Posts Tagged ‘CloudBoost’

Experiences that Meet Expectations

Tom Giuliano

Principal Product Marketing Manager, Data Protection Management Software Solutions
For 17 years, Tom has brought storage, data protection, security and wireless products to market through roles in product marketing, product management and sales. He loves to speak with customers and prospects about their business goals and challenges, their experiences and their needs, and has had a lot of opportunity to do it. Backed with a master’s degree in Engineering and an MBA, Tom is equally comfortable digging into the details with technical personnel as well as translating and delivering the business value story. But honestly – TELLING STORIES is SO much more FUN for him! Tom's current role in product marketing focuses on data protection management solutions and management strategy. He gets to spend his days thinking about how to help you simplify and enhance your experience achieving your data protection objectives. When not driving go-to-market initiatives, identifying unique and creative methods to build product awareness or launching new and innovative offerings, you’ll likely find him cycling, skiing, boating or running. And, who knows, maybe you’ll hear some of more of his interesting experiences in a future post from time to time.

I recently found myself standing at one end of a large field.  People were everywhere and it was extremely loud.  It was 37 degrees Fahrenheit and raining.  I think I even saw a few snowflakes mixed in.  I stood there soaked and shaking, but didn’t mind.  I was cold and wet on the outside, but was glowing with pride on the inside.

Besides, I had experienced this before (dozens of times….) and knew what to expect.

Then I saw them – the lead group of runners of varsity girls cross country crested a rise toward the end of the first loop of their 5k race, which is the first time we had seen them in nearly five minutes.  Between the starting gun and then, every teammate and family member hoped their friend or child was running strong and not injured as they’d just run through narrow wooded trails littered with tree roots, loose stones and mud.

My daughter, who was first off the starting line on this particular day, had fallen back to 4th place.  I wasn’t worried though.  Her strategy was to remain in the front group for the majority of the race and sprint the final 200 yards to the finish.  She’s consistent and predictable, at least as much as any teen can be.  At least that’s been my experience, and her, and her coach’s, expectation.

After all, it’s about making sure the experience meets the expectation.

In June 2016 I wrote a blog titled “That Familiar Enterprise Experience in the Cloud”, which discussed how Dell EMC NetWorker protects cloud-resident workloads as an enterprise backup solution.  The most important take-away in that article was that NetWorker protects applications and data in the public cloud with THE SAME USER EXPERIENCE as when using NetWorker to back up on-premises workloads.  (more…)

Oh, There’s No Place Like Las Vegas for the Holidays

Dave Robinson

Sr. Director Product Marketing, Dell EMC
Dave is a 10-year EMC veteran, responsible for the marketing behind Dell EMC’s portfolio of data protection cloud products and technologies. A California native and graduate of the University of Utah, Dave started his career in advertising, building integrated marketing campaigns for a large healthcare client. The allure of technology was too hard to resist so he took the leap and never looked back. Outside of work, he may be found in the mountains, on a lake, reading a great history book, or coaching youth baseball. Dave is married with 4 children.

Latest posts by Dave Robinson (see all)

AWS-reinvent-conference-las-vegas

As the last few leaves drop from the trees and warm sunny afternoons give way to cold winter nights, it can mean only one thing… the holidays are near. Like many of you, I am a firm believer that late November through early January is indeed “the most wonderful time of the year,” as Andy Williams first crooned back in 1963. It’s a time for binge eating, reconnecting with friends and family and in the case of the Robinson family, movie marathons! One of my most cherished traditions the past few years has been introducing my kids to the holiday classics that I grew up on; “A Christmas Story,” “It’s a Wonderful Life,” “Elf,” and “Home Alone” to name a few.

 

aws-data-protection

Image provided by Google images

In “Home Alone,” the McCallister family vacation takes a turn for the worse when eight-year-old Kevin is left behind as a result of an overnight storm and ensuing power outage. <Spoiler Alert!> As a result of his cleverness, a few household items, and a newfound friend, Kevin is ultimately able to protect his home against a pair of bungling intruders.

