We live in the age of data, accessed through the cloud, and we don.t
want to lose any.
Medium- to very-large-scale systems administrators have to protect
large amounts of critical data. They have to design backup solutions
that are scalable and optimized to meet changing conditions. This
book will cover some of the more common backup applications, such as
Symantec NetBackup/BackupExec, EMC NetWorker, IBM TSM, and CommVault,
but the main discussion will focus on the implementation of 21st
century architectures that allow the backup software to be a .commodity.
item. The underlying architecture provides the framework for meeting
the requirements of data protection for the organization.
This book covers new developments in data protection, specifically
the definition and application of both source and target based de-
duplication strategies, as well as the impact of single-instance
storage upon backup infrastructures. It discusses the impact of backup
and data replication, the often misapplied B2D and D2D strategies, and
.tapeless. backup environments. Continuous data protection and remote
replication strategies will be addressed as they are integrated within
backup strategies.a very important topic today.
Learn backup solution design regardless of specific backup software
Design realistic recovery solutions
Take into account new data protection standards and the impact of data
replication
What you.ll learn
Elements of a backup environment and applications of those elements
New technologies within the backup technology area and their impact
on design
Configurations using both Symantec NetBackup and EMC NetWorker, with
combinations of backup serves, media servers, and clients, and the
impacts of each combination.
Combinations of both hardware and software configurations that are
scalable from small to large environments
Designs that address perennial problem areas such as remote offices,
very short (less-than-15-minute) recovery point objectives (RPOs),
and tape management
Reporting requirements that will assist in maintaining and growing
an implementation once executed
Who is this book for?
The general audience for this book includes systems engineers,
systems administrators, and specialist backup administrators
Download File Size:6 MB