2008-12-17

An overview of continuous data protection

IT organizations have been caught between a rock and a hard place. Charged with protecting their company's information, IT organizations have established aggressive service level agreements (SLAs) that impact the manner in which they implement data protection by setting recovery point objectives (RPO)
and recovery time objectives (RTO).

Organizations struggle with shrinking or non-existent backup windows, the need to recover quickly, often to a specific point in time, and even meeting compliance or regulatory guidelines. Backing up to tape is no longer adequate; not only is it difficult to administer for backups and recoveries, but it lacks the speed, reliability, flexibility and simplicity IT needs to meet stringent SLAs. Backing up to disk using virtual tape emulation or virtual tape libraries also falls short as the administration of the solution is tape-centric and schedule driven. Add in the explosion of data, along with the challenge of protecting remote offices, and you have the challenge facing many of today's business--with IT sitting on the front lines of aligning business needs with today's technology.

As a result, a growing number of IT organizations are augmenting their traditional backup and recovery strategies with continuous data protection (CDP) solutions. CDP dramatically improves RPOs and RTOs while eliminating backup windows. What's more, CDP not only reduces the need for tape in the backup and recovery process but it also makes recovery easy enough that users can often recover their own files, without help from IT.

What is CDP?

CDP is a process that lets organizations continuously capture or track data modifications and stores changes independent of the primary data, enabling recovery points from specific points in the past. CDP systems may be block, file-, or application-based and can provide fine granularities of restorable objects to infinitely variable recovery points in time.

CDP reduces the complexity of the data protection system and eliminates the classic challenge of theing backup window because it eliminates the need for full, incremental, or differential backups by protecting data immediately and then continuously backing it up to disk. CDP is not a complete replacement for traditional backup but rather an important component of a well-rounded backup and recovery strategy.

Can CDP be leveraged for backing up and recovering email? As the predominant form of communication for business transactions, email is an application that is mission-critical to organizations of all sizes. It generates a huge amount of information that must be immediately available and protected. The loss of a single message may generate hours of unnecessary and frustrating labor for administrators and/or users and can lower productivity or affect business operations. And with the introduction of Exchange 2007, organizations need protective solutions that can support the latest offering from Microsoft.

Not surprisingly, the amount of email data requiring protection and availability is growing exponentially. IT, in turn, is faced with the challenge of backing up this critical data within the existing backup window and recovering it quickly. Moreover, they must not only be able to back up and recover whole email databases but they also require a system which enables recovery of individual mailboxes or emails. However, if administrators want to back up email databases for complete disaster recovery purposes and be able to recover individual email, folders, or mailboxes, they typically have had to do separate backups.

New granular recovery technologies have emerged that enable mail messages, mailboxes, and folders to be restored individually without having to restore an entire email database, and without separate and redundant mailbox backups. In an Exchange environment, for example, only a single-pass full or incremental backup of Exchange is required, which dramatically decreases the time required to protect all mailboxes while also reducing the backup storage requirement.

CDP significantly streamlines backup and recovery of email by completely eliminating the need to perform scheduled daily email backups, and speeding recovery, thereby delivering email continuity for businesses.

How does CDP enable end users to recover their own data?

Because CDP is a disk-based protection and recovery solution, it is possible to enable end users to retrieve their own data. Some CDP solutions provide this type of functionality; some utilizing a simple Web interface that requires no training and enables end users to retrieve previous versions of files without contacting IT. Empowering end users to retrieve their own data frees up IT to focus on other business-critical needs of the organization.

With these self-service recovery solutions, retrieving lost, corrupted, or overwritten data is as easy as searching for and downloading a file from the Internet. There is no backup tape to locate or load and no additional information to restore to find the correct file. Best of all, these solutions do not require the installation of client software or agents on individual desktops laptops, and a familiar web paradigm requires no additional training. Users need only a standard Web browser, making data retrieval easier than ever.

Ensuring data protection on the path to Linux


Open source technologies are gaining momentum as a viable backbone for core computing requirements, resulting in soaring popularity for Linux worldwide. In fact, 2006 was a banner year for Linux, powered by a record surge in enterprise deployments as well as broad-based validations from industry heavyweights, including Oracle and Microsoft.

As the fastest growing operating system and storage management software opportunity in the market today, Linux continues to gain substantial traction in companies of all types and sizes, from mid-range organizations to large-scale enterprises running mission-critical applications.

Perhaps the most valuable validation that Linux is ready for primetime in enterprise and data center environments is its ever-increasing application support. Beyond its distinguished trademark as a staple for use in web portals and web hosting as part of the LAMP stack (Linux, Apache, MySQL and PHP), Linux is winning broader acceptance as a platform for mission-critical databases, messaging, enterprise resource planning (ERP) and payroll. In response, enterprise software vendors are increasingly porting applications to Linux, resulting in wide-scale deployments across all industries, including finance, retail, government, manufacturing and education.

