduplication By Lauren Whitehouse October, 2010 This ESG White Paper was commissioned by Fujitsu and is distributed under license from

More information

Key Messages of Enterprise Cluster NAS Huawei OceanStor N8500

Key Messages of Enterprise Cluster NAS Huawei OceanStor N8500 Messages of Enterprise Cluster NAS Huawei OceanStor Messages of Enterprise Cluster NAS 1. High performance and high reliability, addressing bid data challenges High performance: In the SPEC benchmark test,

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

EISOO AnyBackup Family 5.0 All-in-One Protection

EISOO AnyBackup Family 5.0 All-in-One Protection EISOO AnyBackup Family 5.0 All-in-One Protection ESSENTIALS Simplifies data backup by integrating software, hardware, server and storage in one product Provides comprehensive backup for files, emails,

More information

Unitrends Recovery-Series: Addressing Enterprise-Class Data Protection

Unitrends Recovery-Series: Addressing Enterprise-Class Data Protection Solution Brief Unitrends Recovery-Series: Addressing Enterprise-Class Data Protection 2 Unitrends has leveraged over 20 years of experience in understanding ever-changing data protection challenges in

More information

Volume Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS )

Volume Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS ) Open-E Data Storage Server (DSS ) Volume Replication INSTALATION GUIDE Enterprise-class Volume Replication helps ensure non-stop access to critical business data. Open-E DSS Volume Replication Open-E Data

More information

Trends in Data Protection and Restoration Technologies. Jason Iehl, NetApp

Trends in Data Protection and Restoration Technologies. Jason Iehl, NetApp Trends in Data Protection and Restoration Technologies Jason Iehl, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and

More information

EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE

EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE White Paper EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE A Detailed Review Abstract This white paper introduces EMC Data Domain Extended Retention software that increases the storage scalability of a Data

More information

Technology Insight Series

Technology Insight Series HP s Information Supply Chain Optimizing Information, Data and Storage for Business Value John Webster August, 2011 Technology Insight Series Evaluator Group Copyright 2011 Evaluator Group, Inc. All rights

More information

DPAD Introduction. EMC Data Protection and Availability Division. Copyright 2011 EMC Corporation. All rights reserved.

DPAD Introduction. EMC Data Protection and Availability Division. Copyright 2011 EMC Corporation. All rights reserved. DPAD Introduction EMC Data Protection and Availability Division 1 EMC 的 備 份 與 回 復 的 解 決 方 案 Data Domain Avamar NetWorker Data Protection Advisor 2 EMC 雙 活 資 料 中 心 的 解 決 方 案 移 動 性 ( Mobility ) 可 用 性 ( Availability

More information

Backup and Recovery. Introduction. Benefits. Best-in-class offering. Easy-to-use Backup and Recovery solution.

Backup and Recovery. Introduction. Benefits. Best-in-class offering. Easy-to-use Backup and Recovery solution. DeltaV Distributed Control System Product Data Sheet Backup and Recovery Best-in-class offering. Easy-to-use Backup and Recovery solution. Data protection and disaster recovery in a single solution. Scalable

More information

W H I T E P A P E R R e a l i z i n g t h e B e n e f i t s o f Deduplication in a Backup and Restore System

W H I T E P A P E R R e a l i z i n g t h e B e n e f i t s o f Deduplication in a Backup and Restore System W H I T E P A P E R R e a l i z i n g t h e B e n e f i t s o f Deduplication in a Backup and Restore System Sponsored by: HP Noemi Greyzdorf November 2008 Robert Amatruda INTRODUCTION Global Headquarters:

More information

3Gen Data Deduplication Technical

3Gen Data Deduplication Technical 3Gen Data Deduplication Technical Discussion NOTICE: This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change without notice and

More information

Optimizing Large Arrays with StoneFly Storage Concentrators

Optimizing Large Arrays with StoneFly Storage Concentrators Optimizing Large Arrays with StoneFly Storage Concentrators All trademark names are the property of their respective companies. This publication contains opinions of which are subject to change from time

More information

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate

More information

Cloud-integrated Enterprise Storage. Cloud-integrated Storage What & Why. Marc Farley

Cloud-integrated Enterprise Storage. Cloud-integrated Storage What & Why. Marc Farley Cloud-integrated Enterprise Storage Cloud-integrated Storage What & Why Marc Farley Table of Contents Overview... 3 CiS architecture... 3 Enterprise-class storage platform... 4 Enterprise tier 2 SAN storage...

