Anatomy of a archiving project basic principles to consider
Download
1 / 35

Anatomy of a Archiving Project Basic Principles To Consider - PowerPoint PPT Presentation


Anatomy of a Archiving Project Basic Principles To Consider. Bruce Fischer, Princeton Softech. Princeton Softech. Proven leader in Enterprise Data Management Solving complex data management issues since 1989

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha

Download Presentation

Anatomy of a Archiving Project Basic Principles To Consider

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Anatomy of a archiving project basic principles to consider l.jpg
Anatomy of a Archiving ProjectBasic Principles To Consider

Bruce Fischer,

Princeton Softech


Princeton softech l.jpg
Princeton Softech

  • Proven leader in Enterprise Data Management

    • Solving complex data management issues since 1989

    • In-depth functional knowledge of mission-critical applications and the business rules that govern them

    • Over 2,400 customers worldwide, Including nearly half of the Fortune 500

  • At each level of the management organization (CIO, business executives), we appeal to the most universal, broadest business issues

    • Simplification of Infrastructure

    • Information Governance

    • Business Continuity

    • Business Value


Addressing the challenges l.jpg
Addressing The Challenges

  • Key challenges for sites with Custom Applications

    • Managing Application Performance

    • Controlling Costs

      -Mitigating Risks Associated with Data Retention and E-Discovery Requirements

      How can archiving help?


Explosive database growth l.jpg
Explosive Database Growth

  • Mergers & acquisitions

  • Organic business growth

    • eCommerce

    • ERP/CRM

  • Records retention:

    • Healthcare – HIPAA

    • Pharmaceutical – 21 CFR 11

    • Financial – IRS and SEC Rule 17a-4

  • Data multiplier effect

  • According to industry analysts, annual compound growth rates for databases will exceed 125%


The ongoing problem l.jpg
The Ongoing Problem

Risk

Compliance $

Downtime

IT Resources

How many copies?


Data multiplier effect l.jpg

The Data Multiplier Effect

1200GB

Test

Production

Total

Development

Backup

200GB

DisasterRecovery

200GB

200GB

200GB

200GB

200 GB

Quality Control

Data Multiplier Effect

Actual Data Burden = Size of production database + all replicated clones


Who is impacted and how they benefit l.jpg
Who is Impacted and how they benefit

  • Data Growth

  • Retention and Compliance

  • Portfolio Optimization

  • CEO

  • CIO

  • Applications

  • DBAs

  • Quality Assurance

  • Business Users

  • Capacity Planners


Analysts projections l.jpg
Analysts Projections

  • A new ESG report, "Digital Archiving: End User Survey and Market Forecast 2006-2010," regarding their purchasing intentions for archiving solutions.

    • 48% of organizations say they will purchase and deploy a database archiving application within the next 24 months

    • An additional 35% say they expect to purchase a database archiving application at some point beyond 24 months.

    • Database-resident information will be the fastest growing type of archived information between now and 2010, growing at a CAGR of 79%. Over 4000 Petabytes of database archives will exist in 2010.

  • The database archiving market will grow at a CAGR of 38.5 percent through 2009- Gartner



Assess l.jpg
Assess

  • Determine application types

    • Mission critical

    • Business critical

    • Targeted for sunset

  • Decide where to locate the archive

    • Which storage devices

    • When to deploy each type

  • Determine access requirements

    • Who, what, how, when?


Classify l.jpg
Classify

  • Identify “Business Objects” to archive

    • Historical reference snapshot

    • Examples: Activities, Service Requests

  • Determine retention requirements

    • Cross functional consensus

    • Time value of business object

    • Deletion requirements

  • Identify post-archive use cases

    • Customer service inquiries, audit, e-discovery, trend analysis

    • SLA for access

    • Retrieve from archive

    • Reload to temporary DBMS



Archive l.jpg
Archive

  • Determine operational practices

    • Frequency of archive

    • Automated or manual operations

    • Online or offline

  • Define file management

    • Across storage tiers

    • Manual or integrated (Tivoli, Symantec, etc.)


