Cover image for Data lifecycles : managing data for strategic advantage
Title:
Data lifecycles : managing data for strategic advantage
Personal Author:
Publication Information:
Chichester, West Sussex : John Wiley & Sons, 2007
ISBN:
9780470016336

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010128878 QA76.9.D3 R44 2007 Open Access Book Book
Searching...
Searching...
30000010135648 QA76.9.D3 R44 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

Businesses now rely almost entirely on applications and databases, causing data and storage needs to increase at astounding rates. It is therefore imperative for a company to optimize and simplify the complexity of managing its data resources.

Plenty of storage products are now available, however the challenge remains for companies to proactively manage their storage assets and align the resources to the various departments, divisions, geographical locations and business processes to achieve improved efficiency and profitability. Data Lifecycles identifies ways to incorporate an intelligent service platform to manage and map the storage of data. The authors give an overview of the latest trends and technologies in storage networking and cover critical issues such as world-wide compliance.

Data Lifecycles:

Provides a single-source guide to data and storage methodologies, processes, technologies and compliance issues. Addresses the need of an encompassing intelligent data and storage management platform for modern businesses. Gives an overview of the latest data technologies and concepts such as utility computing and information lifecycle management. Clearly defines and describes lifecycle management and strategies to ensure growth of critical business data. Shows how to dramatically reduce the total cost of storage ownership and provide rapid return on investment. Enables customers to make decisions directed toward the purchase of storage tools and storage management solutions.

This text is an ideal introduction to modern data lifecycle management for network managers, system administrators, storage/system architects, network managers, information management directors as well as CIO/CTOs and their teams, senior IT managers and decision makers, and database administrators.


Author Notes

Roger Reid is an Enterprise Storage Architect for VERITAS Software Corporation with over ten years' combined industry experience supporting various Fortune 500 customers in architecting and implementing a variety of storage solutions including storage area networks, storage virtualization, active storage resource management, backup and hierarchal storage management products.

Gareth Fraser-King is the Manager for Product Marketing in the European, Middle East, and African emerging territories producing high level messaging, white papers, articles, presentations, and marketing deliverables. He has worked as a writer and marketer for over 20 years, the last 10 within the IT industry, and possesses a wide range of marketing experience, including copywriting, business, technical and service authoring, as well as business development, operation efficiency, strategic planning, affinity marketing, product development and quality management.


Table of Contents

Prefacep. ix
Who should read this bookp. ix
Purpose of this bookp. x
1 Introducing Utility Computingp. 1
1.1 Real problems and real solutionsp. 5
1.1.1 Real issues identified - regulation, legislation and the lawp. 5
1.1.2 More regulation, legislation and the lawp. 6
1.1.3 Current storage growthp. 8
1.2 New storage managementp. 9
1.2.1 What are the things organisations need to consider?p. 11
1.2.2 What does data lifecycle management mean?p. 13
1.2.3 Why is IT lifecycle management important?p. 15
1.2.4 Goals of data lifecycle managementp. 16
2 The Changing IT Imperativep. 19
2.1 Introduction to utility computingp. 22
2.2 General market highlightsp. 25
2.2.1 Current storage growthp. 26
2.2.2 Enterprises for which DLM is criticalp. 30
2.3 Real challenges and opportunitiesp. 36
2.3.1 Real issues identifiedp. 36
2.3.2 Data compliancep. 37
2.3.3 Case study in ineffective storage reportingp. 39
2.4 Summaryp. 40
3 Being Compliantp. 43
3.1 So what are the regulations?p. 46
3.2 Financial services companiesp. 49
3.2.1 Crime in the finance sectorp. 52
3.3 Telecommunications companiesp. 54
3.4 Utilities companiesp. 58
3.5 Public authorities and governmentp. 59
3.6 Managing data for compliance is just a specialised form of data managementp. 61
3.7 Just plain junk data!p. 63
3.8 The bottom line - what is mandated?p. 64
3.8.1 Record retention and retrievalp. 65
3.8.2 Auditable processp. 68
3.8.3 Reporting in real timep. 69
3.8.4 Integrating data management from desktop to data centre to offsite vaultp. 72
3.8.5 Challenge - the data dilemmap. 72
4 Data Taxonomyp. 75
4.1 A new data management consciousness levelp. 77
4.1.1 De-mystifying data classificationp. 79
4.1.2 Defining data classificationp. 81
4.1.3 Classification objectivesp. 81
4.1.4 Various approaches to data classificationp. 82
4.2 Data personificationp. 83
4.2.1 Business infrastructure mapping analysisp. 84
4.3 Classification model and frameworkp. 87
4.4 Customer reportingp. 97
4.4.1 Summary reportsp. 98
4.4.2 Detailed reportsp. 100
4.4.3 Summary graphsp. 104
4.5 Summaryp. 105
5 Email Retentionp. 107
5.1 Email management to achieve compliancep. 108
5.2 What is archiving?p. 109
5.2.1 Email archiving requirementsp. 110
5.3 How should organisations manage their email records?p. 111
5.4 Email retention policies are for life - not just for Christmasp. 113
5.5 How companies can gain competitive advantage using compliancep. 114
5.5.1 Compliance makes good business sensep. 115
5.6 What laws govern email retention?p. 117
5.6.1 How long do we have to keep email records?p. 118
5.7 Write once, secure against tamperingp. 119
5.8 Storage recommendations for emailp. 121
5.9 Conclusionp. 124
6 Securityp. 125
6.1 Alerting organisations to threatsp. 125
6.1.1 Vulnerability identified and early warningsp. 129
6.1.2 Early awareness of vulnerabilities and threats in the wildp. 130
6.1.3 Listening postsp. 132
6.2 Protecting data and IT systemsp. 133
6.2.1 Threats blocked using vulnerability signatures to prevent propagationp. 134
6.2.2 Preventing and detecting attacksp. 135
6.2.3 Managing security in a data centrep. 136
6.2.4 Monitoring and identification of systems versus vulnerabilities and policiesp. 137
6.2.5 Responding to threats and replicating across the infrastructurep. 138
6.2.6 Patches and updates implemented across infrastructurep. 139
6.2.7 Keeping information secure and availablep. 140
6.3 Conclusionsp. 140
Referencep. 143
7 Data Lifecycles and Tiered Storage Architecturesp. 145
7.1 Tiered storage definedp. 145
7.1.1 Serial ATA backgroundp. 147
7.1.2 Serial ATA overviewp. 148
7.1.3 Serial ATA reliabilityp. 150
7.1.4 Bit error rate (BER)p. 151
7.1.5 Mean time before failure (MTBF)p. 152
7.1.6 Failure rate breakdownp. 154
7.1.7 No free lunchp. 155
7.2 RAID reviewp. 156
7.2.1 RAID 5 reviewp. 156
7.2.2 RAID 6 overviewp. 158
7.3 Tape-based solutionsp. 159
7.3.1 Virtual tape library primerp. 160
7.4 Recoverability of data: you get what you pay forp. 163
7.5 Conclusionp. 166
Bibliographyp. 167
8 Continuous Data Protection (CDP)p. 169
8.1 Introductionp. 169
8.2 CDP data-tapsp. 171
8.2.1 Application data-tapp. 172
8.2.2 File system data-tapp. 172
8.2.3 Volume data-tapp. 172
8.3 CDP operationsp. 175
8.3.1 CDP storep. 177
8.3.2 CDP stakeholdersp. 180
8.4 Conclusionp. 182
9 What is the Cost of an IT Outage?p. 185
9.1 Failure is not an optionp. 185
9.1.1 Tangible costsp. 187
9.1.2 Intangible costsp. 189
9.2 Finding the elusive ROIp. 191
9.3 Building a robust and resilient infrastructurep. 192
9.3.1 Five interrelated steps to building a resilient infrastructurep. 194
9.3.2 Disaster recovery concepts and technologiesp. 194
9.3.3 Disaster tolerancep. 196
9.4 Conclusion - Analysing business impactp. 198
9.4.1 Identifying critical functionsp. 199
10 Business Impactp. 201
10.1 Business impactp. 201
10.1.1 Business impact analysisp. 202
10.1.2 Cost versus adoptionp. 207
10.1.3 Service level agreements and quality of storage servicep. 211
10.2 The paradigm shift in the way IT does businessp. 212
10.2.1 Aligning business with ITp. 212
10.2.2 Software consistency and agnostic supportp. 214
10.3 The Holy Grail: standard software platformp. 214
10.3.1 Business technology reporting and billingp. 215
10.3.2 Smart storage resource managementp. 216
10.3.3 Data forecasting and trendingp. 217
10.3.4 Policy-based Administrationp. 219
10.4 Summaryp. 219
Bibliographyp. 220
11 Integrationp. 221
11.1 Understanding compliance requirementsp. 221
11.1.1 Automating data lifecycle managementp. 226
11.1.2 Content searchingp. 229
11.2 Understanding hardware and its constructionsp. 233
11.2.1 Current storage technologiesp. 234
11.2.2 Disk-based storage strategiesp. 234
11.3 Understanding user expectationsp. 237
11.3.1 Organising datap. 238
11.4 Knowing the capabilities of your data management toolsp. 240
11.4.1 Virtualisation of storage, servers and applicationsp. 241
11.4.2 Product technology and business management functionalityp. 243
11.5 Solution integration - business data and workflow applicationsp. 243
11.5.1 Standard management and reporting platformp. 245
11.5.2 Meeting business objectives and operational information (Figure 11.7)p. 246
11.6 A ten-point plan to successful DLM, ILM and TLM strategyp. 247
11.7 Conclusionp. 248
Referencesp. 248
Indexp. 251