sponsored by EMC Backup and Recovery Solutions
Posted:  08 May 2009
Published:  28 Jan 2008
Format:  PDF
Length:  6  Page(s)
Type:  Presentation Transcript
Language:  English
ABSTRACT:

ESG defines data de-duplication as the process of examining data to identify and eliminate redundancy. In other words data de-duplication is all about reducing the amount of redundant or non-unique data that ends up stored on disk. It can be applied to all tiers of storage but we have seen adoption mostly in secondary storage specifically backup to disk.

This presentation transcript is the first of a two-part ESG e-Seminar Series on data de-duplication. In part one, Tony Asaro, ESG Senior Analyst, and Heidi Biggar, ESG analyst, will discuss the various technology considerations when applying data deduplication technology to disk backup. Part two of the series will explore the business considerations for this type of environment.




Authors

Tony Asaro
Senior Analyst ,  ESG

Heidi Biggar
Solution Marketing Principal, Hitachi Data Systems
As a Solutions Marketing Principal at Hitachi Data Systems, Heidi Biggar is responsible for driving awareness around Hitachi Solutions, their benefits and application in the market/field, and importantly their positioning. Heidi has been in the storage business for more than 13 years. Previously, Heidi was with Enterprise Strategy Group, where she was the primary data protection analyst for disk backup and data de-duplication.



BROWSE RELATED RESOURCES
Backups | Disk Backups | Disk Storage Systems | Disk-to-Disk Backup | Disk-to-Disk-to-Tape | Storage Capacity | Storage Infrastructure | Storage Management

View All Resources sponsored by EMC Backup and Recovery Solutions

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement