Posts Tagged ‘vmware’

Modernized Data Protection for the SDDC

Deanna Hoover

Product Marketing Manager, Dell EMC
Deanna Hoover started her IT career over 30 years ago with a focus on software and hardware engineering. She has had the opportunity to work in a variety of different industries and has built a broad skillset ranging from writing machine code in a factory, migration of mainframe to client server, and storage architecture as well as systems and database administration. In August of 2004 Deanna made the move to EMC as a backup, recovery and archive presales SE. Since that time she has managed a Professional Services team and as of current is in marketing for Dell EMC with a focus on virtualization backup and recovery software. In her spare time Deanna enjoys the outdoors and participates in triathlons.

vmworld16

VMworld 2016 was a huge success and set a new record of 23,000 attendees in the US alone. The theme was   ‘be_tomorrow’ with focus on the technology, trends and people who are shaping the future of the digital business.

I asked several attendees how data protection of their environments fits into the be_tomorrow theme.

My findings:  Software Defined Data Center  (SDDC) is in the forefront of planning for modernizing data centers.  Data protection is an integral part of the SDDC strategy. Key requirements I heard from VMworld attendees:

  • Automation
  • Self-service capabilities
  • Multiple tiers of data protection

The SDDC enables customers to scale by rapidly provisioning applications across clouds and devices.  A few benefits of the SDDC include improved compliance, faster time to market, boost capacity and lower costs.

The evolution of the SDDC reminds me of when Henry Ford installed the first moving assembly line in 1910. His innovation reduced the time it took to build a car from 16 hours to 8 hours. Many years later, a digital factory with robots was created.  The digital factory reduces human error and repetitive processes. Technology within the factory continues to progress; however, technology failures increase the cost to do business.

What is the relationship between the assembly line and the SDDC?   The assembly line started the revolution of automation while reducing manual labor. The SDDC is the evolution of an agile digital business in which all the infrastructure is virtualized and delivered “as-a-service. Both require protection against failures and outages.

Outages within a SDDC have the potential of causing data loss – increasing your cost to do business. While very important, data protection is not always included during the provisioning process. (more…)

Let the Transformation Begin

Jamie Doherty

Consultant Social Media Engagement Manager, Dell EMC
Jamie brings over 20 years of experience in both traditional and digital marketing and has worked for companies like Direct to Retail Advertising, The Robb Report Magazine and Monster.com. She joined Dell EMC over four years ago to manage the Advanced Software Division’s social media strategy, and since then has taken on the challenge of managing the social media strategy for Dell EMC's Core Technologies Division. Her newest role will be managing Digital Campaigns for the Dell EMC Data Protection Division as well as leading strategy for Social Media in both the Data Protection and Storage Divisions. Jamie is also a Beachbody Coach helping to inspire others to live a healthier and more active lifestyle. When she is not Tweeting on behalf of Dell EMC or working out to Beachbody, you can find her at a live music venue watching her favorite artist or planning her next theme party. Follow her on Twitter @MnkyGrl47 or @CoachFab40

You may have heard in the news that a little merger happened  a few weeks ago between Dell and EMC.  Of course I say that kiddingly.  This was the biggest merge to take place in technological history.  A major transformation has been taking place to bring these two technology power houses together as the newly formed Dell EMC.  I, for one, could not be more excited to be a part of making history as an employee of this amazing new company.

oow-small-invite

So why am I telling you all this? I want to invite you to also be a part of history in the making by getting a first-hand -view of the transformation.  How you ask? Join us for an exclusive Dell EMC event this week in San Francisco.  A three day event starting today is being hosted at 839 Howard Street right across from Moscone Center West.  My suspicion is many of you reading this are at Oracle Open World…so why not stop by?  Here are a few reasons why you should:

  • You’ve heard a lot about Dell EMC – Find out directly from the experts what that means to you
  • Dell EMC Oracle Solutions experts will be onsite conducting 1×1 demos and answering all of your questions
  • Technical experts will be running engaging sessions that will showcase Dell EMC solutions for Oracle Applications
  • Breakfast and lunch will be served AND it will be amazing! If you joined us last year you know this is no average conference food
  • Dell EMC knows how to throw a party! This Tuesday night will be one you won’t want to miss