For enterprise IT, unwanted intruders, bungling or sophisticated, are no laughing matter. At Dell EMC, we’re committed to protecting all of our customer’s data against unwelcome intruders, power outages, ransomware and more. Physical or virtual. Data center or public cloud. North Carolina or North Pole. No data is out of reach for Dell EMC data protection solutions.

To that end, Dell EMC is a bronze sponsor of the AWS re:Invent 2016 conference, which kicks off today at the Sands Expo in Las Vegas. With the sweet scent of Starbucks Pumpkin Chai lattes drifting through the air, the more than 20,000 attendees can network with cloud experts, engage in hands-on labs, attend boot camps and more. Come visit Dell EMC at booth #947 in the Expo Hall to talk to the experts about data protection solutions from Data Domain and NetWorker with CloudBoost for the AWS platform.

Data Domain Cloud Tier allows you to natively tier data to Amazon S3 object storage for long-term retention. As you would expect from Data Domain, only unique data is sent directly to AWS for a highly efficient and cost-effective long-term retention solution. We’ll also be offering demos of NetWorker with CloudBoost for protecting enterprise applications running on Elastic Compute Cloud (EC2). NetWorker with CloudBoost runs completely self-contained within the AWS EC2 environment and includes client-side optimized backups, inline de-duplication, encryption and compression with backup directly to Amazon S3. (more…)

That Familiar Enterprise Experience in the Cloud

Tom Giuliano

Principal Product Marketing Manager, Data Protection Management Software Solutions
For 17 years, Tom has brought storage, data protection, security and wireless products to market through roles in product marketing, product management and sales. He loves to speak with customers and prospects about their business goals and challenges, their experiences and their needs, and has had a lot of opportunity to do it. Backed with a master’s degree in Engineering and an MBA, Tom is equally comfortable digging into the details with technical personnel as well as translating and delivering the business value story. But honestly – TELLING STORIES is SO much more FUN for him! Tom's current role in product marketing focuses on data protection management solutions and management strategy. He gets to spend his days thinking about how to help you simplify and enhance your experience achieving your data protection objectives. When not driving go-to-market initiatives, identifying unique and creative methods to build product awareness or launching new and innovative offerings, you’ll likely find him cycling, skiing, boating or running. And, who knows, maybe you’ll hear some of more of his interesting experiences in a future post from time to time.

I drive a Honda Odyssey minivan.

Well, actually, it’s my wife’s van.  I use it for occasional trips to Home Depot, the landfill…that sort of thing.  And I’ll freely admit it…..I like driving the van (which I lovingly refer to as “the bus”).  It has tons of room, plenty of power, great visibility, it’s SUPER RELIABLE.

Until it’s not.

There was nothing really wrong with the van.  We faithfully have an authorized Honda dealer perform maintenance at the suggested intervals so it keeps delivering the reliability we’ve come to expect. It was simply time for its 110,000 mile checkup, and ironically the “check engine” light came on at 108K.  Talk about irony (or at least a reliable reminder!)

In any case, the dealer recommended new spark plugs, timing belt, water pump, oil change and cylinder recalibration.  I was suspicious of that last one but after looking into it agreed to the work.  It would take all day so I’d need to leave the car overnight and they offered me a rental car to get back to the office.

They called their preferred local car rental agency and requested a vehicle be delivered quickly.  I was happy to see the rental agent within 15 minutes, complete the paperwork and walk outside to see my temporary wheels.  That’s when my day went downhill.

web-jeep

I was staring at a very compact (is that overly redundant?) rental vehicle.  I won’t tell you what brand or model, but I can honestly tell you it was about the same size as my bike.  And it wasn’t even in great shape.  It had multiple dents and scratches in the bodywork and stains on the seats.  For the record my car is a mid-sized sedan and I am meticulous about keeping it clean.

This tiny rental was not at all what I expected.  In the past I’ve received rental vehicles of the same type and size of the car being worked on.  But, after all, the dealership covered the cost of the rental and I needed to get back to the office.  (more…)

Road to Efficiency, Part 2

Vladimir Mandic

Chief Technology Officer & Distinguished Engineer Data Protection Cloud, Core Technologies Division, Dell EMC
Vladimir has been driving technical innovation and change within EMC for the past 10 years, first in the area of data protection software and, currently, in cloud technologies. Prior to that, he’s had rich industry experience as a solution integrator and in the service provider space. When not working on technology innovation, he may be difficult to locate due to his passion for world travel.

