Concurrent VSAM Access for Batch and CICS: A white paper series

Size: px
Start display at page:

Download "Concurrent VSAM Access for Batch and CICS: A white paper series"

Transcription

1 Concurrent VSAM Access for Batch and CICS: A white paper series Overview: Conventional and Current Alternatives A white paper from:

2 IBM and CICS are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. SYSB-II is a registered trademark of H&W Computer Systems, Inc. All other products mentioned herein may be trademarks or registered trademarks of their respective companies.

3 Introduction: Ongoing dilemma requires modern-day solution Current estimates suggest that CICS applications handle more than 30 billion transactions per day and process more than $1 trillion dollars' worth of business each week. Mainframe data also still drives information systems worldwide. Approximately 60 percent of organizations responding to a 2013 Arcati survey said they manage 40 to 100 percent of their enterprise data on the mainframe. 1 Integrating legacy systems is a strategy mainframe sites continue to adopt. In fact, 74 percent of respondents in the 2013 Arcati survey said specifically that they re web-enabling CICS subsystems. 1 However, as organizations pursue this strategy, challenges can include unlocking the data, keeping the applications and data available to users, and maintaining data integrity in an efficient and cost-effective manner. A common scenario for availability involves CICS applications that require VSAM data. The traditional batch updating process takes VSAM files offline so that either: CICS applications no longer have access to the data and may be unavailable to users. Users have access only to a shadow file, a read-only file, or outdated data. This issue can be significant. In fact, a 2012 CICS survey from z/journal (now called Enterprise Tech Journal) of IT professionals found that 53 percent reported that it was Extremely Important or Very Important that their organizations business-critical data in VSAM files be shared concurrently by both CICS and batch. 2 This showed a significant increase over the 2011 response of 43 percent and the 2010 response of 45 percent. When online users can't access current VSAM data, productivity stalls, crucial information becomes unavailable, and decisions are delayed. Any number of fall-out scenarios are then possible, including inaccurate data analysis, lost customers, supply chain disruption, and abandoned sales. This white paper provides an overview of the common approaches to providing availability for CICS applications and batch to VSAM data.this white paper provides an overview of the common approaches to providing availability for CICS applications and batch to VSAM data. This white paper is one of four in the H&W series titled Concurrent VSAM Access for Batch and CICS. The other white papers in the series are: VSAM Record-Level Sharing (RLS). This explores a method for accessing VSAM files that gives multiple CICS address spaces concurrent READ/WRITE access to recoverable VSAM data sets. Challenges are explored in detail. 1. Arcati Mainframe Yearbook 2013, Arcati Limited, 2013, 2. z/journal magazine, Survey Results for 2012 z/journal CICS Survey, MainframeZone, Inc., February 6, 2012, Concurrent VSAM Access for Batch and CICS: A white paper series 3

4 Transactional VSAM (TVS or DFSMStvs). This explores a method for sharing recoverable VSAM data between CICS and batch without compromising data integrity. Considerations with this method are discussed. Transparent VSAM File Sharing via CICS and Batch. This explores a method for sharing VSAM files inside CICS so that batch jobs appear to CICS like any other online transaction. The root problem: systems and users in conflict Organizations ranging from governments and large enterprises to e-commerce and educational institutions rely on VSAM-reliant CICS applications. All kinds of users and systems connect back to these systems for critical information. These stems include: Insurance applications that handle policy, claims, and annuity payments Banking programs that manage deposits, withdrawals, and account details 401k fund transfers, trade processing, and balance information Call center employees who need to update customer records EDI systems that broker order information across complex supply chains In many different scenarios, the world depends on the critical link between CICS and VSAM files. With the goals of IT and business units involving web access, electronic transactions, and interconnectivity as the basis for revenue growth and customer satisfaction 3, the availability of VSAM-reliant CICS applications is more important than ever. The fundamental conflict presents itself when application downtime or limited access due to batch interrupts crucial functions. However, batch processing has to happen in order to provide users with up-to-date data. The standard approach has been to shrink the batch window and force batch updates to late-night windows when demands are low. Today, increasing transaction volumes and the need for availability at untraditional times in the interconnected, web-enabled global economy do not tolerate such strategies. 3. Murphy, Chris, IT Must Create: 2011 Global CIO Report. InformationWeek Analytics (2011): The root problem: systems and users in conflict

5 IBM options: evolving VSAM file-sharing methodologies Over the past 30 years, IBM introduced the following methodologies that directly or indirectly relate to VSAM file sharing. SHAREOPTIONs File open and close products Shadow files Memo posting EXCI VSAM Record-Level Sharing (RLS) Transactional VSAM (TVS or DFSMStvs) In the sections that follow, each of these approaches is discussed in more detail. Understanding VSAM SHAREOPTIONs SHAREOPTIONs are settings that provide various levels of shared access to VSAM files. This capability has been available for decades, and on initial review, it appears to be an easy way to provide file sharing. Let's take a closer look at the SHAREOPTIONs and exactly what it takes to implement this approach. SHAREOPTION 1 is the most restrictive of all SHAREOPTIONs, disallowing any file sharing if updates occur. This SHAREOPTION permits a single region to write to a VSAM data set or enables many regions to read a data set. If a region is updating the file, all access to the file is denied to any region seeking to perform a read, so this option is often deemed unacceptable. Yet, performance wise, this is the most effective SHAREOPTION to use. SHAREOPTION 2 also prohibits concurrent data set updates, but provides for multiple reads during an update process. This function is typically used where CICS is the updating application with infrequent data reading from batch. A major drawback of SHAREOPTION 2 occurs when a reading region attempts to access data that an update region has modified. It is possible that the reading region will not receive the most recent updates and could terminate abnormally if substantial data changes have occurred. Concurrent VSAM Access for Batch and CICS: A white paper series 5

