Finding a Cure for Downtime
|
|
- Isabel Eaton
- 8 years ago
- Views:
Transcription
1 Finding a Cure for Downtime 7 Tips for Reducing Downtime in Healthcare Information Systems EXECUTIVE SUMMARY THE COST OF DOWNTIME IN HEALTHCARE According to research by Healthcare Informatics: Every minute of downtime to healthcare information systems costs more than $264 for a typical 500-bed hospital. Each 1% of downtime per year costs more than $1.4 million for that same 500-bed hospital in additional operating costs. That's not including the potential costs of medical errors made during downtime. The continued adoption of electronic medical records, PACS and other health information systems are becoming an increasingly integral part of the delivery of patient care. With vital patient information residing in electronic health records and images, tolerance for system downtime is approaching zero. In addition, if patient data is lost or corrupted, HIPAA and JCAHO data integrity and data protection requirements could be at risk. Whether you're a local community hospital or national health network, this paper outlines seven key tips that every healthcare organization should consider to protect the availability of healthcare information systems. From reducing human error, to understanding the key differences between high availability and disaster recovery, to selecting the right hardware and storage components, this paper provides an overview of the key steps necessary to ensure the availability and integrity of your healthcare information systems. SEVEN TIPS FOR REDUCING DOWNTIME TIP #1: REDUCE HUMAN ERROR Human error is one of the primary sources of unplanned downtime. There are two main types of human factors that cause or worsen downtime:
2 1. The initial human errors that cause the downtime 2. Additional errors after an outage has occurred that delay uptime restoration Left to ourselves, we humans (even IT people) will complicate all processes and guidelines. - Niel Nickolaisen Niel Nickolaisen, IT process management expert and co-author of the new book Stand Back and Deliver: Accelerating Business Agility, says that in his experience working with best practices companies, system downtime can be reduced by at least 70% by defining and implementing a simple IT change management process, which includes identifying and researching the change, performing risk analysis on the change, and consistently communicating the change. All changes should be reviewed using a cross-functional team, always including the operational people who are responsible for maintaining the changed system. Including a cross-functional review as part of the change management process is essential to avoiding unexpected problems that can lead to unplanned downtime. Different teams may be aware of interdependencies between systems that may otherwise go unnoticed. For example, when a problem occurs, someone must identify the problem correctly and take steps to address it. To restore service or ensure continued availability, operations teams may need to replace damaged server hardware, restore lost data, replace redundant network connections, and/or reload applications or an operating system. The next step in reducing human error is to simplify IT processes, including change management processes, wherever possible. As Nickolaisen puts it in his law of inverse entropy: "Left to ourselves, we humans (even IT people) will complicate all processes and guidelines." To guard against excess complexity, he suggests revisiting and reviewing change management processes regularly, and making changes if: Change management processes exceed two pages A change review form exceeds one page in length A special "emergency" change process emerges because the ordinary process is too time-consuming or complex The same general principles apply to ordinary operational processes. Managing and maintaining availability in the IT organization should be simple, reducing the strain on expert employees. For example, IT operations staff should be able to: Roll back changes easily Easily maintain, upgrade or replace an IT infrastructure component without complex processes for switching components in and out of production P a g e 2
3 Many technologies for high availability actually introduce complexity into the IT environment. For example, clustering technologies may require administrators to painstakingly maintain each server in the cluster to support successful failover. IT organizations instead should find and embrace those technologies that reduce complexity for operational staff thereby eliminating potential sources of human error. TIP #2: UNDERSTAND THE DIFFERENCE BETWEEN HA AND DR Don't confuse high availability (HA) and disaster recovery (DR), or expect a DR solution to meet your availability needs. Put simply, HA is about preventing downtime and disasters, while DR is recovering from problems once they occur. Disaster recovery solutions are designed to help you recover from true disasters (floods, fires), not minor problems (network card failure, storage corruption). To identify your needs, you should evaluate two key factors: Recovery Time Objective (RTO): How long can you afford to have your system down if at all? Electronic healthcare record systems or patient identification systems, for example, may not tolerate any downtime. Recovery Point Objective (RPO): How out-of-date can you afford your data to be once the system is up and running again? HIPAA regulations require that you protect patient records from loss. DR failover is sometimes necessary, but is usually a lengthy and complex process. Outages of hours or days are costly and dangerous in the healthcare environment. Your systems should be able to keep operating through minor problems and disruptions that fall short of site-wide disasters. Local HA protection can keep your systems running during the common, minor outages and failures that plague complex computer systems. And for complete protection, you should combine local HA with DR as protection from major, site-wide failures. TIP #3: REDUCE SERVER FAILURES WITH QUALITY HARDWARE AND COMPONENT REDUNDANCY Server hardware problems can cause unplanned downtime in several ways: Catastrophic server failures caused by memory, processor or motherboard failures Failures of server components, including power supplies, fans, internal disks, disk controllers, host bus adapters and network adapters P a g e 3
4 To reduce the chances of catastrophic server failure, purchase robust name brand servers, perform recommended preventative maintenance, and monitor server errors for signs of future problems. To reduce downtime caused by server component failures, add redundancy at the component level. Examples include: redundant power and cooling, ECC memory, with the ability to correct single-bit memory errors, and combining Ethernet cards with RAID. TIP #4: PROTECT AGAINST STORAGE FAILURES WITH STORAGE DEVICE REDUNDANCY AND RAID Government regulations require that you protect patient data from loss. Use device redundancy combined with RAID storage algorithms to protect data access and data integrity from hardware failures. For local storage, add extra disks configured with RAID protection. Use a second disk controller to prevent the controller itself from being a single point of failure. Access to shared storage relies on either a fibre channel or Ethernet storage network. To assure uninterrupted access to shared storage, these networks must be designed to eliminate all single points of failure. This requires redundancy of storage network paths, network switches, and network connections to each storage array. TIP #5: USE REDUNDANT NETWORK PATHS, SWITCHES AND ROUTERS TO PROTECT AGAINST NETWORK FAILURES The network is another possible source of downtime. The network infrastructure itself must be fault-tolerant, with redundant network paths, switches, routers and other network elements. Use redundant server connections to eliminate failovers caused by the failure of a single server or network component. Make sure that the physical network hardware does not share common components. For example, dual-ported network cards share common hardware logic, and a single card failure can disable both ports. For full redundancy, you need either two separate adapters or a built-in network port combined with a separate network adapter. TIP #6: PROTECT AGAINST SITE FAILURES WITH DATA REPLICATION TO ANOTHER SITE Many factors can cause site-wide failures, including an air conditioning failure or leaking roof, a power failure, or a major hurricane. Site disruptions can last anywhere from a few hours to days or even weeks. There are two methods for replicating data across sites. One method is to tightly couple redundant servers across high speed/low latency links, to provide zero dataloss and zero downtime. The other method is to loosely couple redundant servers P a g e 4
5 over medium speed/higher latency/greater distance lines. This provides a disaster recovery capability where a remote server can be restarted with a copy of the application database missing only the last few updates. In the latter case, asynchronous data replication maintains a backup copy of the database. Combine data replication with error detection and failover tools to help get a disaster recovery site up and running in minutes or hours, rather than days remaining compliant with industry regulations while preserving access to patient data. TIP #7: USE HA SOFTWARE TO AUTOMATE PROTECTION OF SERVERS, STORAGE AND NETWORKS Implementing steps 3-6 above requires a significant investment of time and resources, particularly if you have no automated way to monitor and react to failures in the application infrastructure. Automated application availability software can reduce or entirely eliminate downtime and data loss without adding a lot of overhead. A software solution can monitor and react to failures in systems, storage and networks, automatically reconfiguring resources to keep the application operating with little or no interruption or loss of client connectivity. The next section of this paper describes the automated application availability software developed by Marathon Technologies and its use in the healthcare industry to protect healthcare information systems. everrun PROTECTS HEALTHCARE APPLICATIONS FROM DOWNTIME Marathon Technologies' everrun software provides automated application availability that is easy to deploy, maintain and afford. everrun eliminates the complexities and hidden costs of traditional high availability and data protection products to give you reliable, affordable application protection. Delivered in software, everrun makes application availability practical for a wide range of healthcare applications, including imaging systems, electronic medical records, building security systems and others. Leading healthcare providers around the globe rely on everrun to protect applications critical to patient care. everrun offers: High availability: everrun's ComputeThru technology means that EHR and PACS applications keep running around the clock helping you meet HIPAA and JCAHO data integrity and data protection requirements. P a g e 5
6 Affordability: everrun fits seamlessly with existing infrastructure, supporting commodity, low-cost hardware and local, shared-disk or SANbased storage. It has a lower acquisition cost than other solutions, with a much lower total cost of ownership than cluster solutions. Automation: With automated fault detection and policy management, everrun monitors systems continuously and automatically addresses failures. everrun does not require any specialized training. Easy integration: everrun supports any Windows application, even special or custom applications, without requiring custom scripts or application changes. BELFAST CITY HOSPITAL CASE STUDY "In the space of a week, the everrun system proved its worth." Philip Leighton, Belfast City Hospital Opened in March 2006, Belfast City Hospital s Oncology Centre is the Regional Centre of Excellence in the treatment of cancer across Northern Ireland. REQUIREMENTS Belfast Hospital needed a system that would be accessible by all cancer units, 24x7, throughout Northern Ireland, and that could be easily updated in real-time. This system ensures that all the information on a patient, their diagnosis, treatment and progress can be accessed from any of the cancer units throughout Northern Ireland. They turned to Real Time Systems Ltd (RTLS), an IT solutions provider, to design and implement a state-of-the-art IT solution for patient care. And RTLS chose everrun to protect the critical patient systems. THE SOLUTION RTSL designed the IT system, using everrun to work within the existing infrastructure while providing 24x7 availability. They then implemented a 'split site' solution from Marathon to protect the system from a site-wide disruption. THE RESULTS The resulting system has not experienced any unscheduled downtime since implementation. Philip Leighton, Senior Systems Specialist, Belfast City Hospital says, It is unthinkable what we would be up against without this system in place. We transferred all the users on to the system over a weekend period; in the space of a week, the everrun system proved its worth. Belfast City Hospital has plans to move more of their systems over to everrun in the long term. The main beneficiaries are the patients, as patient care was at the core of the systems design. P a g e 6
7 The Marathon solution for SiPass, offers us the extremely high level of availability we need for our critical control system at 24*7 facilities, where interruptions in the access control security system cannot be tolerated. - Royce Cox, Senior Project Manager SCOTT & WHITE HOSPITAL AND CLINIC CASE STUDY Scott & White Memorial Hospital and Clinic is the largest multi-specialty practice in Texas, with more than 500 physicians who provide care in Temple and at 15 regional clinics throughout Central Texas. In addition to accepting most major insurance plans, they deliver care to members of the Scott & White Health Plan, one of the highest rated plans in the nation. Scott & White is also the clinical educational site for The Texas A&M Health Science Center College of Medicine. REQUIREMENTS Scott & White s Center for Advanced Medicine (CAM) is technologically integrated, interdisciplinary and designed for the most important people in a hospital the patients. This new facility has a Siemens SiPass access control system installed for security. The access control for other clinics in surrounding areas is also controlled from the same server, installed in the CAM. Siemens Building Technologies was chosen to provide a single controlling SiPass system to control access to all of these important facilities which operate 24*7. A solution was required to protect the SiPass security system from any failures. Marathon s everrun was chosen, since it is the qualified fault tolerant solution for Siemens SiPass and it offers simple and superior application and system availability. THE SOLUTION everrun was set up in a very short time and passed the hospital s required tests immediately. everrun synchronizes two standard Windows servers to create a virtual application environment that runs a single license of SiPass on both servers simultaneously. If a device or even an entire server fails, SiPass continues to operate uninterrupted. All redundancies and failures are completely transparent to the applications and users, with no interruption or downtime. Applications are installed, managed and accessed through a single Windows environment, eliminating the need to license, install and manage multiple copies as required in clustering and failover situations. THE RESULTS The Marathon solution for SiPass offers us the extremely high level of availability we need for our critical control system at 24 by 7 facilities, where interruptions in the access control security system cannot be tolerated, said Royce Cox, Senior Project Manager of Siemens Building Technologies. P a g e 7
8 SUMMARY No matter what size your healthcare organization, you cannot afford downtime or data loss for critical, patient-facing systems. The seven tips outlined in this paper highlight processes and strategies that you can adopt today to reduce the risks of downtime, while containing the cost of IT management. More than 2,500 organizations around the world trust their application availability to Marathon s everrun software. Find out how Marathon can help your organization ensure regulatory compliance, contain costs and protect patient safety with automated availability. To see everrun in action, watch our product demo videos, or download a free 30-day evaluation license, visit P a g e 8 The Marathon logo, SplitSite and everrun are trademarks or registered trademarks of Marathon Technologies Corporation. Microsoft and Windows are registered trademarks of Microsoft Corporation. All other trademarks and registered trademarks are the property of their respective owners. Copyright 2010 Marathon Technologies Corporation. All rights reserved. Marathon Technologies Corporation reserves the right to make changes to this document at any time and without further notice. Marathon Technologies Corporation assumes no responsibility for any errors that may appear in this document.