(more…)

Purpose-Built Data Protection for Today and Tomorrow

Meredith Soper

Marketing Manager, Dell EMC Data Protection Division
As a former college athlete who never lost her competitive edge, I continuously challenge myself to learn new things and become an expert on others. However, my focus is no longer basketball, but the world of data protection. My MBA and innate passion for technology led me to a career in product marketing at Dell EMC, where I aspire to add some pizazz to the already-exciting world of backup and recovery. Outside of the office, I’m a born and raised Bostonian who has trouble pronouncing her R’s (think “pahk the cah”). I love sports, shopping, and a good glass of red wine. Follow me on Twitter @Meredith_Soper and I promise to #followback!

Buying a car can be challenging. As a buyer, there are certain things you look for and see value in. And those things differ buying personas 1according to your needs. For instance, my ideal car is an SUV with four wheel drive, has a voice-activated GPS system, and is backed by a trusted car brand. From this list of must-haves you can infer my needs; I need a vehicle that is built to withstand New England winters, provides navigation assistance, and is historically known to be reliable. I look for certain features based on my transportation needs. It’s important to note that your list of car requirements is likely different from mine. You may live in a warmer climate where it rarely snows, and therefore prefer an eco-friendly, compact car. Or you may be a NASCAR driver and require a vehicle with a manual transmission and a five-point harness, rather than a traditional seatbelt. I can confidently say your ideal vehicle looks slightly, if not completely, different from mine. Our individual buyer personas are based on each of our distinctive needs.

The same goes for many other aspects of life, as well as business, including the way in which we buy and consume data protection solutions. Each data owner has a distinct set of requirements they need to meet in order to successfully do their job. For instance, the backup admin, database admin and vAdmin each play an important role in the business’ overall data protection strategy. Each individual may be partially, or even solely, responsible for protecting their data and therefore have specific requirements for visibility and control for that protection. And for efficiency and familiarity purposes, each data owner is best empowered through using their native tools and interfaces. The 2016 EMC Global Data Protection Index (GDPI) confirms these points, indicating that management of data protection aligns with environment, meaning that the storage team focuses on storage based protection, the virtualization team on virtual environments, and so forth. And 40% of those surveyed also noted that they prefer a collaborative model, giving both IT and app owners self-service in terms of visibility and management capabilities. Although each individual is working towards the common goal of fully protected and accessible data, the way in which they manage the data protection environment is different. Each situation is unique and every role has unique needs.

In addition, as enterprises engage in implementing more modern approaches to data protection, new requirements will emerge which introduce new buyers. For instance, while self-service in the data center has brought to bear many benefits, it has also contributed largely to copy data sprawl.  The proliferation of copy data leads to increased cost and risk, detracting from an enterprise’s ability to invest in next generation apps and infrastructure. The buyer concerned with controlling copy data is probably the person held accountable for setting SLAs for both protection and storage. They may be an infrastructure or compliance manager and their requirements differ from those of an application, backup, or storage admin, because they have a unique set of needs.
(more…)

Ease of Use for Everyone

Aaron Bairos

Product Marketing Manager, Dell EMC, Data Protection
Aaron is currently pursuing a master’s degree at Brandeis University and a Product Marketing Manager at Dell EMC. He’s been with Dell EMC/RSA for over 5 years now across multiple roles in security and data protection. When not working he enjoys being a tourist in new cities and spending time with family and friends. Follow him on Twitter: @AaronBairos

Latest posts by Aaron Bairos (see all)

Protecting Virtualized Environments
I remember being at Marist College a few years ago completing my last assignment as an undergrad student called “capping”. Capping was a required course that all students had to take in order to graduate. It’s designed to bring together everything you’ve learned throughout your time at Marist and bring them to life through real-life scenarios. Graduating with a Finance degree meant I had to come up with a financial business plan and then present to my panel of “sharks”. It consisted of sales forecasts, expense budgets and cash flow statements but before I bore you, I’ll stop there. It was a very tedious course and students all around campus cringe at the thought of having to take it.

