Sponsored by SearchDataBackup.com
The fourth chapter of this e-book discusses things to consider about the way deduplication is performed and the ways that dedupe integrates with other data protection processes. It offers information about how deduplication can impact restore time and the different approaches vendors take to speed restores of deduped data. It can take longer to restore deduped data than a comparable restoration might take, had the data not been deduplicated at all. The degree to which the deduplication tax becomes an issue depends on the nature of the restoration, the vendor product being used, and the method used to deduplicate the data. This chapter also takes a look at how deduplication integrates with other data protection processes such as replication, encryption/compression, cloud and archiving. For instance, some forms of replication can be problematic when used in conjunction with deduplication. Access >>>
Premium Content for Free.
Access Other Available Chapters
Data deduplication has evolved from the most cutting-edge emerging technology to an everyday backup capability. Access this e-book to get backup ...
Data deduplication technologies have existed in various forms for years, but now, dedupe is a standard in our current IT landscape. Expert Brien M. ...
Combining both source and target deduplication might sound promising, but there’s one major disadvantage: Source + target dedupe solutions tend not ...
More Premium Content Accessible For Free
Connect to the disconnected world of remote backups
Remote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. Because these devices are often disconnected ...
Plugging into the data backup appliance
IT pros continue to move away from tape for backup, opting instead for backup to disk. And users performing disk-based backup have a number of ...
How snapshot and CDP integrate with an organization's data backup strategy
Technologies that have traditionally been managed separately are increasingly becoming integrated into the backup process. Two of these technologies,...