Protecting SQL Server in Physical And Virtual Environments
Protecting SQL Server in Physical And THE NEED TO PROTECT SQL SERVER AND RELATED APPLICATIONS Microsoft SQL Server is the preferred database management system for a large number of Windows-based applications.
More informationFive Secrets to SQL Server Availability
Five Secrets to SQL Server Availability EXECUTIVE SUMMARY Microsoft SQL Server has become the data management tool of choice for a wide range of business critical systems, from electronic commerce to online
More informationFault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform
Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform Why clustering and redundancy might not be enough This paper discusses today s options for achieving
More informationBusiness Continuity: Choosing the Right Technology Solution
Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail
More informationRed Hat Enterprise linux 5 Continuous Availability
Red Hat Enterprise linux 5 Continuous Availability Businesses continuity needs to be at the heart of any enterprise IT deployment. Even a modest disruption in service is costly in terms of lost revenue
More informationAchieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
More informationIBM Virtualization Engine TS7700 GRID Solutions for Business Continuity
Simplifying storage processes and ensuring business continuity and high availability IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity The risks are even greater for companies that
More informationAffordable Remote Data Replication
SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted
More informationHRG Assessment: Stratus everrun Enterprise
HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at
More informationEonStor DS remote replication feature guide
EonStor DS remote replication feature guide White paper Version: 1.0 Updated: Abstract: Remote replication on select EonStor DS storage systems offers strong defense against major disruption to IT continuity,
More informationIBM System Storage DS5020 Express
IBM DS5020 Express Manage growth, complexity, and risk with scalable, high-performance storage Highlights Mixed host interfaces support (Fibre Channel/iSCSI) enables SAN tiering Balanced performance well-suited
More informationCreating A Highly Available Database Solution
WHITE PAPER Creating A Highly Available Database Solution Advantage Database Server and High Availability TABLE OF CONTENTS 1 Introduction 1 High Availability 2 High Availability Hardware Requirements
More informationFault Tolerant Servers: The Choice for Continuous Availability
Fault Tolerant Servers: The Choice for Continuous Availability This paper discusses today s options for achieving continuous availability and how NEC s Express5800/ft servers can provide every company
More informationHP StorageWorks Data Protection Strategy brief
HP StorageWorks Data Protection Strategy brief Your business depends on IT more than ever before. The availability of key application services and information is critical to maintain business processes,
More informationSolution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware
Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery
More informationGetting Started with Endurance FTvirtual Server
Getting Started with Endurance FTvirtual Server Marathon Technologies Corporation Fault and Disaster Tolerant Solutions for Windows Environments Release 6.1.1 June 2005 NOTICE Marathon Technologies Corporation
More informationAssuring High Availability in Healthcare Interfacing Considerations and Approach
Assuring High Availability in Healthcare Interfacing Considerations and Approach High availability is a term used in the software industry to indicate that the application is available a high percentage
More informationMaximumOnTM. Bringing High Availability to a New Level. Introducing the Comm100 Live Chat Patent Pending MaximumOn TM Technology
MaximumOnTM Bringing High Availability to a New Level Introducing the Comm100 Live Chat Patent Pending MaximumOn TM Technology Introduction While businesses have become increasingly dependent on computer-based
More informationVeritas InfoScale Availability
Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale
More informationSQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH EQUALLOGIC AUTO-SNAPSHOT MANAGER
