Access your Pro+ Content below.
What you should know about the deduplication process
Deduplication technology is mature and there are a variety of options available depending on your organization's specific needs. This e-book compares hardware- and software-based deduplication, source and target deduplication, global deduplication and things to consider about how dedupe is performed to help readers make the right dedupe decisions for their organization.
CHAPTERS AVAILABLE FOR FREE ACCESS
Data deduplication has evolved from the most cutting-edge emerging technology to an everyday backup capability. Access this e-book to get backup expert Brien Posey's insight into hardware and software deduplication, cloud backups and the combination of hardware and software dedupe.Download
Data deduplication technologies have existed in various forms for years, but now, dedupe is a standard in our current IT landscape. Expert Brien M. Posey explains how you can master the concept and ensure your backups are the best fit for your company's unique needs.Download
Combining both source and target deduplication might sound promising, but there’s one major disadvantage: Source + target dedupe solutions tend not to scale very well. The sheer volume of data that needs to be backed up often causes the backup target’s controller to become a bottleneck. Global deduplication is similar to source + target deduplication in that data is deduplicated at the source and again at the backup target. However, global deduplication solutions attempt to eliminate bottlenecks through load balancing.Download
The fourth chapter of this e-book discusses things to consider about the way deduplication is performed and the ways that dedupe integrates with other data protection processes. It offers information about how deduplication can impact restore time and the different approaches vendors take to speed restores of deduped data. It can take longer to restore deduped data than a comparable restoration might take, had the data not been deduplicated at all. The degree to which the deduplication tax becomes an issue depends on the nature of the restoration, the vendor product being used, and the method used to deduplicate the data. This chapter also takes a look at how deduplication integrates with other data protection processes such as replication, encryption/compression, cloud and archiving. For instance, some forms of replication can be problematic when used in conjunction with deduplication.Download