The reduction of the size of a data set, such as a packet or file, so that it requires less storage space or can be transmitted with less bandwidth. Compression is carried out in software (software compression) or dedicated hardware (hardware compression). Software compression speed is dependent on computer processor power, whereas hardware compression potentially gives superior performance without loading the host system and is transparent to the user. Data transfer speed and total storage capacity are affected by the data compression achieved. Compression is a process of removing fine-grained redundancy from data prior to storing or transmitting it. The granularity may vary, but generally compression deals with redundancy in grains of a few bytes. This is as compared to deduplication, which deals with redundancy in a granularity generally in KB or larger. Because of the difference in granularity between deduplication and compression, deduplicated data can generally be further reduced in size with compression techniques. Compression relies on finding patterns in the data. If the data is very random in nature (for example, due to it having been encrypted), the amount of achievable compression will be low to zero.
Compact, scalable deduplication appliances with enterprise performance, replication, and manageability.
Scalable disk-backup and replication appliances featuring variable-length deduplication for maximum data reduction and highest value—all powered by StorNext 5.
Variable-length deduplication typically reduces disk backup capacity by more than 90% and allows existing networks to be used for automated DR protection.
Enterprise deduplication appliances with the power and performance needed for data centers, multi-site installations, and cloud environments.
Industry's first virtual deduplication appliances for protecting virtual and physical servers using a software-only device—perfect for remote offices.
In the digital age, maximizing asset value often means using different storage tiers with different cost and access characteristics for data in different stages of its life.