Implementing IBM Storage Data Deduplication Solutions

An IBM Redbooks publication

Published 24 March 2011

cover image

ISBN-10: 0738435244
ISBN-13: 9780738435244
IBM Form #: SG24-7888-00
(322 pages)

More options

Rate and comment

Authors: Alex Osuna, Eva Balogh, Alexandre Ramos Galante de Carvalho, Rucel F. Javier, Zohar Mann


Until now, the only way to capture, store, and effectively retain constantly growing amounts of enterprise data was to add more disk space to the storage infrastructure, an approach that can quickly become cost-prohibitive as information volumes continue to grow and capital budgets for infrastructure do not.

In this IBM® Redbooks® publication, we introduce data deduplication, which has emerged as a key technology in dramatically reducing the amount of, and therefore the cost associated with storing, large amounts of data. Deduplication is the art of intelligently reducing storage needs through the elimination of redundant data so that only one instance of a data set is actually stored. Deduplication reduces data an order of magnitude better than common data compression techniques. IBM has the broadest portfolio of deduplication solutions in the industry, giving us the freedom to solve customer issues with the most effective technology. Whether it is source or target, inline or post, hardware or software, disk or tape, IBM has a solution with the technology that best solves the problem. This IBM Redbooks publication covers the current deduplication solutions that IBM has to offer:

  • IBM ProtecTIER® Gateway and Appliance
  • IBM Tivoli® Storage Manager
  • IBM System Storage® N series Deduplication

Table of contents

Part 1. Introduction to Deduplication
Chapter 1. Introduction to Deduplication
Chapter 2. Introduction to N series Deduplication
Chapter 3. Introduction to ProtecTIER deduplication
Chapter 4. Introduction to IBM Tivoli Storage Manager deduplication
Part 2. Planning for deduplication
Chapter 5. N series deduplication planning
Chapter 6. ProtecTIER planning
Chapter 7. ITSM planning
Part 3. Implementing Deduplication
Chapter 8. Implementing N series deduplication
Chapter 9. Implementing ProtecTIER
Chapter 10. Implementing ITSM deduplication
Chapter 11. Suggestions
Appendix A. N series use case
Appendix B. ProtecTIER user cases
Appendix C. ITSM deduplication examples

Follow IBM Redbooks

Follow IBM Redbooks