Feeds

Data Domain gives itself DD Boost

Storage with extra cleavage

SANS - Survey on application security programs

EMC's Data Domain has got itself DD Boost software which pre-processes backup data on a media server to increase deduplication speed by up to 50 per cent.

The software is installed on a media server and is integrated with either Symantec NetBackup or Backup Exec. It is a library and is used to identify segments in incoming data. The segment IDs are checked with the connected Data Domain array which says which ones are new. These are compressed on the media server and sent over the wire, reducing both local network traffic and the overall transfer time for the data.

Data Domain says that overall resource use on the media server is reduced by 20 to 40 per cent because of a reduced data copy overhead. It also says the aggregate backup throughput on its arrays increase by up to half as much again. Its DD880 is now rated at 8.8TB/hour because of DD Boost, up from the initial 5.4B/hour.

EMC will add DD Boost support to its own NetWorker backup software and expects to get the same benefits.

This is bad news for other backup software vendors. Even if they support Data Domain hardware their performance will suck compared to Backup Exec, NetBackup and the coming refreshed NetWorker. There is no mention in the EMC release of an open API for the media server software/DD Boost interface and no mention of a backup software supplier partner program.

Other deduplication array vendors, such as Quantum and Sepaton, now face another hurdle to jump, because their ability to boast of shorter backup times due, for example, to post-process dedupe just got reduced. In-line dedupers face the same problem; Data Domain has pressed the gas pedal and threatens to leave them behind.

Suppliers of disk-to-disk backup and Virtual Tape Libaries are in a similar bind. Life must be sweet for Data Domain boss Frank Slootman with this boost to his product set's appeal which screws the competition. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
IBM rides nightmarish hardware landscape on OpenPOWER Consortium raft
Google mulls 'third-generation of warehouse-scale computing' on Big Blue's open chips
It's GOOD to get RAIN on your upgrade parade: Crucial M550 1TB SSD
Performance tweaks and power savings – what's not to like?
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.