© 2005 Princeton Softech, Inc. Princeton Softech Anatomy of an Archive Project Let’s Talk About Data!! April 18, 2007 Alan Schneider.

Slides:



Advertisements
Similar presentations
Windows Server Deployment and Management With System Center.
Advertisements

Records Management for UW-Madison Employees – An Introduction UW-Madison Records Management UW-Archives & Records Management 2012 Photo courtesy of University.
“THINK” About Data 2008 © 2008 IBM Corporation IBM Tivoli Software Data Lifecycle Management Driving and Optimizing Storage Rob Hockey European Tivoli.
 Management has become a multi-faceted complex task involving:  Storage Management  Content Management  Document Management  Quota Management.
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
Business Excellence Day November 2009 Putting trust in your electronic information store Alan Shipman Group 5 Training Limited.
 PrincetonSoftech 2004 Maximize Oracle E-Business Suite Performance by Archiving Historical Data David K. Glomski Sr. Consultant.
1 Archive Access Audit Keys to Effective Compliance Lifecycle Management.
Data - Information - Knowledge
Barracuda Backup Service Data Backup and Disaster Recovery.
Optim ™ © 2008 IBM Corporation ® Enterprise Data Management Featuring IBM ® Optim™ Unlocking the Business Value of Information for Competitive Advantage.
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
Agenda Symantec Enterprise Vault 1 Today’s Management Challenges 1 Why Management? 2 The Solution: Symantec Enterprise Vault 3 Benefits & Closing.
CHAPTER 9 DEVELOPING BUSINESS/IT STRATEGIES. IT Planning Planning an information system doesn’t start with bits, and bytes, or a Web site. It starts with.
Oracle Database Administration. Rana Almurshed 2 course objective After completing this course you should be able to: install, create and administrate.
Information Lifecycle Management for
© 2006 EMC Corporation. All rights reserved. Managing the Data Center Section 5.2.
1 © Copyright 2009 EMC Corporation. All rights reserved. Agenda Storing More Efficiently  Storage Consolidation  Tiered Storage  Storing More Intelligently.
November 2009 Network Disaster Recovery October 2014.
By N.Gopinath AP/CSE. Why a Data Warehouse Application – Business Perspectives  There are several reasons why organizations consider Data Warehousing.
Database Systems: Design, Implementation, and Management Ninth Edition
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Database Design - Lecture 1
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
© 2007 Princeton Softech, Inc. Anatomy of a Archiving Project Basic Principles To Consider Eric Offenberg, Product Marketing Manager Tim Smith, Technical.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
1 Solving the records management problem A cloud-computing approach to archiving Amanda Kleha Product Marketing, Google May 20, 2008.
© 2009 EMC Corporation. All rights reserved. Introduction to Information Storage and Management Module 1.1.
Service Transition & Planning Service Validation & Testing
JAXA Archive Activity JAXA Archive Activity JAXA/EORC Kengo Aizawa JAXA/EORCOsamu Ochiai.
Barracuda Message Archiver. Integrated hardware and software Archiving and policy management Search and retrieval Internal storage and support for external.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
STORAGE MANAGEMENT/MASTER: The Storage Control Center SRM, Performance Monitoring and Operations Jenney Fields Senior Consultant GlassHouse Technologies,
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Chapter 6 Supporting Knowledge Management through Technology
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Maximo © 2009 IBM Corporation Optim ™ for Maximo.
1 IBM TIVOLI Business Continuance Seminar Training Document.
Accumulus Delivers Enterprise Class Subscription Billing and Automation Solutions for Gaming, Retail, and More on the Scalable Microsoft Azure Platform.
Database Systems. Role and Advantages of the DBMS Improved data sharing Improved data security Better data integration Minimized data inconsistency Improved.
== Enovatio Delivers a Scalable Project Management Solution Minus Large Upfront Infrastructure Costs, Thanks to the Powerful Microsoft Azure Platform MICROSOFT.
Dell Confidential Dell Database Solutions: SQL Server 2005 APR 2006.
Symantec Archiving & eDiscovery 1 Randy Law, Symantec Andy Becker, Trace3 Introducing the Clearwell eDiscovery Platform.
The Power of Aligning Backup, Recovery, and Archive Bob Madaio Sr. Manager; Backup, Recovery and Archive Marketing EMC Corporation.
SAM for SQL Workloads Presenter Name.
Microsoft and Symantec
Broward County Public Schools BP #3 Optimal Relationships
© 2003 IBM Corporation © 2005 IBM Corporation 3rd EGEE Conference – Athens, Greece Grid Computing in the Enterprise Creating I/T and Business Value Yann.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
Cloud Cellar Offers Users a Cost-Effective, Turnkey Backup and Restore Solution for Their Applications and Data Hosted in the Microsoft Azure Cloud MICROSOFT.
The Need for Data Analysis 2 Managers track daily transactions to evaluate how the business is performing Strategies should be developed to meet organizational.
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
© 2015 TriZetto Corporation Managed Services Overview Presenter Names 2.
6/13/2015 Visit the Sponsor tables to enter their end of day raffles. Turn in your completed Event Evaluation form at the end of the day in the Registration.
Considerations and Benefits for Archive and Compliance Deploying Enterprise Vault on NetApp Storage 1.
Why Rocket Arkivio May, Storage Trends and Data Growth © 2012 Rocket Software, Inc. All Rights Reserved.
Increasing Cloud Adoption Through Cloud Services Brokerage (CSB) Brent Brightwell Senior VP Products and Strategy DoubleHorn.
Clouding with Microsoft Azure
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Organizations Are Embracing New Opportunities
Data and database administration
Automated Live Workload Migration to vCloud Air with ATAmotion
Information Lifecycle วัฏจักรสารสนเทศ
Data Security for Microsoft Azure
Cloud Consulting Services and Solutions
Presentation transcript:

