In Part 1 and Part 2 of this blog we looked at the four major technology trends impacting the IT industry. Now let’s discuss what the attributes of future data protection will look like in the coming years.1) Data protection will be cloud nativeData protection will live in an IT environment that spans on-premises, private and multiple public clouds, and will have to be native to such environments. It will operate wherever the workloads and data reside and at the granularity of the new entities that will be used: containers, functions, micro-services, etc. It will be designed as a cloud-native application and delivered as SaaS to enable seamless scalability and portability that enables protection policies to follow workloads wherever they reside across multi-cloud environments.2) Business service protection – beyond data protection As IT environments evolve, protecting just the data is insufficient. For example, we used to protect the data/log files of a database or application, and during a recovery event, present these files to a DBA who was then responsible for bringing the database back online. In dynamic cloud-native environments or in distributed edge configurations, there is no DBA to manage the recovery process. Instead, the data protection service will need to deliver the automation required to not only restore the data, but also configure and set up the environment (platform, compute, services, networking) to fully automate the recovery process. This level of automation requires the data protection service to protect all the entities that constitute the business service and fully orchestrate the recovery to ensure the lowest RTOs possible.3) Autonomous Protection & Recovery -> Resilience As users get used to fully-automated technology services and devices, the business service protection will also evolve to become automatic and eventually autonomous. It will automatically discover all the entities in the IT environment associated with the business service, such as containers, databases, files and file systems, objects, etc. It will then leverage AI/ML algorithms to assign the appropriate protection policy to each of them.Once protection becomes autonomous, recovery flows will follow. Continuous intelligent health monitoring will detect failures and trigger autonomous recovery to a previous known state to resume the business service. It will even be able to predict some failures and use preemptive measures to avoid service disruptions. It’s an inevitable change since the growing complexity and dynamic nature of the environment will not allow for manual control. Data protection will morph into Business Service Resilience (BSR).4) Data management and securityThe final pillar of future data protection solutions would leverage the data for:Data management – how we manage repositories of data (files, objects, data-bases etc.) using their meta-data attributes, without analyzing their content. This level of data management is available at various forms in most storage and data protection solutions.Data Analytics and Content Analysis – this advanced level looks inside data repositories to understand its context and what action should be taken. It ranges from basic Search to more advanced content analysis using Natural Language Understanding to provide insights and optimizations, e.g., by identifying document sensitivity through its content, thus determining the appropriate protection policy.Security –security will become integral to data protection as their synergies have proven to be effective in responding, or even preventing cyber-attacks. Two examples are the way backup services are used for recovery from ransomware attacks, and how isolated air-gapped systems can be used to recover from cyber-attacks.These four pillars will be gradually introduced in the coming years. In the final installment of this blog series, the CTO of Dell Technologies Data Protection Division, Arthur Lent, will discuss how Dell Technologies is innovating for the future to deliver on this vision.
Syracuse announces home-and-home series with LSU starting in 2015Syracuse announces home-and-home series with LSU starting in 2015
Published on April 16, 2014 at 5:46 pm Contact Stephen: [email protected] | @Stephen_Bailey1 Facebook Twitter Google+ Syracuse and Louisiana State have finalized an agreement for a home-and-home series, SU head coach Scott Shafer announced at Destiny USA on Wednesday.The Tigers of the Southeastern Conference will come to the Carrier Dome on Sept. 26, 2015, and the Orange will travel to Tiger Stadium on Sept. 9, 2017.“We talk to our kids about always stepping up to the plate and taking challenges,” Shafer said, “and the opportunity to see an (Atlantic Coast Conference) school take on an SEC opponent in the Dome in 2015 is what it’s all about.“Life being short, bring it on.”Syracuse has played elite programs at MetLife Stadium in each of the last two seasons, and Deputy Athletics Director Herman Frazier said that exposure helped lead to the LSU series. Frazier said discussions began more than a year ago, and an official contract has now been signed by both sides.AdvertisementThis is placeholder text“I thought it was very, very important — and all of us did — to have the first game in the Dome,” Frazier said.Syracuse and LSU have played twice before, both in postseason bowl games. The Tigers defeated the Orangemen 13-10 in the 1965 Sugar Bowl before it took the rematch 23-10 in 1989 the Hall of Fame Bowl.SU quarterback Terrel Hunt said he learned the news of the series just before the current players were shown SU’s new uniforms Wednesday.“That’s amazing,” Hunt said. “I was actually reading it right before I came down here. I was like, ‘That’s real.’”The first meeting may only be two years away, but the hype for Syracuse-LSU begins now. And hopefully, Shafer said, it leads to more premier programs coming to the Dome.Said Shafer: “I want our community to be excited about the fact that we’re not only playing the best of the best in our conference, but every couple years in the Dome we’re also going to play some of the best teams in the country.” Comments