6 SHAREOPTION 3 on the surface, appears to solve the limitations of SHAREOPTION 2 by enabling multiple, concurrent updates. Because SHAREOPTION 3 permits multiple regions to both read and write to a single data set, it would also permit multiple regions to concurrently update identical blocks of records, causing a loss of physical data. Using SHAREOPTION 3 could lead to VSAM data integrity issues and increased overhead. SHAREOPTION 4 requires extensive and complex programming modifications to your application. These modifications will increase I/O overhead to ensure data integrity. Use of SHAREOPTION 4 will not enable a single CICS region to lock onto its required records. An environment using SHAREOPTION 4 and enabling concurrent updates by both CICS and batch could experience a severe data integrity problem in the event of a CICS transaction abend. The CICS dynamic transaction backout will replace all the transaction-updated records with initial values, even if a batch job updated the records. Practical implications: Employment of a higher VSAM SHAREOPTION translates into increased overhead. Additionally, the risk of error increases when there is less data-integrity protection. Employing VSAM SHAREOPTIONs for concurrent update access between CICS regions and batch jobs is rarely a suitable solution for companies striving to ensure processing efficiency and data integrity. File open and close products For many data centers, an option for managing UPDATE access to VSAM data from multiple address spaces includes disabling CICS files, or closing them, for a period of time in order to perform batch processing. Closing files to CICS while batch is running has been around since the late 1970s. For companies that are not facing pressure to reduce or even eliminate the nightly batch window, closing files to CICS is still a good solution. It minimizes the disruption to users by taking selected files offline, as batch needs them. This solution is also a low-cost way to protect data integrity. Practical Implications: When files are closed, users do not have full access to their applications. Multiple batch jobs that need to process against a given file must be serialized because only one address space can own a VSAM file at a given time. This further lengthens the time the file is offline to CICS. As a result, productivity is lost, customer service stops, and work flow is interrupted. In a world that requires 24/7 availability, taking files offline to CICS has become far less acceptable. 6 IBM options: evolving VSAM file-sharing methodologies

7 Shadow files Another method for improving VSAM availability is the use of shadow or mirror files. This procedure involves closing the VSAM master file to CICS while a backup copy (the shadow or mirror file) is taken. Once this is complete, the shadow or mirror file is opened to CICS in READ ONLY mode. The batch process then updates the master file. When the batch processing finishes, the updated master file is then reallocated to CICS with full READ/WRITE access. The drawback of a shadow file is that it only remains a true duplicate for a short time. Once batch begins its updating process, the files are no longer considered mirrored. In addition, the CICS user community is limited to inquiry only and this impacts productivity. While the shadow file approach has typically been used to respond to ad hoc or scheduled report requests, it still requires that either a CICS or batch process wait until the files are reallocated and available. Again, multiple batch jobs that need to process against a given file must be serialized because only one address space can own a VSAM file at a given time. This will further lengthen the time the file is offline to CICS. Using shadow files is an affordable solution to preserve the integrity of data. However, this solution can be costly to end users because of lost time and outdated data. Furthermore, you cannot run batch processes during the day or night while CICS remains available with full READ/WRITE access. Practical Implications: A shadow file remains a true duplicate for a short period of time. Once the batch processing begins, the files are no longer considered mirrored. Read-only mode impacts user productivity and precludes CICS file access. Additionally, a batch cannot run while CICS has full READ/WRITE access. Concurrent VSAM Access for Batch and CICS: A white paper series 7

8 Memo posting Memo posting takes the concept of shadow files one step further. With memo posting, CICS access to a file is set to READ ONLY while batch updates the master copy of the file. [You can do this by switching the CICS File Control Table definition to READ ONLY and using SHAREOPTION (2,3) to allow CICS to read the VSAM master file and give exclusive UPDATE access to the batch address space.] The CICS application architecture needs to be designed to recognize this condition. Update requests that the CICS application makes to the VSAM file are queued in a log so that they can be applied later. When the batch process finishes, the queued CICS updates are then applied to the master file and the file is restored to CICS with full READ/WRITE access. A point of consideration is that the CICS transaction is reading records through its buffering facilities while batch is directly (natively) accessing and updating the master VSAM file. This can present data integrity exposures that must be considered and managed. For example, records that reside in the CICS buffers might not reflect the updates the batch job is processing natively against the master VSAM file. When this occurs, a CICS transaction will get a dirty read and will make an update decision based on that dirty read. From the batch perspective, the batch program might natively read a master VSAM record for update, but CICS might have already read that same record and queued its own update. This situation causes the batch program to get a dirty read. With memo posting, you must carefully manage data integrity. If you do not have an application that handles this situation, you have to code your application to handle it, assuming you have the ability to change source code. As with the practices of opening and closing files and shadow files, memo posting is not a true real-time solution for providing up-to-date data, nor does it allow batch to run while CICS remains available with concurrent READ/WRITE access. As previously noted, multiple batch jobs that need to process against a given file must be serialized. Practical Implications: Memo posting is not a true real-time solution for providing up-to-date data and it creates data integrity exposures that must be carefully considered and managed. 8 IBM options: evolving VSAM file-sharing methodologies

