WHITE PAPER. Header Title. Side Bar Copy. Real-Time Replication Is Better Than Periodic Replication WHITEPAPER. A Technical Overview
|
|
- Aileen Caitlin McBride
- 8 years ago
- Views:
Transcription
1 Side Bar Copy Header Title Why Header Real-Time Title Replication Is Better Than Periodic Replication A Technical Overview WHITEPAPER
2 Table of Contents Introduction...1 Today s IT Landscape...2 What Replication Is: A Narrow Definition...2 What Replication Can Do...2 Replication Methods...3 Periodic Replication Not Well Suited to Multi-Tiered Computing Environment...3 Replicating in Real-Time with Double-Take...4 Summary...7 About Vision Solutions...7 1
3 Introduction Replication is a foundational construct in computing. In today s complex computing environments with geographically dispersed heterogeneous platforms, replication regardless of its form is an essential bridge. It can help you lower costs, increase efficiency and limit your exposure to risk. Today s IT Landscape Complicated. This word best describes the state of information technology these days. Pervasive, around-the-clock delivery of services to end users is heavily dependent on interdependencies between technologies that many IT organizations have only recently embraced. Today, most businesses have more than one location and one computer. Data is bigger and must be shared across several physical, virtual and Cloud servers that are often geographically dispersed. Today, you need to be able to transition to new platforms quickly, and deliver accurate and timely information for consumption by computer systems operated by your supply chain partners and clients. What Replication Is: A Narrow Definition In the context of computing, the term replication describes the process of sharing information between multiple computing or storage devices. In either case, the replication process must have built-in capabilities to ensure parity between writes on the publisher and any number of subscribers. Replication is particularly useful in distributed computing environments. It is a proven way to synchronize multiple decentralized servers. Replicating data across multiple servers maintains data in a synchronized state. In the interest of bandwidth optimization, replication engines designed for efficiency only copy data that has been changed since the data was previously replicated. What Replication Can Do Replication can be used to address several different types of information management challenges, and thus, improve efficiency and profitability. The ways in which replication can benefit your business are as follows: Migrations By using replication to move your entire computing environment to new systems you can cut a large block of time out of the migration process and lessen the expense through a reduction in sheer manpower. You also can virtually eliminate downtime from the migration process. Availability and Recovery When used to maintain an exact duplicate of your production system on a backup machine, replication can dramatically reduce the likelihood of a prolonged outage caused by a major system or environmental disaster. Availability and Recovery are the areas where replication technology is most commonly deployed. 2
4 Replication Methods Periodic Replication Periodic replication is a technological variant of replication that involves a source system, often referred to as a publisher batching up several transactions over the course of a defined interval and sharing that increment with other target, or subscriber at the end of the collection process. Periodic replication is relatively simplistic in its approach. Computing resources are consumed in the collection of data for each increment, and a considerable amount of network bandwidth is consumed when data is transmitted. Periodic replication is not suitable in environments were data is frequently changed because transactions committed on the publisher server but not yet transmitted to other subscriber servers can be lost if the publisher or connection fails. Therefore, periodic replication is suitable in environments where data rarely changes; when the publisher and subscriber do not need to remain synchronized, or where networks cannot tolerate large amounts of data shipped over short intervals. Real-Time Replication Real-time replication is a term that describes the process of copying data and system setting changes on the publisher to subscribers as soon as they occur. The term real-time is often used to describe two distinctly different technological approaches. The first is when writes occur on several platforms simultaneously. This is synchronous replication, where data is first replicated to the target, and once it is committed, it is also written to the production system. Synchronous replication may slow down your system if you don t have a large amount of low-latency bandwidth. The second is a scenario where a write occurs on the publisher and then immediately after on the subscribers but without holding up the publisher write operation. This is referred to as real-time asynchronous replication. Asynchronous replication also keeps both systems in sync with much less impact on performance. The difference is that asynchronous replication is tolerant of lower bandwidth connections and therefore can provide real-time replication over low bandwidth connections over any distance. Asynchronous replication commits data to the target system as quickly as possible over available bandwidth. Periodic Replication Not Well Suited to Multi-Tiered Server Environments While periodic replication has a place in the datacenter, it is better suited for lower-tier server environments versus multi-tiered ones. There are three reasons for this: First, periodic replication does not keep data continuously in sync which allows for stale data and data loss on the subscriber between replication intervals. Periodic replication is not a sufficient solution to protect systems that cannot tolerate data loss. Second, periodic replication has to be aware of the application it is protecting. Therefore, if the replication vendor has not written an interface for the application you need to protect, it may not be a suitable solution. 3
