Data Lifecycles: Managing Data for Strategic Advantage

Roger Reid, Gareth Fraser-King, W. David Schwaderer

  • 出版商: Wiley
  • 出版日期: 2007-03-01
  • 定價: $3,300
  • 售價: 5.0$1,650
  • 語言: 英文
  • 頁數: 268
  • 裝訂: Hardcover
  • ISBN: 0470016337
  • ISBN-13: 9780470016336
  • 相關分類: 大數據 Big-dataData Science
  • 立即出貨 (庫存 < 3)




Businesses now rely almost entirely on applications and databases, causing data and storage needs to increase at astounding rates. It is therefore imperative for a company to optimize and simplify the complexity of managing its data resources.

Plenty of storage products are now available, however the challenge remains for companies to proactively manage their storage assets and align the resources to the various departments, divisions, geographical locations and business processes to achieve improved efficiency and profitability.  Data Lifecycles identifies ways to incorporate an intelligent service platform to manage and map the storage of data. The authors give an overview of the latest trends and technologies in storage networking and cover critical issues such as world-wide compliance.

Data Lifecycles:

  • Provides a single-source guide to data and storage methodologies, processes, technologies and compliance issues.
  • Addresses the need of an encompassing intelligent data and storage management platform for modern businesses.
  • Gives an overview of the latest data technologies and concepts such as utility computing and information lifecycle management.
  • Clearly defines and describes lifecycle management and strategies to ensure growth of critical business data.
  • Shows how to dramatically reduce the total cost of storage ownership and provide rapid return on investment.
  • Enables customers to make decisions directed toward the purchase of storage tools and storage management solutions.

This text is an ideal introduction to modern data lifecycle management for network managers, system administrators, storage/system architects, network managers, information management directors as well as CIO/CTOs and their teams, senior IT managers and decision makers, and database administrators.


Table of Contents


Who should read this book.

Purpose of this book.

1 Introducing Utility Computing.

1.1 Real problems and real solutions.

1.1.1 Real issues identified–regulation, legislation and the law.

1.1.2 More regulation, legislation and the law.

1.1.3 Current storage growth.

1.2 New storage management.

1.2.1 What are the things organisations need to consider?

1.2.2 What does data lifecycle management mean?

1.2.3 Why is IT lifecycle management important?

1.2.4 Goals of data lifecycle management.

2 The Changing IT Imperative.

2.1 Introduction to utility computing.

2.2 General market highlights.

2.2.1 Current storage growth.

2.2.2 Enterprises for which DLM is critical.

2.3 Real challenges and opportunities.

2.3.1 Real issues identified.

2.3.2 Data compliance.

2.3.3 Case study in ineffective storage reporting.

2.4 Summary.

3 Being Compliant.

3.1 So what are the regulations?

3.2 Financial services companies.

3.2.1 Crime in the finance sector.

3.3 Telecommunications companies.

3.4 Utilities companies.

3.5 Public authorities and government.

3.6 Managing data for compliance is just a specialised form of data management.

3.7 Just plain junk data!

3.8 The bottom line–what is mandated?

3.8.1 Record retention and retrieval.

3.8.2 Auditable process.

3.8.3 Reporting in real time.

3.8.4 Integrating data management from desktop to data centre to offsite vault.

3.8.5 Challenge–the data dilemma.

4 Data Taxonomy.

4.1 A new data management consciousness level.

4.1.1 De-mystifying data classification.

4.1.2 Defining data classification.

4.1.3 Classification objectives.

4.1.4 Various approaches to data classification.

4.2 Data personification.

4.2.1 Business infrastructure mapping analysis.

4.3 Classification model and framework.

4.4 Customer reporting.

4.4.1 Summary reports.

4.4.2 Detailed reports.

4.4.3 Summary graphs.

4.5 Summary.

5 Email Retention.

5.1 Email management to achieve compliance.

5.2 What is archiving?

5.2.1 Email archiving requirements.

5.3 How should organisations manage their email records?

5.4 Email retention policies are for life–not just for Christmas.

5.5 How companies can gain competitive advantage using compliance.

5.5.1 Compliance makes good business sense.

5.6 What laws govern email retention?

5.6.1 How long do we have to keep email records?

5.7 Write once, secure against tampering.

5.8 Storage recommendations for email.

5.9 Conclusion.

6 Security.

6.1 Alerting organisations to threats.

6.1.1 Vulnerability identified and early warnings.

6.1.2 Early awareness of vulnerabilities and threats in the wild.

6.1.3 Listening posts.

6.2 Protecting data and IT systems.

6.2.1 Threats blocked using vulnerability signatures to prevent propagation.

6.2.2 Preventing and detecting attacks.

6.2.3 Managing security in a data centre.

6.2.4 Monitoring and identification of systems versus vulnerabilities and policies.

6.2.5 Responding to threats and replicating across the infrastructure.

6.2.6 Patches and updates implemented across infrastructure.

6.2.7 Keeping information secure and available.

6.3 Conclusions.


7 Data Lifecycles and Tiered Storage Architectures.

7.1 Tiered storage defined.

7.1.1 Serial ATA background.

7.1.2 Serial ATA overview.

7.1.3 Serial ATA reliability.

7.1.4 Bit error rate (BER).

7.1.5 Mean time before failure (MTBF).

7.1.6 Failure rate breakdown.

7.1.7 No free lunch.

7.2 RAID review.

7.2.1 RAID 5 review.

7.2.2 RAID 6 overview.

7.3 Tape-based solutions.

7.3.1 Virtual tape library primer.

7.4 Recoverability of data: you get what you pay for.

7.5 Conclusion.


Recommended Reading.

8 Continuous Data Protection (CDP).

8.1 Introduction.

8.2 CDP data-taps.

8.2.1 Application data-tap.

8.2.2 File system data-tap.

8.2.3 Volume data-tap.

8.3 CDP operations.

8.3.1 CDP store.

8.3.2 CDP Stakeholders.

8.4 Conclusion.

9 What is the Cost of an IT Outage?

9.1 Failure is not an option.

9.1.1 Tangible costs.

9.1.2 Intangible costs.

9.2 Finding the elusive ROI.

9.3 Building a robust and resilient infrastructure.

9.3.1 Five interrelated steps to building a resilient infrastructure.

9.3.2 Disaster recovery concepts and technologies.

9.3.3 Disaster tolerance.

9.4 Conclusion–Analysing business impact.

9.4.1 Identifying critical functions.

10 Business Impact.

10.1 Business impact.

10.1.1 Business impact analysis.

10.1.2 Cost versus adoption.

10.1.3 Service level agreements and quality of storage service.

10.2 The paradigm shift in the way IT does business.

10.2.1 Aligning business with IT.

10.2.2 Software consistency and agnostic support.

10.3 The Holy Grail: standard software platform.

10.3.1 Business technology reporting and billing.

10.3.2 Smart storage resource management.

10.3.3 Data forecasting and trending.

10.3.4 Policy-based Administration.

10.4 Summary.


11 Integration.

11.1 Understanding compliance requirements.

11.1.1 Automating data lifecycle management.

11.1.2 Content searching.

11.2 Understanding hardware and its constructions.

11.2.1 Current storage technologies.

11.2.2 Disk-based storage strategies.

11.3 Understanding user expectations.

11.3.1 Organising data.

11.4 Knowing the capabilities of your data management tools.

11.4.1 Virtualisation of storage, servers and applications.

11.4.2 Product technology and business management functionality.

11.5 Solution integration–business data and workflow applications.

11.5.1 Standard management and reporting platform.

11.5.2 Meeting business objectives and operational information (Figure 11.7).

11.6 A ten-point plan to successful DLM, ILM and TLM strategy.

11.7 Conclusion.








- 提供了一個關於數據和存儲方法、流程、技術和合規問題的單一指南。
- 解決了現代企業對全面智能數據和存儲管理平台的需求。
- 概述了最新的數據技術和概念,如實用計算和信息生命周期管理。
- 清晰定義和描述了生命周期管理和確保關鍵業務數據增長的策略。
- 展示了如何大幅降低存儲擁有成本並實現快速投資回報。
- 幫助客戶做出針對購買存儲工具和存儲管理解決方案的決策。



第1章 引入實用計算
1.1 真實問題和真實解決方案
1.1.1 真實問題的確定-法規、法律和法律
1.1.2 更多法規、法律和法律
1.1.3 當前存儲增長
1.2 新的存儲管理
1.2.1 組織需要考慮的事項是什麼?
1.2.2 數據生命周期管理是什麼意思?
1.2.3 為什麼IT生命周期管理很重要?
1.2.4 數據生命周期管理的目標
第2章 IT需求的變化
2.1 引入實用計算
2.2 市場概況
2.2.1 當前存儲增長
2.2.2 需要數據生命周期管理的企業
2.3 真正的挑戰和機遇
2.3.1 真實問題的確定
2.3.2 數據合規性
2.3.3 無效存儲報告的案例研究
2.4 總結
第3章 合規性
3.1 那麼有哪些法規?
3.2 金融服務