digital communities in a networked society e-commerce e-business and e-government

259 367 0
digital communities in a networked society e-commerce e-business and e-government

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... Surrounding Data Life Cycle 9.3 Data Life Cycle Management 9.3.1 Hierarchical Storage Management (HSM) as a Space Management Tool 9.3.1.1 Space management example 9.3.2 Archive Management 9.3.3 Archive and Space Management Together 9.4 Application Considerations 9.4.1 Email as a Driving Force 9.4.2 Instant Messaging 9.4.3 Business Portals 9.4.4 Applying an Application Strategy 9.4.5 Content Indexing 9.5 Additional... equally ‘there’ Virtualization can mirror identical data on two or more disk drives to insulate against disk and other failures and increase availability Cost of capacity Disk storage prices are decreasing at an amazing rate, which in part accounts for equally amazing increases in storage consumption Virtualization, in the form of mirroring RAID 17 and remote replication, increases consumption still further... performance More and more, data access and delivery speed determine the viability of applications Virtualization can stripe data addresses across several storage devices to increase I/O performance as observed by applications Availability As society goes increasingly online, tolerance for unavailable computer systems is decreasing Data can only be ‘there’ if data storage is equally ‘there’ Virtualization... high bandwidth and computation power As a result, analysts such as Gartner are predicting a change in the role of the IT organization and its potential shift from a cost center to a value center We are going to look at this subject from the viewpoint of overall data protection and how we are seeing data protection and data management merging into a single discipline We will start with a brief walk down... looks at traditional backup and recovery along with hierarchical storage management and how it can augment the overall data protection scheme We also take a look at disaster recovery and management challenges Chapter 2 looks at some of the traditional disk and data management tools This includes the different RAID (redundant array of independent (inexpensive) disks) technologies as well as replication In. .. media on which all the backup images have expired These media will be recalled and reintroduced into the local backup environment, usually going back into an available media set ENCRYPTION 11 A good vaulting application will also manage the backup and off-site storage of the data that makes up the backup application’s internal catalogue It will also track this information, which is very important... success is much greater Another by-product of the BIA and the DR plan is developing a much better working relationship between the business units, application owners and the IT staff With the growing emphasis on DR and high availability, we begin seeing the mingling of data protection and data management techniques Users started clustering local applications and replicating data both locally and remotely... EVOLUTION Data that is located on the internal disks, standalone disks or JBOD is traditionally managed by a host-based volume manager if you want to implement RAID (redundant array of independent (inexpensive) disks) or replication For data located on an array, you can use either a hostbased volume manager or the internal control software that is a part of the array The host-based volume manager or the internal... technical description of new technologies such as single instance store (SIS) that are surfacing today in data protection and setting the stage for this industry to be a part of data management in the future xvi 4 INTRODUCTION SUMMARY By combining technical knowledge with day-to-day data protection and data management issues, we hope to offer the reader an informative book, a book that is based on... access in Chapters 5 and 6 In part 2, Total Data Management, we look at where things are going today and our view of where they are going tomorrow, at least in the realm of data integrity Chapter 7 gives us our first look at some of the exciting new features that are being offered for data protection INTRODUCTION xv Chapter 8 examines the rapidly growing arena of disk-based protection technologies Chapters . part 1 with a look at management, reporting, and security and access in Chapters 5 and 6. In part 2, Total Data Management, we look at where things are going today and our view of where they are. will take a look at the way data protection has been traditionally accomplished. Chap- ter 1 looks at traditional backup and recovery along with hierarchical storage management and how it can augment. disks, increasing availability of high bandwidth and com- putation power. As a result, analysts such as Gartner are predicting a change in the role of the IT organization and its potential shift

Ngày đăng: 03/07/2014, 16:06

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan