Posts Tagged ‘Hyper-V’

Reflection on 2015 Resolutions – When a Triathlon Meets Data Protection

Deanna Hoover

Product Marketing Manager, Dell EMC
Deanna Hoover started her IT career over 30 years ago with a focus on software and hardware engineering. She has had the opportunity to work in a variety of different industries and has built a broad skillset ranging from writing machine code in a factory, migration of mainframe to client server, and storage architecture as well as systems and database administration. In August of 2004 Deanna made the move to EMC as a backup, recovery and archive presales SE. Since that time she has managed a Professional Services team and as of current is in marketing for Dell EMC with a focus on virtualization backup and recovery software. In her spare time Deanna enjoys the outdoors and participates in triathlons.

It’s that time of year to reflect back on 2015 and set new goals.  Are you one of the 45% who chose to set resolution goals?  If so, did you honestly stick to your goals? Congratulations if you did! Only 8% were successful in achieving resolution goals.

triathalon and data protectionI barely managed to meet my goal of improving my rankings as a triathlete. In a moment of insanity, I signed up for a half-ironman.  Several months and a few hundred hours of training later, I was race ready.  However, my race had a few glitches, and I wasn’t prepared for the unexpected.

A Triathlon involves swimming, biking and running – in this order.  Each triathlete is typically stronger at one of the 3 sports. For me it is biking.  It is beneficial to know the strengths of the other athletes before race day.   Let me give you an example of why.

The day before the race, we setup our transition areas, which includes, putting our running gear at the location where we dismount our bikes.  I strategically placed my gear to ensure I had a quick exit for my run. Despite that planning, another athlete had researched my previous race results, and learned biking was my strong sport and moved my running shoes.  I got off the bike in first place but it took me three minutes to find my hidden shoes! This gave her a competitive advantage. She finished a couple of minutes ahead of me and won the race.

I learned a couple of lessons in that race that we can apply to Data Protection.

  • I should have held the athlete accountable by turning her into the officials. Data Protection solution needs to be accountable, ensuring data is recoverable no matter what happens or where it lives.
  • One minor mishap affected the overall outcome of my race. A mishap in your Data Protection solution can be detrimental to your business. Reliable Data Protection is more than backup and recovery. It includes protection across the continuum, continuous data protection, and centralized analysis and monitoring.
  • The other athlete was committed to win, albeit unfairly. It is important that your Data Protection vendor be committed to your success for years to come.

Let me ask you, is your Data Protection solution prepared for whatever might happen? (more…)

It May Be Even “Cloudier” … But it’s all Clear Azure Skies with the new Avamar Virtual Edition

Phil George

Sr. Product Marketing Manager, Data Protection and Availability Division at EMC
Working with customers and partners (like VMware) to develop leading backup solutions makes every day very interesting; helping them optimize their backup architectures for virtualized environments is what really energizes me. Over the past 25 years, I’ve held senior engineering, marketing and sales roles within the technical software industry. This gives me a good vantage point to recognize technical challenges, see emerging trends and propose new solutions. I hold a BSEE from Cornell University and a Masters in Computer Engineering from Boston University. I currently reside with my wife and two children in Massachusetts.

HyperV EMC is pleased to announce the Avamar Virtual Edition (AVE) – deduplication backup software and virtual appliance designed for Microsoft Azure and Hyper-V environments. More and more companies are expanding their cloud initiatives to include public clouds.  We see three use-models that are quickly being adopted: Backup to Azure, Replicate Backup Data to Azure for disaster recovery, and protect virtual machines running in Azure.

back up to cloud (more…)

What’s New in NetWorker 8.2: Visibility and Control for Microsoft Private Cloud Administrators

Sherry Davenport

Senior Manager, Data Protection, Core Technologies
I started in the IT industry over 30 years ago — it sure doesn’t feel like that long! I worked my way through the ranks starting at the old Digital Equipment Corporation in software sales support, sales training, channel training, product management and, ultimately, marketing. My background includes digital imaging, team productivity software, Alta Vista (remember that?), storage management, storage networking and most recently backup and recovery software. While I love my job, I love cooking and wine appreciation even more.

This is the third in a set of blogs related to NetWorker 8.2.  This time I will delve a little deeper into the new support added in the NetWorker Module for Microsoft enabling system administrators for Microsoft Private Clouds with visibility and control over image-level recovery of virtual machines using an add-in for Microsoft System Center Virtual Machine Manager.  (more…)

SUBSCRIBE BELOW

Categories

Archives

Connect with us on Twitter

Click here for the Cloud Chats blog