9 EXCI EXCI, or external CICS interface, is an application programming interface (API) that allows non- CICS resources to gain access to CICS applications running in a CICS Transaction Server region. With EXCI, these non-cics resources and CICS applications can also pass and receive data using a communications area (commarea). The EXCI API is intended to allow the non-cics resources to tap into CICS sporadically to complete occasional updates. Another common use of EXCI is to open and close files. However, using EXCI for batch jobs that process numerous records significantly increases the time it takes for the job to finish. Due to these performance issues with high-volume jobs, the use of EXCI for VSAM file sharing is limited. Similar to the other methods already discussed, EXCI requires extensive and complex coding changes. If you are doing a large numbers of updates, you need to consider frequently syncpointing or committing the work. If you do not use syncpoints, CICS will see the entire batch job as a single unit of work and it will retain locks on all updated records for recoverable VSAM files until the batch job finishes. If you do commit the work along the way, you need to determine a strategy to manage recovery if a batch abend occurs. Going back to a point-in-time copy of the file and restoring it will undo the batch updates, but what happens to the CICS updates to those files? The requirement for making application changes makes EXCI an unacceptable choice for companies that use third-party applications whose code cannot be changed or other applications whose code they do not want changed. Even organizations that have access to the application source and are open to redesigning it typically find that the data integrity exposure and performance impact limit the use of this solution. Practical Implications: Due to performance issues with high-volume jobs, EXCI is not suitable for VSAM file sharing. It also requires extensive and complex coding changes that are not possible or desirable with many applications. Using EXCI for batch jobs that process numerous records significantly increases the time it takes for the job to finish. Due to these performance issues with high-volume jobs, the use of EXCI for VSAM file sharing is limited. Concurrent VSAM Access for Batch and CICS: A white paper series 9

10 VSAM RLS Prior to the introduction of VSAM RLS, a single CICS address space owned and accessed any VSAM data sets opened for update. The CICS address space processed all requests for data. VSAM RLS provides a new method for accessing VSAM files that gives multiple CICS address spaces concurrent READ/WRITE access to recoverable VSAM data sets. This approach eliminates the potential problem of the one CICS address space that owned UPDATE access to the VSAM files from being a single point-of-failure or a performance bottleneck. From a batch perspective, VSAM RLS allows a batch program to read recoverable VSAM files with integrity. VSAM RLS does this by employing an SMSVSAM address space and a coupling facility. These two pieces provide record locking and buffering for the multiple CICS address spaces that can access the VSAM files for READ or WRITE. For recoverable VSAM files, batch receives READ access through these buffers to ensure data integrity. However, to make batch updates to recoverable files and to protect data integrity, organizations still must rely on the file open and close process, shadow files, or memo posting. If you were to choose memo posting, you would need to do some work with CEDA and switch CICS to a non-rls, read-only file control table (FCT). This is because you cannot open an RLS FCT if you have the file open for update in batch From a CICS and batch perspective, you can have concurrent UPDATE access for CICS and batch, but only if the VSAM files are specified as nonrecoverable. This means that VSAM RLS will not be responsible for data integrity. For example, if a batch abend occurs, you can restore the file to a point-in-time and recover from the batch updates, but you will lose all CICS updates after the batch job failed. H&W s white paper entitled VSAM Record-Level Sharing (RLS) covers these topics in greater depth and includes information on what is required to set up and install VSAM RLS and its components, and the changes you must make in order to open files in VSAM RLS mode. 10 IBM options: evolving VSAM file-sharing methodologies

11 Transactional VSAM The main objective of transactional VSAM, also known as TVS or DFSMStvs, is to extend the ability to share recoverable VSAM files between CICS and batch for update without compromising data integrity. From a concurrent update standpoint, SMSVSAM and the coupling facility manage all record locks for both CICS and batch, just as they do for VSAM RLS. From a recovery standpoint, TVS (in conjunction with resource recovery services or RRS) manages syncpointing and recovery for non-cics VSAM updates and CICS provides recovery for online updates. TVS requires you to use VSAM RLS and make extensive modifications to the batch application, such as committing work with syncpoints and managing recovery considerations. This effort is similar to the one you must make for EXCI. If you undertake this application redesign, IBM recommends making your batch applications restartable from the point at which the last unit of work was committed. All of these changes can, and usually do, represent a major redesign and rewrite of the batch applications. H&W s white paper entitled Transactional VSAM (TVS) explores these issues in depth and examines the skills required to perform these complex tasks. Sharing VSAM files inside of CICS: A way to break free from previous limitations One way to avoid the aforementioned conflicts is to share VSAM files inside of CICS. This makes batch jobs appear to CICS like any other online transaction. Batch jobs can then process while CICS continues to have full READ/WRITE access to VSAM files. Because CICS has already been entrusted with your data, extending CICS to batch is a natural move. There are numerous advantages to this approach including: performance, data integrity, implementation, reliability, and recovery benefits. Like other solutions, you must consider issues associated with solutions that share files inside of CICS. These issues include performance, such as how you will make batch and CICS each perform optimally and ensure CICS service level agreements (SLAs) are not impacted. You also need to look at recovery. How do you recover quickly while maintaining the integrity of CICS updates, batch updates, or both? The optimal transparent VSAM file sharing solution should address these areas while retaining the investment that you have made in your batch applications. These topics are explored in further detail in Transparent VSAM File Sharing via CICS and Batch. Concurrent VSAM Access for Batch and CICS: A white paper series 11

