Achieving Disaster Recovery Success

Size: px
Start display at page:

Download "Achieving Disaster Recovery Success"

Transcription

1 Achieving Disaster Recovery Success Ros Schulman Hitachi Data Systems Technical Track, Session March, 0 :-:m About the Seakers Ros Schulman is Director, Data Protection at Hitachi Data Systems with over years exerience in the IT business both on the vendor and customer side including systems rogramming, oerations, technical suort and sales suort. She currently works in the Global Solutions Strategy and Develoment organization with resonsibility for Data Protection Software and Mainframe Management software including Disaster recovery and backu software. She sends much of her time with Customers, discussing their unique Data Protection challenges. She has also co-authored many white aers in the area of Business Continuity. Rebecca M. Levesque is Chief Executive Officer of st Century Software and resonsible for shaing the comany s roduct strategy and vision. She has over 0 years exerience heling hundreds of comanies establish resiliency and recoverability strategies from any disrutive event. Her knowledge and deth of exerience is offered as a seaker at SHARE, IBM Systems Magazine, ACP, and DRJ. She is a ublished author in trade journals, white aers, and industry forums. Additionally, Rebecca has heled executives, storage managers, and technical architecture rofessionals leverage their existing storage technology investments while ensuring efficiencies across the enterrise. About this Session Have you ever questioned if your IT solution maximizes technology, olicies, and rocedures or whether your strategy encomasses continuous data rotection, relication, or traditional DR? Is IT substituting high availability for DR? Are you really getting a real return on investment for the availability solution in lace? This session demystifies long-standing (and often misguided) assumtions made around recoverability and more imortantly time to data. Learn how combining storage-based relication and host-based software lowers your RPO and RTO, delivering robust and effective recovery solutions.

2 Misunderstandings of Mainframe Availability Myth : Distributed systems are down much more often than mainframes Myth : As long as I relicate my critical data, it should be easy to restart my critical alications after a disrution Myth : Storage Systems are bulletroof Myth : A owners & storage folks understand interlay of technology and effect on recovery Myth : HA technologies like GDPS negate the need for other forms of Data Protection Establish Problem Then Aroriate Solution Disaster Recovery solves site/hardware interrution Does not solve oerational recovery issues May not be suitable for smaller local failures High availability does not solve everything Establish RPO s/rto s that match your SLA s Use the right technology Most relication technologies create crash consistent data May be ok for Databases What about oen datasets Non-database alication recoverability requires different aroach for both oerational recovery and DR

3 Data Protection Actual DR events -% It matters less whether the root cause of an oerations disrution is a significant disaster event or minor malfunctioning of one or ieces of data center equiment. The disrutive effect on business oerations is the same. What are we rotecting against? Traditional Recovery Time Slots Industry Requirements RTO RPO SLA (maximum) To Tier Financial Services, Healthcare, Utilities, Telecom seconds hours seconds hours minutes Media, IT, Manufacturing, Federal Government, Financial Services, Retail, Distribution, Biotech hours hours hours Insurance, Transortation, Energy, Education, State & Local Government Hositality, Food & Beverage, Wholesale Distribution, Constructions, Publishing, Nonrofit hours hours - hours > hours - hours hours Data courtesy of Gartner, 0

4 SLA Tiers Determine SLA er alication Tier - continuous availability requirement, maximum four minutes downtime a year Tier - high availability, maximum of one outage er year, maximum four hours outage er year Tier - recovery essential within hours, maximum three outages er year Tier - recovery required within three days, maximum four outages er year Tier - delayed recovery, all other services (Hiles, Continuity Central, 0) Oerational or DR or Both? Continuous availability enables / access to ITenabled business functions, rocesses and alications Continuous availability involves two strategies: high availability (minimizing unlanned downtime) and continuous oerations (minimizing lanned downtime) Sometimes, continuous availability architectures embody disaster recovery strategies IT service rocessing continues desite disaster events Gartner refers to this as "multisite continuous availability (Gartner, Donna Scott, 0)

5 To Down Recommended Achieving 00% or near-00% availability requires a to-down aroach to engineering availability into the alication, infrastructure and oerating architectures. The greater the availability requirements, the more customization and integration are required across multivendor comonents of a solution. Achieving continuous availability is an exensive roosition and has, in the ast, generally been reserved for only the most critical business and IT services. How do legacy as lay in? (Gartner, Donna Scott, 0) Criticality Levels Define IT Resiliency Criteria - BIA & business cost of downtime analysis Criticality User Grou Utime Availability Mission Critical External (customer revenue roducing) / scheduled utime 99.9% ( min/mon) min RTO 0 RPO Critical Internal (ERP, ) /. days er week 99.9% ( min/mon) hrsrto hrs RPO Imortant Internal (financial systems) / days er week 99.% ( hrs/mon) hrs RTO hrs RPO Non-critical Internal (deartmental systems, R&D) / days er week 9% week RTO hrs RPO Data courtesy of Gartner, 0

