SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
GmbH
Enterprise Servers, Storage and Business Continuity
© Josh Krischer & Associates GmbH. All rights reserved. P a g e | 1
IBM TS7610 ProtecTIER®
Deduplication Appliance Express
Enterprise level technology for SMEs
IBM TS7610 ProtecTIER®
Deduplication
Appliance Express – Enterprise Level
Technology for SMEs
Josh Krischer is an expert IT advisor with 40 years of experience
in high-end computing, storage, disaster recovery, and data center
consolidation. Currently working as an independent analyst at
Josh Krischer & Associates GmbH, he was formerly a Research
Vice President at Gartner, covering mainframes, enterprise
servers, storage and disaster recovery techniques from 1998 until
2007. He spoke on these topics and others at a multitude of
worldwide IT events, including Gartner conferences and symposia,
industry and educational conferences, as well as major vendor
events.
Table of Contents
Contents
July 2010 Introduction.................................................................................................................... 1
Introduction..................................................................................................................................... 2
Virtual Tape and Data Deduplication ............................................................................................. 2
Virtual Tape Libraries............................................................................................................. 2
Data Deduplication ................................................................................................................. 3
Users’ Requirements for Deduplication.......................................................................................... 4
TS7610 ProtecTIER®
Deduplication Appliance Express - Overview............................................ 4
Market and Economical Considerations......................................................................................... 5
Bottom Line .................................................................................................................................... 6
Josh Krischer
July 2010
GmbH
Enterprise Servers, Storage and Business Continuity
© Josh Krischer & Associates GmbH. All rights reserved. P a g e | 2
IBM TS7610 ProtecTIER®
Deduplication Appliance Express
Enterprise level technology for SMEs
Introduction
On July, 20th
, 2010 IBM announced the IBM TS7610 ProtecTIER®
Deduplication Appliance
Express, a complete deduplicated storage subsystem for Small Medium Enterprises (SMEs)
and remote offices. The new subsystem is the newest and smallest member of the
ProtecTIER series–a leading enterprise-suitable deduplication technology, which IBM
acquired from Diligent Technologies in 2008 and continues to develop and enhance at a
remarkable pace. The TS7610 uses the same ProtecTIER software found in their larger
TS7650 solutions, has the same ProtecTIER functionality, is pre-configured (ready to use)
and offers very competitive CapEx and OpEx pricing.
Virtual Tape and Data Deduplication
IBM’s ProtecTIER is a proven enterprise-class virtual tape library with inline embedded data
deduplication. For many years tape was the only media used to store backups. However, in
the last decade, disk technologies have been gaining wider acceptance with many
organizations. While tapes force to access their data sequentially, disk drives allow direct
random access, enabling multiple concurrent backup sessions and better performance. The
resulting productivity gains and lowered operating expense can lead to significant time and
cost savings.
Virtual Tape Libraries
A Virtual Tape Library (VTL) is a virtualization feature that gives disk storage the look and
feel of a tape library. Standard backup applications cannot distinguish between a VTL and a
physical tape library, which simplifies operation and makes the backup process fully
transparent. There are two types of VTLs: stand-alone, which includes only the emulation on
disk subsystems, and integrated VTLs containing physical tape libraries connected to the
VTL.
Regular daily backups can be directed to the VTL to exploit disk technology advantages, but
when the data on a virtual tape needs to be archived, the backup application or the VTL
control program copies the data from the virtual tape to a physical tape (cloning operation).
For restore operations, the major backup applications are able to access backups on the
virtual tape or a physical tape mounted in the library. Backup applications track tapes by
barcode labels and therefore are confused if two “tapes” have the same barcode label.
GmbH
Enterprise Servers, Storage and Business Continuity
© Josh Krischer & Associates GmbH. All rights reserved. P a g e | 3
IBM TS7610 ProtecTIER®
Deduplication Appliance Express
Enterprise level technology for SMEs
Hence, the physical tape usually carries a different barcode than the virtual one despite that
both contain the same data. If the original virtual tape is deleted, the physical tape can be
imported and the backup application’s catalog should be updated.
Two major disadvantages of VTL technology are the relative high cost of disks in comparison
to tapes and its limited scalability. Two technologies address these problems: high-capacity,
low-price SATA type disks and data deduplication.
There is no doubt that disk subsystems are faster and inherently more reliable than tape
solutions; therefore, using virtual tapes for backup reduces failure rates, allows for smaller
backup windows, and significantly speeds up recovery. Still, tape retains a vital role in
backup and recovery operations, especially when it comes to portability and long term data
retention requirements.
Data Deduplication
Deduplication aims to eliminate redundant data. Currently it is mainly used in backup and
archiving. While it can be employed for any data, this is not recommended due to
performance considerations. The deduplication process divides the data into blocks (or
chunks) and builds a catalog based on the contents of these blocks, which is stored as
metadata. This metadata indexes individual blocks of unique information. Upon new writes
(subsequent backup, for example), the deduplication mechanism identifies which data
elements are unique, stores them on disk, and updates the metadata. For the non-unique
data elements, only references are created without actually storing the data.
There are two basic implementations: inline and post processing. With the inline technique,
as data is received by the target device, it is deduplicated in real-time. Post processing, on
the other hand, first allows the entire data stream to be stored on disk temporarily, which is
then read back off-line and then processed by a deduplication engine. All of IBM’s
ProtecTIER solutions use inline processing.
Data deduplication vendors deploy different methods to detect unique information. Most
vendors create a data-dependent fingerprint by applying a hashing algorithm on data blocks
and comparing the result with previously calculated hashes. The hash results are usually
stored on a disk as well. ProtecTIER uses a unique pattern matching and differencing
algorithm (HyperFactor®) that identifies duplicate data. HyperFactor, IBM’s patented
GmbH
Enterprise Servers, Storage and Business Continuity
© Josh Krischer & Associates GmbH. All rights reserved. P a g e | 4
IBM TS7610 ProtecTIER®
Deduplication Appliance Express
Enterprise level technology for SMEs
deduplication technology, first identifies “similar data” using a small key that fits into a
deduplication appliance server’s memory-resident index and is not stored on disk. If an
element looks similar, HyperFactor then performs a bit-level comparison between the new
data and the similar data, storing only the bit-level differences. This unique method is more
efficient because it dramatically reduces disk accesses for indexing, thus maintaining
consistently high performance and scalability; at the same time it ensures full data integrity.
Users’ Requirements for Deduplication
Users require several important properties from a deduplication subsystem: data integrity,
performance (sustained throughput in MB/s per node, number of nodes), scalability,
application transparency, product maturity (customer
references), price, and ease-of-use.
As mentioned above, most deduplication subsystems use
hashing algorithms to develop the unique chunk signature. The
risk of hash collision (the same signature for two different data
chunks) is very low statistically, but such risk may be realized in
very large environments; when it does, there is no way of
knowing about it until the data needs to be retrieved/restored.
Deduplication performance is the result of two processes:
identification of duplicate data, which requires a database or index look-up, and a store
operation in the repository.
ProtecTIER’s HyperFactor algorithm creates a relatively small index, which allows the
deduplication appliance to keep the index in its memory, thus increasing performance and
scalability as well as enabling overall system throughput to run at speeds greater than 80
MB/s for the new TS7610 and 1000+ MB/s for their enterprise-class systems. In addition, as
we have tested and validated previously, ProtecTIER’s native IP-based replication works
transparently with any of the major backup applications and is flexible and easy to use.
TS7610 ProtecTIER®
Deduplication Appliance Express - Overview
IBM’s TS7610 ProtecTIER®
Deduplication Appliance Express is available as a 3U standard
19” rack-mounted enclosure. It features one quad-core 2.33 GHz Intel XEON processor and
twelve 1 TB SATA Drives, which are RAID 6 protected. Two configurations are supported,
with 4.0 TB or 5.4 TB useable physical capacity, respectively (see Figure 1). Both
Bit comparison techniques such
as the one used by ProtecTIER
were designed to provide 100%
data integrity by avoiding the
risk of hash collisions.
GmbH
Enterprise Servers, Storage and Business Continuity
© Josh Krischer & Associates GmbH. All rights reserved. P a g e | 5
IBM TS7610 ProtecTIER®
Deduplication Appliance Express
Enterprise level technology for SMEs
configurations support sustained write performance of more than 80 MB/s, which usually
exceeds the backup data bandwidth of SMEs.
Figure 1: IBM TS7610 ProtecTIER® Deduplication Appliance Express (source IBM)
The software used on the TS7610 is identical to the rest of the ProtecTIER series, supporting
the same functionality. It supports full, incremental, and differential backups while integrating
seamlessly with real physical tape library resource management. When it is a target of the
backup application, a ProtecTIER subsystem presents itself as a single tape library (or
several libraries) to the system. The backup application manages the “cartridges” within a
ProtecTIER system as if they were real cartridges. It can perform read and write operations
as with physical tape. In addition, it can import and export cartridges, track the cartridges with
barcodes, and perform many other tape library operations.
Market and Economical Considerations
IBM is targeting the TS7610 at SMEs that currently use tapes or non-deduplicated VTLs. The
suggested pricing levels will be below the major competitive devices available on the market.
By using the deduplication capabilities of ProtecTIER, users can lower their CapEx and
GmbH
Enterprise Servers, Storage and Business Continuity
© Josh Krischer & Associates GmbH. All rights reserved. P a g e | 6
IBM TS7610 ProtecTIER®
Deduplication Appliance Express
Enterprise level technology for SMEs
OpEx investments significantly. The major savings come from procurement and smaller disk
space, which means lower investment, service, energy, and storage management costs. In
addition to financial savings, carbon-dioxide emissions are also lowered, yielding a better
environmental footprint. The TS7610 comes preconfigured, which ensures easy installation
and integration. It sports an intuitive, easy to use GUI,
which requires less storage management attention and
man-power.
Large companies wishing to consolidate backups to the
main office is another target for this solution. For such
deployments, the “one-to-many” native replication feature
can be used. It can conduct data transfers from up to 12
branch offices (spokes) to the main target (hub),
supporting a mix and match of ProtecTIER Gateways, large appliances (single or two-node
clusters), and TS7610 appliances if required. ProtecTIER replicates just the deduplicated
data, which can be up to 25 times smaller than the raw data, meaning that the required
transmission bandwidth can be significantly lower and cheaper. The replicated data is
compressed, which again reduces data traffic. The replication feature license scheme is
based on tiered deduplicated capacity, which in most cases is much lower than a disk
replication license based on raw capacity. The transmission costs in data replication are
sometimes the biggest part of disaster recovery OpEx.
Bottom Line
As seen from above the major benefits of IBM TS7610 ProtecTIER are:
 Easy to deploy, plug-and-play
 Affordable pricing scheme
 Simple to use, user friendly GUI
 Fully compatible with the rest of IBM ProtecTIER deduplication solutions, supporting
the same enterprise type features
 Its full transparency supports all backup applications without changes which allow
fast deployment and usage
 By porting the ProtecTIER appliance standard software onto the TS7610, IBM
delivers enterprise-class deduplication appliance tailored for SMEs requirements
By porting the ProtecTIER
appliance standard software onto
the TS7610, IBM delivers enterprise
class deduplication for SMEs.
GmbH
Enterprise Servers, Storage and Business Continuity
© Josh Krischer & Associates GmbH. All rights reserved. P a g e | 7
IBM TS7610 ProtecTIER®
Deduplication Appliance Express
Enterprise level technology for SMEs
TSW03058-USEN-00
All the benefits mentioned above match the requirements of typical SME users.
Users new to VTLs may significantly improve their backup and archiving reliability, as well as
recovery times at acceptable costs by exploiting deduplication benefits. The high
deduplication factor allows keeping a vast amount of data online, and for most SMEs, it may
completely replace magnetic tape libraries.
IBM continues to invest heavily in Data Protection – Backup & Recovery. IBM’s ProtecTIER
is the only deduplication technology on the market today that is enterprise-class proven in
the largest data centers worldwide. IBM is now leading the market by bringing that powerful
and proven deduplication technology, in an easy-to-install and simple-to-manage set of
offerings and has priced it to be in line with the needs and budget possibilities of any large or
medium-sized organization.