12 Conclusions Today, the world now expects to consume data and access applications on a 24/7 schedule. Businesses face the demands of continuous data availability with no wait time on the phone, no system unavailable screens, no clogged order queues, and no delays at the check in or check out counter. If you have CICS applications that depend on batch updated VSAM files, you need to consider the following critical questions: Do you lock down access to files and hope that you can meet batch schedules at odd hours? Can you really deliver concurrent VSAM file access while still ensuring data integrity? Are you forced to recode applications to deal with the complex integration options? The approach that best fits your organization depends on your current and planned operating environment and your requirements and goals for availability. That said, H&W believes that there s a better way to address these issues and get the most value out of your high-performance systems without disrupting users. By sharing VSAM files inside of CICS, you can avoid many of the pains associated with half-measures and still ensure high levels of performance, data integrity, implementation ease, reliability, and recoverability. To learn more about existing batch management issues and transparent VSAM file sharing, please review the other installments in this Concurrent VSAM Access for Batch and CICS series including: VSAM Record-Level Sharing (RLS), Transactional VSAM, and Transparent VSAM File Sharing via CICS and Batch. About H&W Headquartered in Boise, Idaho, H&W has been a leading provider of quality software solutions since H&W creates reliable, technically sound solutions like SYSB-II that provide long-term value. Today, corporations worldwide, including many Global 500 companies, trust H&W for their IT software and services needs. Call or visit North Meeker Pl., Ste 100 Boise, ID by H&W Computer Systems, Inc. All rights reserved (v.3) 12

Strategies for modernizing VSAM-reliant CICS applications

Strategies for modernizing VSAM-reliant CICS applications Strategies for modernizing VSAM-reliant CICS applications A white paper from: CICS is a registered trademark of International Business Machines (IBM) Corporation in the United States, other countries,

More information

Standard Life gives customers continuous availability to CICS data

Standard Life gives customers continuous availability to CICS data Case Study Standard Life gives customers continuous availability to CICS data Overview The Standard Life Assurance Company of Canada is one of the leading companies in the financial services industry in

More information

The case for cloud-based disaster recovery

The case for cloud-based disaster recovery IBM Global Technology Services IBM SmartCloud IBM SmartCloud Virtualized Server Recovery i The case for cloud-based disaster recovery Cloud technologies help meet the need for quicker restoration of service

More information

System Migrations Without Business Downtime. An Executive Overview

System Migrations Without Business Downtime. An Executive Overview System Migrations Without Business Downtime An Executive Overview Businesses grow. Technologies evolve. System migrations may be inevitable, but business downtime isn t. All businesses strive for growth.

More information

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss

More information

WHITE PAPER. Header Title. Side Bar Copy. Real-Time Replication Is Better Than Periodic Replication WHITEPAPER. A Technical Overview

WHITE PAPER. Header Title. Side Bar Copy. Real-Time Replication Is Better Than Periodic Replication WHITEPAPER. A Technical Overview Side Bar Copy Header Title Why Header Real-Time Title Replication Is Better Than Periodic Replication A Technical Overview WHITEPAPER Table of Contents Introduction...1 Today s IT Landscape...2 What Replication

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery

More information

Buffering, Record Level Sharing, and Performance Basics for VSAM Data Sets

Buffering, Record Level Sharing, and Performance Basics for VSAM Data Sets Buffering, Record Level Sharing, and Performance Basics for VSAM Data Sets Session 12999 Presented by Michael E. Friske Expectations From This Session You will be given some general rules of thumb for

More information

IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity

IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity Simplifying storage processes and ensuring business continuity and high availability IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity The risks are even greater for companies that

More information

IBM TotalStorage IBM TotalStorage Virtual Tape Server

IBM TotalStorage IBM TotalStorage Virtual Tape Server IBM TotalStorage IBM TotalStorage Virtual Tape Server A powerful tape storage system that helps address the demanding storage requirements of e-business storag Storage for Improved How can you strategically

More information

VMware Hybrid Cloud. Accelerate Your Time to Value

VMware Hybrid Cloud. Accelerate Your Time to Value VMware Hybrid Cloud Accelerate Your Time to Value Fulfilling the Promise of Hybrid Cloud Computing Through 2020, the most common use of cloud services will be a hybrid model combining on-premises and external

More information

High Availability and Disaster Recovery Solutions for Perforce

High Availability and Disaster Recovery Solutions for Perforce High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce

More information

Perforce Backup Strategy & Disaster Recovery at National Instruments

Perforce Backup Strategy & Disaster Recovery at National Instruments Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir National Instruments Perforce User Conference April 2005-1 - Contents 1. Introduction 2. Development Environment 3. Architecture

More information

Transaction Processing Monitors

Transaction Processing Monitors Chapter 24: Advanced Transaction Processing! Transaction-Processing Monitors! Transactional Workflows! High-Performance Transaction Systems! Main memory databases! Real-Time Transaction Systems! Long-Duration

More information

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11 Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node

More information

BMC Mainframe Solutions. Optimize the performance, availability and cost of complex z/os environments

BMC Mainframe Solutions. Optimize the performance, availability and cost of complex z/os environments BMC Mainframe Solutions Optimize the performance, availability and cost of complex z/os environments If you depend on your mainframe, you can rely on BMC Sof tware. Yesterday. Today. Tomorrow. You can

More information

WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE

WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE Published: May 2006 Executive Summary Database Management Systems (DBMS) are the hidden engines behind some of a company's

More information

ENZO UNIFIED SOLVES THE CHALLENGES OF OUT-OF-BAND SQL SERVER PROCESSING

ENZO UNIFIED SOLVES THE CHALLENGES OF OUT-OF-BAND SQL SERVER PROCESSING ENZO UNIFIED SOLVES THE CHALLENGES OF OUT-OF-BAND SQL SERVER PROCESSING Enzo Unified Extends SQL Server to Simplify Application Design and Reduce ETL Processing CHALLENGES SQL Server does not scale out

