The document discusses various storage options on Amazon Web Services (AWS) including Simple Storage Service (S3), Elastic Block Store (EBS), and Glacier. It then provides details on how to configure NetBackup to leverage these AWS storage services for backup and recovery. Specific scenarios are presented on backing up on-premises and cloud-based workloads to S3, EBS, and Glacier using different NetBackup and AWS configurations. Reporting and monitoring capabilities are also demonstrated.
This document summarizes the launch of Veritas Storage Foundation 6.0 and related products. It provides resilient private clouds by enabling pooled, elastic, resilient storage and business services across existing infrastructure. Key features include storage optimization through deduplication and compression, intelligent reporting and remediation through Veritas Operations Manager, and a new core-based pricing model. The launch delivers a holistic solution for building private clouds from existing IT investments.
Well Managed Systems - Endpoint Management and MobilitySymantec APJ
This document discusses key trends that are changing how organizations support their employees' computing needs. It notes that the traditional desktop-centric model no longer applies as employees increasingly use personal mobile devices and expect to access work systems and applications from anywhere. The document outlines challenges for IT departments in managing this new environment, including rapid technology changes, user expectations, and the need to support a variety of platforms while ensuring security, compliance and cost efficiency. It presents the Symantec endpoint management solution as a way to address these challenges through unified policy management, application delivery, security and support across physical, virtual and mobile devices.
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
The document discusses information and identity protection solutions from Symantec. It outlines the key threats to data security, such as data breaches, non-compliance, and external attacks. It then describes Symantec's information-centric security approach and solutions portfolio, which includes tools for identity management, data awareness, and data protection through encryption and data loss prevention.
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
The document discusses information and identity protection solutions from Symantec. It covers the risks of data breaches, an information-centric security approach, and Symantec's portfolio of products that provide data loss prevention, encryption, and user authentication capabilities. The integrated suite helps customers gain awareness of sensitive data, protect it across networks and endpoints, and authenticate user identities.
The survey found that despite warnings most SMBs are still not prepared for disasters. While 65% of SMBs are in regions susceptible to natural disasters, only 52% have a disaster preparedness plan. Those without plans cited reasons like not seeing IT systems as critical or it not being a priority. SMBs also have inconsistent backup practices, with only 21% backing up daily. As a result, a disaster could cause SMBs to lose large amounts of important customer, application, and email data. The survey recommends that SMBs create and test disaster preparedness plans to avoid expensive outages that could temporarily put them out of business or cause customers to switch vendors.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
The document discusses various storage options on Amazon Web Services (AWS) including Simple Storage Service (S3), Elastic Block Store (EBS), and Glacier. It then provides details on how to configure NetBackup to leverage these AWS storage services for backup and recovery. Specific scenarios are presented on backing up on-premises and cloud-based workloads to S3, EBS, and Glacier using different NetBackup and AWS configurations. Reporting and monitoring capabilities are also demonstrated.
This document summarizes the launch of Veritas Storage Foundation 6.0 and related products. It provides resilient private clouds by enabling pooled, elastic, resilient storage and business services across existing infrastructure. Key features include storage optimization through deduplication and compression, intelligent reporting and remediation through Veritas Operations Manager, and a new core-based pricing model. The launch delivers a holistic solution for building private clouds from existing IT investments.
Well Managed Systems - Endpoint Management and MobilitySymantec APJ
This document discusses key trends that are changing how organizations support their employees' computing needs. It notes that the traditional desktop-centric model no longer applies as employees increasingly use personal mobile devices and expect to access work systems and applications from anywhere. The document outlines challenges for IT departments in managing this new environment, including rapid technology changes, user expectations, and the need to support a variety of platforms while ensuring security, compliance and cost efficiency. It presents the Symantec endpoint management solution as a way to address these challenges through unified policy management, application delivery, security and support across physical, virtual and mobile devices.
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
The document discusses information and identity protection solutions from Symantec. It outlines the key threats to data security, such as data breaches, non-compliance, and external attacks. It then describes Symantec's information-centric security approach and solutions portfolio, which includes tools for identity management, data awareness, and data protection through encryption and data loss prevention.
