Protect Your Data With A-B-C And 3-2-1

Protecting data can be made simpler by looking at the mechanisms involved. The A-B-C of data management describes the most commonly used processes to protect data. A-B-C refers to Archive, Backup and Cloning, all of which are essential to cover all aspects of data protection and data preservation.

A Is For Archive
All files and projects that have been completed should migrate to the long-term archive, where they are catalogued and preserved. For returning customers, for reference and re-use of any kind, the archive provides the "Single Source of Truth“ because it is the one and only place to look for files. The Archive catalog provides browsing and visual presentation of media files with thumbnails and proxy clips. Finding files is made easy by providing metadata fields and menus for searching and combined searching. The metadata schema can and should be customised to fit the needs of the company and the workflow.
B Is For Backup
For less time-critical, an automated Backup is the way to go. Depending on the requirements, that backup can go to disk, cloud or tape storage. In case a file is deleted or corrupted, it can be found in the Backup index and a restore triggered. Depending on requirements, all users can be granted access to a backup so they may restore whenever need be.
The backup always replicates the present production storage, i.e. files needed for day-to-day work. All files that have been finalized or delivered can and should migrate to the archive in order to keep the main production storage and the files residing on it at a reasonable number.
C Is For Cloning
Time critical production storage needs to be cloned to a secondary volume. This serves as fail-over replacement for the primary production storage in case something goes wrong. Cloning is needed where there is no tolerance for the runtime of a restore. Cloning provides an identical copy or replication of a complete storage on a secondary storage device, which can then be used as fail-over for immediate data availability so production can continue within minutes. A cloning strategy requires a secondary storage that can at least to some degree replace the speed and performance of the primary production storage.

3-2-1 To Protect Your Data
The 3-2-1 rule is the most basic rule of data protection and should be observed in any professional IT environment where (media) files play an essential role. The rule states that at least three copies of each file should exist. They should be stored on two different types of media (LTO tape, HDD, SSD, Cloud). One of the copies must be stored off-site for maximum security.
You might also like...
IP Monitoring & Diagnostics With Command Line Tools: Part 7 - Remote Agents
How to run diagnostic processes in each machine and call them remotely from a centralised system that can marshal the results from many other networked systems. Remote agents act on behalf of that central system and pass results back to…
Growing Momentum For 5G In Remote Production
A combination of factors that includes new 3GPP 5G standards & optimizations that have reduced latencies & jitter, new network slicing capabilities and the availability of new LEO satellite services are bringing increasing momentum to the use of 5G for…
Building Software Defined Infrastructure: Part 4 - Integration
Welcome to Part 4 of Building Software Defined Infrastructure. This multi-part content series from Tony Orme explores the microservices based IT technologies that are driving the next phase of transition from hardware to software based broadcast systems. This series is essential…
Monitoring & Compliance In Broadcast: Accessibility & The Impact Of AI
The proliferation of delivery devices and formats increases the challenges presented by accessibility compliance, but it is an area of rapid AI powered innovation.
IP Monitoring & Diagnostics With Command Line Tools: Part 6 - Advanced Command Line Tools
We continue our series with some small code examples that will make your monitoring and diagnostic scripts more robust and reliable