Thursday, June 9, 2016

5 Forecasts for the Protection of Virtual Ones and Zeros data in 2014

5 Forecasts for the Protection of Virtual Ones and Zeros data in 2014 -

In the virtual machine management for virtual mobility and all things in between virtual two, here are five predictions surrounding the protection of virtual data next year. 1. protected VMs in the cloud A 2013 winds down, we see greater adoption of virtual technology that allows data and applications to be more mobile and flexible. your customer's mail server is directly related to the equipment of a supplier, and instead, can be moved from one machine to little to no downtime. This allows end users to preserve data of the fastest and safest possible. Recent advances now allow data to be replicated and managed in a cloud. In 2014, retailers will start to see a change to the protection of virtual data, or the ability to replicate virtual hosts to a service provider. This provides many new features that will start to become more public, such as:

  • backup on the cloud
  • Downgrading to the cloud
  • recovery disaster in the cloud

2. Virtual machines in small and medium enterprises with the decreasing cost of virtual technology, its use will become routine for those looking for a better and more powerful computing. Virtual hosts become commonplace for small businesses as they aim to address the same issues as the company's clients. 3. Virtual mobility and flexibility With the progress of replication and cloud, virtual environments customers are increasingly mobile. More companies will have data in virtual environments that are available in many places at one time. For example, a production environment with a data protection solution could be copied and implemented under a new name to host training purposes on a weekly basis. This testing machine could be raised in an environment at any time and place. 4. The Virtual Machine Management Virtual machines are transient by their very nature. Some are in place for hours or days while others are in place for long periods of time. This poses a real problem for system administrators. How they manage guests in an environment where it takes just minutes to set up a new server and do not go down? How can a system administrator to follow with all the changes and decide what data to protect and that data is waste? In 2014, there will be greater integration of the management host in data protection solutions. For example, when a server is shut down today, the host is cut, but the image of the host always resides on a physical disk somewhere in the environment. If the user is not going to restart the host, at some point, it must be removed from the environment of disk and archived off of certain non-production media such as tape. Dealers will start the virtual software, including the "hooks" of the API to better manage user hosts for long periods of time, and thus enable improved protection providers of data access policies that allow better management and long-term protection. A good example of this would be the decommissioning of armed automatically. When a host is not used for a pre-determined amount of time, VMware will automatically archive and delete the ESX server. 5. Tape will not die Finally, contrary to popular debate, a band will not die in 2014. People who say that the band is dead are the same people who said UNIX was dead. The band is too mobile and inexpensive to ignore. It will continue to grow in size and cost less per megabyte and terabyte. JARRETT POTTS is director of strategic marketing for STORServer, a provider of data backup solutions for midsize companies. Before joining the STORServer team, Potts spent 15 years working in various capacities IBM, including Tivoli Storage Manager Marketing and Technical Sales. His experience includes administration of computer systems, including desktop support, small networks, basic infrastructure, storage management, and remote access for enterprises and Internet service providers.

5 Forecasts for the Protection of Virtual Ones and Zeros data in 2014 Rating: 4.5 Diposkan Oleh: Abdullah

0 comments:

Post a Comment