In the "Wild
West" days of the early United States, there wasn't a quick, nor reliable,
way to transport data from one place to another. You would have to send and
receive data, via written messages. You would then have to send that message
with people heading in that general direction, in hopes that it would get there
months later. If that letter contained sensitive information, they would either
have to write using coded wording, or hope that the numerous
"carriers" would not let curiosity get the best of them. If some
nefarious soul were determined to use forceful means to acquire your message,
you could bet that the letter you sent with the Smith family bound for
Tascaloosa was sure to be given up quickly. To solve these problems, a few entrepreneurial fellows created the Pony
Express ("PE"). The PE employed mail carriers to
specialize in the expedited delivery of messages (data) and to ensure secure
delivery.
The formation of the
PE was revolutionary, but that concept continued to be improved upon. The PE
was replaced by the telegraph and the United States Post Office, and they, along with private
enterprise, gradually improved both the speed and security of the delivery of
data. Fast forward to today, where most of your data delivery is done
electronically. But despite hundreds of years of innovation, the Pony Express
has found its way back into your application delivery projects, data center
consolidations, and disaster recovery
solutions; slowing your projects, injecting defects, and skyrocketing costs.
Tell-tale signs that
the Pony Express is alive and well in your Government Agency or Company:
- When a new database copy or application environment needs to be made, you submit a request/ticket that has to pass through numerous hands and wait days/weeks/months before it is delivered.
- When a database or application environment data needs to be refreshed, you submit a request/ticket that has to pass through numerous hands and wait days/weeks/months before it is delivered.
- You rely on a person/group to manually ensure production data is secured via masking/obfuscation before delivering data to non-production sources.
- You subset data to accomplish any of the above in a reasonable amount of time or at a reasonable cost.
- You chuckled and thought "I wish I could do that" or "I wish I could get it that fast" to any of the above.
If none of the above apply, then I
wholeheartedly thank you for being a Delphix customer. If any of the above
apply, then you are a victim of the 1800's.
Whether your data is
a Microsoft, Oracle, PostGres, or Sybase database; or if your data is in files
on Linux, Unix, or Microsoft operating systems; waiting on multiple people to
deliver your data (when they get around to it) and entrusting them to secure it
is a centuries old methodology. The Delphix Agile Data Platform can deliver
full read/write autonomous copies of your data within minutes in as little as
10% of the space. And not just gigabytes of data, but terabytes. (Is 5TB in 5 minutes fast enough for you?) If you
choose, Delphix Agile Masking will also ensure that each one of those copies
has had all of the sensitive information replaced with pseudo-data to ensure
that your copies will have realistic data that will help your projects move
faster at reduced risk.
The Pony Express was
the first attempt along the data agility journey that has recently taken a huge
leap forward despite around a decade of stunted innovation and "business
as usual." It's time to put those ponies out to pasture.
For more information check out the following links:






