Efficient, Stable De-duplicating Processes

Storage needs are ballooning. Data volumes will soon overwhelm organisations like a never receding Tsunami if nothing is done about it. There are very few choices. Organisations must:

1. Get more storage space;
2. Archive / take offline data that is no longer relevant; or
3. Compress the data stored.

While falling disk prices and innovative storage systems have made it possible to hire more disk space or archive data effectively, it is data compression that has received a lot of attention in recent years. Compression not only saves disk space, it also saves bandwidth required for transmission of data over the network. Data compression includes data de-duplication and is relevant both for data storage and data archival.

Disk based “de-duplication systems” compress data by removing duplicates of data across the data storage system. Some implementations compress data at a ratio of 20:1 (total data size / physical space used) or even higher. This may be done by reducing the footprint of the versioned data during incremental or differential backup.

Vendors use a variety of algorithms to de-duplicate data. Chunking algorithms break the data into chunks for de-duplication purposes. Chunking can be defined by physical layer constraints, as sliding blocks or single instance storage algorithms. Client backup de-duplication systems use hash calculations to evaluate similarity between files for removal and referencing of duplicates. Primary and secondary storage de-duplication designs also vary. While primary storage de-duplication is directed towards performance optimisation, secondary storage is more tolerant of performance degradation and hence de-duplication algorithms are constructed with more leeway.

Until recently, data de-duplication was only associated with secondary storage. The increasing importance of the cloud as a primary storage has created a lot of interest in de-duplication technologies for primary storage.

We, at Backup Technology, offer an agentless cloud backup service powered by Asigra. Our software de-duplicates data at source and transmits only the compressed, bandwidth efficient incremented or differentiated ‘bits and bytes’ or blocks of the backup set, over the network. Global level de-duplication technology at source is also available for the hybrid versions of the cloud for local backups. The comprehensive solution is non-invasive and ideally suited for small, medium businesses, as well as enterprises. Why don’t you try out our software before you decide to commit yourself?

Real Time Transaction Monitoring in the Cloud

Critical ‘business-events’ are actions performed by the business. The transactions between two independent entities entering into an agreement to exchange items of value — such as purchase or sale of goods — are recorded as business transactions. Accuracy, integrity and accessibility of this information in real time are of immense importance to the business. How does the cloud make this possible?

A typical enterprise application provisions for the storage and access of transaction information in a database. However, in most enterprises, the database integrity is compromised in several ways. Multiple application programs may connect to a single database for commitment of information. Database locks generated by one application may prevent the updates initiated by other application resulting in data loss. Power shutdowns may result in a failure to commit information to the database. Consequently, the accuracy, currency and reliability of information may be questionable.

Cloud-based database applications are ‘uniform’ constructs. The client application and the web browser based applications are alternate versions of the same software constructed with the same business logic. In most instances, all functions that are available in the client-based version of the software are available in the web version of the software. They do not perform any operations or actions that will compromise the integrity of the database at any point in time. The transaction database will remain consistent, accurate, reliable and current at all times.

Real time transaction processing in the cloud will emulate the business transaction. The application will register the start of the transaction, and will identify the appropriate tables that need to be updated. It will also perform the update, record the update in the log, and then commit the transaction to the database. If even one of these steps fails, an alert will be generated and the failure will be registered in the log. If a rollback settings option has been selected, the database will be rolled back to the pre-transaction stage and an alert will be sent to the user.

IT personnel needs a coherent and reliable means of recording real time transactions in the cloud. Our software constructs for the client and the web make sure that your data remains consistent and integrated at all times. The software allows correct recovery from failures with rollback of database to original pre-transaction state. Users can choose to record all database activities on the log and to be alerted immediately if a transaction fails to complete.

Run your business without boundaries confident that Backup Technology, Powered by Asigra, can meet the ACID (Atomic, Consistent, Isolated and Durable) test of real time transaction processing head on!

Functionality, Quality, Price—The Evaluation Parameters for the Cloud

IT budgets do not scale in proportion to IT needs. Data growth outstrips infrastructure and headcount growth. The CIO is forced to compromise.