WHITE PAPER SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH EQUALLOGIC AUTO-SNAPSHOT MANAGER MANAGEMENT SERIES Business critical applications depend on Relational Database Management Systems (RDBMS)
More informationVeritas Storage Foundation High Availability for Windows by Symantec
Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability
More informationTitle Goes ASSET MANAGEMENT
Title Goes ASSET MANAGEMENT MAXIMIZING UPTIME: BUILDING A FAULT-TOLERANT FACTORYTALK ASSETCENTRE SYSTEM ASSET MANAGEMENT Introduction FactoryTalk AssetCentre software has proven to be the industry standard
More informationFour Steps to Disaster Recovery and Business Continuity using iscsi
White Paper Four Steps to Disaster Recovery and Business Continuity using iscsi It s a fact of business life physical, natural, and digital disasters do occur, and they interrupt operations and impact
More informationTraditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking
Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like
More informationDeveloping a dynamic, real-time IT infrastructure with Red Hat integrated virtualization
Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization www.redhat.com Table of contents Introduction Page 3 Benefits of virtualization Page 3 Virtualization challenges
More informationSTORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER
STORAGE CENTER DATASHEET STORAGE CENTER Go Beyond the Boundaries of Traditional Storage Systems Today s storage vendors promise to reduce the amount of time and money companies spend on storage but instead
More informationSymantec Cluster Server powered by Veritas
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
More informationBlackboard Managed Hosting SM Disaster Recovery Planning Document
BLACKBOARD MANAGED HOSTING Blackboard Managed Hosting SM Disaster Recovery Planning Document Prepared By: MH Services Modified Date: March 2009 Revision: 1.8 1. OBJECTIVES... 3 2. SCOPE... 3 3. ASSUMPTIONS...
More informationSite-Wide Disaster Recovery and Business Continuity Solutions
Site-Wide Disaster Recovery and Business Continuity Solutions Enterprises need an effective disaster recovery and business continuity plan to safeguard critical business processes. This article presents
More informationEnd-to-End Availability for Microsoft SQL Server
WHITE PAPER VERITAS Storage Foundation HA for Windows End-to-End Availability for Microsoft SQL Server January 2005 1 Table of Contents Executive Summary... 1 Overview... 1 The VERITAS Solution for SQL
More informationHigh availability and disaster recovery with Microsoft, Citrix and HP
High availability and disaster recovery White Paper High availability and disaster recovery with Microsoft, Citrix and HP Using virtualization, automation and next-generation storage to improve business
More informationVeritas Cluster Server from Symantec
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
More informationMission-Critical Fault Tolerance for Financial Transaction Processing
W H I T E P A P E R Mission-Critical Fault Tolerance for Financial Transaction Processing Windows-based payments solutions from ACI and Stratus deliver mainframe-class uptime assurance Uptime. All the
More informationProtecting Microsoft SQL Server
Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary
More informationOVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available
Phone: (603)883-7979 sales@cepoint.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous
More informationBackup and Redundancy
Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down
More informationReal-time Protection for Hyper-V
1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate
More informationExecutive Brief Infor Cloverleaf High Availability. Downtime is not an option
Executive Brief Infor Cloverleaf High Availability Downtime is not an option Gain value from Infor by: Delivering continuous access to mission-critical systems and data Providing uninterrupted continuity
More informationDeltaV Virtualization High Availability and Disaster Recovery
DeltaV Distributed Control System Whitepaper October 2014 DeltaV Virtualization High Availability and Disaster Recovery This document describes High Availiability and Disaster Recovery features supported
More informationProtect Your Business with Automated Business Continuity Solutions
SOLUTION brief Protect Your Business with Automated Overview VMware makes business continuity simple and affordable, so no company operating a single-site or multiple-site environment has to do without