6 Oerational Resiliency Timeline RTO or SLA? On-Line / Batch Cycle Daily Business & Oerational VTL or traditional Processes tae Recovery Point (RPO) Availability Relication Or Relication Break Point Of Last Backu On-Line / Batch Cycle Triage - Resonse Time Rollover to Side B or Taes, Disk Technology Recovery Process Relocate Business Functions Restore Oerating System(s) Relocate Non-DP Suort Restore Data & Voice Network Restore Alications, Prog. Prod. Traditional RTO Estimate ~ Hours Information Potentially Over Days Old Communication & Notification Restore Data / Information - + Hours - + Hours - Hours - Hours - 0+ Hours ACTUAL RTO In Excess Of Hours (Conservative) Ready To Go?? Business Recovery Process Recreate & Reenter Lost Data Reenter Manually Tracked Data Production? Can Business Use Day + Old Data? Systems Cleanu: Synchronization, Performance, Caacity, Configuration BUSINESS AS USUAL Percentage Utime Achieved Per Year Utime Maximum Downtime/Year % Missed* Six nines %. seconds Five nines % minutes sec Four nines 99.99% minutes sec Three nines 99.9% hours min Two nines 99.0% hours min One nine 90.0% days hours From htt:// % % % *Continuity Software Survey (0/0)

7 *BMC 0 Mainframe Survey Issues with Backu DATA GROWTH Successful backu 9 0 Backu Window Needed Data Recovery Objective 9 0 Available Disaster Strikes 9 0 Data Loss 9 0 Disaster Strikes RTO Data Restored Full backu Incr Incr Incr Incr Incr 0

8 What is your recovery oint? DATA GROWTH Successful backu 9 A 0 A A A 9 Backu Window Needed A A Data Loss 0 A A Data Recovery Objective A A A A A A Available Disaster Strikes Disaster Strikes RTOA Data Restored A Full backu Incr Incr Incr Incr Incr What about the roblems interdeendencies between as cause? 0 Data Protection Technologies and Recovery Time Technology RPO Range RTO Range MAX Downtime/yr SLA Archive Static Deends Hours Traditional Backu to Tae/Disk including VTL or PBBA - hours - hours d 9h 9m.s Hours 99.% Disk PIT/CDP With or without Alication Awareness Minutes hours mins hours Synchronous Relication 0- mins - hours Synchronous Relication with Failover 0- mins -0 mins Asynchronous Relication 0-0 mins hours Asynchronous Relication with Failover 0-0 mins 0 mins hours DC (Sync/HA and Async) 0-0 mins mins hours Hours minutes Hours minutes mins mins hours mins Minutes 99.9% 99.9% 99.99% % 99.9% mins 99.99% hours mins - mins 99.9% %

9 Recovery Classes and Performance Oerational Recovery (restore a file, folder, volume, system) RPO CDP Snashots Backu 0 Secs Mins Hours Days RTO Disk Virtual Tae Tae Disaster Recovery (restore oerations at/from another location) RPO Sync & Async Mirror Backu Relication Off-Site Tae 0 Secs Mins Hours Days RTO Disk Virtual Tae Tae Other Considerations Storage relication, software relication alone doesn t automate and guarantee failover Failover waits for go ahead or automate and roll the dice Corrution Tae/DASD seed differential SLA achieved through aroach What about GDPS? Batch has to be restarted even with GDPS Potential for transactions to have been stranded in the failed site Attemts to aly the stranded changes to the data in the active site may result in an excetion or conflict, as the before image of the udate that is stranded will no longer match the udated value in the active site (IBM Share - August, 0)

10 Balancing Risk, Costs, & Volume of Data Cost of Risk Data Loss Availability Cost of Protection CAPEX OPEX Otimize Risks and Costs Business Data Protection Service Level Service Level Resiliency - Focus on 0% Problem Emhasis on system vs. alication Plenty of data where is generational which data to use? How designed for active/active? Backus for alications where and when Intertwined deendencies are not known High availability solutions are not DR Jobs write at conclusion interrution midstream create unknown status Corrution coied and not detected

11 Different Data Classes Require Different Data Management Mirroring or synchronous relication, and continuous data rotection (CDP) for oint-in-time recovery Storage-based snashots and relication to increase availability (RPO and RTO) Standard backu rocesses (full + incremental) and relication for DR Migrate to archive tier, manage retention, and enable discovery Gartner on Key Challenges of Current Backu Solutions (Dave Russell) The convergence of backu and disaster recovery technologies has occurred largely because snashot, relication and virtualization have made it ossible to recover from a disaster without the need for a traditional data restoration. The methods involved in this convergence seek to minimize storage cost, while also allowing for instant recovery. (Posey, 0)

12 Time to Data is the ultimate determinant of recovery strategy effectiveness The amount of time required to restore alication access to a business is what searates a temorary CRISIS from a full blown DISASTER Slide courtesy of Jon Toigo Questions to Ponder Is the data you recover useable, what does it take to make it useable Are business SLAs achievable currently and do they match your RTO/RPO s? Are you using the right technology to ma to you SLA s What do you test from a recovery standoint DR Data corrution Have you ever tested month end, quarter end, or year end and determined how recoverability was affected