Weitere ähnliche Inhalte

Was ist angesagt?

A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storagePreludedx
 
The All-Flash SAP HANA Solution: Performance, Economics, and Reliability
The All-Flash SAP HANA Solution: Performance, Economics, and Reliability The All-Flash SAP HANA Solution: Performance, Economics, and Reliability
The All-Flash SAP HANA Solution: Performance, Economics, and Reliability Western Digital
 
Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)SP Home Run Inc.
 
1cloudstar cloud store.v1.1
1cloudstar cloud store.v1.11cloudstar cloud store.v1.1
1cloudstar cloud store.v1.11CloudStar
 
IT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup AgainIT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup AgainHelpSystems
 
Data Centers and IoT
Data Centers and IoTData Centers and IoT
Data Centers and IoTsflaig
 
How e fpga future proofs data centers
How e fpga future proofs data centersHow e fpga future proofs data centers
How e fpga future proofs data centersdonnabrown085
 
Microsoft Windows Azure - istore Boost Efficiency With Software Plus Services...
Microsoft Windows Azure - istore Boost Efficiency With Software Plus Services...Microsoft Windows Azure - istore Boost Efficiency With Software Plus Services...
Microsoft Windows Azure - istore Boost Efficiency With Software Plus Services...Microsoft Private Cloud
 
Transceiver – How They Help Support Big Data in Data Centers?
 Transceiver – How They Help Support Big Data in Data Centers? Transceiver – How They Help Support Big Data in Data Centers?
Transceiver – How They Help Support Big Data in Data Centers?Fern Xu
 
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeDs 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeBloombase
 
Hitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeHitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeBloombase
 
Deploying All-Flash Cloud Infrastructure without Breaking the Bank
Deploying All-Flash Cloud Infrastructure without Breaking the BankDeploying All-Flash Cloud Infrastructure without Breaking the Bank
Deploying All-Flash Cloud Infrastructure without Breaking the BankWestern Digital
 
Unitrends Sales Presentation 2010
Unitrends Sales Presentation 2010Unitrends Sales Presentation 2010
Unitrends Sales Presentation 2010lincolng
 
Next Level Supercomputing at STFC Hartree Centre
Next Level Supercomputing at STFC Hartree CentreNext Level Supercomputing at STFC Hartree Centre
Next Level Supercomputing at STFC Hartree CentreLenovo Data Center
 

Was ist angesagt? (20)

A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storage
 
The All-Flash SAP HANA Solution: Performance, Economics, and Reliability
The All-Flash SAP HANA Solution: Performance, Economics, and Reliability The All-Flash SAP HANA Solution: Performance, Economics, and Reliability
The All-Flash SAP HANA Solution: Performance, Economics, and Reliability
 
Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)
 
GFO case study
GFO case studyGFO case study
GFO case study
 
CONVRGD Slide Deck_Customer (1)
CONVRGD Slide Deck_Customer (1)CONVRGD Slide Deck_Customer (1)
CONVRGD Slide Deck_Customer (1)
 
1cloudstar cloud store.v1.1
1cloudstar cloud store.v1.11cloudstar cloud store.v1.1
1cloudstar cloud store.v1.1
 
IT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup AgainIT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup Again
 
Data Centers and IoT
Data Centers and IoTData Centers and IoT
Data Centers and IoT
 
Generic RLM White Paper
Generic RLM White PaperGeneric RLM White Paper
Generic RLM White Paper
 
How e fpga future proofs data centers
How e fpga future proofs data centersHow e fpga future proofs data centers
How e fpga future proofs data centers
 
Microsoft Windows Azure - istore Boost Efficiency With Software Plus Services...
Microsoft Windows Azure - istore Boost Efficiency With Software Plus Services...Microsoft Windows Azure - istore Boost Efficiency With Software Plus Services...
Microsoft Windows Azure - istore Boost Efficiency With Software Plus Services...
 
