Posts Tagged ‘salesforce’

Happy Birthday to the World Wide Web!

Lori Witzel

Product Marketing Manager, Spanning by EMC
Lori Witzel is a Salesforce MVP, has worked with and for SaaS companies since 2005, and has been sharing info with, listening to, and learning from tech users ever since. She is currently PMM for Spanning Backup for Salesforce, as well as PMM for Spanning Backup for Google Apps. Prior to Spanning Backup, Lori worked for various early-stage Cloud start-ups, mid-sized middleware providers, and ed tech firms, and she’s always eager to learn more. Lori's profile on LinkedIn:

World map point, line, composition, representing the global.

As Dell EMC continues to innovate in SaaS, hybrid and public cloud technologies, here’s a hat-tip to another innovation that enables us to #GoBigWinBig – the World Wide Web, “born” on November 12, 1990.Some interesting facts about the World Wide Web:

  • The Internet and the World Wide Web are not the same thing. I’m sure some of you know that, but many don’t. Webopedia describes the Internet as “a massive network of networks, a networking infrastructure,” and the World Wide Web as an “information-sharing model that is built on top of the Internet.” In other words, the World Wide Web is a “portion of the Internet.”
  • The World Wide Web has two parents – Tim Berners-Lee and Robert Cailliau. They made a proposal to CERN on November 12, 1990 for a hypertext project to solve inefficiencies caused by “incompatibilities of the platforms and tools [that] make it impossible to access existing information through a common interface, leading to waste of time, frustration and obsolete answers to simple data lookup.”
  • Their original proposal provided early support for the concepts of open source and freeware. The proposal stipulated that information was open to additional enrichment by later contributors, and would “provide the software for the above free of charge to anyone.”

With the World Wide Web project, and the subsequent release of the Web browser Mosaic by Marc Andreessen in 1993, SaaS and Cloud as we know them today could be born.

The World Wide Web: Fundamental to the growth of SaaS and Cloud
With Web-enabled, browser-based applications, a global community of users was possible. And that possibility led to potential communities becoming growth markets for a new “computing paradigm where the boundaries of computing will be determined by economic rationale rather than technical limits alone.” The term “cloud computing,” to describe this change in boundary, was first used in 1997 by Ramnath Chellappa at that year’s Institute for Operations Research and the Management Sciences (INFORMS) conference.

And as noted by Ana Cantu (formerly of Dell) in Forbes, “Within just a few years, companies began switching from hardware to cloud services because they were attracted to benefits like a reduction in capital costs as well as an easing in IT staffing issues.” (more…)

SaaS is Changing Everything – Including Data Loss Risk from Admin Error

Lori Witzel

Product Marketing Manager, Spanning by EMC
Lori Witzel is a Salesforce MVP, has worked with and for SaaS companies since 2005, and has been sharing info with, listening to, and learning from tech users ever since. She is currently PMM for Spanning Backup for Salesforce, as well as PMM for Spanning Backup for Google Apps. Prior to Spanning Backup, Lori worked for various early-stage Cloud start-ups, mid-sized middleware providers, and ed tech firms, and she’s always eager to learn more. Lori's profile on LinkedIn:

Software-as-a-Service (SaaS) has a history unlike that of on-premises software, and the people who manage and administer SaaS applications reflect that difference. When it comes to data protection, that difference matters, as you’ll learn.

accidental admin

What is SaaS, and does it REALLY differ from on-premises or from hosted applications?
SaaS isn’t just some software sitting on a vendor-managed server in the cloud –  it’s significantly different from its predecessors, hosted and on-premises applications, in its delivery and its architecture.

  • A SaaS application is by definition cloud-based and multi-tenant, sharing IT resources securely in the cloud among multiple applications and tenants (businesses, organizations, schools). Multi-tenancy is the technical architecture that differentiates SaaS from hosted/ASP applications. The customer will access the application through a web browser, and is only responsible for managing the data and metadata (customizations) of their instance.
  • A hosted application is almost always a single-instance, single-tenant adaptation of an on-premises application. The customer may lease or own physical or virtualized servers upon which the application is installed, and will access it through a web browser or a thin client. The customer may be responsible for managing the servers, and is responsible for managing application upgrades and maintenance.
  • On-premises applications are installed on and operated from a customer’s in-house (on-premises) servers and computing infrastructure. The customer is responsible for application security, availability to the organization, and management.