13 Summary - where are the gas? Any tye of availability solution Highly available configurations do not equate to 0 downtime High availability does not relace DR Resiliency is a rocess Recovery of systems (infrastructure) can easily disregard Alications involved Interdeendencies Tye of interrution (crash, corrution, deletion) and effect on data/jobs No single answer Ask us we can hel Cost of Risk Otimize Risks and Costs Data Protectio Business Service nlevel Service Level Cost to Protec t Hitachi Mainframe Business Continuity Portfolio IN-SYSTEM In-System REPLICATION Relication SOLUTIONS REMOTE Remote REPLICATION Relication SOLUTIONS REPLICATION MANAGEMENT Relication SOLUTIONS Solutions Solutions Management Solutions ShadowImage In-System Relication For full volume clones of business data with consistency (ATTIME slit with HUR) Hitachi TrueCoy Synchronous, consistent clones at remote location u to 00km (~0 miles) Hitachi Business Continuity Manager (BCM) Relication management in z/os environments IBM-Comatible FlashCoy Point-in-time volumes and datasets via IBM command set in z/os environment IBM-Comatible FlashCoy/SE Point In Time volumes with virtual volume ool as target vs. whole volumes Hitachi Universal Relicator (HUR) Any distance, unique use of Pull technology and Journal Volumes to accommodate link outages or interrutions IBM-Comatible XRC* Asynchronous remote relication via comatible with IBM XRC in z/os environment * Note: Only available as a migration tool to HUR Hitachi Relication Manager with mainframe BCM Enterrise-wide GUI relication management and monitoring for mainframe and oen systems IBM Basic HyerSwa, GDPS HyerSwa certification and/or integration High-availability storage for z/os environments Relication Assessment, Migration and Imlementation Services Best ractice designs that ensure results and lower risks in imlementation Relication Score Card (Health Check) Services Periodic checkus that ensure continued solution value

14 st Century Software z/os Portfolio Data Resiliency Storage Management & Usage Tae Migration VFI In-System Relication Slashes recovery Solutions time objectives and assures SLAs Erases recoverability gas, ensures resiliency, and reduces storage Enables recovery to job/dataset level through real-time architecture and atent ending software code (InstaSna, InstaRestore, and Timeliner) Focuses on intricate, alicationlevel deendencies Protects InFlight data and maximizes sna coies sync ed to alication backus Cross-alication deendencies Total Storage Remote Relication True knowledge Solutions for storage and management class Insightful reorting for JCL coding to avoid olicies Tier data based uon usage, reference, and criticality (from DR/VFI) Data modeling for new urchase or imroving allocation and utilization SaceFinder Intelligent resource management tools Tae/Assist Migration in Place Relication Management Solutions Reduces cost of managing tae resources while roviding continuous availability Director and high seed coy utilities Backend utility rocesses assure referential data Portability, disaster recovery, and backu coies for data resiliency Consolidation of data Exertise to assist in migration management Recovery Resiliency, Storage Management and Modeling, Tae Migration and Imlementation Services Questions? Thank you!

15 Final Thought The lifeblood of almost every organization is data, and the requirements to rotect, maintain, and access the systems that store that data are absolutely essential to suort business oerations. With the sheer amount and varying tyes of information that must be stored, the comlexity of managing the data can grow as quickly as the amount of data itself. In this fast-moving day and age, businesses cannot afford to wait for anything if they do, they risk, at best, losing sales to the cometition, or, at worst, falling behind the cometition and being ushed out of business. (Storage Economics for Dummies - Hitachi Data Systems, 0) Thank You! For additional Hitachi information, lease contact: Ros Schulman Data Protection Technologies Global Solutions Strategy and Develoment Hitachi Data Systems 9 0 (cell) Ros.Schulman@hds.com For additional st Century Software information, lease contact: Rebecca Levesque st Century Software, Inc. 90 West Valley Road Suite 0 Wayne PA 90 U.S.A x (cell) RebeccaL@csw.com

17573: Availability and Time to Data How to Improve Your Resiliency and Meet Your SLAs

17573: Availability and Time to Data How to Improve Your Resiliency and Meet Your SLAs 17573: Availability and Time to Data How to Improve Your Resiliency and Meet Your SLAs Ros Schulman Hitachi Data Systems Rebecca Levesque 21st Century Software August 13, 2015 10-11:00 am Southern Hemisphere

More information

17609: Continuous Data Protection Transforms the Game

17609: Continuous Data Protection Transforms the Game 17609: Continuous Data Protection Transforms the Game Wednesday, August 12, 2015: 8:30 AM-9:30 AM Southern Hemishere 5 (Walt Disney World Dolhin) Tony Negro - EMC Rebecca Levesque 21 st Century Software

More information

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist I Planning Guide The HR Software Buyer s Guide and Checklist Table of Contents Introduction... 1 Recent Trends in HR Technology... 1 Return on Emloyee Investment Paerless HR Workflows Business Intelligence

More information

HITACHI DATA SYSTEMS USER GORUP CONFERENCE 2013 MAINFRAME / ZOS WALTER AMSLER, SENIOR DIRECTOR JANUARY 23, 2013

HITACHI DATA SYSTEMS USER GORUP CONFERENCE 2013 MAINFRAME / ZOS WALTER AMSLER, SENIOR DIRECTOR JANUARY 23, 2013 HITACHI DATA SYSTEMS USER HITACHI GROUP DATA CONFERENCE SYSTEMS 2013 USER GORUP CONFERENCE 2013 MAINFRAME / ZOS WALTER AMSLER, SENIOR DIRECTOR JANUARY 23, 2013 AGENDA Hitachi Mainframe Strategy Compatibility

More information

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents

More information

Addressing the Roadblocks to Application Recovery through Integrated Recovery Management

Addressing the Roadblocks to Application Recovery through Integrated Recovery Management WHITE PAPER Addressing the Roadblocks to Application Recovery through Integrated Recovery Management EXECUTIVE OVERVIEW Today s market challenges combine with the complexities of application management

More information

Achieve Continuous Computing for Mainframe Batch Processing. By Hitachi Data Systems and 21st Century Software

Achieve Continuous Computing for Mainframe Batch Processing. By Hitachi Data Systems and 21st Century Software Achieve Continuous Computing for Mainframe Batch Processing By Hitachi Data Systems and 21st Century Software February 2016 Contents Executive Summary... 2 Introduction... 3 Difficulties in Recovering

More information

Sage Timberline Office

Sage Timberline Office Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User

More information

Enabling Disaster Recovery Through Data Replication Technology June 7, 2010

Enabling Disaster Recovery Through Data Replication Technology June 7, 2010 Enabling Disaster Recovery Through Data Replication Technology June 7, 2010 Christophe Bertrand, BA (Hons), MBA Roselinda Schulman, CBCP Hitachi Data Systems 2005 Hitachi Data Systems About This Session

More information

Storage Basics Architecting the Storage Supplemental Handout

Storage Basics Architecting the Storage Supplemental Handout Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it

More information

construction eal estate health onstruction hospitality energyy healthcare infra PRACTICE AREAS IMPARTIAL. THOROUGH. EXPERIENCED.

construction eal estate health onstruction hospitality energyy healthcare infra PRACTICE AREAS IMPARTIAL. THOROUGH. EXPERIENCED. PRACTICE AREAS Real Estate. INTECH s early days in Risk Management were centred around suorting the Real Estate industry. Since then, we have continued to build our team of exerts, knowledge and techniques

More information

Bravo Software Group e.commerce enablers... 2 RemoteDesk... 4

Bravo Software Group e.commerce enablers... 2 RemoteDesk... 4 Table of Contents Bravo Software Grou e.commerce enablers... 2 RemoteDesk... 4 A suite of roducts for entering orders or invoices remotely, for direct osting to your central accounting system. RemoteDesk

More information

Restoration Technologies. Mike Fishman / EMC Corp.

Restoration Technologies. Mike Fishman / EMC Corp. Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

Simplify and Improve Database Administration by Leveraging Your Storage System. Ron Haupert Rocket Software

Simplify and Improve Database Administration by Leveraging Your Storage System. Ron Haupert Rocket Software Simplify and Improve Administration by Leveraging Your Storage System Ron Haupert Rocket Software Session Agenda and Storage Integration Overview System-Level Backup Methodologies and Storage Integration

More information

Publication Date: April 2007

Publication Date: April 2007 white paper Boost Block-level Replication with GoldenGate s TDM Technology for 100% Business Continuity Publication Date: April 2007 Abstract: Recent natural disasters and government regulations have created

More information

How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems

How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems W H I T E P A P E R How to Manage Critical Data Stored in Microsoft Exchange Server 2010 By Hitachi Data Systems April 2012 2 Table of Contents Executive Summary and Introduction 3 Mission-critical Microsoft

More information

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN *Akbar Abdolhosenzadeh 1, Laya Mokhtari 2, Amineh Sahranavard Gargari

More information

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems

More information

Storage Virtualization for Mainframe DASD, Virtual Tape & Open Systems Disk

Storage Virtualization for Mainframe DASD, Virtual Tape & Open Systems Disk Storage Virtualization for Mainframe DASD, Virtual Tape & Open Systems Disk Scott James Luminex Software, Inc. John McDevitt HDS Jeffrey Deaver Financial Services Company Example Wednesday, August 14 Session

More information

DEFINING THE RIGH DATA PROTECTION STRATEGY

DEFINING THE RIGH DATA PROTECTION STRATEGY DEFINING THE RIGH DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions By Cindy LaChapelle, Principal Consultant, ISG www.isg-one.com INTRODUCTION Most organizations have traditionally

More information

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 The Business Maturity Model V Enabled Web

More information

Data Center Down This is a Disaster. A Presentation by Richard Dolewski

Data Center Down This is a Disaster. A Presentation by Richard Dolewski Data Center Down This is a Disaster A Presentation by Richard Dolewski Definition of a Disaster A sudden, unplanned event that causes great damage or loss to an organization The time factor determines

More information

Storage System High-Availability & Disaster Recovery Overview [638]

Storage System High-Availability & Disaster Recovery Overview [638] Storage System High-Availability & Disaster Recovery Overview [638] John Wolfgang Enterprise Storage Architecture & Services jwolfgang@vicominfinity.com 26 June 2014 Agenda Background Application-Based

More information

Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar

Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar Kevin Horn Principal Product Manager Enterprise Data Protection Solutions March

More information

Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices

Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices Solution Brief Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices 2 So you re confident knowing that the backup and recovery solution protecting your business-critical operations

More information

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The

More information

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State Pay tream A D V I S O R S WHITE PAPER Web Inv Web Invoicing Strategic Imact of AP Automation What s Inside Inefficiencies in Current State Key Drivers for Automation Web Invoicing Comonents New Automation

More information

Synchronous Data Replication

Synchronous Data Replication S O L U T I O N S B R I E F Synchronous Data Replication Hitachi Data Systems Synchronous Data Replication Business continuity has become one of the top issues facing businesses and organizations all around

More information

9/23/2013. Disaster Recovery Planning Best Practices. Over the Next Decade. 75X growth in files. 50X growth in data. 10X growth in servers

9/23/2013. Disaster Recovery Planning Best Practices. Over the Next Decade. 75X growth in files. 50X growth in data. 10X growth in servers Disaster Recovery Planning Best Practices Mohammad Alshafie, Systems Engineer mo@unitrends.com Harold Schmoecker, Regional Sales VP harold@unitrends.com Over the Next Decade 75X growth in files 50X growth

More information

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information

More information

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation Introduction to Data Protection: Backup to Tape, Disk and Beyond Michael Fishman, EMC Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll

More information

Optimizing IT Data Services

Optimizing IT Data Services Christopher L Poelker Optimizing IT Data Services US Commission on Cloud Computing Commission on the Leadership Opportunity in U.S. Deployment of the Cloud (CLOUD 2 ) Commission Full Report Text Available

More information

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation (Author and Presenter)

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation (Author and Presenter) Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation (Author and Presenter) SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747

Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Introduction Rajesh Gupta - rajgupta@deloitte.com Solution Network

More information

Real-time Protection for Hyper-V

Real-time Protection for Hyper-V 1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate

More information

One-Chip Linear Control IPS, F5106H

One-Chip Linear Control IPS, F5106H One-Chi Linear Control IPS, F5106H NAKAGAWA Sho OE Takatoshi IWAMOTO Motomitsu ABSTRACT In the fi eld of vehicle electrical comonents, the increasing demands for miniaturization, reliability imrovement

More information

Gartner: The Broken State of Backup

Gartner: The Broken State of Backup Gartner: The Broken State of Backup Dave Russell Vice President, Storage Technologies and Strategies Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced

More information

SOLUTION BRIEF: KEY CONSIDERATIONS FOR DISASTER RECOVERY

SOLUTION BRIEF: KEY CONSIDERATIONS FOR DISASTER RECOVERY SOLUTION BRIEF: KEY CONSIDERATIONS FOR DISASTER RECOVERY A Disaster Recovery and Business Continuity plan is specific to the circumstances, priorities and expense versus the value decisions of the organization,

More information

SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY

SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY Among the priorities for efficient storage management is an appropriate protection architecture. This paper will examine how to architect storage

More information

401K Plan. Effective January 1, 2014

401K Plan. Effective January 1, 2014 401K Plan Effective January 1, 2014 Summary Plan Descrition Particiation...2 Contributions...2 Disabled Particiants...4 Definition of Comensation...4 Legal Limits on Contributions...4 Enrollment...5 Investment

More information

Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs

Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs EMC RECOVERPOINT FAMILY Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs ESSENTIALS EMC RecoverPoint Family Optimizes RPO

More information

SQL Server Storage Best Practice Discussion Dell EqualLogic

SQL Server Storage Best Practice Discussion Dell EqualLogic SQL Server Storage Best Practice Discussion Dell EqualLogic What s keeping you up at night? Managing the demands of a SQL environment Risk Cost Data loss Application unavailability Data growth SQL Server

More information

NSI Solutions with Microsoft VSS

NSI Solutions with Microsoft VSS Published: March 2004 Abstract With the introduction of Volume Shadow Copy Service (VSS) in Microsoft Windows Server 2003 and Windows Storage Server 2003 and the strength of NSI Software Double-Take you

More information

Introduction to Enterprise Data Recovery. Rick Weaver Product Manager Recovery & Storage Management BMC Software

Introduction to Enterprise Data Recovery. Rick Weaver Product Manager Recovery & Storage Management BMC Software Introduction to Enterprise Data Recovery Rick Weaver Product Manager Recovery & Storage Management BMC Software Contents Introduction...1 The Value of Data...2 Risks to Data Assets...2 Physical Loss...2

More information

Dell Data Protection Point of View: Recover Everything. Every time. On time.

Dell Data Protection Point of View: Recover Everything. Every time. On time. Dell Data Protection Point of View: Recover Everything. Every time. On time. Dell Data Protection White Paper May 2013 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL

More information

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012 FIrch Worksho Brussels 22 nd February 2012 Towards Future Internet rchitecture lex Galis University College London a.galis@ee.ucl.ac.uk www.ee.ucl.ac.uk/~agalis FIrch Worksho Brussels 22 nd February 2012

More information

Business Life Insurance 18.5 - 12.1.1

Business Life Insurance 18.5 - 12.1.1 Changing Nothing Risks Everything. The New Style of IT demands a new approach to Backup, Recovery and Archive Bill Philbin VP Data Protection & Retention, Software Defined Storage HP Storage, Enterprise

More information

IBM Resiliency Services Convergence of High Availability & Disaster Recovery

IBM Resiliency Services Convergence of High Availability & Disaster Recovery Convergence of High Availability & Disaster Recovery March 2015 Introductions Chuck Hinkle IBM GDPS Offering Executive chinkle@us.ibm.com Troy Jassey Delivery Leader tjassey@us.ibm.com 2 Cross Industry

More information

Sage Document Management. User's Guide Version 12.1

Sage Document Management. User's Guide Version 12.1 Sage Document Management User's Guide Version 12.1 NOTICE This is a ublication of Sage Software, Inc. Version 12.1. November, 2012 Coyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage

More information

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently

More information

Cloud Computing and Disaster Recovery

Cloud Computing and Disaster Recovery Understanding the Cloud Environment Cloud Environment = Internet-based data access & exchange + Internet-based access to low cost computing & applications Cloud Computing and Disaster Recovery April 2013

More information

On Software Piracy when Piracy is Costly

On Software Piracy when Piracy is Costly Deartment of Economics Working aer No. 0309 htt://nt.fas.nus.edu.sg/ecs/ub/w/w0309.df n Software iracy when iracy is Costly Sougata oddar August 003 Abstract: The ervasiveness of the illegal coying of

More information

How to plan for a Disaster Recovery strategy. Nicholas Gee BCAP Jodie Rugless RDNS SA

How to plan for a Disaster Recovery strategy. Nicholas Gee BCAP Jodie Rugless RDNS SA How to plan for a Disaster Recovery strategy Nicholas Gee BCAP Jodie Rugless RDNS SA Agenda Drivers The need for DR! Why we are all here? Objectives What can be achieved? The Costs Involved The Cost of

More information

Using Hitachi Protection Manager and Hitachi Storage Cluster software for Rapid Recovery and Disaster Recovery in Microsoft Environments

Using Hitachi Protection Manager and Hitachi Storage Cluster software for Rapid Recovery and Disaster Recovery in Microsoft Environments Using Hitachi Protection Manager and Hitachi Storage Cluster software for Rapid Recovery and Disaster Recovery in Microsoft Environments Robert Burch, Advanced Technical Consultant Leland Sindt, Principal

More information

Virtual Disaster Recovery

Virtual Disaster Recovery Virtual Disaster Recovery White Paper September 16, 2008 Kelly Laughton Davenport Group Consultant Davenport Group 2008. All rights reserved. Introduction Today s data center has evolved into a complex,

More information

Data Protection as Part of Your Cloud Journey

Data Protection as Part of Your Cloud Journey Data Protection as Part of Your Cloud Journey Jim Vanek DPAD Area Manager IL / WI EMC Data Protection & Availability Division October 23, 2014 Copyright 2014 EMC Corporation. All rights reserved. 1 Setting

More information

IMS Disaster Recovery Overview

IMS Disaster Recovery Overview IMS Disaster Recovery Overview Glenn Galler gallerg@us.ibm.com IBM Advanced Technical Skills (ATS) August 8, 2012 (1:30-2:30 pm) IBM Disaster Recovery Solutions IMS Recovery Solutions IMS databases are

More information

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland Backup and Recovery Solutions for Exadata Cor Beumer Storage Sales Specialist Oracle Nederland Recovery Point and Recovery Time Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Data Loss (Recovery Point Objective)

More information

Leveraging the Cloud for Data Protection and Disaster Recovery

Leveraging the Cloud for Data Protection and Disaster Recovery WHITE PAPER: Leveraging the Cloud for Data Protection and Disaster Recovery Leveraging the Cloud for Data Protection and Disaster Recovery Bennett Klein DATA MANAGEMENT CUSTOMER SOLUTIONS MARCH 2012 Table

