As Biggie Smalls stated, “It was all a dream.” Big Data and Analytics are now notorious! Together, they’re transforming the way businesses run and dictating critical business decisions. In 2015, enterprises are now beginning to realize the benefits of Big Data and how their overall success relies on how they use and protect it.
EMC Offers Data Lake Protection Solutions to Keep You Afloat
There is a lot of talk going on in IT around Big Data, data lakes, data ponds, and even data puddles. These are still new concepts to many, so what does it all really mean to your business? Traditionally, most data has been neatly structured and living comfortably within the enterprise. But then the world went digital leading to all kinds of new unstructured data types popping up both within the enterprise and outside on the Internet, and thus Big Data was born. Big Data can be characterized by the 3 V’s – it is growing at high Volumes, generated at high Velocities, and includes both structured and unstructured data Varieties.
By creating a data lake, which can accommodate all data types and ingest mechanisms, and provide a standard analytic platform, businesses will become well positioned to harness the power that all of this varied and complex data holds. However, without the proper data protection strategy in place, all of that value could be lost. Data protection is a key component of any data lake in order to achieve higher degrees of businesses value and operational efficiency and ensure data is recoverable when you need it.
Let me walk you through how EMC is uniquely positioned to address the 3 V’s and deliver enterprise-grade data protection solutions for your data lake that will keep you afloat:
The EMC Business Data Lake Protection solution offers the flexibility and scale needed to keep pace with explosive data growth. EMC Data Domain delivers highly scalable protection storage and high-speed, variable-length deduplication reduces storage requirements by 10 to 30x. So, the large volume associated with Big Data is able to be protected within a significantly smaller footprint.
Using EMC’s solution, Hadoop and IT administrators are able to protect and manage their data lake using native tools such as DistCP or by leveraging Isilon snapshots using EMC Data Protection Suite (DPS). The Networker Snapshot Management feature of DPS enables snapshots to be efficiently replicated and then provide simple rollover to protection storage. The industry-leading performance of Data Domain protection storage ensures that data is protected quickly and with the addition of DD Boost software results in 50% faster backups.
Finally, EMC Business Data Lake Protection Solutions are optimized to manage and protect data from disparate sources and across multiple protocols all on a single platform. One of the key differentiators of Data Domain systems is that all of these data sources and a variety of use cases can be protected on a single system.
Not only do EMC’s data protection technologies successfully deliver the scalability, speed, and agility needed to handle Big Data workloads, they are also the most reliable in the industry, ensuring data is recoverable. So you can rest assured you have the life preserver you need to keep from drowning in your data lake.
For more information on EMC’s cutting-edge Big Data protection solutions visit the Data Protection for Big Data page on emc.com
The maxim goes, “The road to hell is paved with good intentions.” Not to be satirical here, many IT pain points are the results of resolving problems the wrong way, conforming to the “good old standards and practices” that long dominated IT operations manuals. In a conformist culture prevalent in most parts of Asia, it is not a surprise that many IT organizations still rely on tape storage as their last line of defense against data loss, even putting both their career and organizations at risks when it comes to meeting stringent regulatory compliance requirements. Continue reading
I was recently visiting a large law firm in Canada and one of their critical pieces of infrastructure was a document repository. With decades of completed cases and supporting materials, the firm wanted to be sure that their intellectual property was protected consistently and reliably and also instantly accessible for use in future litigation. As you can imagine their repository has grown rapidly and consumed about 25TB of NAS storage. Continue reading
After reading the blog 4 Things IT Can Learn From Massachusetts Record Snowfall, I began to think about natural disasters and other types of scenarios that could disrupt IT and for that matter companies as a whole. Every second of every day, volumes of irreplaceable data is updated.
Can your business afford its data to take sick leave? My guess is NO.
So far this winter season Boston has made history with a new snowfall record. Winter storms have slammed Northern New England, causing record-breaking snowfall, high winds with coastal flooding, and school cancellations causing major delays across the region. While city and town workers worked all hours of the night clearing the streets and sidewalks, schools getting a snow day, IT workers kept a close eye on making sure businesses didn’t run into any unplanned downtime causing disruption to any service level agreements. Continue reading
If you don’t know who I’m talking about when I say “Miss P,” then I will assume you are not a dog lover like myself. This past week, the four year old beagle took the crown for “Best in Show” at the 2015 Westminster Kennel Club Show. Head judge, David Merriam, identified her as the champion of the night in a best-of-seven final ring full of favorites.
Data Protection Provisioning 2.0
Third platform applications are changing the way organizations manage, consume, deliver and protect storage. They are increasingly cloud-enabled, use sophisticated development frameworks, and are instantly available from any device. However, many existing applications are still in traditional and dedicated storage silos with restricted protection policies and provisioning has one basic purpose – connect well-known users to on-premise enterprise applications. Provisioning 1.0 operates with only an IT focus, with no business context and is in the dark ages. Provisioning 2.0 has emerged as a modern and agile way to fill the provisioning gap and is guided by a few key characteristics: business-driven, simple user experience, intuitive process, easy to deploy and maintain, and meets cloud and mobile demands. Continue reading
The impact that exponential data growth is having on the eDiscovery process has been dramatic in recent years. This increase in data has cancelled out the amount of time and money companies once could save by utilizing just standard archiving technologies. This calls for an archiving technology that can provide a scalable and sustainable solution with optimized searchability. Continue reading
Not surprisingly, in 2014 we had many discussions with our customers about Information Governance issues such as data retention and remediation, privacy and eDiscovery. Very surprisingly, at many of these meetings, we introduced the IT and Legal departments to one another for the first time. Continue reading
According to the EMC Global Data Protection Index, which surveyed 3,300 IT decision makers from mid-size to enterprise-class businesses across 24 countries, common data protection practices have left global businesses exposed to data loss and downtime to the tune of $1.7 trillion annually. For the sake of comparison, that’s about the same as the world’s total military spend in a single year. A startling statistic by any account! And this is only a glimpse of what’s to come if attitudes and practices toward data protection are left unchanged. Continue reading
Does your organization keep old, stale and useless data? Most do. In our practice we find that about two-thirds of data on file shares has not been accessed in at least six months. While the lack of access does not necessarily identify data that has no business value, it’s a pretty good indicator. Continue reading
I feel like I was born with a computer in my hand; I embrace them both from a business and personal perspective.
But I am a Gen-Xer, so certain realities are true. I was not born with a computer in my hand, but rather a typewriter, record player, and an Atari game console. According to the folks who define the characteristics of each generation, I have different priorities, perspectives, and drivers than Millennials (a.k.a. Gen-Yers). But how different? Continue reading
It’s been 13 years since the world changed.
While there have been no shortage of tragedies since 9/11, including other acts of terrorism home and abroad, war, hurricanes, tsunamis, and massive tornados, no single event has matched the impact of that day thirteen years ago. The transformation of the world after that event has touched all our lives in ways big and small, the technology industry included.
No, people really don’t care more about data protection now than they did then. Nor did the event set disk-based backup or VPLEX in motion. But 9/11 did help redefine the role and expectation of data protection. That day began the journey to converge data protection and security. Continue reading