How Did SaaS Come to PaaS?
In 1999, was founded, offering the first true multi-tenant architecture in a commercial software application. Its SaaS applications, such as Sales Cloud and Service Cloud, were developed on its Platform-as-a-Service (PaaS). By foregoing conventional application development platforms and creating its own platform, freed itself from some of the performance limitations inherent in a standard relational database.

The achievement in creating a PaaS to enable SaaS, enabling them to scale up to support hundreds of thousands of intra- and inter-enterprise tenants (different departments, different organizations) was, to quote Computerworld, “complex, commendable and quite revolutionary.” (more…)

Road to Efficiency, Part 2

Vladimir Mandic

Chief Technology Officer & Distinguished Engineer Data Protection Cloud, Core Technologies Division, Dell EMC
Vladimir has been driving technical innovation and change within EMC for the past 10 years, first in the area of data protection software and, currently, in cloud technologies. Prior to that, he’s had rich industry experience as a solution integrator and in the service provider space. When not working on technology innovation, he may be difficult to locate due to his passion for world travel.

Latest posts by Vladimir Mandic (see all)

As business look at cloud adoption, the question is, “What is the cloud good for?” Yes, the cloud can be efficient and elastic, but what would be its real use in complex environments?

A different way of looking at the road to the cloud is by considering where your data—both primary and secondary copies—resides.
efficiency2-1Cloud as 3rd copy
In a typical data center your primary file and application data would reside in on-premises storage arrays such as XtremIO, VMAX, VNX or Isilon. Second-level protection is offered via data protection solutions using secondary storage such as EMC Data Domain. As a last step, select data can be tiered to the cloud via products such as CloudBoost or CloudArray, to either private clouds built using ECS or public clouds. That means that data in the cloud is a 3rd tier of data. This is a good way to achieve efficiencies for specific use cases such as long-term retention, offsite copy of data, and data archiving while maintaining all primary processing within the data center.

Cloud as 2nd copy
A more direct way of using the cloud is by having data copied directly from primary storage to the cloud (that is, storage tiering) or protecting data directly to the cloud. This results in even higher efficiencies; however, this creates a much larger dependency on the cloud for operational recovery purposes as there is no second copy of data on premises.

Ideally, at this point we would look at direct-to-cloud tiering and protection with ability to maintain on-premises copies of active data for quick access.

Cloud as 1st copy
The last step in cloud adoption is where your primary data resides directly in the cloud, either with SaaS applications (such as Office 365, Salesforce, and Google Apps) or hosted applications running on cloud-based PaaS (such as developed using Pivotal’s Cloud Foundry platform) or IaaS (such as Amazon AWS or Microsoft Azure). In that case, the need for data protection still remains even if infrastructure resiliency responsibility has moved to the cloud solution provider. And to achieve efficiencies, data protection solution and resulting data copies also reside in the cloud itself. However, in that case you may need to export data back to on-premises either for safety, compliancy, or other reasons. (more…)

Data Recovery Versus Restoration: When it comes to SaaS Backup, Restore is Everything

Mat Hamlin

Director of Products for Spanning by Dell EMC
Mat is the Director of Products for Spanning by Dell EMC. He is responsible for the overall direction and strategy for Spanning's suite of SaaS backup and recovery solutions. His career in technology spans five startups and two large organizations, all in Austin, TX. Mat started out in product support and training, then engineering leadership and for the past nine years has been focused on product management and product marketing. Prior to joining Spanning, Mat served as Sr. Product Manager for SailPoint Technologies and Sun Microsystems, contributing to their market-leading enterprise identity management solutions.

