Thursday, October 4, 2012

VM Data Protection For Dummies Quantum Special Edition free pdf download

VM Data Protection For Dummies Quantum Special Edition

VM Data Protection For Dummies Quantum Special Edition Published by John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030-5774VM Data Protection For Dummies Quantum Special Edition www.wiley.com Copyright © 2012 by John Wiley & Sons, Inc., Indianapolis, Indiana Published by John Wiley & Sons, Inc., Indianapolis, Indiana No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. Quantum and the Quantum logo are trademarks of Quantum Corporation. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ. For general information on our other products and services, please contact our Business Development Department in the U.S. at 317-572-3205. For details on how to create a custom For Dummies book for your business or organization, contact info@dummies.biz. For information about licensing the For Dummies brand for products or services, contact BrandedRights& Licenses@Wiley.com. ISBN: 978-1-118-19464-5 eISBN 978-1-118-19669-4 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 Contents Introduction . 1 Chapter 1: Protecting Virtual Data. 5 Determining What Constitutes Protection.............................. 6 Understanding How VMs Complicate the Protection Process..................................................................................... 8 Looking at Traditional Methods of Protecting Virtual Data............................................................................ 10 Chapter 2: Shopping for a Virtual Data Protection Solution. 17 Looking for a Virtual-Centric Solution.................................... 18 Finding Out How It Functions.................................................. 20 Evaluating Ease of Integration................................................. 23 Considering Costs..................................................................... 24 Chapter 3: Making Virtual Data Protection Easy. 27 Simplifying Management.......................................................... 27 Understanding the Four vmPRO Core Technologies........... 28 Introducing Quantum vmPRO Solutions................................ 33 Chapter 4: Ten Frequently Asked VM Protection Questions (And Their Answers). 37 Do I Need a Separate Backup Process If I'm Using Snapshots to Protect My VM? ............................................ 37 Why Can't I Use the Same Backup Process That I Apply to Physical Servers On My Virtual Ones? ......................... 38 Why Are So Many Backup Applications Designed to Work for VMs?.................................................................. 38 Why Do VMs Seem to Hold More Data Than Physical Servers Doing the Same Job?............................................... 39 Why Can't I Access Individual Files From Some Types of VM Backups? .................................................................... 40 In Which Formats Are Backup Files Presented, and Why Should I Care?........................................................................ 40 Do I Have to Choose between One of the New VM-only Backup Applications and My Legacy Backup Software? .....................41 How Does VM Backup Work with Deduplication Appliances?............................................................................ 42 How Can I Estimate the Real Cost of a VM Backup Solution?................................................................................. 42 What Are the Most Important Management Features I Should Look For in VM Backup Software?...............................43 Introduction V irtualization is rapidly changing the way business IT operates, from small local businesses to multi-national corporations. If you are reading this, chances are good that your company is already taking advantage of virtualization's benefits. Virtualization means that a single underlying piece of hardware, such as a server, runs multiple guest operating systems to create virtual machines, or VMs, with each of them being oblivious to the others. An administrative application, such as VMware, manages the sharing process, allocating hardware resources, memory, and CPU time to each VM as needed. And all applications look at this software construct exactly as if it were a real, physical server — even the VM thinks it's a real server! Virtualization makes good financial sense. It enables a single server to offer multiple capabilities that otherwise would require separate servers. It includes native high availability features so you don't have to use any more complex clustering tools. This ability to combine capabilities means that you spend less money on server hardware and much less time providing IT support, systems administration and maintenance. VM Data Protection For Dummies Quantum Special Edition pdf
Read more... http://www.fordummiespdf.com/vm-data-protection-for-dummies-quantum-special-edition-free-pdf-download/

No comments:

Post a Comment