More information

e22-290 http://www.gratisexam.com/ Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0

e22-290 http://www.gratisexam.com/ Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 e22-290 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ EMC E22-290 EMC Data Domain Deduplication, Backup and Recovery Exam Version: 5.1 Exam A QUESTION

More information

Business Benefits of Data Footprint Reduction

Business Benefits of Data Footprint Reduction Business Benefits of Data Footprint Reduction Why and how reducing your data footprint provides a positive benefit to your business and application service objectives By Greg Schulz Founder and Senior

More information

CloudEngineSeries Switches. SVF Technology White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

CloudEngineSeries Switches. SVF Technology White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2014-07-01 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper

Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper bex30102507wpor Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies Introduction Are you a database administrator

More information

Ultra-Scalable Storage Provides Low Cost Virtualization Solutions

Ultra-Scalable Storage Provides Low Cost Virtualization Solutions Ultra-Scalable Storage Provides Low Cost Virtualization Solutions Flexible IP NAS/iSCSI System Addresses Current Storage Needs While Offering Future Expansion According to Whatis.com, storage virtualization

More information

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide WHITE Deployment PAPERGuide Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Deployment Guide Table of contents About

More information

DeltaStor Data Deduplication: A Technical Review

DeltaStor Data Deduplication: A Technical Review White Paper DeltaStor Data Deduplication: A Technical Review DeltaStor software is a next-generation data deduplication application for the SEPATON S2100 -ES2 virtual tape library that enables enterprises

More information

Understanding EMC Avamar with EMC Data Protection Advisor

Understanding EMC Avamar with EMC Data Protection Advisor Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features that reduce the complexity of managing data protection

More information

EMC Backup and Recovery for Microsoft SQL Server

EMC Backup and Recovery for Microsoft SQL Server EMC Backup and Recovery for Microsoft SQL Server Enabled by EMC NetWorker Module for Microsoft SQL Server Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the

More information

Protecting enterprise servers with StoreOnce and CommVault Simpana

Protecting enterprise servers with StoreOnce and CommVault Simpana Technical white paper Protecting enterprise servers with StoreOnce and CommVault Simpana HP StoreOnce Backup systems Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key

More information

Keys to Successfully Architecting your DSI9000 Virtual Tape Library. By Chris Johnson Dynamic Solutions International

Keys to Successfully Architecting your DSI9000 Virtual Tape Library. By Chris Johnson Dynamic Solutions International Keys to Successfully Architecting your DSI9000 Virtual Tape Library By Chris Johnson Dynamic Solutions International July 2009 Section 1 Executive Summary Over the last twenty years the problem of data

More information

EMC Backup and Recovery for Microsoft SQL Server

EMC Backup and Recovery for Microsoft SQL Server EMC Backup and Recovery for Microsoft SQL Server Enabled by Quest LiteSpeed Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the information in this publication

More information

IBM PROTECTIER: FROM BACKUP TO RECOVERY

IBM PROTECTIER: FROM BACKUP TO RECOVERY SOLUTION PROFILE IBM PROTECTIER: FROM BACKUP TO RECOVERY NOVEMBER 2011 When it comes to backup and recovery, backup performance numbers rule the roost. It s understandable really: far more data gets backed

More information

Cisco Active Network Abstraction Gateway High Availability Solution

Cisco Active Network Abstraction Gateway High Availability Solution . Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and

More information

Restoration Technologies. Mike Fishman / EMC Corp.

Restoration Technologies. Mike Fishman / EMC Corp. Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

One Solution for Real-Time Data protection, Disaster Recovery & Migration

One Solution for Real-Time Data protection, Disaster Recovery & Migration One Solution for Real-Time Data protection, Disaster Recovery & Migration Built-in standby virtualisation server Backs up every 15 minutes up to 12 servers On and Off-site Backup User initialed file, folder

More information