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
The document discusses information and identity protection solutions from Symantec. It covers the risks of data breaches, an information-centric security approach, and Symantec's portfolio of products that provide data loss prevention, encryption, and user authentication capabilities. The integrated suite helps customers gain awareness of sensitive data, protect it across networks and endpoints, and authenticate user identities.
The survey found that despite warnings most SMBs are still not prepared for disasters. While 65% of SMBs are in regions susceptible to natural disasters, only 52% have a disaster preparedness plan. Those without plans cited reasons like not seeing IT systems as critical or it not being a priority. SMBs also have inconsistent backup practices, with only 21% backing up daily. As a result, a disaster could cause SMBs to lose large amounts of important customer, application, and email data. The survey recommends that SMBs create and test disaster preparedness plans to avoid expensive outages that could temporarily put them out of business or cause customers to switch vendors.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
Creative operations teams expect increased AI use in 2024. Currently, over half of tasks are not AI-enabled, but this is expected to decrease in the coming year. ChatGPT is the most popular AI tool currently. Business leaders are more actively exploring AI benefits than individual contributors. Most respondents do not believe AI will impact workforce size in 2024. However, some inhibitions still exist around AI accuracy and lack of understanding. Creatives primarily want to use AI to save time on mundane tasks and boost productivity.
Organizational culture includes values, norms, systems, symbols, language, assumptions, beliefs, and habits that influence employee behaviors and how people interpret those behaviors. It is important because culture can help or hinder a company's success. Some key aspects of Netflix's culture that help it achieve results include hiring smartly so every position has stars, focusing on attitude over just aptitude, and having a strict policy against peacocks, whiners, and jerks.
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
PepsiCo provided a safe harbor statement noting that any forward-looking statements are based on currently available information and are subject to risks and uncertainties. It also provided information on non-GAAP measures and directing readers to its website for disclosure and reconciliation. The document then discussed PepsiCo's business overview, including that it is a global beverage and convenient food company with iconic brands, $91 billion in net revenue in 2023, and nearly $14 billion in core operating profit. It operates through a divisional structure with a focus on local consumers.
Content Methodology: A Best Practices Report (Webinar)contently
This document provides an overview of content methodology best practices. It defines content methodology as establishing objectives, KPIs, and a culture of continuous learning and iteration. An effective methodology focuses on connecting with audiences, creating optimal content, and optimizing processes. It also discusses why a methodology is needed due to the competitive landscape, proliferation of channels, and opportunities for improvement. Components of an effective methodology include defining objectives and KPIs, audience analysis, identifying opportunities, and evaluating resources. The document concludes with recommendations around creating a content plan, testing and optimizing content over 90 days.
How to Prepare For a Successful Job Search for 2024Albert Qian
The document provides guidance on preparing a job search for 2024. It discusses the state of the job market, focusing on growth in AI and healthcare but also continued layoffs. It recommends figuring out what you want to do by researching interests and skills, then conducting informational interviews. The job search should involve building a personal brand on LinkedIn, actively applying to jobs, tailoring resumes and interviews, maintaining job hunting as a habit, and continuing self-improvement. Once hired, the document advises setting new goals and keeping skills and networking active in case of future opportunities.
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
The document provides career advice for getting into the tech field, including:
- Doing projects and internships in college to build a portfolio.
- Learning about different roles and technologies through industry research.
- Contributing to open source projects to build experience and network.
- Developing a personal brand through a website and social media presence.
- Networking through events, communities, and finding a mentor.
- Practicing interviews through mock interviews and whiteboarding coding questions.
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
1. Core updates from Google periodically change how its algorithms assess and rank websites and pages. This can impact rankings through shifts in user intent, site quality issues being caught up to, world events influencing queries, and overhauls to search like the E-A-T framework.
2. There are many possible user intents beyond just transactional, navigational and informational. Identifying intent shifts is important during core updates. Sites may need to optimize for new intents through different content types and sections.
3. Responding effectively to core updates requires analyzing "before and after" data to understand changes, identifying new intents or page types, and ensuring content matches appropriate intents across video, images, knowledge graphs and more.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
During this webinar, Anand Bagmar demonstrates how AI tools such as ChatGPT can be applied to various stages of the software development life cycle (SDLC) using an eCommerce application case study. Find the on-demand recording and more info at https://applitools.info/b59
Key takeaways:
• Learn how to use ChatGPT to add AI power to your testing and test automation
• Understand the limitations of the technology and where human expertise is crucial
• Gain insight into different AI-based tools
• Adopt AI-based tools to stay relevant and optimize work for developers and testers
* ChatGPT and OpenAI belong to OpenAI, L.L.C.
3. Overview
1 Symantec Data Protection & Virtualization
2 V-Ray and vStorage APIs
3 Symantec NetBackup 7 & Backup Exec 2010
4 Just Announced...
5 Questions & Answers
Modernizing Backup for Virtual Environments
4. Data Protection
Key trends affecting data protection
• Virtualization
– Starting, In the Middle, Completed –
Everyone’s doing it...
– Different Animal requires Different
Strategies
– HW is on faster refresh cycles b/c of
utilization rates
• The Information Explosion
– Deduplication is Mainstream
– Data Protection requires
“Modernization”
– HW refresh is accelerating
Modernizing Backup for Virtual Environments 4
5. Data Protection
Virtualization: Starting, In the Middle, Completed
• Everybody’s doing it
– Project Based
• Decisions made out of backup team in
many cases
• Example Deployments
– Data Center Economy
– Remote Office Consolidation
– Preparation for the Cloud
– Disaster Recovery Site
The Result: VMware consolidation
accelerates the information explosion
– On VMware
So Deduplication is necessary to
protect VMware environments
Modernizing Backup for Virtual Environments 5
6. Symantec - Industry leading Backup and Recovery
Largest Global Data Protection Footprint
Fortune 500 Global 2000
Enterprise Distributed System Backup/Recovery
99% 90%
Revenue Market Share, 2009
Leading Telecom Leading Healthcare
10 of 10 10 of 10
Leading Financial Savvy Businesses
Services 10 of 10 • 35K Enterprise
• 1.5 Million SMB
Combined 40% Market Share
• NetBackup – Delivers 1st in
Storage, VMware, Copy Management, and
Scale for the Enterprise
• Backup Exec – Delivers 1st in Microsoft
Application Protection, and Simplicity for
SMB
• Underlying Technologies Shared Between
Both Solutions –
Dedupe, VMware, FlashBackup, etc.
May 2010 #1 Backup/Recovery Market Share
Modernizing Backup for Virtual Environments
7. Symantec’s Unparalleled Data Protection Portfolio
Hybrid Cloud Enterprise
500+ employees
>$150m revenue
Mid Size Business
50 -1000s of servers
Small Business Specialized backup team
100-999 employees
Data center focus
10-99 employees $50-$150m revenue
Consumer <$50m revenue 11-50 servers Updated
1-10 servers Windows server focus NetBackup 7.1
1-9 desktops
Windows desktop & server
No servers Updated NetBackup 5000 and
Windows desktop & server NEW Backup Backup Exec 2010 R3 5200 Series Appliances
Exec.cloud
Built on Symantec NBU 5000 Series
Updated
Appliances Appliances &NEW
Norton Online Backup Enterprise Vault 10
Backup Exec Appliances
80+ PB Cloud – Largest Backup Exec for
Private Cloud in Windows Small Business System Recovery 2011 Bare Metal Recovery
Production Servers
Modernizing Backup for Virtual Environments
8. The Value of Partnership & the Results
A NINE year strong partnership
yielding collaborative solutions:
Backup Exec 2010
+ NetBackup 7
Extended customer value!