Transceiver – How They Help Support Big Data in Data Centers?
 Transceiver – How They Help Support Big Data in Data Centers? Transceiver – How They Help Support Big Data in Data Centers?
Transceiver – How They Help Support Big Data in Data Centers?
 
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeDs 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
 
Hitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeHitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafe
 
Deploying All-Flash Cloud Infrastructure without Breaking the Bank
Deploying All-Flash Cloud Infrastructure without Breaking the BankDeploying All-Flash Cloud Infrastructure without Breaking the Bank
Deploying All-Flash Cloud Infrastructure without Breaking the Bank
 
Unitrends Sales Presentation 2010
Unitrends Sales Presentation 2010Unitrends Sales Presentation 2010
Unitrends Sales Presentation 2010
 
Next Level Supercomputing at STFC Hartree Centre
Next Level Supercomputing at STFC Hartree CentreNext Level Supercomputing at STFC Hartree Centre
Next Level Supercomputing at STFC Hartree Centre
 
Cleversafe.PPTX
Cleversafe.PPTXCleversafe.PPTX
Cleversafe.PPTX
 
Introduction
IntroductionIntroduction
Introduction
 
DataCore Software with Cisco UCS Complete Unification of the Data Center Ser...
 DataCore Software with Cisco UCS Complete Unification of the Data Center Ser... DataCore Software with Cisco UCS Complete Unification of the Data Center Ser...
DataCore Software with Cisco UCS Complete Unification of the Data Center Ser...
 

Andere mochten auch

Webinar1 dornberger giz_final
Webinar1 dornberger giz_finalWebinar1 dornberger giz_final
Webinar1 dornberger giz_finalbfnd
 
Arctic shipping – the norwegian government perspective
Arctic shipping – the norwegian government perspectiveArctic shipping – the norwegian government perspective
Arctic shipping – the norwegian government perspectiveInnovation Norway
 
Technology for SMEs
Technology for SMEsTechnology for SMEs
Technology for SMEsGer Foley
 
Transforming SMEs using opensource technology platforms
Transforming SMEs using opensource technology platformsTransforming SMEs using opensource technology platforms
Transforming SMEs using opensource technology platformsMangesh Wagh
 
How SMEs can leverage Technology to overcome economic challenges and stay com...
How SMEs can leverage Technology to overcome economic challenges and stay com...How SMEs can leverage Technology to overcome economic challenges and stay com...
How SMEs can leverage Technology to overcome economic challenges and stay com...IBMAsean
 
How to conduct a literature review: A literature review on knowledge manageme...
How to conduct a literature review: A literature review on knowledge manageme...How to conduct a literature review: A literature review on knowledge manageme...
How to conduct a literature review: A literature review on knowledge manageme...Roberto Cerchione
 
SME Technology Summit 2009 - Building Your Business with Mobile
SME Technology Summit 2009 - Building Your Business with MobileSME Technology Summit 2009 - Building Your Business with Mobile
SME Technology Summit 2009 - Building Your Business with MobileShane Williamson
 
The proces approach Small and Medium Enterprises [SME] development - Nigeria
The proces approach Small and Medium Enterprises [SME] development - NigeriaThe proces approach Small and Medium Enterprises [SME] development - Nigeria
The proces approach Small and Medium Enterprises [SME] development - NigeriaPeter Senkus
 

Andere mochten auch (9)

Webinar1 dornberger giz_final
Webinar1 dornberger giz_finalWebinar1 dornberger giz_final
Webinar1 dornberger giz_final
 
Arctic shipping – the norwegian government perspective
Arctic shipping – the norwegian government perspectiveArctic shipping – the norwegian government perspective
Arctic shipping – the norwegian government perspective
 
Horizon 2020
Horizon 2020Horizon 2020
Horizon 2020
 
Technology for SMEs
Technology for SMEsTechnology for SMEs
Technology for SMEs
 
Transforming SMEs using opensource technology platforms
Transforming SMEs using opensource technology platformsTransforming SMEs using opensource technology platforms
Transforming SMEs using opensource technology platforms
 
How SMEs can leverage Technology to overcome economic challenges and stay com...
How SMEs can leverage Technology to overcome economic challenges and stay com...How SMEs can leverage Technology to overcome economic challenges and stay com...
How SMEs can leverage Technology to overcome economic challenges and stay com...
 
How to conduct a literature review: A literature review on knowledge manageme...
How to conduct a literature review: A literature review on knowledge manageme...How to conduct a literature review: A literature review on knowledge manageme...
How to conduct a literature review: A literature review on knowledge manageme...
 
SME Technology Summit 2009 - Building Your Business with Mobile
SME Technology Summit 2009 - Building Your Business with MobileSME Technology Summit 2009 - Building Your Business with Mobile
SME Technology Summit 2009 - Building Your Business with Mobile
 
The proces approach Small and Medium Enterprises [SME] development - Nigeria
The proces approach Small and Medium Enterprises [SME] development - NigeriaThe proces approach Small and Medium Enterprises [SME] development - Nigeria
The proces approach Small and Medium Enterprises [SME] development - Nigeria
 

Ähnlich wie IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Technology for SMEs

Efficient, fast and reliable backup and recovery solutions featuring IBM Prot...
Efficient, fast and reliable backup and recovery solutions featuring IBM Prot...Efficient, fast and reliable backup and recovery solutions featuring IBM Prot...
Efficient, fast and reliable backup and recovery solutions featuring IBM Prot...IBM India Smarter Computing
 
TSS03135-USEN-00_HR
TSS03135-USEN-00_HRTSS03135-USEN-00_HR
TSS03135-USEN-00_HREd Ahl
 
Software defined storage rev. 2.0
Software defined storage rev. 2.0 Software defined storage rev. 2.0
Software defined storage rev. 2.0 TTEC
 
Enterprise Storage Solutions for Overcoming Big Data and Analytics Challenges
Enterprise Storage Solutions for Overcoming Big Data and Analytics ChallengesEnterprise Storage Solutions for Overcoming Big Data and Analytics Challenges
Enterprise Storage Solutions for Overcoming Big Data and Analytics ChallengesINFINIDAT
 
Tools of noc
Tools of nocTools of noc
Tools of nocmunawarul
 
Webinar: What's Best for VDI, Hybrid or All-Flash Storage?
Webinar: What's Best for VDI, Hybrid or All-Flash Storage?Webinar: What's Best for VDI, Hybrid or All-Flash Storage?
Webinar: What's Best for VDI, Hybrid or All-Flash Storage?Storage Switzerland
 
Syneto Company presentation client
Syneto Company presentation clientSyneto Company presentation client
Syneto Company presentation clientValter Ricci
 
Evolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in MotionEvolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in Motionconfluent
 
Backing Up Mountains of Data to Disk
Backing Up Mountains of Data to DiskBacking Up Mountains of Data to Disk
Backing Up Mountains of Data to DiskIT Brand Pulse
 
IDC Spotlight: PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...
IDC Spotlight:  PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...IDC Spotlight:  PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...
IDC Spotlight: PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...Symantec
 
IBM System Storage TS7650G ProtecTIER Deduplication Gateway
IBM System Storage TS7650G ProtecTIER Deduplication GatewayIBM System Storage TS7650G ProtecTIER Deduplication Gateway
IBM System Storage TS7650G ProtecTIER Deduplication GatewayIBM India Smarter Computing
 
Software-Defined Storage (SDS)
Software-Defined Storage (SDS)Software-Defined Storage (SDS)
Software-Defined Storage (SDS)Ali Mirfallah
 
Catching the Software Defined Storage Wave
Catching the Software Defined Storage WaveCatching the Software Defined Storage Wave
Catching the Software Defined Storage WaveDataCore Software
 

Ähnlich wie IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Technology for SMEs (20)

Efficient, fast and reliable backup and recovery solutions featuring IBM Prot...
Efficient, fast and reliable backup and recovery solutions featuring IBM Prot...Efficient, fast and reliable backup and recovery solutions featuring IBM Prot...
Efficient, fast and reliable backup and recovery solutions featuring IBM Prot...
 
TS7680 ProtecTIER for z/OS Datasheet
TS7680 ProtecTIER for z/OS DatasheetTS7680 ProtecTIER for z/OS Datasheet
TS7680 ProtecTIER for z/OS Datasheet
 
TS7680 ProtecTIER for z/OS Datasheet
TS7680 ProtecTIER for z/OS DatasheetTS7680 ProtecTIER for z/OS Datasheet
TS7680 ProtecTIER for z/OS Datasheet
 
Evaluator Group on TS7680 ProtecTIER for z/OS
Evaluator Group on TS7680 ProtecTIER for z/OSEvaluator Group on TS7680 ProtecTIER for z/OS
Evaluator Group on TS7680 ProtecTIER for z/OS
 
IBM ProtecTIER Deduplication for z/OS
IBM ProtecTIER Deduplication for z/OSIBM ProtecTIER Deduplication for z/OS
IBM ProtecTIER Deduplication for z/OS
 
TSS03135-USEN-00_HR
TSS03135-USEN-00_HRTSS03135-USEN-00_HR
TSS03135-USEN-00_HR
 
Software defined storage rev. 2.0
Software defined storage rev. 2.0 Software defined storage rev. 2.0
Software defined storage rev. 2.0
 
Enterprise Storage Solutions for Overcoming Big Data and Analytics Challenges
Enterprise Storage Solutions for Overcoming Big Data and Analytics ChallengesEnterprise Storage Solutions for Overcoming Big Data and Analytics Challenges
Enterprise Storage Solutions for Overcoming Big Data and Analytics Challenges
 
Tools of noc
Tools of nocTools of noc
Tools of noc
 
Webinar: What's Best for VDI, Hybrid or All-Flash Storage?
Webinar: What's Best for VDI, Hybrid or All-Flash Storage?Webinar: What's Best for VDI, Hybrid or All-Flash Storage?
Webinar: What's Best for VDI, Hybrid or All-Flash Storage?
 
Syneto Company presentation client
Syneto Company presentation clientSyneto Company presentation client
Syneto Company presentation client
 
Flashelastic
FlashelasticFlashelastic
Flashelastic
 
The Benefits of using Tegile
The Benefits of using TegileThe Benefits of using Tegile
The Benefits of using Tegile
 
Evolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in MotionEvolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in Motion
 
Backing Up Mountains of Data to Disk
Backing Up Mountains of Data to DiskBacking Up Mountains of Data to Disk
Backing Up Mountains of Data to Disk
 
IDC Spotlight: PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...
IDC Spotlight:  PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...IDC Spotlight:  PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...
IDC Spotlight: PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...
 
IBM System Storage TS7650G ProtecTIER Deduplication Gateway
IBM System Storage TS7650G ProtecTIER Deduplication GatewayIBM System Storage TS7650G ProtecTIER Deduplication Gateway
IBM System Storage TS7650G ProtecTIER Deduplication Gateway
 
Media & Entertainment Solutions via Innovative IT
Media & Entertainment Solutions via Innovative ITMedia & Entertainment Solutions via Innovative IT
Media & Entertainment Solutions via Innovative IT
 
Software-Defined Storage (SDS)
Software-Defined Storage (SDS)Software-Defined Storage (SDS)
Software-Defined Storage (SDS)
 
Catching the Software Defined Storage Wave
Catching the Software Defined Storage WaveCatching the Software Defined Storage Wave
Catching the Software Defined Storage Wave
 

Mehr von IBM India Smarter Computing

Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments IBM India Smarter Computing
 
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...IBM India Smarter Computing
 
A Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceA Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceIBM India Smarter Computing
 
IBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM India Smarter Computing
 

Mehr von IBM India Smarter Computing (20)

Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments
 
All-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage EfficiencyAll-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage Efficiency
 
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
 
IBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product GuideIBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product Guide
 
IBM System x3250 M5
IBM System x3250 M5IBM System x3250 M5
IBM System x3250 M5
 
IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4
 
IBM System x3650 M4 HD
IBM System x3650 M4 HDIBM System x3650 M4 HD
IBM System x3650 M4 HD
 
IBM System x3300 M4
IBM System x3300 M4IBM System x3300 M4
IBM System x3300 M4
 
IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4
 
IBM System x3500 M4
IBM System x3500 M4IBM System x3500 M4
IBM System x3500 M4
 
IBM System x3550 M4
IBM System x3550 M4IBM System x3550 M4
IBM System x3550 M4
 
IBM System x3650 M4
IBM System x3650 M4IBM System x3650 M4
IBM System x3650 M4
 
IBM System x3500 M3
IBM System x3500 M3IBM System x3500 M3
IBM System x3500 M3
 
IBM System x3400 M3
IBM System x3400 M3IBM System x3400 M3
IBM System x3400 M3
 
IBM System x3250 M3
IBM System x3250 M3IBM System x3250 M3
IBM System x3250 M3
 
IBM System x3200 M3
IBM System x3200 M3IBM System x3200 M3
IBM System x3200 M3
 
IBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and ConfigurationIBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and Configuration
 
A Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceA Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization Performance
 
IBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architecture
 
X6: The sixth generation of EXA Technology
X6: The sixth generation of EXA TechnologyX6: The sixth generation of EXA Technology
X6: The sixth generation of EXA Technology
 

IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Technology for SMEs

  • 1. GmbH Enterprise Servers, Storage and Business Continuity © Josh Krischer & Associates GmbH. All rights reserved. P a g e | 1 IBM TS7610 ProtecTIER® Deduplication Appliance Express Enterprise level technology for SMEs IBM TS7610 ProtecTIER® Deduplication Appliance Express – Enterprise Level Technology for SMEs Josh Krischer is an expert IT advisor with 40 years of experience in high-end computing, storage, disaster recovery, and data center consolidation. Currently working as an independent analyst at Josh Krischer & Associates GmbH, he was formerly a Research Vice President at Gartner, covering mainframes, enterprise servers, storage and disaster recovery techniques from 1998 until 2007. He spoke on these topics and others at a multitude of worldwide IT events, including Gartner conferences and symposia, industry and educational conferences, as well as major vendor events. Table of Contents Contents July 2010 Introduction.................................................................................................................... 1 Introduction..................................................................................................................................... 2 Virtual Tape and Data Deduplication ............................................................................................. 2 Virtual Tape Libraries............................................................................................................. 2 Data Deduplication ................................................................................................................. 3 Users’ Requirements for Deduplication.......................................................................................... 4 TS7610 ProtecTIER® Deduplication Appliance Express - Overview............................................ 4 Market and Economical Considerations......................................................................................... 5 Bottom Line .................................................................................................................................... 6 Josh Krischer July 2010
  • 2. GmbH Enterprise Servers, Storage and Business Continuity © Josh Krischer & Associates GmbH. All rights reserved. P a g e | 2 IBM TS7610 ProtecTIER® Deduplication Appliance Express Enterprise level technology for SMEs Introduction On July, 20th , 2010 IBM announced the IBM TS7610 ProtecTIER® Deduplication Appliance Express, a complete deduplicated storage subsystem for Small Medium Enterprises (SMEs) and remote offices. The new subsystem is the newest and smallest member of the ProtecTIER series–a leading enterprise-suitable deduplication technology, which IBM acquired from Diligent Technologies in 2008 and continues to develop and enhance at a remarkable pace. The TS7610 uses the same ProtecTIER software found in their larger TS7650 solutions, has the same ProtecTIER functionality, is pre-configured (ready to use) and offers very competitive CapEx and OpEx pricing. Virtual Tape and Data Deduplication IBM’s ProtecTIER is a proven enterprise-class virtual tape library with inline embedded data deduplication. For many years tape was the only media used to store backups. However, in the last decade, disk technologies have been gaining wider acceptance with many organizations. While tapes force to access their data sequentially, disk drives allow direct random access, enabling multiple concurrent backup sessions and better performance. The resulting productivity gains and lowered operating expense can lead to significant time and cost savings. Virtual Tape Libraries A Virtual Tape Library (VTL) is a virtualization feature that gives disk storage the look and feel of a tape library. Standard backup applications cannot distinguish between a VTL and a physical tape library, which simplifies operation and makes the backup process fully transparent. There are two types of VTLs: stand-alone, which includes only the emulation on disk subsystems, and integrated VTLs containing physical tape libraries connected to the VTL. Regular daily backups can be directed to the VTL to exploit disk technology advantages, but when the data on a virtual tape needs to be archived, the backup application or the VTL control program copies the data from the virtual tape to a physical tape (cloning operation). For restore operations, the major backup applications are able to access backups on the virtual tape or a physical tape mounted in the library. Backup applications track tapes by barcode labels and therefore are confused if two “tapes” have the same barcode label.
  • 3. GmbH Enterprise Servers, Storage and Business Continuity © Josh Krischer & Associates GmbH. All rights reserved. P a g e | 3 IBM TS7610 ProtecTIER® Deduplication Appliance Express Enterprise level technology for SMEs Hence, the physical tape usually carries a different barcode than the virtual one despite that both contain the same data. If the original virtual tape is deleted, the physical tape can be imported and the backup application’s catalog should be updated. Two major disadvantages of VTL technology are the relative high cost of disks in comparison to tapes and its limited scalability. Two technologies address these problems: high-capacity, low-price SATA type disks and data deduplication. There is no doubt that disk subsystems are faster and inherently more reliable than tape solutions; therefore, using virtual tapes for backup reduces failure rates, allows for smaller backup windows, and significantly speeds up recovery. Still, tape retains a vital role in backup and recovery operations, especially when it comes to portability and long term data retention requirements. Data Deduplication Deduplication aims to eliminate redundant data. Currently it is mainly used in backup and archiving. While it can be employed for any data, this is not recommended due to performance considerations. The deduplication process divides the data into blocks (or chunks) and builds a catalog based on the contents of these blocks, which is stored as metadata. This metadata indexes individual blocks of unique information. Upon new writes (subsequent backup, for example), the deduplication mechanism identifies which data elements are unique, stores them on disk, and updates the metadata. For the non-unique data elements, only references are created without actually storing the data. There are two basic implementations: inline and post processing. With the inline technique, as data is received by the target device, it is deduplicated in real-time. Post processing, on the other hand, first allows the entire data stream to be stored on disk temporarily, which is then read back off-line and then processed by a deduplication engine. All of IBM’s ProtecTIER solutions use inline processing. Data deduplication vendors deploy different methods to detect unique information. Most vendors create a data-dependent fingerprint by applying a hashing algorithm on data blocks and comparing the result with previously calculated hashes. The hash results are usually stored on a disk as well. ProtecTIER uses a unique pattern matching and differencing algorithm (HyperFactor®) that identifies duplicate data. HyperFactor, IBM’s patented