More information

Introduction to Enterprise Data Recovery. Rick Weaver Product Manager Recovery & Storage Management BMC Software

Introduction to Enterprise Data Recovery. Rick Weaver Product Manager Recovery & Storage Management BMC Software Introduction to Enterprise Data Recovery Rick Weaver Product Manager Recovery & Storage Management BMC Software Contents Introduction...1 The Value of Data...2 Risks to Data Assets...2 Physical Loss...2

More information

Caché High Availability Guide

Caché High Availability Guide Caché High Availability Guide Version 2015.1 11 February 2015 InterSystems Corporation 1 Memorial Drive Cambridge MA 02142 www.intersystems.com Caché High Availability Guide Caché Version 2015.1 11 February

More information

VERITAS Business Solutions. for DB2

VERITAS Business Solutions. for DB2 VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................

More information

Business Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time

Business Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time Business Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time Introduction This is the third of a series of best practices workbooks designed to familiarize

More information

Disaster Recovery for Oracle Database

Disaster Recovery for Oracle Database Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance 7.0 Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Loss Business Impact... 6 2.2 Recovery Tools... 8 3 Manual Recovery Method...

More information

Enabling comprehensive data protection for VMware environments using FalconStor Software solutions

Enabling comprehensive data protection for VMware environments using FalconStor Software solutions Industry Trends and Technology Perspective White Paper Enabling comprehensive data protection for VMware environments using FalconStor Software solutions Issues and solutions to enable complete data protection

More information

Affordable Remote Data Replication

Affordable Remote Data Replication SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted

More information

An Introduction to System i High Availability. Get to know the core components of HA solutions and important installation considerations.

An Introduction to System i High Availability. Get to know the core components of HA solutions and important installation considerations. An Introduction to System i High Availability Get to know the core components of HA solutions and important installation considerations. Introduction Every company faces critical hours when system downtime

More information

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models 1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint

More information

VERITAS Volume Replicator in an Oracle Environment

VERITAS Volume Replicator in an Oracle Environment VERITAS Volume Replicator in an Oracle Environment Introduction Remote replication of online disks and volumes is emerging as the technique of choice for protecting enterprise data against disasters. VERITAS

More information

IBM PROTECTIER: FROM BACKUP TO RECOVERY

IBM PROTECTIER: FROM BACKUP TO RECOVERY SOLUTION PROFILE IBM PROTECTIER: FROM BACKUP TO RECOVERY NOVEMBER 2011 When it comes to backup and recovery, backup performance numbers rule the roost. It s understandable really: far more data gets backed

More information

technology brief RAID Levels March 1997 Introduction Characteristics of RAID Levels

technology brief RAID Levels March 1997 Introduction Characteristics of RAID Levels technology brief RAID Levels March 1997 Introduction RAID is an acronym for Redundant Array of Independent Disks (originally Redundant Array of Inexpensive Disks) coined in a 1987 University of California

More information

PROTECTING MICROSOFT SQL SERVER TM

PROTECTING MICROSOFT SQL SERVER TM WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden

More information

Once the RTO and RPO objectives are known, the customer is able to determine which disaster recovery methodology works best for their needs.

Once the RTO and RPO objectives are known, the customer is able to determine which disaster recovery methodology works best for their needs. 1 With the base IMS product, we will explore disaster recovery where the remote site is restored to a specific recovery point using batch image copies and a backup of the DBRC RECON data set. There are

More information

IBM Global Technology Services March 2008. Virtualization for disaster recovery: areas of focus and consideration.

IBM Global Technology Services March 2008. Virtualization for disaster recovery: areas of focus and consideration. IBM Global Technology Services March 2008 Virtualization for disaster recovery: Page 2 Contents 2 Introduction 3 Understanding the virtualization approach 4 A properly constructed virtualization strategy

More information

Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint

Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint Applied Technology Abstract This white paper covers how EMC NetWorker and EMC NetWorker modules can be used effectively in

More information

The Revival of Direct Attached Storage for Oracle Databases

The Revival of Direct Attached Storage for Oracle Databases The Revival of Direct Attached Storage for Oracle Databases Revival of DAS in the IT Infrastructure Introduction Why is it that the industry needed SANs to get more than a few hundred disks attached to

More information

Contents. SnapComms Data Protection Recommendations

Contents. SnapComms Data Protection Recommendations Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery

More information

The Google File System

The Google File System The Google File System By Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung (Presented at SOSP 2003) Introduction Google search engine. Applications process lots of data. Need good file system. Solution:

More information

ASG-Rochade Backing up Rochade Databases Quick Start Guide

ASG-Rochade Backing up Rochade Databases Quick Start Guide ASG-Rochade Backing up Rochade Databases Quick Start Guide Version 7.00.006 March 5, 2007 ROC0600-700 This publication contains information about backing up databases of ASG-Rochade (herein called Rochade).

