Datasheet
suMMarY
|
17
Each of these capabilities will be covered in future chapters — including in-depth discussions
on how they work as well as practical, step-by-step instructions on getting started with each of
those technologies.
Selecting a data protection plan from among the multiple choices and then reliably imple-
menting your plan in a cohesive way is critical — no matter how large or small, physical or vir-
tual, your particular “enterprise” happens to be. There are a few key points that I hope you take
away from this chapter:
Start with a vision of what you want to recover, and then choose your protection technologies
•u
(usually plural) — not the other way around.
Tape is not evil and disk is not perfect — but use each according to what each medium is •u
best suited for.
Be clear among your stakeholders as to whether you are seeking better protection or better
•u
availability. It’s not always both and rarely does one technology or product cover them equally.
Deliver “availability” within the workload/server if possible and achieve “protection” •u
from a unified solution.
No single protection or availability technology will cover you. Each addresses certain sce-
•u
narios and you will want to look at a “balanced diet” across your enterprise — protecting
each according to their needs.
Now that you know what you want to accomplish, let’s move on to Chapter 2, where you’ll
learn how to quantify your solution, compare choices, and cost-justify.
572146c01.indd 17 6/23/10 5:42:21 PM