  • 4. GmbH Enterprise Servers, Storage and Business Continuity © Josh Krischer & Associates GmbH. All rights reserved. P a g e | 4 IBM TS7610 ProtecTIER® Deduplication Appliance Express Enterprise level technology for SMEs deduplication technology, first identifies “similar data” using a small key that fits into a deduplication appliance server’s memory-resident index and is not stored on disk. If an element looks similar, HyperFactor then performs a bit-level comparison between the new data and the similar data, storing only the bit-level differences. This unique method is more efficient because it dramatically reduces disk accesses for indexing, thus maintaining consistently high performance and scalability; at the same time it ensures full data integrity. Users’ Requirements for Deduplication Users require several important properties from a deduplication subsystem: data integrity, performance (sustained throughput in MB/s per node, number of nodes), scalability, application transparency, product maturity (customer references), price, and ease-of-use. As mentioned above, most deduplication subsystems use hashing algorithms to develop the unique chunk signature. The risk of hash collision (the same signature for two different data chunks) is very low statistically, but such risk may be realized in very large environments; when it does, there is no way of knowing about it until the data needs to be retrieved/restored. Deduplication performance is the result of two processes: identification of duplicate data, which requires a database or index look-up, and a store operation in the repository. ProtecTIER’s HyperFactor algorithm creates a relatively small index, which allows the deduplication appliance to keep the index in its memory, thus increasing performance and scalability as well as enabling overall system throughput to run at speeds greater than 80 MB/s for the new TS7610 and 1000+ MB/s for their enterprise-class systems. In addition, as we have tested and validated previously, ProtecTIER’s native IP-based replication works transparently with any of the major backup applications and is flexible and easy to use. TS7610 ProtecTIER® Deduplication Appliance Express - Overview IBM’s TS7610 ProtecTIER® Deduplication Appliance Express is available as a 3U standard 19” rack-mounted enclosure. It features one quad-core 2.33 GHz Intel XEON processor and twelve 1 TB SATA Drives, which are RAID 6 protected. Two configurations are supported, with 4.0 TB or 5.4 TB useable physical capacity, respectively (see Figure 1). Both Bit comparison techniques such as the one used by ProtecTIER were designed to provide 100% data integrity by avoiding the risk of hash collisions.
  • 5. GmbH Enterprise Servers, Storage and Business Continuity © Josh Krischer & Associates GmbH. All rights reserved. P a g e | 5 IBM TS7610 ProtecTIER® Deduplication Appliance Express Enterprise level technology for SMEs configurations support sustained write performance of more than 80 MB/s, which usually exceeds the backup data bandwidth of SMEs. Figure 1: IBM TS7610 ProtecTIER® Deduplication Appliance Express (source IBM) The software used on the TS7610 is identical to the rest of the ProtecTIER series, supporting the same functionality. It supports full, incremental, and differential backups while integrating seamlessly with real physical tape library resource management. When it is a target of the backup application, a ProtecTIER subsystem presents itself as a single tape library (or several libraries) to the system. The backup application manages the “cartridges” within a ProtecTIER system as if they were real cartridges. It can perform read and write operations as with physical tape. In addition, it can import and export cartridges, track the cartridges with barcodes, and perform many other tape library operations. Market and Economical Considerations IBM is targeting the TS7610 at SMEs that currently use tapes or non-deduplicated VTLs. The suggested pricing levels will be below the major competitive devices available on the market. By using the deduplication capabilities of ProtecTIER, users can lower their CapEx and
  • 6. GmbH Enterprise Servers, Storage and Business Continuity © Josh Krischer & Associates GmbH. All rights reserved. P a g e | 6 IBM TS7610 ProtecTIER® Deduplication Appliance Express Enterprise level technology for SMEs OpEx investments significantly. The major savings come from procurement and smaller disk space, which means lower investment, service, energy, and storage management costs. In addition to financial savings, carbon-dioxide emissions are also lowered, yielding a better environmental footprint. The TS7610 comes preconfigured, which ensures easy installation and integration. It sports an intuitive, easy to use GUI, which requires less storage management attention and man-power. Large companies wishing to consolidate backups to the main office is another target for this solution. For such deployments, the “one-to-many” native replication feature can be used. It can conduct data transfers from up to 12 branch offices (spokes) to the main target (hub), supporting a mix and match of ProtecTIER Gateways, large appliances (single or two-node clusters), and TS7610 appliances if required. ProtecTIER replicates just the deduplicated data, which can be up to 25 times smaller than the raw data, meaning that the required transmission bandwidth can be significantly lower and cheaper. The replicated data is compressed, which again reduces data traffic. The replication feature license scheme is based on tiered deduplicated capacity, which in most cases is much lower than a disk replication license based on raw capacity. The transmission costs in data replication are sometimes the biggest part of disaster recovery OpEx. Bottom Line As seen from above the major benefits of IBM TS7610 ProtecTIER are:  Easy to deploy, plug-and-play  Affordable pricing scheme  Simple to use, user friendly GUI  Fully compatible with the rest of IBM ProtecTIER deduplication solutions, supporting the same enterprise type features  Its full transparency supports all backup applications without changes which allow fast deployment and usage  By porting the ProtecTIER appliance standard software onto the TS7610, IBM delivers enterprise-class deduplication appliance tailored for SMEs requirements By porting the ProtecTIER appliance standard software onto the TS7610, IBM delivers enterprise class deduplication for SMEs.
  • 7. GmbH Enterprise Servers, Storage and Business Continuity © Josh Krischer & Associates GmbH. All rights reserved. P a g e | 7 IBM TS7610 ProtecTIER® Deduplication Appliance Express Enterprise level technology for SMEs TSW03058-USEN-00 All the benefits mentioned above match the requirements of typical SME users. Users new to VTLs may significantly improve their backup and archiving reliability, as well as recovery times at acceptable costs by exploiting deduplication benefits. The high deduplication factor allows keeping a vast amount of data online, and for most SMEs, it may completely replace magnetic tape libraries. IBM continues to invest heavily in Data Protection – Backup & Recovery. IBM’s ProtecTIER is the only deduplication technology on the market today that is enterprise-class proven in the largest data centers worldwide. IBM is now leading the market by bringing that powerful and proven deduplication technology, in an easy-to-install and simple-to-manage set of offerings and has priced it to be in line with the needs and budget possibilities of any large or medium-sized organization.