More informationMicrosoft Cross-Site Disaster Recovery Solutions
Microsoft Cross-Site Disaster Recovery Solutions End-to-End Solutions Enabled by Windows 2008 Failover Clustering, Hyper-V, and Partner Solutions for Data Replication Published: December 2009 Introduction:
More informationParish National Bank. Parish National Bank increases protection with recovery management from EMC and VMware BUSINESS VALUE HIGHLIGHTS
Customer Focus on Business Continuity Parish National Bank Parish National Bank increases protection with recovery management from EMC and VMware BUSINESS VALUE HIGHLIGHTS SOLUTION SNAPSHOT Software: VMware
More informationStorage Backup and Disaster Recovery: Using New Technology to Develop Best Practices
Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,
More informationMicrosoft SQL Server on Stratus ftserver Systems
W H I T E P A P E R Microsoft SQL Server on Stratus ftserver Systems Security, scalability and reliability at its best Uptime that approaches six nines Significant cost savings for your business Only from
More informationWestek Technology Snapshot and HA iscsi Replication Suite
Westek Technology Snapshot and HA iscsi Replication Suite Westek s Power iscsi models have feature options to provide both time stamped snapshots of your data; and real time block level data replication
More informationDisaster Recovery: The Only Choice for Mission-Critical Operations and Business Continuity
Disaster Recovery: The Only Choice for Mission-Critical Operations and Business Continuity NEC Solutions (America), Inc. 2890 Scott Boulevard Santa Clara, CA 95050 www.necsam.com Disaster Recovery: The
More informationAvailability Digest. Stratus Avance Brings Availability to the Edge February 2009
the Availability Digest Stratus Avance Brings Availability to the Edge February 2009 Business continuity has not yet been extended to the Edge. What is the Edge? It is everything outside of the corporate
More informationPreface... 1. Introduction... 1 High Availability... 2 Users... 4 Other Resources... 5 Conventions... 5
Table of Contents Preface.................................................... 1 Introduction............................................................. 1 High Availability.........................................................
More informationSQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER
WHITE PAPER SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER Business critical applications depend on Relational Database Management Systems (RMS) to store and
More informationFault Tolerant Solutions Overview
Fault Tolerant Solutions Overview Prepared by: Chris Robinson Sales & Technical Director 24/7 Uptime Ltd October 2013 This document defines and highlights the high level features, benefits and limitations
More informationEliminating End User and Application Downtime:
Eliminating End User and Application Downtime: Architecting the Right Continuous Availability and Disaster Recovery Environment March 2010 Table of Contents Introduction 3 Where to Start 3 Moving to Continuous
More informationLeveraging Virtualization for Disaster Recovery in Your Growing Business
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
More informationW H I T E P A P E R. Disaster Recovery Virtualization Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take
W H I T E P A P E R Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take Contents Introduction...1 What is VMware Infrastructure?...1 What is Double-Take?...1 Data Protection
More informationVERITAS Business Solutions. for DB2
VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................
More informationBusiness Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time
Business Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time Introduction This is the third of a series of best practices workbooks designed to familiarize
More informationEMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers
EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is
More informationServer and Storage Virtualization: A Complete Solution A SANRAD White Paper
Server and Storage Virtualization: A Complete Solution A SANRAD White Paper copyright SANRAD 2008 SANRAD Inc. www.sanrad.com Server and Storage Virtualization: A Complete Solution A SANRAD Whitepaper Server
More informationHow can I deploy a comprehensive business continuity and disaster recovery solution in under 24 hours without incurring any capital costs?
