Wonder Club world wonders pyramid logo
×

Digital Data Integrity: Evolution from Passive Protection to Active Management Book

Digital Data Integrity: Evolution from Passive Protection to Active Management
Digital Data Integrity: Evolution from Passive Protection to Active Management, How to plan your future strategy for efficient, cost-saving data management
Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude i, Digital Data Integrity: Evolution from Passive Protection to Active Management has a rating of 4.5 stars
   2 Ratings
X
Digital Data Integrity: Evolution from Passive Protection to Active Management, How to plan your future strategy for efficient, cost-saving data management Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude i, Digital Data Integrity: Evolution from Passive Protection to Active Management
4.5 out of 5 stars based on 2 reviews
5
50 %
4
50 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Digital Data Integrity: Evolution from Passive Protection to Active Management
  • Written by author David B Little
  • Published by Wiley, John & Sons, Incorporated, December 2006
  • How to plan your future strategy for efficient, cost-saving data management Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude i
  • How to plan your future strategy for efficient, cost-saving data management Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attit
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Acknowledgements     xi
Introduction     xiii
An Introduction to Data Protection Today     1
Introduction     1
Traditional Backup and Recovery     1
Hierarchical Storage Migration (HSM)     5
Disaster Recovery     6
Vaulting     7
Offsiting Original Backup     10
Create Multiple Copies of the Backup     10
Duplicate the Original Backup     10
Encryption     11
Client Side Encryption     11
Media Server Encryption     12
Encryption Appliance     12
Management and Reporting     12
Service Level Management     13
Summary     14
The Evolution     15
Introduction     15
Storage Virtualization     15
Why Storage Virtualization?     16
RAID     17
So What Does This Really Mean?     18
RAID Levels     19
What Mirroring and RAID Do Not Do     22
Which RAID Should I Use When?     23
Replication     24
Host-Based Replication     27
RAID System Replication     27
Standby orDR Site     28
Summary     29
Backup Integration     31
Introduction     31
Snapshots     31
Mirror     32
Mirror as an instant recovery mechanism     32
Mirror as a backup object, either by the application server or by a backup server     32
Mirror resynchronization     33
COW Snapshot     35
Replication     37
Applications     38
Summary     39
Bare Metal Restore     41
Introduction     41
Background     41
Why BMR?     42
Why Has This Taken So Long?     43
The Evolution of BMR Capabilities     44
The Manual Reinstall-and-Restore Method     45
Limitations of the manual reinstall-and-restore method     45
Operating System Provided Recovery Solutions     48
Limitations of operating system provided recovery solutions     49
Hybrid or Home-Grown Recovery Solutions     50
Filling the Gap - Integrated BMR     53
The Bar Rises     54
The Problem of Dissimilar Disk Recovery     55
Approach 1: Changing the Disk and Volume Configuration Information      55
Approach 2: Adjusting the Volumes and File Systems During Recovery     56
The Problem of Automating Disk Mapping     56
The Problem of Dissimilar System Recovery     58
Windows Dissimilar System Restore Issues     59
UNIX Dissimilar System Restore Issues     60
The Current State of Integrated BMR     61
The Future of BMR     62
Enterprise Data Protection Server Self-Restore     62
Automated Dissimilar Disk Restore     63
Automated Dissimilar System Recovery     63
Network Integration     64
New Capabilities and Challenges in Data Protection and the Effect on Bare Metal Recovery     64
Continuous Data Protection (CDP)     64
Single Instance Store (SIS)     64
Storage Area Network (SAN)     65
Large-Scale Automated Bare Metal Recovery     65
Summary     66
Management     67
Introduction     67
Protecting Data Throughout Its Life Cycle     69
Architecting for Efficient Management     71
Reporting     78
Backup Operations Reporting     79
Alerting and Notification     81
Backup Reporting to Business Units      83
Business Unit Chargeback     86
Backup Service Providers     86
Conclusion     87
Security     89
Introduction     89
Encryption and Data Protection     90
Encryption Overview     90
Encryption and Key Management     91
Encryption Use in Data Protection     92
Data Protection Application Security     94
Terminology     95
Authentication     95
Authorization     95
