Storage Devices

  Home arrow Storage Devices arrow The Rise of Purpose-Built Backup Appli...
Watch our Tech Videos 
Dev Hardware Forums 
Computer Cases  
Computer Processors  
Computer Systems  
Digital Cameras  
Flat Panels  
Gaming  
Hardware Guides  
Hardware News  
Input Devices  
Memory  
Mobile Devices  
Motherboards  
Networking Hardware  
Opinions  
PC Cooling  
PC Speakers  
Peripherals  
Power Supply Units  
Software  
Sound Cards  
Storage Devices  
Tech Interviews  
User Experiences  
Video Cards  
Weekly Newsletter
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
STORAGE DEVICES

The Rise of Purpose-Built Backup Appliances
By: Robert Amatruda
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 1
    2011-10-13

    Table of Contents:

    Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH DEV HARDWARE

    Traditionally, the backup and recovery processes for many companies have been stable and long established. These processes have not been subject to rapid changes due to the critical nature of backup and recovery planning. However, new customer challenges brought on by unabated data growth, more aggressive service-level agreements (SLAs) for recovery, and the rapid growth of virtual server infrastructure has forced many companies to reevaluate their backup and recovery solutions.

    These new protection challenges have been in the making for some time. Early in the new millennia, customers began to experience rapid growth of their backup data volumes. The enormous growth of backup data volumes outstripped the capabilities of traditional data protection methodologies that relied on physical tape backups pushed over a LAN. Furthermore, many companies have geographically distributed operations and aggressive SLAs for recovery. As a result, backup windows have grown beyond a 24-hour period.

    This inability to backup data in a timely manner forced many to introduce disk-based backup targets to ensure timely backups. This represented the first evolution of their backup and data protection process to cope with the new challenges. Nevertheless, the process of backup and restore remained largely unchanged. Introducing disk targets, VTL, etc., was helpful, but it was only a part of the answer, as it still treated the disk as "tape-like," and didnít do anything to help alleviate the growth of the backup storage.

    Today, customers demand disk-based data protection solutions that address the burgeoning data requirements of organizations with storage optimization technologies such as data deduplication and unlock the full potential of disk. In addition, they want to reduce the complexity of the backup and recovery process. More importantly, any new data protection solution must extend its protection capabilities beyond physical servers to virtual environments, cover datacenters, and increasingly cloud-based architectures.

    Any new data protection offering must provide customers a measureable cost savings in terms of operational and/or capital costs. Also, any new data protection solution will need to integrate with existing data protection practices and process.

    This would add to the operational benefits. These attributes become much more critical as server virtualization gains adoption. Unfortunately, many customers are still relying on tools that were designed for protection of physical assets Ė not virtual. A traditional data protection methodology does not scale well to virtualized server infrastructure. Customers must reevaluate and rearchitect their data protection strategies to safeguard their virtual server infrastructure as well as the applications that reside on them. A new holistic data protection approach is needed.

    Customers are demanding faster backup, restore, and recovery. Additionally, customers need storage optimization tools, such as data deduplication, to control their explosive data growth. We have discovered many customers are augmenting or foregoing further investments in physical tape infrastructure in favor of purpose-built backup appliances (PBBAs).

    PBBAs are typically tightly coupled with application software and utilize technologies such as data deduplication and replication. IDC research indicates that the customer drivers for increased investment in PBBA solutions result from the need to improve backup window time, provide faster restore and recovery times, and enable seamless integration with existing backup applications. In addition, the accelerated adoption of virtual servers and desktops is causing IT organizations to review and modernize their data protection architectures and processes with PBBA solutions. Furthermore, PBBAs allow customers a good measure of investment protection by allowing them to extend the longevity of existing data protection infrastructure such as software and hardware.


    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.

    More Storage Devices Articles
    More By Robert Amatruda

    blog comments powered by Disqus

    STORAGE DEVICES ARTICLES

    - The Rise of Purpose-Built Backup Appliances
    - Why Are Customers Deploying Purpose-Built Ba...
    - TrueCrypt: Free, On-the-Fly Disk Encryption
    - Bootable Rescue Flash Drives
    - Operating Systems on Bootable Flash Drives
    - Shopping For External Storage
    - How to Flash Your BIOS with Flash Drives
    - Flash Drive Booting Fundamentals
    - Freecom Media Player 450 WLAN
    - Mobile Computing Technologies: an Overview
    - Throwing a Glance at Solid State Drives
    - Soyo SlimEX Platinum Review
    - Setting Up Your USB Storage Device as a Port...
    - Network Storage for the Home with the D-Link...
    - Netgear SC101 Network Attached Storage for t...

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap
    KEITHLEE2zdeconfigurator/configs/INFUSIONSOFT_OVERLAY.phpzdeconfigurator/configs/ OFFLOADING INFUSIONSOFTLOADING INFUSIONSOFT 1debug:overlay status: OFF
    overlay not displayed overlay cookie defined: TI_CAMPAIGN_1012_D OVERLAY COOKIE set:
    status off