Posts Tagged ‘data’

Backing Up Your Data Should Be a Routine, Not a Tradition

David Tye

Product Marketing Manager
As a recent graduate from Sacramento State University I am able to take what I have learned in school and apply it to the high tech industry and the problems companies are facing today. I am a California native, die hard Green Bay Packers fan, and an outdoor enthusiast.

Latest posts by David Tye (see all)

With the holiday season upon us, it’s time to break out the lights, decorations, gifts and, of course, good food. Thanksgiving is a time for all of us to give thanks and spend time with the ones we love. Like many families, my family partakes in a variety of holiday traditions. Every Turkey Day we bring out the “Giving Tree.” The Giving Tree contains blank leaves, which are filled out anonymously with phrases and sayings of what each of us is thankful for. After dinner, each leaf is pulled off the tree and read aloud. Family members then have to guess which leaf belongs to whom. I’ll give you a hint: any leaf that mentions the Green Bay Packers is probably mine.

People Talking Celebrating Thanksgiving Holiday Concept

The Giving Tree is a one-time occurrence that takes place on the night of Thanksgiving. Backing up your data, on the other hand, is something that needs to be routine. The most important information that resides on any endpoint is your data. Operating systems and applications can be reinstalled relatively easily; however, getting your original data back is not so easy. Backing up your data is paramount when it comes to data protection. According to the Global Data Protection Index, a third-party study that surveyed 2,200 IT decision makers across 18 countries, 30% of respondents had lost data in the last 12 months!

There are a variety of methods you can use to back up data. In the past, backing up data to an external hard drive or tape was standard operating procedure. In today’s IT landscape, businesses large and small are adopting more modern and automated approaches such as cloud backup. Backing up data has moved from a cumbersome manual process to a simple automated process in a relatively short amount of time. For example, Mozy by Dell lets you log in to an easy-to-use admin console and set backups to happen automatically on a weekly, daily or hourly cadence, depending on user needs. (more…)

Backing Up Your Data Should Be Obvious

Brian Heckert

Principal Content Editor, Dell EMC
My first long-term exposure to technology was the typewriter. I still love that invention, which really sparked my interest in writing. For the past 20 years, I have worked in high tech as a content development specialist, marketing writer, and documentation editor. Prior to working in the software industry, I was a journalist, photographer, photo editor, and military fire fighter. After hours, I enjoy spending time with family, reading, and hiking in the mountains.

Keeping a safe distance from large mammals with large canines should be obvious, especially when they can weigh more than a couple of tons. But what’s obvious to one person may not be so obvious to another.

On a recent excursion to the Central California coast I had the opportunity to observe elephant seals, mammals so massive they can grow to more than 16 feet and weigh more than 5,000 pounds. Elephant seals are fascinating animals, but there are some critical facts to keep in mind when you’re watching them in close proximity. According to the clearly visible signs posted nearby where the seals congregate, here’s what observers need to know:

beware-sealsElephant seals…

  • are large
  • have teeth and bite
  • are faster than you think
  • are wild

Seems obvious, right? And in case that information isn’t convincing enough, here’s the last bit of advice on the sign to anyone who might think elephant seals are cuddly critters: For your safety and theirs, KEEP YOUR DISTANCE. It’s the law.

When I returned to work the following week, I was thinking about my adventure at the elephant seal rookery and what I learned. It really was a treat to observe them and see them thriving, especially when you consider that at the end of the 19th century they were nearly extinct. That got me thinking about data protection. You may be asking, “What? Elephant seals and data protection?!” But when you consider the information on the signs that warns rookery visitors, and the importance of protecting your data, it’s not such a stretch, especially when you realize that many businesses don’t do the obvious by adequately protecting one of their most important assets—their data.

Why do you need data protection? The EMC Global Data Protection Index (GDPI) discovered some critical facts. The GDPI found that of the organizations surveyed, 52% of them suffered unplanned system downtime in the last 12 months, and 29% suffered data loss. Whether it’s a cyberthreat (36% of organizations reported internal or external security breaches, according to index) or hardware failure (hardware failure is still the number one cause of data loss and/or system downtime, according to Index), a massive data breach can happen faster than you think. In fact, once they gain access to a system, it takes just six minutes for cybercriminals to compromise an organization, and they can do that successfully 60% of the time. Those numbers have a lot of bite (think very large canines)!

When you consider that many industry and government entities require that businesses conform to standards for safeguarding and retaining data, it’s not much of a stretch to say that protecting your data is the law. And backing it up is an important aspect of your data protection strategy. Don’t ignore the obvious! Data is always at risk of being lost, stolen, damaged, or corrupted. The signs are all around. Your data is critical to your success and everyday operations, and business continuity depends on the availability of your data. Don’t let your data—or your business—become extinct! One way to ensure it doesn’t is by implementing the right solution. Check out how Dell EMC Mozy’s enterprise-grade cloud backup solutions can give you that peace of mind.

beware-hackers

So if I were to revise the elephant seal signs to instead caution business owners who are not yet confident in their data protection readiness, here’s how I would do it:

Your data…

  • is important
  • is valuable
  • must be accessible
  • must be safeguarded

And just to underscore that: For the safety of your business, BACK UP YOUR DATA. It’s essential!

Beyond the Buzzword: Modern Data Management

Tyler Stone

Dell EMC eCDM Product Marketing
Tyler is currently a software engineer in the Engineering Leadership Development Program at Dell EMC. He has spent the past three years at EMC across multiple roles in storage, IT, and data protection. Tyler has a love of technology and innovation, and something about data centers has always sparked his sense of wonder and amazement (as he says, maybe it’s the flashing lights). When his head isn’t up in the cloud, he is out travelling, taking pictures, or playing golf. Follow him on Twitter @tyler_stone_

When I think of technology buzzwords, I think of really big, complex concepts that slowly grow into all-encompassing terms to make those concepts easy to reference. Due to the complexity of some technology topics, however, buzzwords often create an opportunity for misconceptions. I’ve had people ask me if I work “for the cloud” when I talk about what I do, which is close – yet so far away.

In an earnest attempt to combat misconceptions, I want to discuss a term near and dear to my heart: modern data management. On the surface, it looks like this phrase implies that we want to manage data… modernly…? Well, that’s not wrong; but there’s a lot more behind this buzz-phrase.

First, we need to understand a broader trend in the industry: self-service. Basically, businesses no longer depend on IT to solve infrastructure problems due to the development of new technologies to enable increased agility. Before self-service, if an application administrator or DBA needed a copy of a production database, they would have to place a request to a storage or backup administrator and wait for the request to be fulfilled. Now, application owners and DBAs have easy access to copy creation tools from their native utilities, making it extremely easy to create copies themselves for any desired use case. Self-service is the foundation for modern data management.

While self-service is necessary to keep up with the demands of agile businesses, it raises some concerns. Specifically, if application owners and DBAs are managing their own copies, how can managers enforce a specific set of rules or policies to ensure compliance with business objectives, such as protection SLAs or retention policies?  This trend towards self-service has led to siloes of storage managed by decentralized teams, making it difficult for IT managers and protection administrators to monitor their copy ecosystem and ensure service level agreement (SLA) compliance.

Moreover, native utilities have no way to monitor or enforce SLAs or protection policies. Copy creation tools simply relay that the copy was created successfully. Even if application, database, and backup administrators create copies to align with protection SLAs, they can’t be expected to constantly check the environment to ensure that nothing has happened to those copies. Administrators are left to assume that their copies are sitting healthy on storage, even though they could be missing their SLAs.

Ok, so how does modern data management solve these problems? Well, modern data management provides a comprehensive view of data generated in the modern enterprise to enable SLA-based copy data lifecycle management, thus ensuring enterprise compliance and security. In order to fulfill this mission, modern data management consists of two additional components that build on self-service: intelligent copy oversight and analytics.

modern DC Management

Intelligent copy oversight, such as Dell EMC Enterprise Copy Data Management, provides managers with a view of all copies in a data center. This component allows managers to create SLOs and apply them to protectable storage assets. Then, copies of assets will be continually monitored for compliance, and SLA enforcement can be automated to ensure compliance with business objectives. With intelligent copy oversight, managers will have a clear way to view and manage their copy ecosystem. (more…)

Modernizing the Data Center – What is Everyone Else Doing?

Stephen Manley

CTO, EMC Core Technologies Division
Over the past 15 years at both EMC and NetApp, I have traveled the world, helping solve backup and recovery challenges - one customer at a time (clearly, I need to optimize my travel arrangements!). My professional mission is to transform data protection so that it accelerates customers’ businesses. I have a passion for helping engineers pursue technical career path(without becoming managers), telling stories about life on the road and NDMP (yes, that’s NDMP).