© 2005 Princeton Softech, Inc. Princeton Softech Anatomy of an Archive Project Let’s Talk About Data!! April 18, 2007 Alan Schneider

© 2005 Princeton Softech, Inc. 2 Archiving Impact  Archiving solves a variety of problems  Today’s focus: Information Lifecycle Management (“ILM”)  Components  Issues to consider

© 2005 Princeton Softech, Inc. 3 5 Reasons Why Company’s Don’t Archive  Organizational Alignment  Priority  Funding  Timing  Knowledge of what archiving is and how to do it

© 2005 Princeton Softech, Inc. 4 What is ILM?  Information has a ‘lifecycle’  Over time, the value of data decreases  Data should be stored and managed according to its evolving value

© 2005 Princeton Softech, Inc. 5 ILM Quiz Q Product or concept? Q Storage vendor solution? Q Function of frequency of data access? Q Fast and easy to implement? Q Crucial to substantial infrastructure savings? A ILM is about managing data from cradle to grave A Archiving is the key enabler of ILM

© 2005 Princeton Softech, Inc. 6 Components of an Archive Project

© 2005 Princeton Softech, Inc. 7 Assess  Determine application types or modules -Mission critical -Business critical -Targeted for sunset  Decide where to locate the archive -Which storage devices -When to deploy each type  Determine access requirements -Who, what, how, when?  Build archive server, or utilize existing application server(s)?

© 2005 Princeton Softech, Inc. 8 One Example of an ILM Infrastructure DATA Tier I Custom Tier IITier IIICAS Tape DATA Disposal Database Server With Optim Database Server With Optim

© 2005 Princeton Softech, Inc. 9 One Example of an ILM Infrastructure DATA Tier I Custom Tier IITier IIICAS Tape DATA Disposal Archive Server

© 2005 Princeton Softech, Inc. 10 Classify  Identify “Business Objects” to archive -Database and application constraints -Retention requirements  Identify time parameters -Time value of business object -SLA for access  Specify deletion requirements  Identify post-archive use cases -Customer service inquiries -Audit / e-discovery -Retrieve from archive -Reload to temporary DBMS -SLA for access

© 2005 Princeton Softech, Inc. 11 One Example of Classifications ApplicationTier Deployments Deletion> 2 Year Access SLA > 5 year Access SLA Mission Critical3 Years 7 Years No3 Hours1 Day Business Critical2 Years 4 Years Yes, after 78 Hours3 Days Important6 months 3 years Yes, after 33 days30 days DecommissionTier III OnlyYes, after 1014 days30 days

© 2005 Princeton Softech, Inc. 12 Subset and Privatize Data  Eliminate cloning and related problems -Unproductive wait time -Expensive storage requirements  Speed creation / refresh of test databases -Improve test coverage, quality -Accelerate application deployment  Eliminate disclosure risks -Mask, transform, de-identify -Protect data privacy

© 2005 Princeton Softech, Inc. 13 Privacy News – The US Government is Involved US Senate Bill Holds IT Managers Responsible for Privacy Breaches By Scott M. Fulton, III, BetaNewsScott M. Fulton, III February 8, 2007, 8:09 PM A bill introduced in the US Senate on Tuesday by Judiciary Committee Chairman Patrick Leahy (D - Vermont), along with one independent and one Republican backer, aims to strengthen security requirements for all private databases accessible online that may hold personal information. Reintroducing language that had been stalled since 2005, if passed, the bill could hold IT managers accountable and responsible for security breaches where personal information is pilfered.

© 2005 Princeton Softech, Inc. 14 Archive  Determine operational practices -Frequency of archive -Automated or manual operations -Online or offline  Define file management -Across storage tiers -Manual or integrated (Tivoli, Symantec, etc.)  Establish processes -Backup -Archive -Reorg

© 2005 Princeton Softech, Inc. 15 Store  Determine format of archives -DBMS vs. File  Define hardware targets -Number of tiers -Types of devices  Establish security parameters -Integration with existing framework  Database, application, network -Additional Archive security requirements  Functional security  Data, Object and File security

© 2005 Princeton Softech, Inc. 16 Access  Analyze use cases vs. cost of access -Goal: match SLA to value to cost -Native, application based access -Application independent access  Communicate access terms & conditions -SLAs -Resource provisioning -Training on access

© 2005 Princeton Softech, Inc. 17 Tune  Deletes are expensive  Evaluate indexing and partitioning strategies  Tune SQL to match constraints

© 2005 Princeton Softech, Inc. 18 Dispose  Determine data deletion policies -Sign off by stakeholders -Which data to delete, and when -Automated or manual delete

© 2005 Princeton Softech, Inc. 19 Princeton Softech Inc.  Provider of a single solution for managing enterprise application data throughout every stage of the information lifecycle  In business since 1989; 2400 customers; 50% of Fortune 500; profitable with no debt  Supports multiple applications, databases, operating systems and hardware platforms  Optim capabilities -Migrate, Archive and Vault Data -Test Data Management and Data Privacy -Application Retirement

© 2005 Princeton Softech, Inc.