Modernizing Backup for Virtual Environments
9. VMware vStorage APIs for Data Protection
Storage layer access for Data protection
Media Server
Backup ESX
Storage Discovery (LAN)
VM 1 VM 2 VM 3
APP APP APP
OS OS OS
DATA DATA DATA
Data Path (SAN) Datastore
NetBackup 5000
Series Dedupe
Storage Appliance
Modernizing Backup for Virtual Environments
10. VMware vStorage APIs for Data Protection
Snapshot Protection Offloads VM Resources
Backup
• Last evolution of VMware
Application Data Protection
vStorage APIs for Data
Protection • Available with vSphere 4.x
• Tighter integration with
Tape/Disk Symantec products
3 • Supports Windows and
Linux
Backup
• Improved Functionalities
Proxy Server • Support all storage
(Physical/ VM) architectures for backup
and restore (LAN/SAN)
• Windows/Linux guests
Mount
2
1
Snapshots • Full, incremental and
differential image backup
• File level backup and
restore
LAN/SAN
Storage
Modernizing Backup for Virtual Environments
11. The VM Snapshot Protection Challenge
Bad Things Happen in the Dark
• You can’t: Backing Up Blind
• manage
• recover
• dedupe
• protect
what you can’t see.
Modernizing Backup for Virtual Environments
12. Don’t Let Poor Visibility and Silos Slow You Down
and Cost you more Time, Resources, and Storage
• Symantec V-Ray
• Patented visibility into virtual
file systems and applications
• Transparent backup and
recovery across physical and
virtual silos
• Symantec’s 3th Generation
Granular Recovery Technology
(GRT)
Unified Protection, File & Application Recovery,
Deduplication, & Automated Protection
Modernizing Backup for Virtual Environments
14. Integration with VMware vStorage APIs
Everyone does it... Symantec Does it Right!
VM2 VM1
• No agent in VM
x86 for backup
OS or recovery
VMware Host
• Full & incremental VM backup
• Works with any backup storage
• Supports any virtual machine
Modernizing Backup for Virtual Environments
15. V-Ray Visibility for Global Deduplication
NetBackup Data stream Data stream
?
What We See -
• Complete layout of the file What Others See -
• System represented inside • One big file
• VMDK/VHD file including: • No Q-tree Intelligence
- File boundaries • Deleted Data remains
- Fragments
- Block status (Deleted)
What Happens -
What We Can Do - • No file information
• “Single-Pass” Store the VMDK file • Extra steps to collect file info
• “Single-Step” recovery at file level • Multi-Step processes required
- 2x storage
• Fantastic Deduplication
- Or, multi-step file recovery
• Deduplication Platform for enhancements
• Harder to optimize deduplication
Modernizing Backup for Virtual Environments
16. V-Ray Intelligent Segmentation
VMDK Snapshot - Backup Data Stream Tags, metadata, indexes
NBU Opens VM Snapshot FILE 3 FILE 1 FILE 1 FILE 2 FILE 3 FILE 3 FILE 3 FILE 2
C A B B B D A A
Reads File Order Fidelity
Indexes individual files for incremental backups (for VCB and vStorage)
Aligns deduplication to achieve global deduplication
File 1
File 2
A
D D D VMDK image format File 3
ESX Server
GLOBAL DEDUPE up to 99%
• Across VMguests
D
A
D D
• Across ESX servers
ESX Server
• Across virtual and physical sever
Media server • Across NDMP data sets
Modernizing Backup for Virtual Environments
17. V-Ray Visibility Into Virtual Backup Images for Single File Restore
VM2 VM1
• Stage-less file-level recovery
• Direct from VM backup
• Direct from any backup storage
• All files are cataloged
• File-level recovery for Linux and
Windows
Modernizing Backup for Virtual Environments
18. V-RAY Optimized Synthetic Protection
You can’t Protect everything with a Snapshot
Problem:Traditional cycle of full backups requires
backup server cycles (I/O) and bandwidth
Client • Traditional Synthetic Backups still move data at the
media server
Solution: Optimized Virtual Synthetics
• Leverages appliance CPU power & V-RAY Intelligence
Incremental backups • No Data Movement requires less infrastructure
• Eliminates “heavy lifting” full backups
• Frees Media Servers for other wokload
Full Incr. Incr. Optimized
Backup Backup Backup Synthetic
Optimized
Synthetic
Lightening fast backups!