Evolving business value l.jpg

Active Data

Inactive Data

Historical Data

Evolving Business Value

Value

Access Frequency

Time


Define storage strategies l.jpg

Active Data

Tier 1

Inactive Data

Historical Data

Tier 2

Define Storage Strategies

Value

Access

Historical Data

Tier 3

Time


Set migration policies l.jpg

CLOSE_DATE

> 01-JAN-2005

CLOSE_DATE >

01-JAN-2001&

< 31-DEC-2005

CLOSE_DATE < 31-DEC-2000

Set Migration Policies

Tier 1

Value

Access

Tier 2

Tier 3

Time


Archiving a complete business object l.jpg

Ledgers

Archiving a Complete Business Object


Store l.jpg
Store

  • Determine format of archives

    • Archive file system

  • Define hardware targets

    • Number of tiers

    • Types of devices

  • Establish security parameters

    • Integration with existing framework

      • Database, application, network


Cost effective tiered storage l.jpg
Cost-Effective Tiered Storage

Off-LineArchive

Online

Archive

Current

History/Reporting

Production Database

ArchiveDatabase

SAN / NAS

Production Database

Tape

WORM

Flat Files

Files

Time


Access l.jpg
Access

  • Analyze use cases vs. cost of access

    • Goal: match SLA to value to cost

    • Application independent access

    • Native application access

  • Communicate access terms & conditions

    • SLAs

    • Resource provisioning

    • Training on access paths


Dispose l.jpg
Dispose

  • Build cross-functional team

    • Business, legal, audit, IT

    • Business owns data, IT manages supporting infrastructure

  • Determine data deletion policies

    • Signoff by stakeholders

    • Which records to delete, and when

  • Ensure orderly disposal

    • Automated or manual delete

    • Audit trails



Step 1 business policies drive archiving l.jpg
Step 1: Business Policies Drive Archiving

  • Identify applications that manage regulated data

  • Build consensus among stakeholders on retention and retrieval:

    • Business owners, application developers, storage

    • Include CFO, legal, compliance, security

  • Document your business policies:

    • Types of data (Active, Inactive/Historical, Reference)

    • Processes for Archiving, Viewing, Retrieving Objects

    • Processes for Compliance and Disposal



Step 2 define the storage architecture l.jpg
Step 2: Define the Storage Architecture

  • Technical Safeguards (Security)

  • Data integrity safeguards

    • Access controls – authentication, authorization

    • Recording media (WORM media or subsystems)

    • Secure audit trails, duplicate copies, etc.

  • Data privacy safeguards

    • Access controls – authentication, authorization

    • Data encryption

    • Access logs, audits and reports

      *Exact requirements depend on regulatory environment


Storage goals and criteria l.jpg
Storage Goals and Criteria

Goals:

  • Cost effective

  • Easy to manage and scale

  • Ensure accessibility for many years

    Selection Criteria:

  • Storage capacity

  • Availability

  • Manageability

  • Performance

  • Cost

    Existing storage technology to be combined with new storage technology (e.g. ATA disk storage) to help reduce cost.


Step 3 don t forget about process l.jpg
Step 3: Don’t Forget About Process

  • Important regulatory requirements specify that the data must remain unaltered and accessed only by the proper individuals.

  • Accessibility, storage and audit policies each result in a specific set of processes that govern their maintenance and education.

  • Consistent, repeatable, controlled, documented archive and access methods and tools


Possible alternatives to archiving l.jpg
Possible Alternatives to Archiving

  • Tune or partition the database

  • Add capacity

    • Processors, storage

  • Back up the database

  • Purge data

  • Alleviate symptoms temporarily, but…

    • Inflate costs

    • Do not address underlying data growth


Archiving solution technical requirements l.jpg
Archiving Solution Technical Requirements

  • Basic Requirements

    • Support archive, purge and retrieve operations, including selective retrieve

    • Ensure referential integrity of archived data

    • Increase database performance and minimize batch windows

    • Ensure security and maintain access control of archived data

    • Archive data stored in database as well as the File System, and maintained linkage

  • Archival Definition

    • Allow scope of archive and cascading purge to be controlled

    • Maintain schema information in addition to archive data

    • Provide pre-defined archival configurations for key objects

    • Allow pre-defined archival configurations to be modified to reflect configurations made to applications


Archiving solution technical requirements 2 l.jpg
Archiving Solution Technical Requirements (2)

  • Archive Data Storage and Access

    • Provide access to archived data from within the application

    • Allow data to be archived to another database and offline storage, and integrate with hierarchical storage management

      • Example – Archive to IBM DR550, long term retention

  • Archive Management

    • If there is an interruption in the archive, purge and retrieve processes, be able to recover from the point of the interruption

    • Report on what data is archived

    • Provide administrative tools to manage the archives


Creating and managing archived data l.jpg

Identify the data to archive

Define the data to delete

Select Archive File storage

Create the archive

Research, report, retrieve

Creating and Managing Archived Data


Choosing the best access method l.jpg
Choosing the Best Access Method

  • Native application access

    • Convenient for functional users

    • Can slow down online transaction processing

  • “Self-Help” access (Canned Reports, Query Tools)

    • Convenient for functional users

    • No IT services required

  • Application independent access

    • Preserves a complete view of historical business records regardless of originating application or version

    • Facilitates decommissioning, upgrade and migration paths


Summary of advice l.jpg
Summary of Advice

  • Recognize that IT owns Infrastructure, but the Business owns the data

  • Improve functional processes by tiering services by functional need

    • Higher service levels on current transactions

    • Lower-cost, lower service levels on historical transactions

  • Limit liability by ensuring real-time compliance controls are sustained and documented in your historical retention processes and tools

    • Respond quickly and accurately to audit requests

    • Reduce costs of discovery



ad
  • Login