SOLUTION BRIEF: CA INSTANT RECOVERY ON DEMAND How can I deploy a comprehensive business continuity and disaster recovery solution in under 24 hours without incurring any capital costs? CA Instant Recovery
More informationInformix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11
Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node
More informationVeritas Cluster Server by Symantec
Veritas Cluster Server by Symantec Reduce application downtime Veritas Cluster Server is the industry s leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status
More informationPROTECTING MICROSOFT SQL SERVER TM
WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden
More informationThe Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss
More informationcourtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P
courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview Business Continuity, Disaster Recovery and Data Center Consolidation IT managers today must be ready for the
More informationOPTIMIZING SERVER VIRTUALIZATION
OPTIMIZING SERVER VIRTUALIZATION HP MULTI-PORT SERVER ADAPTERS BASED ON INTEL ETHERNET TECHNOLOGY As enterprise-class server infrastructures adopt virtualization to improve total cost of ownership (TCO)
More informationPervasive PSQL Meets Critical Business Requirements
Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL White Paper May 2012 Table of Contents Introduction... 3 Data Backup... 3 Pervasive Backup Agent... 3 Pervasive PSQL VSS Writer... 5 Pervasive
More informationFeature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V
Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...
More informationPlanning and Implementing Disaster Recovery for DICOM Medical Images
Planning and Implementing Disaster Recovery for DICOM Medical Images A White Paper for Healthcare Imaging and IT Professionals I. Introduction It s a given - disaster will strike your medical imaging data
More informationHigh Availability Server Clustering Solutions
White Paper High vailability Server Clustering Solutions Extending the benefits of technology into the server arena Intel in Communications Contents Executive Summary 3 Extending Protection to Storage
More informationAchieve Continuous Computing for Mainframe Batch Processing. By Hitachi Data Systems and 21st Century Software
Achieve Continuous Computing for Mainframe Batch Processing By Hitachi Data Systems and 21st Century Software February 2016 Contents Executive Summary... 2 Introduction... 3 Difficulties in Recovering
More informationDISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES
DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 The Business Maturity Model V Enabled Web
More informationSkelta BPM and High Availability
Skelta BPM and High Availability Introduction Companies are now adopting cloud for hosting their business process management (BPM) tools. BPM on cloud can help control costs, optimize business processes
More informationHA / DR Jargon Buster High Availability / Disaster Recovery
HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster
More informationEMC SOLUTIONS TO OPTIMIZE EMR INFRASTRUCTURE FOR CERNER
EMC SOLUTIONS TO OPTIMIZE EMR INFRASTRUCTURE FOR CERNER ESSENTIALS Mitigate project risk with the proven leader, many of largest EHR sites run on EMC storage Reduce overall storage costs with automated
More informationAn Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database
An Oracle White Paper November 2010 Oracle Real Application Clusters One Node: The Always On Single-Instance Database Executive Summary... 1 Oracle Real Application Clusters One Node Overview... 1 Always
More informationMicrosoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options
This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware
More informationAbstract... 2. Introduction... 2. Overview of Insight Dynamics VSE and Logical Servers... 2
HP Insight Recovery Technical white paper Abstract... 2 Introduction... 2 Overview of Insight Dynamics VSE and Logical Servers... 2 Disaster Recovery Concepts... 4 Recovery Time Objective (RTO) and Recovery
More information24/7 Uptime for Electronic Health Records: Microsoft Windows-based EHRs and Stratus Medical Grade Servers. Healthcare
by Stratus Technologies, The Availability Company April 2009 Healthcare 24/7 Uptime for Electronic Health Records: Microsoft Windows-based EHRs and Stratus Medical Grade Servers Abstract The long migration
More informationHigh Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
More informationDISASTER RECOVERY PLANNING GUIDE
DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide
More informationIntroduction to Enterprise Data Recovery. Rick Weaver Product Manager Recovery & Storage Management BMC Software
Introduction to Enterprise Data Recovery Rick Weaver Product Manager Recovery & Storage Management BMC Software Contents Introduction...1 The Value of Data...2 Risks to Data Assets...2 Physical Loss...2
More informationUniversity of Texas at Brownsville and Texas Southmost College protects email data and enables 15-minute disaster recovery.