Modernizing Backup for Virtual Environments 18
19. V-Ray VMware Changed Block Snapshot Protection
In NetBackup 7.1
• Changed Block Tracking - AKA Block Level Incremental
– Keeps track of blocks that have changed since last backup
– Much more efficient incremental technology
– Snapshot exists for shorter time – less impact
– Makes non-SAN (DAS or NAS) backups viable
– NBU will uniquely restore at either block or file level
• Every CBT backup is a full recovery point in NetBackup
– Restore the Entire VMDK from CBT incremental backup
• Not by restoring the vmdk then adding file restores
• Not by restoring the vmdk then adding CBT Overlays
• V-RAY Synthetic Protection provides a single DR (full) recovery point from CBT
backups
– Combines Optimized Synthetic Protection with BLIB Protection
• Individual File Recovery from CBT backups Directly
Modernizing Backup for Virtual Environments
20. No Man Is an Island:
Multiple Backup Tools are Costly and Complex
The Backup Team The VMware Team
Physical Infrastructure Virtualized Infrastructure
Modernizing Backup for Virtual Environments
22. V-Ray Enables Granular Recovery of Virtualized App Servers
in Backup Exec 2010 R3
V-Ray Granular Recovery for Virtual Applications
Backup Exec Media Server
with Virtual Agent
VMware Server Single-pass Backup of
Running 1 Virtual Guest Systems 2
Application Restore granular
Servers Exchange, SQL and Active
Directory Data in Seconds:
• Individual Mailboxes
• Emails
• Private or Public Folders
• Calendar Items
• Tasks
• User Accounts or Attributes
• SQL Databases
Modernizing Backup for Virtual Environments
23. New VMware Proxy-less Backup
in Backup Exec 2010R3
VMware vSphere Server [Host] Backup Exec 2010 Media Server
Linux Linux Protects
• Entire Guest VM’s (Windows and
Linux) with Full, Incremental, or
Windows Windows Windows WindowsExchange
Differential backups
• Virtualized Microsoft VSS-capable
applications
• VMware Template Files
• Single-pass backup, Granular Recovery
of file and application data
VMware Virtual Servers [Guests]
Modernizing Backup for Virtual Environments
24. VMware Intelligent Policy With V-Ray
In NetBackup 7.1
Key Features Challenge
• Manage auto discovery and VMs change constantly, creating
administration and performance issues
protection of virtual
machines as they move,
change or come online Key Benefits
• Automatically discover new, cloned, or
migrated virtual machines
• vMotion, Storage vMotion, and DRS
aware
• Protect VMs on-the-fly
VMs VMs
• No editing of backup policy
• Enhanced load balancing/throttling
• Faster backups
Modernizing Backup for Virtual Environments
25. Traditional Backups
17
Active
ESX 1
• Without planning, # of active jobs
Backup Server
per ESX server NetBackup 7 for VMware
will be random
0
Active
ESX 2 • Load on each ESX data store will
SANlopsided
be
2
Active • Overall performance not optimal
ESX 3 Backup
Target
• Backups less reliable – snapshot
1
errors caused by I/O imbalance
Active
ESX 4
UCS
Modernizing Backup for Virtual Environments
26. VMware Intelligent Policies (VIP)
5
Automated Load Balancing In NetBackup 7.1
Active
ESX 1
• Create 1 NetBackup Policy
Backup Server
• Provides complete control VMware
NetBackup 7 for over
5 backup load
Active
ESX 2 • Improve backup performance
SAN backup impact on VM’s
• Reduce
• Significantly improve overall backup
5 reliability
Active
ESX 3 Backup
Target
5
Active
ESX 4
UCS
Modernizing Backup for Virtual Environments
27. NetBackup 7 Performance Benchmark
Total Number of VMs Protected – Full Backups
Single VMware Backup Host
Before vStorage APIs Weekend B/U = 60 hours
Avg. VM size = 40GB
Test 1: 340 VMs Data Change = 5%
63 MB/sec
2430 VMs
With vStorage APIs to regular disk
Test 2:
450 MB/sec 3240 VMs
With vStorage APIs to Deduplicated disk
Test 3:
600 MB/sec
500 1000 1500 2000 2500 3000
http://www.tinyurl.com/NetBackupCiscoVMware
Modernizing Backup for Virtual Environments
28. Unlike Other Vendors, Symantec Offers Choice
1 Client Servers 2 Media Server 3 Target Device
Places to Dedupe
Choice of
Built-In Dedupe Built-In Dedupe Dedupe to a target
at the client at the media server backend storage target
More Choices on a Single Platform Choice
Form Factor
Choice of
Modernizing Backup for Virtual Environments 28
29. Breaking News – Announced May 3rd
Backup for You
Backup Exec Backup Exec Backup Exec.cloud
2010 R3 Hybrid Cloud
Software Appliance Cloud
Protecting Your Virtual and Physical Systems
Modernizing Backup for Virtual Environments
30. The NetBackup Appliance Portfolio
Dedupe Appliances Backup Appliances
NBU 5000 Series NBU 5200 Series
NBU 5000 NBU 5200
NBU 5020 NBU 5220
NBU 5000 Series Dedupe Appliances for both NetBackup Appliances
NetBackup and Backup Exec w/ Dedupe Built in
NBU 5000 NBU 5020 NBU 5200 NBU 5220
Speed 4.3 TB/ hr 13.4 TB/hr 10.5 TB/hr
Raw Capacity 24 TB 48 TB 48 TB Coming
Soon
Usable Capacity (per
node/per deployment)
16 TB/ 96 TB 32 TB/ 192 TB 32 TB
Built-in Replication
Source and Target Dedupe
Exclusive Symantec
Features
NetBackup Appliances Overview 30
31. VM Protection + Optimized Duplication for Multisite
DR for VMware using can leverage your topology (IP and Now Fiber Channel)
IP/FC Transport Flexibility
NetBackup Appliance Design
Production Disaster Recovery
NetBackup 5200 Media
Server Appliance(s) w/
32TB Embedded Dedupe
Pools
NetBackup NetBackup
Deduplication Deduplication
Appliances Appliances
Up to 192TB/Pool Up to 192TB/Pool
Dedupe processing
Optimized
Standard Data Transfer over IP
Duplication
Standard or Optimized Transfer over IP
Standard Data Transfer over FC Transport
Standard or Optimized Transfer over FC Transport*
Optimized Deduplication
31
32. NetBackup 7 & Backup Exec Powered By V-Ray
Industry 1st “End-to-End” VMware & Deduplication Solutions
NetBackup
Backup Exec
Physical Infrastructure Virtualized Infrastructure
Unified Data Protection
NBU 5200 Series 16TB – 192TB
NBU 5000 Series
VMs BE Appliance Series
VMs
VMs
VMs
Built-InClient Dedupe Built-InMedia Server Dedupe Scalable Global Dedupe Across
Virtual/Physical On your equipment or Symantec Appliances Symantec Dedupe Appliance
“End-to-End” Scalable Global Deduplication
Modernizing Backup for Virtual Environments
Point of the slide: What are the big trends affecting the data protection space.Everybody’s doing it, it’s complicated, and we can help
Point of the slide:
With a combined 40% market share, Symantec is the leader, with more market share than the next three largest suppliers combined. We dominate both Fortune 500 enterprises and as well as global 2000 industries and are strong across telco, healthcare and financial services where all of the top 10 businesses are Symantec customers.
One Size Does Not Fit AllSymantec’s comprehensive tailored solutions address the needs of the smallest businesses to the largest enterprisesNorton Online BackupBackup ExecNow with software, cloud, & appliances for SMBsNet BackupLive replication for SAN replication, Linux/Unix system recovery, 100s of terabyes of data or moreEnterprise VaultMore good stuff!
