Feeds

Plane or train? Tape or disk? Reg readers speak

Disk speed versus tape economy and removabiity

  • alert
  • submit to reddit

Top three mobile application threats

Chris Evans - Independent storage consultant

Chris Evans

Many people feel tape no longer has a place in the enterprise data centre. This is not a belief I subscribe to; tape still has a place as part of an overall data management strategy.

A comprehensive data protection strategy will address the following scenarios:

• Data corruption
• Loss of data
• Loss of access to data

Depending on RTO (recovery time objectives) and RPO (recovery point objectives), it may be more appropriate to use disk solutions for short-term backups. Using disk will generally be quicker than tape but more expensive. The decision on whether disk or tape is best comes down to the analysis of RTO/RPO requirements.

RTO is a measure of the acceptable elapsed time taken to recover data. It will vary based on the importance of the data being recovered – mission critical data will be recovered well ahead of development data in a disaster, for example. As data ages, the RTO typically also increases and so one strategy is to use disk for short-term backup/restore requirements, moving older backups to tape over time (otherwise known as Disk to Disk to Tape - D2D2T).

As a storage medium, tape still has many advantages:

• It is relatively cheap compared to keeping disk arrays spinning and available.
• It is compact.
• It is portable.

Of course people point to some of these strengths as weaknesses too; tapes can be lost and many companies have received fines for breaches of regulations after tapes have gone missing. However tape content can be encrypted, mitigating this risk. For long-term backup, tape has clear advantages in cost.

Compared to tape, disk solutions have the advantage of additional functionality, such as de-duplication. In a VTL solution, for example, backups are compressed by removing duplicate copies of data, retaining a reference to a single physical copy on disk. Although de-duplication can provide reductions in storage capacity (and therefore cost), it introduces a greater risk of data loss if a hardware failure occurs in the backup system. It also introduces potential performance issues when multiple restores are performed from the VTL at the same time.

One area where tape is typically mis-used is in the retention of old backups to create a data archive. Unfortunately in many cases, this isn’t the best approach because:

• Tapes can become lost or damaged or lose their contents over time. An archive can’t afford to lose data. Many tape users simply retain multiple backups in the hope that this covers all data ever created. This is unlikely to be the case.

• Tape data is usually stored in the format of the backup product and so not easily searchable; at most the backup software will retain a list of files on tape but not metadata relating to the content.

• Tape's content isn’t easy to refresh. Data has to be physically copied out of the backup software to a format that can be backed up again by other backup software. A data archive therefore needs proper content management processes in place.

Generally, the more complex the data, the more unsuitable it is for long term tape archive.

Another scenario gaining in popularity is the idea of using a cloud storage service to provide backup facilities. At present the use cases for cloud-based backup are small because the time taken to instigate a restore from the cloud will be longer than is acceptable under recovery time objectives. I see the use of cloud backup as being more useful for home users and SMB but not the enterprise.

In summary, tape still has a role to play in the data centre. It is one of many tools that can be used in deploying a comprehensive data management strategy. Tape retains advantages in cost, but has issues around effective management. With companies such as Google having to rely on tape for data recovery, we can be sure that tape has a future in the data centre for many years to come.

Chris M Evans is a founding director of Langton Blue Ltd.. He has over 22 years' experience in IT, mostly as an independent consultant to large organisations. Chris's blogged musings on storage and virtualisation can be found at www.thestoragearchitect.com.

High performance access to file storage

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.