The ability to install more affordable hardware and take advantage of many more software choices results in higher-performance, lower-cost technology deployments. To that end, the long-term value proposition for migrating to Linux is a compelling incentive. Reducing costs has been a dominant driver for Linux adoption, especially at the expense of UNIX, because the tab for software and porting is low to non-existent.

The business case for Linux migrations, especially from a UNIX environment, is fairly straightforward and takes the following into consideration:

* Reduced capital expenditures

* Lowered administrative costs

* Decreased operating system license fees

* Minimal training requirements

* Greater flexibility and control in leveraging off-the-shelf and custom applications

Often, Linux gets its start supporting a specific application or workgroup and over time permeates the organization in growing numbers to take on larger and more critical roles in supporting corporate computing workloads. In addition to commingling with Windows, Linux also must coexist with legacy UNIX, as well as Apple Macintosh platforms in increasingly heterogeneous environments. While the business case to support Linux migration is a solid one, companies may find themselves on shaky ground when facing the realities of supporting a mix of different computing platforms.

The vital role Linux now plays in the enterprise has sparked a new debate about how to incorporate it into an overall strategy that safeguards all data, regardless of the platform and application within which it resides. The conundrum only becomes more complex when taking into account all the different Linux distributions gaining traction worldwide, including AsianUX, Debian, FreeBSD, Mandriva, Miracle, Red Hat, SGI, Novell SUSE SLES, Turbolinux, etc.

While the consensus seems to favor relying on a single cross-platform solution to manage and protect heterogeneous data, the reality is many organizations have yet- or do not know how-to accomplish this feat. To make matters more complicated, many of the larger data protection vendors have been slow to support Linux, forcing end-users to run Linux hardware as clients to a Windows backup server. This type of band-aid fix typically is only sufficient until the Linux system expands to support larger, more data-intensive applications and databases. Ultimately, this approach proves inadequate and makes it difficult to meet ever-increasing backup windows.

In order to make separate solutions work together, time-constrained IT staffers are forced to write additional and/or manual scripts to conduct Linux backup and recovery procedures for applications that are not being protected properly by older data protection solutions. While the result provides a certain level of data protection, it also creates an isolated "island," which requires its own administration and management nightmares and still has data loss exposure in real-time production environments.

The proliferation of separate solutions for different platforms ultimately is insufficient and costly. In addition, this practice cannot provide one unified picture that integrates status, functionality, administration and reporting of the separate platforms. Enterprises need centralized, integrated, OS-agnostic data protection to effectively safeguard mixed-platform environments.

Multi-platform backup and recovery is the first line of defense in ensuring the well-being of Linux environments. To that end, it's imperative to seek a platform-independent solution that works as well in backing up Linux, Solaris and Macintosh environments as it does with Windows. Once the backup and recovery bases are covered, it makes sense to seek advanced capabilities for heightened data protection. In this quest, savvy IT departments are evaluating a growing suite of solutions that go well beyond backup and recovery, including:

* Real-time replication

* Snapshots

* Centralized reporting and administration

* Continuous Data Protection (CDP)

* Disaster recovery

* Business continuity

Many industry analysts claim the days of backup and recovery alone are gone as companies demand additional and often more sophisticated capabilities to increase business resiliency while lowering risks. An emerging class of integrated, real-time, byte-level replication products delivers continuous, multi-platform protection to bolster business continuity strategies. Byte-based replication will yield more granular data protection while also providing both scalable performance and application relevance to support growing Linux environments.

Regardless of whether the priority is simple backup and recovery or far-reaching business continuity, it's important to find solutions that are platform independent so they work seamlessly across all platforms. The need to move and protect data regardless of its source is spawning a new breed of heterogeneous data protection products that are raising the bar in terms of flexibility, control and integration.

With an integrated data protection strategy, companies can manage a single set of resources across all platforms from a centralized console. A single point of control is essential for ensuring operational efficiencies while boosting staff productivity. In fact, centralized management of multi-platform data protection can result in a 10x reduction in administrative costs while yielding a 7x-to-9x overall cost savings. Additionally, streamlining implementation and ongoing administration will reduce future labor costs to lower total cost of ownership (TCO) while improving return on data protection investments.

Putting in place an integrated, holistic solution for cross-platform data protection sets the stage for the highest levels of business continuity. As Linux continues to pick up steam as a global phenomenon, it will become even more crucial to select data protection products that have consistent, cohesive capabilities across all platforms. Over time, the demand for multi-platform data protection will surge right along with rapidly rising Linux deployments. As a result, organizations of all sizes will be able to safeguard critical, mixed environments without giving up anything or sacrificing their budgets, resources or requirements for comprehensive, cross-platform business continuity.

How to Manually Download and Install Windows Vista Updates


We had tough times in installing the Microsoft Vista Windows Update KB9475562 that was released few weeks ago. It always fails to install when ever Windows Automatic Update runs and displays annoying alerts in System tray.