Access control     96
Role-Based Security     96
Audit Trails     97
Firewalls     97
Security Vulnerabilities in Data Protection Applications     98
Vulnerability Detection and Fix Process     99
Types of Vulnerabilities     100
Conclusion     101
New Features in Data Protection     103
Introduction     103
Synthetic Backups     104
Evolution of Synthetic Backups     106
Benefits of Synthetic Backups     106
Building a Synthetic Backup     108
Technical Considerations and Limitations     109
File-Based Versus Block-Based Synthetics      109
File Types and File Change Frequency     109
Media Considerations     110
Disk-Based Solutions     110
Disk to Disk     111
Disk Staging     112
Early Implementations     113
Later Implementations     114
Commercial Implementations     116
Virtual Tape     116
Advantages of Virtual Tape     117
Technical Considerations and Limitations     118
Disk-Based Data Protection Implementation Issues     118
Conclusion     119
Disk-Based Protection Technologies     121
Introduction     121
Disk Synthetic Backup     122
Online Protection: CDP     123
A CDP Definition     124
CDP Using Byte Level Replication     125
CDP or 'Near' CDP Using Snapshot Technology     126
Benefits and Technical Considerations of CDP     127
Data Reduction: SIS     128
Primary Data Growth and Secondary Data Explosion     129
Issues With Today's Secondary Data Storage     130
Growth of the Geographically Dispersed Business Model     131
Issues with Remote Office Backups in the Traditional Data Protection Model      131
SIS as a Solution to Remote Office and Data Redundancy     132
Data Redundancy Elimination Using SIS     133
Benefits and Technical Considerations of SIS     134
New Pricing Paradigms for Disk-Based Protection     137
Source Versus Target     138
Tiered Versus Nontiered     139
Size of the Increments     140
Conclusion     141
Managing Data Life Cycle and Storage     143
Introduction     143
Issues Surrounding Data Life Cycle     143
Data Life Cycle Management     145
Hierarchical Storage Management (HSM) as a Space Management Tool     146
Space management example     147
Archive Management     148
Archive and Space Management Together     151
Application Considerations     152
Email as a Driving Force     152
Instant Messaging     153
Business Portals     154
Applying an Application Strategy     155
Content Indexing     156
Additional Considerations     157
File System Intelligence     157
File Blocking     157
Backup Integration     159
Security      160
Public Disclosure     161
Archive as a Secondary Target     161
Compliance     162
Record Deletion     163
Conclusion     165
Quality Control     167
Introduction     167
Quality Control as a Framework     168
Managing the Service Level Agreements (SLAs)     172
Protection by Business Unit     173
Storage Resource Management (SRM)     174
Application Considerations     175
Corrective Action     176
Patching     177
Policy and Compliance     178
Cost Modelling     179
Security     181
Conclusion     182
Tools for the System     185
Introduction     185
HA     185
Protecting Data that is Part of a Cluster     186
Clustering a Data Protection Application so that It can be Highly Available     187
Provisioning     188
Growing Environments     189
From Test to Production     190
Virtualization     190
Summary     191
Conclusion     193
Glossary     199
Appendix A     207
Appendix B     219
Index     239


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Digital Data Integrity: Evolution from Passive Protection to Active Management, How to plan your future strategy for efficient, cost-saving data management
Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude i, Digital Data Integrity: Evolution from Passive Protection to Active Management

X
WonderClub Home

This item is in your Collection

Digital Data Integrity: Evolution from Passive Protection to Active Management, How to plan your future strategy for efficient, cost-saving data management
Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude i, Digital Data Integrity: Evolution from Passive Protection to Active Management

Digital Data Integrity: Evolution from Passive Protection to Active Management

X
WonderClub Home

This Item is in Your Inventory

Digital Data Integrity: Evolution from Passive Protection to Active Management, How to plan your future strategy for efficient, cost-saving data management
Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude i, Digital Data Integrity: Evolution from Passive Protection to Active Management

Digital Data Integrity: Evolution from Passive Protection to Active Management

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: