{"id":6140,"date":"2017-01-24T18:05:03","date_gmt":"2017-01-24T08:05:03","guid":{"rendered":"http:\/\/nsrd.info\/blog\/?p=6140"},"modified":"2018-12-11T10:03:15","modified_gmt":"2018-12-11T00:03:15","slug":"data-protection-ensuring-data-availability","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2017\/01\/24\/data-protection-ensuring-data-availability\/","title":{"rendered":"Data Protection: Ensuring Data Availability"},"content":{"rendered":"<p>In 2013 I undertook the endeavour to&nbsp;revisit some&nbsp;of the topics from my first book, &#8220;Enterprise Systems Backup and Recovery: A&nbsp;Corporate Insurance Policy&#8221;, and expand it based on the changes that had happened in the industry since&nbsp;the&nbsp;publication of&nbsp;the original in 2008.<\/p>\n<p>A lot&nbsp;<em>had<\/em> happened since&nbsp;that time. At the point I was writing&nbsp;my first book, deduplication was an emerging trend, but tape was still entrenched in the datacentre. While backup to disk was an increasingly common scenario, it was (for the most&nbsp;part) mainly&nbsp;used as a staging activity (&#8220;disk to disk to tape&#8221;), and&nbsp;backup to disk use was either dumb&nbsp;filesystems or&nbsp;Virtual&nbsp;Tape Libraries (VTL).<\/p>\n<p>The Cloud, seemingly ubiquitous now,&nbsp;was still emerging.&nbsp;Many (myself included) struggled to see how the&nbsp;Cloud was any different from&nbsp;outsourcing with a bit of someone else&#8217;s hardware thrown in. Now,&nbsp;core tenets of&nbsp;Cloud computing that made it so popular (e.g., agility and scaleability) have been well and truly adopted as essential&nbsp;tenets of the modern datacentre, as well. Indeed, for on-premises IT to compete against&nbsp;Cloud, on-premises IT has increasingly focused on delivering a private-Cloud or hybrid-Cloud experience to&nbsp;their businesses.<\/p>\n<p>When I started&nbsp;as a Unix System Administrator in 1996, at least in Australia, SANs were relatively new. In fact, I remember around 1998 or 1999 having a couple of sales executives from this company called&nbsp;<em>EMC<\/em>&nbsp;come in to talk about their Symmetrix arrays. At the time the datacentre I worked in was mostly DAS with a little JBOD and just the&nbsp;start of very, very basic&nbsp;SANs.<\/p>\n<p>When I was writing my&nbsp;first book the pinnacle of storage performance&nbsp;was the 15,000 RPM&nbsp;drive, and flash memory storage was something you (primarily) used in digital&nbsp;cameras only, with storage capacities measured in the hundreds of megabytes more than gigabytes (or now, terabytes).<\/p>\n<p>When&nbsp;the first book was published, x86 virtualisation was well and truly growing into the datacentre, but traditional Unix platforms were&nbsp;still heavily used. Their&nbsp;decline and fall started when Oracle acquired Sun and killed low-cost&nbsp;Unix, with&nbsp;Linux and Windows gaining the ascendency&nbsp;\u2013 with&nbsp;virtualisation a significant driving force by adding an economy of scale that couldn&#8217;t be found in the old model. (Ironically, it&nbsp;<em>had<\/em> been found in an older model \u2013 the mainframe. Guess what folks,&nbsp;mainframe won.)<\/p>\n<p>When the first book was published, we were still thinking of&nbsp;silo-like infrastructure within IT. Networking, compute, storage, security and data protection all as seperate functions \u2013 separately&nbsp;<em>administered<\/em> functions. But&nbsp;business, having spent a decade or two hammering into IT the need for governance and process, became hamstrung by IT governance and process and needed things done&nbsp;faster, cheaper, more efficiently. Cloud was one approach \u2013 hyperconvergence in particular was another: switch to a more commodity, unit-based approach, using software to virtualise and automate&nbsp;everything.<\/p>\n<p>Where are we now?<\/p>\n<p>Cloud. Virtualisation. Big Data. Converged and hyperconverged systems. Automation everywhere (guess what? Unix system administrators won, too). The need to drive costs down \u2013 IT is no longer allowed to be a sunk cost for the business, but has to deliver innovation and for many businesses, <em>profit<\/em> too.&nbsp;Flash systems are now&nbsp;offering&nbsp;significantly more IOPs than a traditional array could \u2013&nbsp;Dell EMC for instance can now drop a 5RU system into your datacentre capable of delivering 10,000,000+ IOPs. To achieve ten million IOPs on&nbsp;a traditional spinning-disk array you&#8217;d need &#8230; I don&#8217;t even want to&nbsp;<em>think<\/em> about how many disks,&nbsp;rack units, racks and kilowatts of power you&#8217;d need.<\/p>\n<p>The old model of backup and recovery can&#8217;t cut it in the modern environment.<\/p>\n<p>The old model of&nbsp;backup and recovery is dead.&nbsp;Sort of. It&#8217;s dead as a&nbsp;<em>standalone topic<\/em>. When we plan or think about data protection any more, we don&#8217;t have&nbsp;the luxury of thinking of&nbsp;backup and recovery&nbsp;alone. We need holistic data protection strategies and a whole-of-infrastructure approach to achieving data continuity.<\/p>\n<p>And that, my friends, is where&nbsp;<em>Data Protection: Ensuring Data Availability<\/em> is born from. It&#8217;s not just backup and recovery any more. It&#8217;s not just replication and snapshots, or continuous data protection. It&#8217;s all the technology married with&nbsp;business awareness,&nbsp;data lifecycle management and the recognition that&nbsp;Professor Moody in Harry Potter was right, too: &#8220;constant vigilance!&#8221;<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/2017\/01\/24\/data-protection-ensuring-data-availability\/attachment\/9781482244151\/\" rel=\"attachment wp-att-6141\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6141\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2017\/01\/9781482244151.jpg\" alt=\"Data Protection: Ensuring Data Availability\" width=\"429\" height=\"648\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2017\/01\/9781482244151.jpg 429w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2017\/01\/9781482244151-199x300.jpg 199w\" sizes=\"auto, (max-width: 429px) 100vw, 429px\" \/><\/a><\/p>\n<p>This isn&#8217;t&nbsp;a book about just backup and recovery because&nbsp;that&#8217;s just not enough any more. You need other data protection functions deployed holistically with a business focus and an eye on data management in order to truly have an effective data protection strategy for your business.<\/p>\n<p>To give you an idea of the topics I&#8217;m covering in this book, here&#8217;s the chapter list:<\/p>\n<ol>\n<li>Introduction<\/li>\n<li>Contextualizing Data Protection<\/li>\n<li>Data Lifecycle<\/li>\n<li>Elements of a Protection System<\/li>\n<li>IT Governance and Data Protection<\/li>\n<li>Monitoring and Reporting<\/li>\n<li>Business Continuity<\/li>\n<li>Data Discovery<\/li>\n<li>Continuous Availability and Replication<\/li>\n<li>Snapshots<\/li>\n<li>Backup and Recovery<\/li>\n<li>The Cloud<\/li>\n<li>Deduplication<\/li>\n<li>Protecting Virtual Infrastructure<\/li>\n<li>Big Data<\/li>\n<li>Data Storage Protection<\/li>\n<li>Tape<\/li>\n<li>Converged Infrastructure<\/li>\n<li>Data Protection Service Catalogues<\/li>\n<li>Holistic Data Protection Strategies<\/li>\n<li>Data Recovery<\/li>\n<li>Choosing Protection Infrastructure<\/li>\n<li>The Impact of Flash on Data Protection<\/li>\n<li>In Closing<\/li>\n<\/ol>\n<p>There&#8217;s a lot there \u2013 you&#8217;ll see the first&nbsp;<em>eight<\/em> chapters are not about&nbsp;technology, and for a good reason: you <strong>must<\/strong>&nbsp;have a grasp on the other bits before you can start considering everything else, otherwise you&#8217;re just doing point-solutions, and&nbsp;eventually <em>just<\/em> doing&nbsp;point-solutions will&nbsp;cost you more&nbsp;in time, money and risk than&nbsp;they give you in return.<\/p>\n<p>I&#8217;m&nbsp;pleased&nbsp;to say that <em>Data Protection: Ensuring Data Availability<\/em> is released next month. You can find out more and order direct from the publisher, <a href=\"https:\/\/www.crcpress.com\/Data-Protection-Ensuring-Data-Availability\/Guise\/p\/book\/9781482244151\" target=\"_blank\">CRC&nbsp;Press<\/a>, or order from <a href=\"https:\/\/www.amazon.com\/Data-Protection-Ensuring-Availability\/dp\/1482244152\" target=\"_blank\">Amazon<\/a>, too. I hope you find it enjoyable.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2013 I undertook the endeavour to&nbsp;revisit some&nbsp;of the topics from my first book, &#8220;Enterprise Systems Backup and Recovery: A&nbsp;Corporate&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3,5],"tags":[1241,1262,1342,162,163,174,230,1339,282,301,1341,598,820,822,1219,900,980,1084,1340],"class_list":["post-6140","post","type-post","status-publish","format-standard","hentry","category-architecture","category-backup-theory","tag-architecture","tag-backup-and-recovery","tag-backup-theory","tag-best-practices","tag-big-data","tag-book","tag-cloud","tag-continuous-availability","tag-data-protection","tag-deduplication","tag-flash","tag-monitoring","tag-replication","tag-reporting","tag-service-catalogue","tag-snapshot","tag-tape","tag-virtualisation","tag-virtualization"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-1B2","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/6140","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=6140"}],"version-history":[{"count":6,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/6140\/revisions"}],"predecessor-version":[{"id":7399,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/6140\/revisions\/7399"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=6140"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=6140"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=6140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}