As more organizations are moving their critical data to the cloud and leveraging SaaS applications like Google Apps, Office 365, and Salesforce, we’re witnessing a simultaneous evolution in the backup industry. These forward-thinking organizations are focusing not just on creating backup copies of data for safekeeping, but they’re also considering what it takes to maintain all facets of data protection, including business continuity, accessibility, and compliance. These goals require a new breed of backup. As we like to say at Spanning: Backup is one thing. Restore is everything. It won’t do you much good to just have your SaaS data backed up and stored somewhere unless you can get it back into your SaaS applications (along with metadata and customizations) quickly, easily, and accurately.

What’s the difference between recovery and restore?
Recovery simply means you get your data back – not that you get it back exactly the way it was. In the event of a data loss, you may be dismayed to find that your existing backup and recovery solution or provider defines recovery as exporting all versions of your backed-up SaaS application data and delivering them to you in a zipped folder containing nothing but a massive CSV file. That means your IT team will probably have to expend a lot of time and effort manually identifying precisely what data was lost, rebuilding your file structure the way you had it before, importing or restoring the data back into the application, and then validating it so everyone can finally get back to work. Data recovery is like someone handing you a giant stack of photos with a rubberband around it for you to recreate a scrapbook you had lovingly put together in chronological order with notes, decorations, and keepsakes for each photo.

data recovery

data recovery

Restore, on the other hand, means having that scrapbook returned to you in mint condition with all your memories perfectly intact – even if the original copy was completely destroyed. Translation? Data restoration means accurately and automatically returning your data directly back into your SaaS application, exactly the way it was before you lost it. Excellent backup and restore solutions will restore data from any point in time with file structure, metadata, and labels intact, while providing the flexibility to restore exactly what was lost – whether a single file from yesterday or an entire account from last year. Some solutions even make this process easy enough that an end user can do it in a few clicks without IT intervention. (more…)

Going the Distance for Data Protection

Leslie Chunta

Boston Marathon Team EMC and Guest Blogger
After discovering that being a t-shirt cannon operator wasn't a sustainable occupation, Leslie Chunta is proud to have found her "professional forever home" in tech marketing. Previously working at T3, Kolar Advertising and SailPoint, Leslie brings a ninja-like focus to event marketing execution and customer marketing programs. She holds a Bachelors of Advertising from Texas Tech University in Lubbock, Texas. Connect with Leslie on LinkedIn here:

Latest posts by Leslie Chunta (see all)

Today marks an important day in Boston, MA; the 120th anniversary of the historic Boston Marathon. 20 EMCers from across the globe, including myself, represent Team EMC and will be taking our place among over 30,000 runners covering the 26.2 miles between Hopkinton and the final stretch down iconic Boylston Street.

Photo Credit:

Photo Credit:

If you’re like me, I used to believe that running long distances should be reserved for escaping danger (like bears) and gaining access to delicious treats (like brownies). However, over the past few months of training for this prestigious marathon, I’ve come to find that running can be quite parallel to this data security universe that we live in. Allow me to explain.

Like long distance running, you may see others practicing data security in their organizations, such as backup and recovery or end-to-end data protection, and think “well, that’s nice, but I don’t really need that in my day-to-day routine.”. But then there may be benefits that you see from afar that make you start second guessing yourself. Perhaps you’ve had an admin accidentally delete thousands of Salesforce records that contained critical customer information. Do you have a backup and recovery system to help get your organization running as usual as quickly as possible? If you can’t answer yes, or the question has you wondering what your strategy would be, then you might be ready to do some technical fitness training in your IT organization. Let’s get you started training on your IT organization to get its data security fitness in marathon shape.

Training is the most important work your team can do to be prepared for the “big day.”. For runners, it’s the race day. For IT pros like yourself, it’s the dreaded day when data is hacked, corrupted or deleted in error and goes missing. You must take on the role of hero and recover it confidently. But, putting in the work beforehand and making sure that you’ve followed through on your training plan is critical. (more…)




Connect with us on Twitter

Click here for the Cloud Chats blog