As part of this course Adobe Acrobat and Photoshop were required and offered in our lab, however, PCs running the software were antiquated and slow. The university virtualized all essential applications, including Adobe Acrobat and Photoshop.  However, we had no guarantee that our projects were being backed up.  This meant that every student had to put their projects on thumb drives – and hope it was not left behind or in my case ….lost. After looking for days on end and realizing I’d never see that thumb drive again I wasn’t sure which direction to go in next. I had weeks of work I’d never be able to access again simply because of my data being unprotected. Using the thumb drive backup method to control the backup of any project was not ideal.  I’m sure you’ve run into similar constraints either at work or in your personal life.
Virtualization-aug 31

vAdmins and IT managers are struggling to meet their company’s requirements and traditional backup and recovery strategies just aren’t enough to deliver the recovery that businesses now need. In fact, 71% of those surveyed are not confident they could recover systems. (more…)

EMC Helps the Swedish-speaking Population of Finland Preserve Its Cultural Heritage

Susan Stout

Customer References Manager, EMC, Core Technologies Division
Susan is a creative, enthusiastic, results-driven and detail oriented professional with many years of program/project management experience in the high tech industry. She leverages strong organization and communication skills to manage multiple on-going projects simultaneously and consistently meets commitments with integrity. Susan is currently a part of the customer reference team within EMC's Core Technologies Division. Outside of EMC Susan works as a personal trainer as well as enjoys spending time with her husband and twin boys.

people of finland 2In an increasingly globalized world, local traditions, dialects and literature can become lost in national and international culture. Like many similar organizations around the world, the Society of Swedish Literature in Finland (SLS), is working to curate a record of one sector of its country’s indigenous heritage.  And, with that task comes huge data storage and data protection challenges.

SLS digitizes and protects a wide range of materials related to the lives of Swedish-speaking Finns– everything from photos, to hand-written documents, to films, books, recordings, and more.  In many cases, the act of scanning old photographs or playing magnetic tapes destroys the original as the electronic copies are made so SLS’s digital archives contain cultural treasures that, often, exist today only in digital form.

“Photos continue to fade, and magnetic tapes wear out,” Karola Söderman, head of information management at SLS, explains. “In some cases, after we’ve played a tape to digitize it, it falls apart.”

SLS’s library of Swedish-speaking Finnish history is stored and managed in two phases.  Initially, data is digitized and catalogued on a system based on EMC VNX technology.  Once processed, the data is stored on one of two EMC Atmos arrays, one in its Helsinki main office and another, that mirrors it, in its Vaasa facility.  SLS’s 100TB of data is protected using EMC NetWorker and EMC Data Domain.

In addition to the storage of its library of preserved records, SLS also turns to EMC to support the administrative storage needs of the organization.  SLS’s active directories, email, intranet, file shares and SQL databases all rely on EMC.  Having initially built its storage network on the VNX platform, SLS is transitioning to EMC Unity to realize the benefits of EMC’s most modern midrange offering.

“Unity feels like a godsend to us,” says Mats (Madsen) Wikholm, IT manager at SLS. “With Unity, we get enhanced performance as well as a number of features that make life easier for me.  As an IT manager in a small organization I wear about ten hats and the modernity, simplicity, affordability and flexibility of Unity helps me to achieve more with limited resources.”

Here’s how:

  • The simple and intuitive HTML5 management interface (Unisphere):  This makes everyday actions less time consuming and means that operations that SLS undertakes less frequently can be completed easily without needing to source instructions or log into multiple management consoles.
  • Full unified support for multiple storage protocols, including block, file, and VMware Virtual Volumes (vVols):  This is critical for SLS, since they have a broad selection of workloads running on their network, with both operational applications and its digitized historical assets.
  • Built-in unified snapshots, which are especially helpful in dealing with ransomware

Since the SLS library is irreplaceable, the organization can’t afford to lose data.  Yet is receives submissions via FTP and is reliant on researchers being online, which makes it vulnerable to attack.  The Unity snapshots, in conjunction with EMC NetWorker and EMC Data Domain, leave SLS with a fallback instance of its data in the event that ransomware compromises the network.

To learn more about SLS and its use of EMC solutions, please go here.

SUBSCRIBE BELOW

Categories

Archives

Connect with us on Twitter

Click here for the Cloud Chats blog