3. Backup and Recovery are top concerns for IT Managers Reasons for Data Losses? Source: “For Small Businesses, Bad Backup Can Lead to Data Loss”, http://www.businessnewsdaily.com/data-loss-backup-physical-online-1077/ 42% of midmarket companies have experienced data loss. 32% lost files forever .
4. Hard Lessons Learned August 2011 April 2011 April 2011 : Amazon's huge EC2 cloud services crash permanently destroyed some data…. Amazon didn't say explicitly whether it was human error that touched off the event ….. August 2011: Lightning Strikes Out Amazon’s Cloud „ … . Separately, and independent from the power issue in the affected availability zone, we’ve discovered an error in the EBS software that cleans up unused snapshots. During a recent run of this EBS software in the EU-West Region, one or more blocks in a number of EBS snapshots were incorrectly deleted. The root cause was a software error that caused the snapshot references to a subset of blocks to be missed during the reference counting process ….. „ „… .. Not only are 18 days of backups for some volumes gone, the majority of the remaining snapshots have been corrupted by Amazon’s backup system . ….“
5. Hard Lessons Learned Feb 2011: Google restore gmail from tape … . I know what some of you are thinking: how could this happen if we have multiple copies of your data, in multiple data centers? Well, in some rare instances software bugs can affect several copies of the data. That’s what happened here. Some copies of mail were deleted, and we’ve been hard at work over the last 30 hours getting it back for the people affected by this issue. To protect your information from these unusual bugs, we also back it up to tape . Since the tapes are offline, they’re protected from such software bugs . So what caused this problem? We released a storage software update that introduced the unexpected bug, which caused 0.02% of Gmail users to temporarily lose access to their email. When we discovered the problem, we immediately stopped the deployment of the new software and reverted to the old version. Tape is, last line of defense !
16. Disclaimers The performance data contained herein was obtained in a controlled environment based on the use of specific data. Actual results that may be obtained in other operating environments may vary significantly. These values do not constitute a guarantee of performance. Product data is accurate as of initial publication and is subject to change without notice. No part of this presentation may be reproduced or transmitted in any form without written permission from IBM Corporation. References in this document to IBM products, programs, or services do not imply that IBM intends to make these available in all countries in which IBM operates. Any reference to an IBM program product in this document is not intended to state or imply that only IBM's program product may be used. Any functionally equivalent program may be used instead. The information provided in this document has not been submitted to any formal IBM test and is distributed "As Is" basis without any warranty either express or implied. The use of this information or the implementation of any of these techniques is a customer responsibility and depends on the customer's ability to evaluate and integrate them into their operating environment. While each item may have been reviewed by IBM for accuracy in a specific situation, there is no guarantee that the same or similar results will be obtained elsewhere. Customers attempting to adapt these techniques to their own environments do so at their own risk.
17.
Notas del editor
This presentation is designed to help IBM Sales to discuss Backup/Restore topics and explore business. The will be able to easily design a Backup/Restore Solution in customer environement and align storage hardware. Based on the IBM Framework, part I released in 2009. New: Blueprints
3/12 Of course, we protect data with backup systems because we might need to recover is some day. While disasters or major business disruptions are rare, compared to ordinary file restore requests; they ’re frequent enough to warrant a significant investment. If a disaster is declared, what to we want to recover? We want to recover all the information needed to run the business – and we want to do it as quickly as possible. So I ask you, how do we improve the efficiency of recovery systems, if up to 70% of the data is old or duplicate? When we recognize how these challenges are related, and understand the current inefficiencies; the case for improved Data Protection and Retention is compelling. Inefficient Data Protection and Retention processes can be a Gold Mine of efficiency opportunities. For example, if a disaster is declared, can you restore the 30% or so of your data that is active, or do you have to restore everything? How much does your organization spend protecting data that is duplicate, expired, or infrequently accessed? Data Protection and Retention improvements can improve service levels and control costs by helping clients eliminate unnecessary process steps and workload. In many cases, efficiency improvements free more than enough captive resources to enable improvements in recovery time objectives and recovery point objectives.
2000 60GB 62 sec 2011 4000GB 40 sec Published Values for Bit Error Rate (BER) Tape drives (Midrange and Enterprise) Midrange (typical LTO Ultrium drive) 1 x 10E17 bits Enterprise (typical mainframe drive) 1 x 10E19 bits Disk (FC, SAS, SATA) Enterprise FC/SAS 1 x 10E16 bits Enterprise SATA 1 x 10E15 bits Desktop SATA 1 x 10E14 bits In addition, today’s tape technologies like LTO Ultrium drives, perform a read after write verification process. That is, a set of read elements read the data immediately after it is written to tape to verify that the data was written accurately. LTO Ultrium tape also includes advanced servo tracking mechanisms to help provide precision tracking of the read/write heads with the tape.