Nine Best Practices for Efficient Database Archiving

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Previous Nine Best Practices for Efficient Database Archiving-1 Next

Click through for nine best practices for effective ILM archiving, as identified by Informatica.

Organizations that use prepackaged ERP/CRM, custom, and third-party applications are seeing their production databases grow exponentially. At the same time, business policies and regulations require them to retain structured and unstructured data indefinitely. Storing increasing amounts of data on production systems is a recipe for poor performance no matter how much hardware is added or how much an application is tuned. Organizations need a way to manage this growth effectively.

Over the past few years, the Storage Networking Industry Association (SNIA) has promoted the concept of Information Lifecycle Management (ILM) as a means of better aligning the business value of data with the most appropriate and cost-effective IT infrastructure — from the time information is added to the database until it can be destroyed.

While the SNIA defines what an ILM system should accomplish, it does not specify any particular technology for implementing application ILM. According to Informatica, archiving is one approach that can be particularly effective — if organizations follow archiving best practices to ensure the optimal management of data during its life cycle.

This slideshow features Informatica’s best-practices approach for implementing application ILM archiving.

More Slideshows:

Five Online Routes to the Recruiters' Short List Make sure you make it to the short list when professional talent scouts are looking for candidates.

IT Procurement Best Practices to Reduce Risk in Cloud Contracts Nine contractual terms managers should examine when negotiating cloud contracts.

CIOs Set 2011 Priorities Survey finds that while business intelligence and analytics are still the highest priority, interest in all things cloud computing is rising fast.


Related Topics : Application Security, IT Process Management, Six Sigma

More Slideshows

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Analytics21-190x128 5 Ways to Avoid Becoming 'Digital Prey'

Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ...  More >>

NETSCOUTShadowIT0x 6 Tips for Combating Shadow IT Once and for All

To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.