What if the enterprise could become instantly IT enabled with very little investment in infrastructure, software or HR?

Utility computing in the cloud serves the enterprise with what they need, when they need it, through any channel and any kind of device. The technology integrates and automates the value chain, adapts easily and innovates constantly. Risk and environmental responsibilities are well orchestrated and everything is streamlined to deliver ‘best fit’ services. Functionality, quality and price are definitely attractive.

Cloud computing enhances the efficiency and functionality of the enterprise. Cloud storage systems are developed to support “on demand” utility computing models — SaaS, PaaS and IaaS — with intent to deliver IT as a service over the Internet. Users can scale up or scale down on infrastructure or space instantly and pay only for what they use. Mobile and remote computing technologies are made available for disparate parts of the business and mobile workers can synchronise their activities with that of the parent business from wherever they are. Employees can collaborate with each other or access business applications from the central server. User and usage management policies can be implemented by exploiting the functionality inbuilt into the cloud application.

Quality of service delivery is the unique selling point (USP) of cloud vendors. QOA distinguishes them from the competition and builds trust in business relationships with their customers. Cloud vendors are conscious that their services are evaluated on the basis qualitative factors, such as design and delivery of security systems, compression and de-duplication of data or speed of backup and recovery. The way the services are packaged together also makes a difference.

Economies of scale, deriving from multi-tenancy computing models, make the cloud attractive to cash strapped enterprises. The pay per use model, typical to the utility services sector enables small and medium enterprises with small budgets garner and use resources that were earlier only available to their larger brethren. Additionally, CAPEX vanishes and is replaced by OPEX. This makes it wholly attractive to managements who do not want to invest scarce resources in IT infrastructure to the detriment of other business activities.

Support services provided by the cloud shrinks IT expertise requirements within the enterprise. Hardware and software maintenance in the cloud is the responsibility of the cloud vendor. The vendor is also committed to ensuring high availability of customer information and 99.9% uptime. Responsibility for mirroring, replication, de-duplication, compression and secure storage of information is transferred to the cloud vendor. A single IT Administrator can manage the database and maintain offsite copies of the data for additional data availability.

We at Backup Technology, offer the best of the breed public, private and hybrid cloud services to our customers unfailingly. We anticipate customers’ every need and work towards providing them with the functionalities they require without compromising on quality. Our pay per use pricing model is economical and wholly affordable. For more information, please do visit our website: www.Backup-Technology.com.

Keeping Costs Under Control

The traditional ontology of costing and micro theories of costing may need to be redefined in the virtual world where value adding activities may be less visible except in areas of strategic alliance, information sharing or online payment mores. The theories may have to be generically deployed to achieve cost management irrespective of whether the enterprise belongs to the manufacturing or service sector. The criteria for evaluation may include generality, efficiency, perspicuity, transformability, extensibility, granularity, scalability and competence.

So, how does one keep costs under control? The process must logically begin, by recognising the characteristics of the cloud and identifying the appropriate / suitable costing methods for delivery and use of services.

• The cloud consolidates the distributed enterprise and shifts all activity–online–to the remote data centre in the cloud. This largely precludes the possibility of pinpointing
specific activities to specific cost centres.
• CAPEX vanishes with the cloud and is replaced by OPEX. Direct expenses suddenly assume the aspect of indirect expenses.
• Logistics costs and information management costs form a large chunk of the costs for the virtual enterprise.

Consequently, cloud vendors adopt use-based, granular costing methods for estimating the costs of maintaining a cloud and servicing the customer. There is a defined base cost and a top up cost for the service. While base costs are fixed, the top up costs vary in accordance with the level of usage of the services. The secret of cost control, in context, is simply to monitor the amount of base plus top up costs or to evaluate storage space or application use of the different participating departments and define limits of usage for budgeting purposes.

However, the process is not as simple as it seems. The implication is that enterprises will have to get more sophisticated about shaping the use of resources within the enterprise. They will have to recognise utilisation risks and the management will have to play a significant role in ensuring sufficiency of usage and financial viability of the use. Cost saving opportunities will involve using cloud based applications only where the use makes business sense and scaling up operations in the cloud only when there is a peak transaction load. Since pricing in the cloud is directly proportional to utilisation, IT financial talents must be made conscious that IT operations must become more business like in their dealings if costs are to be kept under control in the cloud. IT Administrators must lock step with business growth and success and optimise on use of cloud based IT resources to advantage the business.

We, at Backup Technology, are always ready to work with our customers in evaluating the economics of using the cloud. Our cloud services are designed to optimise resource use for our customers. Our customers remain informed on usage data and have the option to scale up or scale down usage on-demand. Alerts are generated when usage boundaries are reached. Compression, de-duplication and archiving technologies are used to help our customers achieve cost savings in the cloud.

“Right” Cloud Services—The Identification Problem

Every business considers itself unique, with a unique set of problems and concerns. The cloud considers every business generic, and builds its services around the “generic” needs of the business. Therefore, it is no wonder that businesses find it extremely hard to find a cloud solution that fits in with their every need!

Given the fact, how does a business identify the “right” cloud solution?

The nature of a particular business has a very important bearing on the kind of cloud services that the business should select. Businesses that deal with large volumes of confidential information (government bodies, health care units or advocates) cannot afford to lodge their information in a public cloud. They would do well to consider a private cloud or at best a hybrid cloud that enables them, create data repositories online and offline simultaneously for instantaneous recovery.

Businesses that cannot afford downtime (e-shops, travel agents or service centres) without huge loss of revenue should go in for hybrid clouds that permit them to switch from onsite data repositories to online repositories, and vice versa, quickly and seamlessly. Small and medium businesses that generate large volumes of data (that are neither private nor confidential) and would like to store them for data mining and data analysis purposes may consider public cloud stores.

But, whatever the nature of the business and type of data generated, no business likes to have its information hijacked by malicious elements. Data security protocols implemented by the cloud vendor can influence” right” choices. All types of businessmen want to be sure that their data is protected during transmission and in storage. They want to be assured that the data cannot be accessed by anyone other than those authorised to access the data. They want to know that the remote server is physically secured against intruders. They make the effort to scrutinise data encryption algorithms, user management systems, Log maintenance systems or activity monitoring and reporting systems. Certifications received, market reputation, past history of breaches or even word of mouth can have an impact on the selection process.

Aspiring cloud users like to know that they can retain control over their data even though it resides in a third party repository. They may like to implement the enterprise specific policies in the cloud. The customisation options and administrative flexibility provided in the cloud will have a positive impact on the vendor selection process. Points that may be taken in to consideration include: disaster recovery, failover architecture and availability of fully functional trial versions for testing.

Of course, costs make all the difference. Cost comparisons will be made and will be used to clinch the selection of the successful cloud service vendor.

We, at Backup Technology, are on standby to help our potential customers understand their requirements and match it with the features we offer. A fully functional trial version can be set up for you to test drive our services before you sign up. We can help you get a feel of our services before you firmly commit yourselves to a service. Our support team is ever ready to handhold you and guide you through the process of trying out our services via telephone or email.

Our Customers

  • ATOS
  • Age UK
  • Alliance Pharma
  • Liverpool Football Club
  • CSC
  • Centrica
  • Citizens Advice
  • City of London
  • Fujitsu
  • Government Offices
  • HCL
  • LK Bennett
  • Lambretta Clothing
  • Leicester City
  • Lloyds Register
  • Logica
  • Meadowvale
  • National Farmers Union
  • Network Rail
  • PKR

Sales question? Need support? Start a chat session with one of our experts!

For support, call the 24-hour hotline:

UK: 0800 999 3600
US: 800-220-7013

Or, if you've been given a screen sharing code:

Existing customer?

Click below to login to our secure enterprise Portal and view the real-time status of your data protection.

Login to Portal