Skip to main content

Implementing IBM Storage Data Deduplication Solutions

An IBM Redbooks publication


Published on 24 March 2011

  1. .EPUB (6.2 MB)
  2. .PDF (9.7 MB)

Apple BooksGoogle Play Books

Share this page:   

ISBN-10: 0738435244
ISBN-13: 9780738435244
IBM Form #: SG24-7888-00

Authors: Alex Osuna, Eva Balogh, Alexandre Ramos Galante de Carvalho, Rucel F. Javier and Zohar Mann

    menu icon


    Until now, the only way to capture, store, and effectively retain constantly growing amounts of enterprise data was to add more disk space to the storage infrastructure, an approach that can quickly become cost-prohibitive as information volumes continue to grow and capital budgets for infrastructure do not.

    In this IBM® Redbooks® publication, we introduce data deduplication, which has emerged as a key technology in dramatically reducing the amount of, and therefore the cost associated with storing, large amounts of data. Deduplication is the art of intelligently reducing storage needs through the elimination of redundant data so that only one instance of a data set is actually stored. Deduplication reduces data an order of magnitude better than common data compression techniques. IBM has the broadest portfolio of deduplication solutions in the industry, giving us the freedom to solve customer issues with the most effective technology. Whether it is source or target, inline or post, hardware or software, disk or tape, IBM has a solution with the technology that best solves the problem. This IBM Redbooks publication covers the current deduplication solutions that IBM has to offer:

    • IBM ProtecTIER® Gateway and Appliance
    • IBM Tivoli® Storage Manager
    • IBM System Storage® N series Deduplication

    Table of Contents

    Part 1. Introduction to Deduplication

    Chapter 1. Introduction to Deduplication

    Chapter 2. Introduction to N series Deduplication

    Chapter 3. Introduction to ProtecTIER deduplication

    Chapter 4. Introduction to IBM Tivoli Storage Manager deduplication

    Part 2. Planning for deduplication

    Chapter 5. N series deduplication planning

    Chapter 6. ProtecTIER planning

    Chapter 7. ITSM planning

    Part 3. Implementing Deduplication

    Chapter 8. Implementing N series deduplication

    Chapter 9. Implementing ProtecTIER

    Chapter 10. Implementing ITSM deduplication

    Chapter 11. Suggestions

    Appendix A. N series use case

    Appendix B. ProtecTIER user cases

    Appendix C. ITSM deduplication examples


    Others who read this also read