More information

Five Essential Components for Highly Reliable Data Centers

Five Essential Components for Highly Reliable Data Centers GE Intelligent Platforms Five Essential Components for Highly Reliable Data Centers Ensuring continuous operations with an integrated, holistic technology strategy that provides high availability, increased

More information

IT Service Management

IT Service Management IT Service Management Service Continuity Methods (Disaster Recovery Planning) White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2001. All rights reserved. Duplication of this document or extraction

More information

evm Virtualization Platform for Windows

evm Virtualization Platform for Windows B A C K G R O U N D E R evm Virtualization Platform for Windows Host your Embedded OS and Windows on a Single Hardware Platform using Intel Virtualization Technology April, 2008 TenAsys Corporation 1400

More information

Publication Date: April 2007

Publication Date: April 2007 white paper Boost Block-level Replication with GoldenGate s TDM Technology for 100% Business Continuity Publication Date: April 2007 Abstract: Recent natural disasters and government regulations have created

More information

Enterprise Backup and Restore technology and solutions

Enterprise Backup and Restore technology and solutions Enterprise Backup and Restore technology and solutions LESSON VII Veselin Petrunov Backup and Restore team / Deep Technical Support HP Bulgaria Global Delivery Hub Global Operations Center November, 2013

More information

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of

More information

SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery

SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery by Diane Beeler, Consulting Product Marketing Manager, BMC Software and Mati Pitkanen, SQL-BackTrack for Oracle Product Manager, BMC Software

More information

news Oracle ZDLRA Zero Data Loss Recovery Appliance

news Oracle ZDLRA Zero Data Loss Recovery Appliance news Oracle ZDLRA Zero Data Loss Recovery Appliance December 2014 When Larry Ellison announced the new Oracle Backup Appliance at the Oracle Open World 2013 with the DBLRA (Database Backup Logging Recovery

More information

An Oracle White Paper January 2013. A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c

An Oracle White Paper January 2013. A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c An Oracle White Paper January 2013 A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c TABLE OF CONTENTS Introduction 2 ASM Overview 2 Total Storage Management

More information

IS IN-MEMORY COMPUTING MAKING THE MOVE TO PRIME TIME?

IS IN-MEMORY COMPUTING MAKING THE MOVE TO PRIME TIME? IS IN-MEMORY COMPUTING MAKING THE MOVE TO PRIME TIME? EMC and Intel work with multiple in-memory solutions to make your databases fly Thanks to cheaper random access memory (RAM) and improved technology,

More information

Executive Brief Infor Cloverleaf High Availability. Downtime is not an option

Executive Brief Infor Cloverleaf High Availability. Downtime is not an option Executive Brief Infor Cloverleaf High Availability Downtime is not an option Gain value from Infor by: Delivering continuous access to mission-critical systems and data Providing uninterrupted continuity

More information

Exchange DAG backup and design best practices

Exchange DAG backup and design best practices Exchange DAG backup and design best practices Brien M. Posey Modern Data Protection Built for Virtualization Database Availability Groups (DAGs) are the primary fault-tolerant mechanism used for protecting

More information

Mission-Critical Java. An Oracle White Paper Updated October 2008

Mission-Critical Java. An Oracle White Paper Updated October 2008 Mission-Critical Java An Oracle White Paper Updated October 2008 Mission-Critical Java The Oracle JRockit family of products is a comprehensive portfolio of Java runtime solutions that leverages the base

More information

The next generation, proven, affordable way to protect business using disk-based recovery

The next generation, proven, affordable way to protect business using disk-based recovery REAL-TIME RECOVERY The next generation, proven, affordable way to protect business using disk-based recovery StorageCraft Technology Corporation Leading the Way to Safer Computing 2006 StorageCraft Technology

More information

W H I T E P A P E R T h e C r i t i c a l N e e d t o P r o t e c t M a i n f r a m e B u s i n e s s - C r i t i c a l A p p l i c a t i o n s

W H I T E P A P E R T h e C r i t i c a l N e e d t o P r o t e c t M a i n f r a m e B u s i n e s s - C r i t i c a l A p p l i c a t i o n s Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T h e C r i t i c a l N e e d t o P r o t e c t M a i n f r a m e B u s i n e

More information

Restoration Technologies. Mike Fishman / EMC Corp.

Restoration Technologies. Mike Fishman / EMC Corp. Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

IBM DB2 Recovery Expert June 11, 2015

IBM DB2 Recovery Expert June 11, 2015 Baltimore/Washington DB2 Users Group IBM DB2 Recovery Expert June 11, 2015 2014 IBM Corporation Topics Backup and Recovery Challenges FlashCopy Review DB2 Recovery Expert Overview Examples of Feature and

More information

High Availability Using Raima Database Manager Server

High Availability Using Raima Database Manager Server BUSINESS WHITE PAPER High Availability Using Raima Database Manager Server A Raima Inc. Business Whitepaper Published: January, 2008 Author: Paul Johnson Director of Marketing Copyright: Raima Inc. Abstract

More information

PA Treasury Department Mainframe Modernization to Windows Pennsylvania Treasury Department Bureau of Information Technology Solutions

PA Treasury Department Mainframe Modernization to Windows Pennsylvania Treasury Department Bureau of Information Technology Solutions PA Treasury Department Mainframe Modernization to Windows Pennsylvania Treasury Department Bureau of Information Technology Solutions Nomination Category: IMPROVING STATE OPERATIONS Nominated by Denise

More information

Disk-to-Disk Backup & Restore Application Note

Disk-to-Disk Backup & Restore Application Note Disk-to-Disk Backup & Restore Application Note All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from

More information

StorageCraft Technology Corporation Leading the Way to Safer Computing 2004-2009 StorageCraft Technology Corporation. All Rights Reserved.