More information

Disk Tiering Solutions from IBM, EMC, and HDS

Disk Tiering Solutions from IBM, EMC, and HDS Disk Tiering Solutions from IBM, EMC, and HDS Ros Schulman Hitachi Data Systems Session 17144 March 3, 2015 3:15-4:15pm Sheraton Insert Custom Session QR if Desired. Hitachi Dynamic Tiering Automated Optimized

More information

Virtualizing disaster recovery using cloud computing

Virtualizing disaster recovery using cloud computing IBM Global Technology Services Thought Leadership White Paper January 2012 Virtualizing disaster recovery using cloud computing Transition your applications quickly to a resilient cloud 2 Virtualizing

More information

WHITE PAPER Overview of Data Replication

WHITE PAPER Overview of Data Replication Overview of Data Replication 1 Abstract Replication is the process of making a copy of something, or of creating a replica. In different contexts, such as art (copies of a painting), bioscience (cloning),

More information

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation : Backup to Tape, Disk and Beyond Michael Fishman, EMC Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

Redefining Oracle Database Management

Redefining Oracle Database Management Redefining Oracle Database Management Actifio PAS Specification A Single Solution for Backup, Recovery, Disaster Recovery, Business Continuity and Rapid Application Development for Oracle. MAY, 2013 Contents

More information

Mosaic Technology s IT Director s Series: Exchange Data Management: Why Tape, Disk, and Archiving Fall Short

Mosaic Technology s IT Director s Series: Exchange Data Management: Why Tape, Disk, and Archiving Fall Short Mosaic Technology s IT Director s Series: : Why Tape, Disk, and Archiving Fall Short Mosaic Technology Corporation * Salem, NH (603) 898-5966 * Bellevue, WA (425)462-5004 : Why Tape, Disk, and Archiving

More information

Technology Insight Series

Technology Insight Series Advancing VMware-based Data Resilience John Webster August, 2011 Technology Insight Series Evaluator Group Advancing VMware-based Data Resilience Copyright 2011 Evaluator Group, Inc. All rights reserved.

More information

Building Continuous Cloud Infrastructures

Building Continuous Cloud Infrastructures Building Continuous Cloud Infrastructures Deepak Verma, Senior Manager, Data Protection Products & Solutions John Harker, Senior Product Marketing Manager October 8, 2014 WebTech Educational Series Building

More information

Corporate Compliance Policy

Corporate Compliance Policy Cororate Comliance Policy English Edition FOREWORD Dear Emloyees, The global nature of Bayer s oerations means that our activities are subject to a wide variety of statutory regulations and standards

More information

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

System Availability and Data Protection of Infortrend s ESVA Storage Solution

System Availability and Data Protection of Infortrend s ESVA Storage Solution System Availability and Data Protection of Infortrend s ESVA Storage Solution White paper Abstract This white paper analyzes system availability and data protection on Infortrend s ESVA storage systems.

More information

Backup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant

Backup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant Backup and Recovery Solutions for Exadata Ľubomír Vaňo Principal Sales Consultant Fundamental Backup and Recovery Data doesn t exist in most organizations until the rule of 3 is complete: Different Media

More information

Running Successful Disaster Recovery Tests

Running Successful Disaster Recovery Tests Running Successful Disaster Recovery Tests Understanding the DR Process Running Successful Disaster Recovery Tests Understanding the DR Process Presented by Ray Lucchesi President Silverton Consulting,

More information

SMALL BUSINESS GRANTS PROGRAM GUIDELINES

SMALL BUSINESS GRANTS PROGRAM GUIDELINES SMALL BUSINESS GRANTS PROGRAM GUIDELINES S GARTON STREET Small Business Grants Program Suorting our community The City of Melbourne offers a wide range of grants and sonsorshi oortunities to suort the

More information

Piracy and Network Externality An Analysis for the Monopolized Software Industry

Piracy and Network Externality An Analysis for the Monopolized Software Industry Piracy and Network Externality An Analysis for the Monoolized Software Industry Ming Chung Chang Deartment of Economics and Graduate Institute of Industrial Economics mcchang@mgt.ncu.edu.tw Chiu Fen Lin

More information

Enabling comprehensive data protection for VMware environments using FalconStor Software solutions

Enabling comprehensive data protection for VMware environments using FalconStor Software solutions Industry Trends and Technology Perspective White Paper Enabling comprehensive data protection for VMware environments using FalconStor Software solutions Issues and solutions to enable complete data protection

More information

Quickly Deploy Microsoft Private Cloud and SQL Server 2012 Data Warehouse on Hitachi Converged Solutions. September 25, 2013

Quickly Deploy Microsoft Private Cloud and SQL Server 2012 Data Warehouse on Hitachi Converged Solutions. September 25, 2013 Quickly Deploy Microsoft Private Cloud and SQL Server 2012 Data Warehouse on Hitachi Converged Solutions September 25, 2013 1 WEBTECH EDUCATIONAL SERIES QUICKLY DEPLOY MICROSOFT PRIVATE CLOUD AND SQL SERVER

More information

Implementing Disaster Recovery? At What Cost?