VMware Agent Example Configuration 1This basic example of a VMware environment with a single ESX server being protected by Backup Exec is meant to illustrate the following points: Backup Exec can discover ESX hosts and their VM resources by either hostname or IP address in the Backup Exec console VMware discovery events occur over the LAN Backup data captured through Backup Exec’s VMware Agent and the vStorage API does not necessarily travel over the LAN, but more commonly travels from the datastore directly to Backup Exec-managed storage over the SANAgent SummaryvStorage API for Data Protection IntegrationOptimized Virtual Machine DeduplicationvSphere Block Level Differential/Incremental BackupApplication Granular Recovery (Exchange, SQL, AD) from a Single-Pass VM BackupSymantec Backup Exec™ Management Plug-in for VMware® vCenter and vSphere clientDynamic Inclusion of Newly Found or Created Virtual Machines
Some of the implications of poor visibility include:Seeing half the picture with two separate solutions for physical and virtual backups adds to complexity.Recovering files is a shot in the dark because you don’t know where they are. With virtual machine aware deduplication, backup storage requirements are greater than they should be.When you can’t see new or moved machines, you can’t protect them. This in turn can low rollout of virtual machines with lots of labor intensive backup administration.
V-Ray is the name for a group of Symantec technologies that give customers additional visibility and insight into their virtual environments as well as transparent backup and recovery across physical and virtual environments. V-Ray provides visibility into virtual systems that enables customers to more confidently secure, protect, run, and recover business-critical systems as well as reduced complexity and costs.In a few minutes, I’ll cover how V-Ray improves unified protection, single file and application recovery, deduplication and automated protection.
Backups can affect performance and availability of the virtual environment if a traditional backup application agent is installed on each and every virtual machine. With multiple virtual machines on the same physical host, network bandwidth is much more limited than in physical environments. Thus, moving backup data across the network can quickly exceed available bandwidth. In addition, backup agents on virtual machines consume virtual machine memory and processing resources and require administrative overhead to maintain. NetBackup’s off-host image backups accomplished through virtual machine API integration virtually eliminate the overhead of backup processing on virtual machines and network bandwidth requirements. This translates into greater backup performance while removing the need to install, maintain and upgrade agents on every virtual machine. NetBackup supports full and incremental backups of virtual machines and works with any backup storage. In addition to VMware, we also support Microsoft’s Hyper-V.
Deduplication designed specifically for VMwareEnhanced virtual machine “vmdk aware” deduplication*NetBackupdeduplicates VM data based on what is inside the vmdkGlobally deduplicate data between virtual systems and physicalSo, why is this better?Competitors have no idea what is inside virtual machineThey deduplicatevmdk files like any big file – less efficientGlobal deduplication from virtual to physical, virtual to virtual
Netbackup supports stage-less file level recovering , meaning that only one backup pass is required – data is written to backup storage just once. Competitors often imply that they provide instant single file restore. This is not possible with most competitors as they only index the backup of the entire VM (vmdk file). They do not index what is *inside* the VM. This is a significant competitive advantage that NBU provides.NetBackup supports single file recovery directly from a VM backup or backup storage. All files are cataloged so that you can locate them in minutes as opposed to hours or even days.Our capabilities are available for Linux and Windows.
Siloed data protection solutions for physical and virtual infrastructure only show you half the picture, adding to complexity, unnecessary backup storage growth, backup problems and slower recovery. Point solutions are dead. They no longer serve a market need and represent a risky investment.
