A Data Proteciton Reference Architecture – Part 4

Business Critical Applications

The tip of the triangle focuses on the applications (or data) that drives your business. It is these applications within your business that, should they go down for any length of time, cost you money. The recovery of this information, in the event of a ‘disaster’, needs to be very fast (RTO in minutes) and the data can’t be very ‘old’ when it is recovered (short RPO, less than 24 hours). Typically… Read more »

Twitter is not a Great Polling Tool - However...

Last week I crossed 500 Twitter followers. I thought I would test out my followers to see how many thoughtful responses I would get if I posed a real question about 'Data Protection'. So the question was:

What do you think of when you think about 'Data Protection'?

I got 3 replies - less than 1% - wow! I would have thought people who you follow would be more engaged in back and forth dialog… Read more »

A Data Proteciton Reference Architecture - Part 3

The 'Fat Middle'

In the 'fat middle' of the triangle, as I stated last week, there are a number of ways to protection information. I have chosen to break apart the middle into two categories. The reality is, this is meant to be used as a tool for helping you lay out a strategy so your boxes could be based on capacity and could end up in different areas of the triangle depending upon your… Read more »

A Data Protection Reference Architecture – Part 2

Archive

The most fundamental part of developing a good data protection architecture starts at the base of the triangle with Archive. Archive is often an overlooked component of data protection - It’s not just for regulated business anymore. Archive essentially gives users 100% data deduplication efficiency. What I mean by this is that you have the ability to remove ‘stale’ data (and by 'stale' I don't mean unimportant data, I just mean data that is… Read more »

Storage Switzerland

One of the more thoughtful analysts in the industry, in my opinion is George Crump from Storage Switzerland. (I like the name and George is as independent as you can get in

this business.) Yesterday I had the pleasure of briefing George on EMC's Data Protection Vision. I like talking with George for a couple of reasons. First, he gets it. What does that mean. Read his material. He is genuinely trying to educate IT… Read more »