Latest posts by Vladimir Mandic (see all)

As business look at cloud adoption, the question is, “What is the cloud good for?” Yes, the cloud can be efficient and elastic, but what would be its real use in complex environments?

A different way of looking at the road to the cloud is by considering where your data—both primary and secondary copies—resides.
efficiency2-1Cloud as 3rd copy
In a typical data center your primary file and application data would reside in on-premises storage arrays such as XtremIO, VMAX, VNX or Isilon. Second-level protection is offered via data protection solutions using secondary storage such as EMC Data Domain. As a last step, select data can be tiered to the cloud via products such as CloudBoost or CloudArray, to either private clouds built using ECS or public clouds. That means that data in the cloud is a 3rd tier of data. This is a good way to achieve efficiencies for specific use cases such as long-term retention, offsite copy of data, and data archiving while maintaining all primary processing within the data center.

Cloud as 2nd copy
A more direct way of using the cloud is by having data copied directly from primary storage to the cloud (that is, storage tiering) or protecting data directly to the cloud. This results in even higher efficiencies; however, this creates a much larger dependency on the cloud for operational recovery purposes as there is no second copy of data on premises.

Ideally, at this point we would look at direct-to-cloud tiering and protection with ability to maintain on-premises copies of active data for quick access.

Cloud as 1st copy
The last step in cloud adoption is where your primary data resides directly in the cloud, either with SaaS applications (such as Office 365, Salesforce, and Google Apps) or hosted applications running on cloud-based PaaS (such as developed using Pivotal’s Cloud Foundry platform) or IaaS (such as Amazon AWS or Microsoft Azure). In that case, the need for data protection still remains even if infrastructure resiliency responsibility has moved to the cloud solution provider. And to achieve efficiencies, data protection solution and resulting data copies also reside in the cloud itself. However, in that case you may need to export data back to on-premises either for safety, compliancy, or other reasons. (more…)

Get a Snow Blower for Your Cold Data

Parasar Kodati

Product Marketing Manager
Parasar Kodati has more than ten years of experience in product management and marketing spanning scientific computing, embedded software development, and data acquisition technologies. When not working he may be found plotting with his mischievous daughter, cooking Indian street food or reading eastern philosophy.

I think it is safe to say that this past winter in the Boston area has been more like Spring. Unlike my three year old who is fond of using her shovel (the blue one pictured below) I and my back did not miss the snow. Nevertheless I was prepared with my arsenal to tackle snow on the car, drive way and the back yard. Here they are basking in the 70s in in a picture taken on March 10.

shovel

Cold Data is Accumulating much Faster than You Think
Cold data is something like a more normal snow fall in New England. We clear the car and drive way of the snow but can’t get rid of it completely. What is cold data? Data that is rarely accessed is referred to as cold data. Other names include static data or inactive data. While the chances of access of cold data are very slim, cold data however just sits around occupying valuable primary storage (which is rapidly becoming all flash!). For certain applications data starts to lose value quickly but still needs to be stored for a certain time frame.  A simple example is archive mail boxes. Another example is the rapid accumulation of device data, say from IoT sensors. Let us also note that archival data that is beyond short term back up also presents the same challenge. Whatever the context may be, cold data is simply a consequence of rapid data growth.

Pain Points when Dealing with Cold Data
Now just like we shovel away snow storage administrators spend a lot of time and effort moving this cold to lower tier arrays or to tape. Time and effort aside, in the rare event that access is needed to this data, retrieval is once again a challenge with time consuming processes to load this data back onto the storage network. If you add the cost of your primary storage that is being used up by inactive data, the time and resources it takes to move the cold data out of the primary storage and the recovery costs you will quickly see the inefficiencies of the cold data management chewing up your resources. (more…)

SUBSCRIBE BELOW

Categories

Archives

Connect with us on Twitter

Click here for the Cloud Chats blog