Few minutes of Googling provided a simple solution to install the update manually. Here are the simple steps to be followed to install the update manually
  1. Launch Internet Explorer browser (Firefox does not work as we need to validate Windows) and point the browser to Windows Update KB947562 page
  2. Validate your Windows Vista operating system and download the installable manually

  3. Log off from Internet

  4. Close any anti virus & anti spyware application if they are running

  5. Manually install the downloaded update by double clicking it

  6. Restart the computer

Microsoft plans quick fix for IE

The emergency patch should be available from 1800 GMT on 17 December, Microsoft has said.

The flaw in Microsoft's Internet Explorer browser could allow criminals to take control of people's computers and steal passwords.

Internet Explorer is used by the vast majority of computer users and the flaw could affect all versions of it.

So far the vulnerability has affected only machines running Internet Explorer 7.

"Microsoft teams worldwide have been working around the clock to develop a security update to help protect our customers," the software firm said in a statement.

"Until the update is available, Microsoft strongly encourages customers to follow the Protect Your Computer Guidance at www.microsoft.com/protect, which includes activating the Automatic Update setting in Windows to ensure that they receive the update as soon as it is available," the statement read.

Potential danger

According to Rick Ferguson, a senior security adviser at security firm Trend Micro, the flaw has so far been used to steal gaming passwords but more sensitive data could be at risk until the security update is installed.

"It is inevitable that it will be adapted by criminals. It's just a question of modifying the payload the trojan installs," he said.

It is relatively unusual for Microsoft to issue what it calls an "out-of-band" security bulletin and experts are reading the decision to rush out a patch as evidence of the potential danger of the flaw.

Some experts have suggested that users switch browsers until the flaw is fixed.

Firefox, Opera, Chrome and Apple's Safari system are not vulnerable to this current flaw.

But Graham Cluley, senior consultant with security firm Sophos, said no browser is exempt from problems.

"Firefox has issued patches and Apple has too. Whichever browser you are using you have to keep it up to date," he said.

"People have to be prepared and willing to install security updates. That nagging screen asking if you want to update should not be ignored," he said.

Rumor: Nvidia Plans Launch of GT 300 GPU for Early 2009



Citing those always un-named sources (this time at graphics card makers), DigiTimes reports Nvidia will launch its next generation GT 300 GPU, a high end gaming chip, in the first quarter of 2009. The new part will be manufactured on a 55nm process, just as the company is also planning a 55nm refresh of its GTX 260 videocard.

DigiTimes also says Nvidia will show off a pair of new GT 200 videocards at CES next month. First on tap will be the GTX 295, which will consist of two 55nm GT 200 GPUs. The graphics card maker also plans to show its GTX 285, which will ship with a single GT 200 GPU. Core frequencies for both cards are expected to run 10 to 15 percent faster than existing Nvidia videocards, while also consuming 10 to 15 percent less power.


Apple announces ultra-thin laptop

The computer, which is 0.76 inches (1.93cm) at its thickest point, was unveiled at an event in San Francisco.

The Apple head also launched online film rentals for iTunes users in the US from almost every major film studio, including Disney and Fox.

"We're dying to get this international as well," said Mr Jobs, saying it would roll-out worldwide later in the year.

Of the laptop, Mr Jobs said: "It's an amazing feat of engineering."

It does not have a CD or DVD drive in order to save space. "It was built to be a wireless machine," he added.

The laptop will compete with a range of portable devices, from companies such as Sony, Dell and Asus, which are already building so-called sub-notebooks, designed to be lighter and more mobile.

The machine goes on sale in two weeks and costs from $1,799 in the US (£1,199 in the UK) and comes with either an 80 Gigabyte hard disc drive as standard or 64 Gigabyte solid state drive for an added $999.


Apple worked with chip maker Intel to produce a smaller version of its Core2Duo processor for the laptop.

Movie rentals from the key Hollywood movie studios will be available in the US immediately. Until now customers have had to buy movies outright but now they rent them for up to 30 days, or for 24 hours once viewing has started.

Movie lovers will be able to download films to their computers, and transfer them to the latest iPods and iPhone, in standard and high-definition, for between $3 and $5.

The company also announced it was revamping the Apple TV device so that it can now download content independently of a computer and display it on a widescreen TV.

Mr Jobs admitted that Apple's first attempt to put online video in the living room had failed.

"[Apple TV] was designed to be an accessory for iTunes and your computer.

"It is not what people wanted. What people really wanted was movies, movies, movies."

He added: "We weren't delivering that. We're back: With Apple TV Take Two."

He announced the firm had sold 125 million TV shows and seven million movies via iTunes.

"It's more than everyone else put together, but it didn't meet our expectations," said Mr Jobs. "I think we've got it right this time."

Mr Jobs also announced a wireless back-up system called Time Capsule, offering a combined wi-fi router and hard drive.

New software for the iPhone was unveiled, including an update to Maps, which can plot the phone owner's spot on a map without using GPS.

Apple announced it had sold four million iPhones in the first 200 days on sale, putting it on target to sell 10 million by the end of 2008.