TECHNOLOGY BRIEF: REAL-TIME DATA REPLICATION IN A VIRTUAL ENVIRONMENT University of Texas at Brownsville and Texas Southmost College protects email data and enables 15-minute disaster recovery. Table of
More informationDelivering a New Level of Data Protection Resiliency with Appliances
SOLUTION BRIEF: SYMANTEC NETBACKUP........................................ Delivering a New Level of Data Protection Resiliency with Appliances Who should read this paper - Directors of IT and IT Managers
More informationA MIMECAST SPONSORED WHITE PAPER
A MIMECAST SPONSORED WHITE PAPER Email As Part of a Business Continuity StrategY Why always-on-business requires always-on-email Few businesses could function without email, and email provides a critical
More informationNEC Corporation of America Intro to High Availability / Fault Tolerant Solutions
NEC Corporation of America Intro to High Availability / Fault Tolerant Solutions 1 NEC Corporation Technology solutions leader for 100+ years Established 1899, headquartered in Tokyo First Japanese joint
More informationDeploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems
Deploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems Application Notes Abstract: This document describes how to apply global clusters in site disaster
More informationVERITAS Storage Foundation 4.3 for Windows
DATASHEET VERITAS Storage Foundation 4.3 for Windows Advanced Volume Management Technology for Windows In distributed client/server environments, users demand that databases, mission-critical applications
More informationDisaster Recovery for Small Businesses
Technical White Paper Disaster Recovery for Small Businesses A disaster recovery plan helps you understand what data is critical to your business operations and how to best protect it from unexpected failures.
More informationContents. SnapComms Data Protection Recommendations
Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery
More informationDisaster Recovery for Oracle Database
Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches
More informationAn Oracle White Paper January 2013. A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c
An Oracle White Paper January 2013 A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c TABLE OF CONTENTS Introduction 2 ASM Overview 2 Total Storage Management
More informationNeverfail for Windows Applications June 2010
Neverfail for Windows Applications June 2010 Neverfail, from Neverfail Ltd. (www.neverfailgroup.com), ensures continuity of user services provided by Microsoft Windows applications via data replication
More informationQuorum DR Report. Top 4 Types of Disasters: 55% Hardware Failure 22% Human Error 18% Software Failure 5% Natural Disasters
SAP High Availability in virtualized environments running on Windows Server 2012 Hyper-V Part 1: Overview Introduction Almost everyone is talking about virtualization and cloud computing these days. This
More informationW H I T E P A P E R. Reducing Server Total Cost of Ownership with VMware Virtualization Software
W H I T E P A P E R Reducing Server Total Cost of Ownership with VMware Virtualization Software Table of Contents Executive Summary............................................................ 3 Why is
More informationSQL Server Storage Best Practice Discussion Dell EqualLogic
SQL Server Storage Best Practice Discussion Dell EqualLogic What s keeping you up at night? Managing the demands of a SQL environment Risk Cost Data loss Application unavailability Data growth SQL Server
More informationMaximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity
Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity task is resuming business critical operations. Having
More informationDISASTER RECOVERY ebook FACING DISASTERS HEAD ON
DISASTER RECOVERY ebook FACING DISASTERS HEAD ON CHAPTER 1: Facing Reality CHAPTER 2: Disaster Recovery Considerations CHAPTER 3: Making the Best Choices CHAPTER 4: A Single, Unified Solution CHAPTER 5:
More informationContinuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs
EMC RECOVERPOINT FAMILY Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs ESSENTIALS EMC RecoverPoint Family Optimizes RPO
More informationTABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models
1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint
More informationENTERPRISE VIRTUALIZATION ONE PLATFORM FOR ALL DATA
ENTERPRISE VIRTUALIZATION ONE PLATFORM FOR ALL DATA ENTERPRISE VIRTUALIZATION ONE PLATFORM FOR ALL DATA SUMMARY ONE PLATFORM FOR ALL DATA WOULD YOU LIKE TO SAVE 20% TO 30% ON YOUR STORAGE SPEND? We can
More informationSOLUTION BRIEF: KEY CONSIDERATIONS FOR DISASTER RECOVERY
SOLUTION BRIEF: KEY CONSIDERATIONS FOR DISASTER RECOVERY A Disaster Recovery and Business Continuity plan is specific to the circumstances, priorities and expense versus the value decisions of the organization,
More information