Can you outline some of the ways that data deduplication vendors are accelerating deduplication performance today?
One of the ways that data deduplication vendors are trying to optimize the deduplication process is to use a combination of deduplication methods. For target-based deduplication, some vendors start out by performing post-process deduplication after the first backup completes. Once the initial deduplication process finishes, the backup target begins using inline deduplication. Inline deduplication usually achieves faster results, but is not the best choice for high-volume workloads, such as an initial backup.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Editor’s note: For recent news about how backup vendors are accelerating deduplication, check out the following articles:
HP StoreOnce Catalyst accelerates dedupe
HP StoreOnce Catalyst speeds the dedupe process by deduping at the application and backup servers before moving data to the B6200 backup target.
EMC aims DD Boost at Oracle RMAN
EMC looks to give Oracle RMAN a DD Boost by extending its Data Domain dedupe-enhancement software to the database recovery application.
Quantum puts DXi Accent on dedupe backup target
Quantum looks to take on EMC’s Data Domain Boost with its DXi Accent software that offloads part of the data dedupe backup process to media servers.
EMC Avamar data dedupe software gets a DD Boost
EMC makes its two backup dedupe products work better together, adding DD Boost support for Avamar 6.0 client-side dedupe backup; also tightens Avamar’s integration with VMware.
Dig Deeper on Data reduction and deduplication
Related Q&A from Brien Posey
While you may want to jump on the data management and protection train, consider first how combining the two in one product will affect your systems ... Continue Reading
Hackers can gain remote access to users' desktops through RDP hijacking. As a result, IT pros must know what they can do to prevent such an attack. Continue Reading
When IT pros are seeking an alternative to Outlook, they should consider the features their users need the most and select an email client that best ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.