IBM ProtecTIER Implementation and Best Practices Guide

IBM ProtecTIER Implementation and Best Practices Guide

4.11 - 1251 ratings - Source

This IBMAr RedbooksAr publication provides best practice guidance for planning, installing, and configuring the IBM System StorageAr TS7600 ProtecTIERAr family of products. This guide provides the current best practices for using ProtecTIER software version physical general availability (pGA) 3.3 and the revolutionary and patented IBM HyperFactorAr deduplication engine, along with other data storage efficiency techniques, such as compression and defragmentation. The System Storage TS7650G ProtecTIER Deduplication Gateway and the System Storage TS7620 ProtecTIER Deduplication Appliance Express are disk-based data storage systems that are configured for three available interfaces: The Virtual Tape Library (VTL) interface is the foundation of ProtecTIER and emulates traditional automated tape libraries. The OpenStorage (OST) application programming interface (API) can be integrated with Symantec NetBackup to provide backup-to-disk without having to emulate traditional tape libraries. The File System Interface (FSI) supports Common Internet File System (CIFS) and Network File System (NFS) as backup targets. For your existing ProtecTIER solution, this guide provides preferred practices and suggestions to boost the performance and the effectiveness of the data deduplication with regards to your application platforms for your VTL, OST, and FSI systems. When you build a ProtecTIER data deduplication environment, this guide helps your IT architects and solution designers plan for the best options and scenarios for data deduplication for their environments. This guide helps you optimize your deduplication ratio, and at the same time reduce the hardware, power and cooling, and management costs. This guide provides expertise that was gained from the IBM ProtecTIER Field Technical Sales Support (FTSS) group, development, and quality assurance (QA) teams.Figure 21-3 Adding VMware backup proxy Note: To select another server as a backup proxy, you can click Add new to open the ... in the DNS name or IP address field and provide a description. For example: Click Next. 6. Enter a useranbsp;...

Title:IBM ProtecTIER Implementation and Best Practices Guide
Author:Karen Orlando, Mara Miranda Bautista, Jose Roberto Mosqueda Mejia, Rosane Goldstein Langnor, IBM Redbooks
Publisher:IBM Redbooks - 2015-04-16


You Must CONTINUE and create a free account to access unlimited downloads & streaming