An example of this method is comparing the name, size, type and date-modified information of two files with the same name being stored in a system. The most common methods of implementing deduplication are:įile system-based deduplication is a simple method to reduce duplicate data at the file level, and usually is just a compare operation within the file system or a file system-based algorithm that eliminates duplicates. Expanding upon my last blog on the business benefits of deduplication, let's dive into the details of how this technology works by looking at the different compute methods vendors are using within their dedupe offerings. ![]() This is why many service providers and enterprises rely upon the method of deduplication to keep storage costs in check. In the case of some businesses, cloud service providers might be the preferred method to back up files in the event of a disaster or hardware failure. This is a concern for almost every person who backs up their data to the cloud or share's information with friends and families over the network. Here in part two, I dig a bit deeper into the guts of how deduplication works and why it's important in ensuring that our personal and business data is continually and efficiently protected. It's a long story, but the good news is I am back and ready to go. Before getting to the next installment, I wanted to take a second and apologize to the readers for the long delay between posts. In part one of this series, I covered the basic concepts of data duplication.
0 Comments
Leave a Reply. |