Implementing Disaster Recovery? At What Cost? Implementing Disaster Recovery? At What Cost? Whitepaper Viktor Babkov Technical Director Business Continuity Copyright Business Continuity May 2010 In today s environment, minimizing IT downtime has become

More information

Application Backup and Restore using Fast Replication Services. Ron Ratcliffe rratcliffe@rocketsoftware.com March 13, 2012 Session Number 10973

Application Backup and Restore using Fast Replication Services. Ron Ratcliffe rratcliffe@rocketsoftware.com March 13, 2012 Session Number 10973 Application Backup and Restore using Fast Replication Services Ron Ratcliffe rratcliffe@rocketsoftware.com March 13, 2012 Session Number 10973 Session Agenda What is IBM Tivoli Advanced Backup and Recovery

More information

Taking a Proactive Approach to Crisis Management while Maintaining Business Continuity in a Tiered Environment

Taking a Proactive Approach to Crisis Management while Maintaining Business Continuity in a Tiered Environment Taking a Proactive Approach to Crisis Management while Maintaining Business Continuity in a Tiered Environment John Linse Director of Business Continuity Services, EMC 1 Setting the Stage Taking a Proactive

More information

The Secret to Affordably Protecting Critical Data

The Secret to Affordably Protecting Critical Data The Secret to Affordably Protecting Critical Data Using StoneFly Backup Advantage All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc.

More information

Technology Insight Series

Technology Insight Series Data Protection in a Unified Storage Environment John Webster June, 2012 Technology Insight Series Evaluator Group Copyright 2012 Evaluator Group, Inc. All rights reserved. Page 1 of 6 Are traditional

More information

To Tier or not to Tier

To Tier or not to Tier WHITEPAPERS To Tier or not to Tier Replicating VMware Workloads for Disaster Recovery Chances are, you already have protections in place for the event of a big storm that might threaten your business and

More information

Project Management and. Scheduling CHAPTER CONTENTS

Project Management and. Scheduling CHAPTER CONTENTS 6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method

More information

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France

More information

Trends in Data Protection and Restoration Technologies. Jason Iehl, NetApp

Trends in Data Protection and Restoration Technologies. Jason Iehl, NetApp Trends in Data Protection and Restoration Technologies Jason Iehl, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and

More information

Protecting Microsoft SQL Server

Protecting Microsoft SQL Server Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary

More information

Technical Considerations in a Windows Server Environment

Technical Considerations in a Windows Server Environment Technical Considerations in a Windows Server Environment INTRODUCTION Cloud computing has changed the economics of disaster recovery and business continuity options. Accordingly, it is time many organizations

More information

Leveraging Cloud Computing for Disaster Recovery

Leveraging Cloud Computing for Disaster Recovery Leveraging Cloud Computing for Disaster Recovery November oe 18, 2010 0 Bill Russell brussell@bickgroup.com bill@bluemountainlabs.com AGENDA What is Cloud How do we leverage it for disaster recovery WHO

More information

Sage Document Management. User's Guide Version 13.1

Sage Document Management. User's Guide Version 13.1 Sage Document Management User's Guide Version 13.1 This is a ublication of Sage Software, Inc. Version 13.1 Last udated: June 19, 2013 Coyright 2013. Sage Software, Inc. All rights reserved. Sage, the

More information

Compensating Fund Managers for Risk-Adjusted Performance

Compensating Fund Managers for Risk-Adjusted Performance Comensating Fund Managers for Risk-Adjusted Performance Thomas S. Coleman Æquilibrium Investments, Ltd. Laurence B. Siegel The Ford Foundation Journal of Alternative Investments Winter 1999 In contrast

More information

Disaster Recovery for Oracle Database

Disaster Recovery for Oracle Database Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches

More information

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;

More information

Disaster Recovery Hosting Provider Selection Criteria

Disaster Recovery Hosting Provider Selection Criteria Disaster Recovery Hosting Provider Selection Criteria By, Solution Director 6/18/07 As more and more companies choose to use Disaster Recovery (DR), services the questions that keep coming up are What

More information

Hitachi Unified Storage The Platform for One Goal When you can t afford to compromise your service levels

Hitachi Unified Storage The Platform for One Goal When you can t afford to compromise your service levels Hitachi Unified Storage The Platform for One Goal When you can t afford to compromise your service levels About Unified Storage 1 Traditional unified storage systems provide access to both file and block

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

An introduction to disaster recovery. And how DrAAS from I.R.I.S. Ondit can help!

An introduction to disaster recovery. And how DrAAS from I.R.I.S. Ondit can help! An introduction to disaster recovery And how DrAAS from I.R.I.S. Ondit can help! Events That Impact Information Availability Events that require a data center move: Fewer than 1% of occurrences Natural

More information

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Leveraging Virtualization for Disaster Recovery in Your Growing Business Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster

More information