“What is everybody else doing?” It’s the question that I’m asked most often. Sometimes, those asking are wondering how their peers are approaching things. Others want to know if different industries have alternate perspectives. Sometimes, they just want to understand what their boss is worried about. Regardless of the reason, it’s useful to understand what smart IT leaders are doing – not to blindly copy them, but to have all the information and options available to them.

At EMC World 2016, we brought together four IT leaders to talk about incorporating cloud, leveraging data analytics, and how to innovate using the talent they already have.

This year’s panelists:

  • Jason Kalich – VP, Cloud & Site Reliability Engineering, GoDaddy
  • Dietmar Reinelt – VP, Cloud Infrastructure Services, SAP
  • Eric Coss – Manager, Infrastructure and Operations, Nationwide
  • Amr Awadallah – CTO, Co-Founder, Cloudera

The panel can be viewed online or below, but if you like the previews as much as the movie, or if you prefer the CliffsNotes to the novel (by the way, why did they change their name from Cliff’s Notes to CliffsNotes?), read on.

Public Cloud – What to Do
Due to the varied industries and roles, each panelist had a different perspective on adopting public cloud. Unlike years past, however, each viewpoint was well-defined and not reactive.

cloud panelThe panel spanned the continuum of public cloud adoption. Jason Kalich, from GoDaddy, believes that everybody will live in a hybrid cloud; even acompany that doesn’t organically embrace the public cloud will acquire somebody who has. Conversely, Eric Coss, of Nationwide, who works in the risk-aware insurance industry, is concerned about security and data services in the public cloud. As a result, he’s focused on private cloud. Eric is not alone in his approach. Amr Awadallah pointed out that, even for a cutting-edge analytics company with “Cloud” in the name, only 15% of Cloudera’s customers run in the cloud. He supports Jason’s view on the market direction, however; he projects that by the end of 2016, 30% of Cloudera’s customers will run in the cloud. Finally, Dr. Reinelt shared that SAP is enabling their customers to make that transition when they’re comfortable. Some customers jump right into public cloud, but others want to take smaller steps. For private cloud, SAP is enabling customers to leverage commodity hardware. Everybody’s cloud journey will be different, and companies like Cloudera and SAP are tailoring their solutions to fit their customers’ path to the cloud.

The public cloud is a viable option for customers and vendors. There will be no “one-size-fits-all” answer to the cloud. There are good reasons to adopt and equally strong reasons to be cautious. Regardless of where you stand, it’s important to have a well-defined position that you are willing to review as the environment and business needs evolve. (more…)

Don’t Let Your Data Get Burned

John Amichetti

Product Marketing Manager, EMC

Latest posts by John Amichetti (see all)

Laptop in fire flames

Our world is becoming increasingly reliant on data and failure to protect it can be catastrophic. That may sound like hyperbole, but the loss of data can literally mean the loss of your business. Whether it’s the threat of hackers, system failure, or human error, data protection should be at the forefront of every business’ mind. Unfortunately, not every business is prepared for all risks against data loss, including natural disasters.

As for data protection preparedness, a large, Italian data center and telecommunication services company learned the hard way. One day, due to an AC failure, they fell victim to a fire that ravaged their data center. Many of their storage devices were completely fried; along with the tapes they held for disaster recovery (which they kept on-site).

The tapes were melted entirely, leading to a potentially devastating scenario of data loss. In addition, their EMC Data Domain CPU, which they used for protection storage for operational recovery, was destroyed. In fact, everything was damaged except for the metal disks inside the system.

This is only one example where a company’s data protection strategies were not able to stand up against a potential disaster and this type of disaster can happen to anyone. However, there are certain steps you can take to ensure your data is protected.

  1. Eliminate the use of tape for long term retention or disaster recovery
  2. Ensure your disaster recovery system is off-site, making it less likely to be affected by a potential natural disaster
  3. Utilize a single data protection vendor

 

Even in the wake of this disastrous fire, the company’s data center was salvageable.  Due to the Data Domain Data Invulnerability Architecture, the entire index database was rebuilt in a mere 7 hours, after a simple head swap. Every single file (74 TB) was recovered and the system was back online in less than 24 hours. (more…)

SUBSCRIBE BELOW

Categories

Archives

Connect with us on Twitter

Click here for the Cloud Chats blog