Earlier we heard VIC discuss the realities of running both physical and virtual servers for the foreseeable future. Vic realized that two separate systems for backup and recovery simply wouldn’t cut it. NetBackup Data Protection is designed to work across both Physical and Virtual environments. So the benefits to customers include More standardization and consistent policies and SLAs Backup and VM guys are no longer Duplicating work Eliminates Redundant storage pools Lowers licensing, training, and operational costs Now you’re in keeping with the drivers and benefits of a consolidation strategy
Slide 9 - Granular Recovery of Virtualized Application Servers (Animations)The release of Backup Exec 2010 truly helps your customers virtualize with confidence by providing first to market granular recovery for virtual applications including Exchange, Active Directory and SQL.When customer VMware environments are protected with the Backup Exec 2010 Agent for VMware Virtual Infrastructure, an administrator can easily restore an entire application/database or granular SQL, Exchange or AD application objects. Other vendors on the market today can do thisonly through a second application backup – lengthening backup windows and utilizing more storage space for redundant data.
Virtual machines by design are easy to clone and deploy which explains why virtual machine sprawl is a growing management challenge within IT organizations today. Many IT managers would be hard pressed to give an accurate count as to how many virtual machines they’re running or whether or not they’re all being protected. And as the number of servers being virtualized grows, management of backup and recovery becomes more problematic. With Virtual Machine Intelligent Policy – backup admins can automatically discover new, cloned or moved Virtual Machiness and easily protect them without having to edit backup policies. Customers have been asking for this feature! It basically let’s you put virtual machine protection on “auto-pilot”Virtual machine Intelligent Policy automatically adjusts for any other changes that VMware technologies such as VMotion, Storage Vmotion, Distributed Resource Scheduling (DRS) etc. have made to every virtual machine. Virtual Machine Intelligent Policy is currently only available for VMware in the NetBackup 7.1 release….but support Microsoft Hyper-V is planned for future release.Another exciting feature within VM Intelligent policy is how you apply resource limits for load balancing and efficient throttling for better backup performance. Let’s look at that more closely (NEXT SLIDE)
So why should a customer be interested in VIP? Traditional backups can create unbalanced overhead on ESX servers if the host name of each Client is used in the Policy. For example, basic backups would have a number of hostnames in the Policy and while the number of Clients that can be performing backups at any time can be limited in the Policy, if all those clients reside on the same ESX <click> that system will be overloaded while the other systems are not being used. It is difficult to prevent this using traditional backup methods. This is where VMware Intelligent Policy comes in<click>
The basic backup Policy is recreated and it communicates with vCenter. Basically, NetBackup gets a list of Clients from vCenter and it doesn’t matter which system they are on, then, using filters, NetBackup can instruct vCenter to send data based on any number of criteria. Some of the filters that can be use are things such as: Backup all the machines in Power On stateBackup all the machines where OS type is Windows 2008Backup all the virtual machines for which display name starts with VMprodOr, we can get even more granularBackup all the virtual machines that are on Power State On in data store Storage 1 if the OS type is RedHat LinuxBackup all the virtual machines in folder Dev if they belong to cluster Cluster03In addition, this filtering can allow vCenter to balance the backup load across the various ESX servers thus improving performance while reducing impact.
Symantec NetBackup™, Cisco® Unified Computing System, and VMware® vSphere™Joint Backup Performance BenchmarkStarts with VMware Consolidated Backup (VCB).
Supports mixed environments – With NetBackup 7.0 engineering now extends this functionality by supporting the same functionality for media server deduplication pools (MSDP) within the same NetBackup domain. Now optimized duplication is supported between media server deduplication pools (MSDP) and even supported from an MSDP to a PureDisk deduplication pool, providing more flexibility. In case of the PureDisk pool or the MSDP, the optimized duplication process is performed by NetBackup’s built-in replication technology, and as such independent from the underlying storage or hardware infrastructure, making cross platform duplication finally possible. Follows the most efficient path – Storage life cycle policies have always leveraged the most efficient path when duplication is configured between two similar deduplication pools or OST devices. For the first duplication run the underlying replication technology of the OST device or deduplication pool was leveraged. NetBackup 7.0 now extends this for the automated job retries as well. Originally the default behavior for optimized duplication was set to failover to a regular deduplication when the first attempt failed. In NetBackup 7.0 every automated retry will now continue to retry over the same optimized duplication path, reducing the impact on the network.