StorageCraft Technology Corporation Leading the Way to Safer Computing 2004-2009 StorageCraft Technology Corporation. All Rights Reserved. PRODUCT SCENARIOS Introduction Fast and reliable online backup and bare metal recovery for Windows servers ShadowProtect Server Edition creates an exact point-in-time backup of your entire server or specific

More information

New Ways of Running Batch Applications on z/os

New Ways of Running Batch Applications on z/os Front cover New Ways of Running Batch Applications on z/os Volume 1 CICS Transaction Server Technology overview Application design considerations Example Daniel Millwood Alex Louwe Kooijmans Elsie Ramos

More information

Microsoft BizTalk Server: Spotlight on Cost Savings

Microsoft BizTalk Server: Spotlight on Cost Savings Microsoft BizTalk Server: Spotlight on Cost Savings White Paper Published: March 2009 Abstract Faced with tough economic challenges, organizations across all industries need to reduce costs by maximizing

More information

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database An Oracle White Paper November 2010 Oracle Real Application Clusters One Node: The Always On Single-Instance Database Executive Summary... 1 Oracle Real Application Clusters One Node Overview... 1 Always

More information

Using VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems

Using VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems Using VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems Applied Technology Abstract By migrating VMware virtual machines from one physical environment to another, VMware VMotion can

More information

Data Management in the Cloud

Data Management in the Cloud Data Management in the Cloud Ryan Stern stern@cs.colostate.edu : Advanced Topics in Distributed Systems Department of Computer Science Colorado State University Outline Today Microsoft Cloud SQL Server

More information

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late.

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late. BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS Disasters happen. Don t wait until it s too late. OVERVIEW It s inevitable. At some point, your business will experience data loss. It could

More information

Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com

Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com Introduction Financial institutions need to keep their businesses up and running more than ever now. Considering

More information

Oracle Data Guard OTN Case Study SWEDISH POST

Oracle Data Guard OTN Case Study SWEDISH POST Oracle Data Guard OTN Case Study SWEDISH POST Corporate Profile Annual revenue EUR 2.5 billion 40,000 employees Serving 3 million homes and 800.000 businesses daily url: http://www.posten.se Disaster Recovery

More information

Disaster Recovery Strategies

Disaster Recovery Strategies White Paper Disaster Recovery Strategies Overview... 2 Why Cloud?... 2 Recovery Gaps... 3 Where To Find The Value... 5 Who Should Be Your Cloud Vendor... 6 Conclusion... 7 January 2013 Overview When people

More information

Protecting Virtual Servers with Acronis True Image Echo

Protecting Virtual Servers with Acronis True Image Echo Protecting Virtual Servers with Acronis True Image Echo IT organizations have discovered that virtualization technology can simplify server management and reduce total operating costs. Despite the technical

More information

How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems

How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems W H I T E P A P E R How to Manage Critical Data Stored in Microsoft Exchange Server 2010 By Hitachi Data Systems April 2012 2 Table of Contents Executive Summary and Introduction 3 Mission-critical Microsoft

More information

WHAT IS ENTERPRISE OPEN SOURCE?

WHAT IS ENTERPRISE OPEN SOURCE? WHITEPAPER WHAT IS ENTERPRISE OPEN SOURCE? ENSURING YOUR IT INFRASTRUCTURE CAN SUPPPORT YOUR BUSINESS BY DEB WOODS, INGRES CORPORATION TABLE OF CONTENTS: 3 Introduction 4 Developing a Plan 4 High Availability

More information

Destiny system backups white paper

Destiny system backups white paper Destiny system backups white paper Establishing a backup and restore plan for Destiny Overview It is important to establish a backup and restore plan for your Destiny installation. The plan must be validated

More information

Business Continuity: Choosing the Right Technology Solution

Business Continuity: Choosing the Right Technology Solution Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail

More information

Protecting Microsoft SQL Server

Protecting Microsoft SQL Server Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary

More information

an introduction to networked storage

an introduction to networked storage an introduction to networked storage How networked storage can simplify your data management The key differences between SAN, DAS, and NAS The business benefits of networked storage Introduction Historical

More information

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering

More information

Clustering and Queue Replication:

Clustering and Queue Replication: Clustering & Queue Replication Clustering and Queue Replication: How WatchGuard XCS Provides Fully Redundant Messaging Security Technical Brief WatchGuard Technologies, Inc. Published: March 2011 Introduction

More information

VIRTUALIZATION TECHNOLOGIES AND THEIR IMPACT ON DISASTER RECOVERY PLANNING

VIRTUALIZATION TECHNOLOGIES AND THEIR IMPACT ON DISASTER RECOVERY PLANNING VIRTUALIZATION TECHNOLOGIES AND THEIR IMPACT ON DISASTER RECOVERY PLANNING BUSINESS VALUE WHITEPAPER Double-Take Software, Inc. Published: April 2007 Abstract Virtual server technologies provide companies

More information

Continuous Data Replicator 7.0

Continuous Data Replicator 7.0 DATA PROTECTION ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Continuous Data Replicator 7.0 Continuous Data Protection (CDP) and Centralized Management of Remote Office Data Key Benefits Reduces management

More information

How To Write A Transaction System

How To Write A Transaction System Chapter 20: Advanced Transaction Processing Remote Backup Systems Transaction-Processing Monitors High-Performance Transaction Systems Long-Duration Transactions Real-Time Transaction Systems Weak Levels

More information

Achieve Continuous Computing for Mainframe Batch Processing. By Hitachi Data Systems and 21st Century Software

Achieve Continuous Computing for Mainframe Batch Processing. By Hitachi Data Systems and 21st Century Software Achieve Continuous Computing for Mainframe Batch Processing By Hitachi Data Systems and 21st Century Software February 2016 Contents Executive Summary... 2 Introduction... 3 Difficulties in Recovering

More information

Response Time Analysis

Response Time Analysis Response Time Analysis A Pragmatic Approach for Tuning and Optimizing Oracle Database Performance By Dean Richards Confio Software, a member of the SolarWinds family 4772 Walnut Street, Suite 100 Boulder,

More information

VMware Infrastructure 3 and Stratus Continuous Availability:

VMware Infrastructure 3 and Stratus Continuous Availability: by Stratus Technologies, The Availability Company October, 2007 B E N E F I T F RO M VMware Infrastructure 3 and Stratus Continuous Availability: Going Beyond High Availability for Business-Critical Virtualization

More information

Benefit from Disaster Recovery... Without a Disaster

Benefit from Disaster Recovery... Without a Disaster Benefit from Disaster Recovery... Without a Disaster Startling Facts 87% of businesses experience computer failure each year 50% of businesses experience up to five failures each year The average number

More information

Affordable, Scalable, Reliable OLTP in a Cloud and Big Data World: IBM DB2 purescale

Affordable, Scalable, Reliable OLTP in a Cloud and Big Data World: IBM DB2 purescale WHITE PAPER Affordable, Scalable, Reliable OLTP in a Cloud and Big Data World: IBM DB2 purescale Sponsored by: IBM Carl W. Olofson December 2014 IN THIS WHITE PAPER This white paper discusses the concept

More information

Big data management with IBM General Parallel File System

Big data management with IBM General Parallel File System Big data management with IBM General Parallel File System Optimize storage management and boost your return on investment Highlights Handles the explosive growth of structured and unstructured data Offers

More information

CA Scheduler Job Management r11

CA Scheduler Job Management r11 PRODUCT SHEET CA Scheduler Job Management CA Scheduler Job Management r11 CA Scheduler Job Management r11 (CA Scheduler JM), part of the Job Management solution from CA Technologies, is a premier z/oscentric

More information

Availability Digest. What is Active/Active? October 2006

Availability Digest. What is Active/Active? October 2006 the Availability Digest What is Active/Active? October 2006 It is a fundamental fact that any system can and will fail at some point. The secret to achieving extreme availabilities is to let it fail, but

More information

Scalability and BMC Remedy Action Request System TECHNICAL WHITE PAPER

Scalability and BMC Remedy Action Request System TECHNICAL WHITE PAPER Scalability and BMC Remedy Action Request System TECHNICAL WHITE PAPER Table of contents INTRODUCTION...1 BMC REMEDY AR SYSTEM ARCHITECTURE...2 BMC REMEDY AR SYSTEM TIER DEFINITIONS...2 > Client Tier...

More information

How To Improve Your Database Performance

How To Improve Your Database Performance SOLUTION BRIEF Database Management Utilities Suite for DB2 for z/os How Can I Establish a Solid Foundation for Successful DB2 Database Management? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os

More information

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,

More information

Real-time Data Replication

Real-time Data Replication Real-time Data Replication from Oracle to other databases using DataCurrents WHITEPAPER Contents Data Replication Concepts... 2 Real time Data Replication... 3 Heterogeneous Data Replication... 4 Different

More information

Synchronous Data Replication

Synchronous Data Replication S O L U T I O N S B R I E F Synchronous Data Replication Hitachi Data Systems Synchronous Data Replication Business continuity has become one of the top issues facing businesses and organizations all around

More information

Aljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: June 16, 2009

Aljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: June 16, 2009 Business Continuity & Disaster Recovery Plan Last Updated: June 16, 2009 Business Continuity & Disaster Recovery Plan Page 2 of 6 Table of Contents Introduction... 3 Business Continuity... 3 Employee Structure...

More information

Microsoft Cross-Site Disaster Recovery Solutions

Microsoft Cross-Site Disaster Recovery Solutions Microsoft Cross-Site Disaster Recovery Solutions End-to-End Solutions Enabled by Windows 2008 Failover Clustering, Hyper-V, and Partner Solutions for Data Replication Published: December 2009 Introduction:

More information

RELIABLE BACKUP TO PROTECT YOUR DATA, YOUR BUSINESS, AND YOUR REPUTATION VERITAS MANAGED BACKUP SERVICES

RELIABLE BACKUP TO PROTECT YOUR DATA, YOUR BUSINESS, AND YOUR REPUTATION VERITAS MANAGED BACKUP SERVICES RELIABLE BACKUP TO PROTECT YOUR DATA, YOUR BUSINESS, AND YOUR REPUTATION VERITAS MANAGED BACKUP SERVICES WHAT IS THE STATUS OF YOUR CURRENT BACKUP ENVIRONMENT? Every year, global businesses armed with

More information

CA ARCserve Backup for Windows

CA ARCserve Backup for Windows CA ARCserve Backup for Windows Agent for Sybase Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

RELIABLE BACKUP TO PROTECT YOUR DATA, YOUR BUSINESS, AND YOUR REPUTATION VERITAS MANAGED BACKUP SERVICES

RELIABLE BACKUP TO PROTECT YOUR DATA, YOUR BUSINESS, AND YOUR REPUTATION VERITAS MANAGED BACKUP SERVICES RELIABLE BACKUP TO PROTECT YOUR DATA, YOUR BUSINESS, AND YOUR REPUTATION VERITAS MANAGED BACKUP SERVICES WHAT IS THE STATUS OF YOUR CURRENT BACKUP ENVIRONMENT? Every year, global businesses armed with

More information

DEFINING THE RIGH DATA PROTECTION STRATEGY

DEFINING THE RIGH DATA PROTECTION STRATEGY DEFINING THE RIGH DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions By Cindy LaChapelle, Principal Consultant, ISG www.isg-one.com INTRODUCTION Most organizations have traditionally

More information