5 Third, periodic replication sends bursts of data. With periodic replication, you generally have data being sent in short periods of time which results in spiking of network traffic, a condition that you would not see with real-time replication. Spiking may impact the performance of other applications that are sharing the same network. Spiking in resource utilization also impacts disk I/O and other server resources such as CPU and memory. Replicating in Real-Time with Double-Take The Double-Take real-time replication engine is designed from the ground up to perform the necessary activities to quickly, safely, and efficiently identify I/O operations; determine what must be sent; transmit that information; and finally ensure it is written correctly on the other side. Double-Take s asynchronous replication architecture uses minimal processor and bandwidth so it can be used even in constrained network environments. A technical discussion of the Double-Take real-time replication engine follows. For the Double-Take replication engine to come to life in Microsoft Windows and Linux environments, it must first install a filter driver. This filter allows the Double-Take real-time replication engine to see all I/O operations that are destined for anything that Double-Take is monitoring. This includes any file systems supported by the Double-Take real-time replication engine for Linux and anything that is passed through NTFS on Windows even open, locked or binary files. The filters also allow the Double-Take real-time replication engine to see true byte-level operations, as opposed to block-level operations that occur further down the stack from the file system itself. Logically, if you only change 8k (a standard page size for Microsoft SQL Server ), the Double-Take real-time replication engine can identify the 8k of changes and not have to work with the 32k or 64k of a disk block. This dramatically minimizes the amount of data sent across the line. Read Operations To optimize performance, read operations are ignored as they pass through the filter. Write-and-change operations are copied as they pass through, so the Double-Take real-time replication engine provides real-time replication of I/O operations in the most efficient way possible. Or put a finer point on it, the Double-Take real-time replication engine will only duplicate write and change operations for those areas of the file systems that you define (through one of the workflows in the Console). This can be anything from single files up to an entire volume or set of volumes. Once again, the Double-Take real-time replication engine is minimizing what data has to be managed for transmission, both to speed up the overall process and to preserve bandwidth for other processes on the network. 4
6 How Data Is Transmitted Once Double-Take has an I/O copy that has to be replicated, it adds that copy to the send buffer. All of the buffers and queues used by the Double-Take real-time replication engine exist dynamically in RAM or on disk and you have control over how much of each of those resources the Double-Take real-time replication engine is allowed to use. If the buffer is empty, then it immediately places a copy of the I/O operation into an acknowledgment queue and transmits the original to the target device over TCP/IP. The next operation in the buffer is sequentially addressed, and so on. Since all data flows through the send buffer first, if a bottleneck occurs the Double-Take real-time replication engine simply buffers the changes in the correct write order and transmits them as quickly as bandwidth will allow. If you have chosen to enable throttling (either at a fixedrate or scheduled interval), then the Double-Take real-time replication engine will abide by those limits even if there is bandwidth available above that limit. Target Side Operations Once the I/O is received by the target system, the Double-Take real-time replication engine performs a series of integrity checks to make sure: The entire I/O operation was received without errors. The I/O operation is in the correct file-system write order (based on the source that sent it). After the validation check, the target system sends an acknowledgement back to the source device to confirm receipt, and places the I/O into the receive buffer for commit to disk. Without a bottleneck, the I/O will immediately leave that buffer and be written into the target s own file system. If there are disk bottlenecks, the buffer provides space to queue I/O operations and commits them as quickly as possible. In any case, the I/O operations are written in the same write order and to the same files to which the source wrote on its own file system. Transactional integrity is therefore maintained, even though the I/O in question is being written on a different device. Double-Take can re-direct I/O to a different directory/folder when necessary; but will always write the same I/O to the same files in the same write order without exception. Back on the source, the acknowledgment is received and Double-Take removes the copy of the now accepted I/O from the acknowledgment queue, freeing up space. This process happens continuously, so recognized I/O flows across the link as Double-Take continues to check new I/O and write transmitted I/O. The buffer systems handle any slowdowns and bottlenecks, and the acknowledgement queue provides a re-transmission mechanism to handle in-line errors caused by TCP anomalies and other networking issues. 5
7 Replication Services When starting out with a new job, Double-Take needs to verify the existence of a good copy of the existing data on the target. This process is accomplished through a synchronization event. Double-Take will either send all data to the target, or it will do an NTFS (or Linux FS) file-level comparison of the existing data between source and target. Any file segments that are CRC identical will be skipped, and those with differences will be copied from source to target using the same basic mechanics used for replication. This means you can pre-seed a target by placing a flat-file copy of the data on the volumes in question ahead of time. Replication begins and continues throughout the mirror process. Double-Take replicates new data as it compares the existing data both to shorten mirror times and to ensure there is not a large backlog of new data waiting to be transmitted while we check the existing information. If there is a major disruption between the two servers (short of a failover event), the Double-Take replication engine will automatically re-mirror using this same methodology. With this feature, non-failover emergencies (such as an unexpected reboot) can be handled without administrative intervention. 6
8 Summary With replication you can solve many computing challenges. Described as the process of sharing information between multiple computing or storage devices, replication is useful in today s complex, multi-platform, multi-tiered environments. Replication can be used for migrations and availability and recovery. Common replication methodologies fall into two classes, periodic and real-time. Periodic replication needs to be tightly coupled with the application it is monitoring and periodically bursts potentially large volumes of data across the communications line. Real-time replication continuously transmits data to other servers as it becomes available. It is generally application agnostic so it works with any application or database management system and it is bandwidth friendly making it a good choice for environments with bandwidth considerations. The Double-Take real-time replication engine is designed to quickly, safely, and efficiently identify I/O operations; determine what must be sent; transmit that information; and ensure it is written correctly on the other side. Double-Take s asynchronous replication architecture uses minimal processor and bandwidth so it can be used in situations where resources are limited. About Vision Solutions With more than 25,000 customers globally, Vision Solutions is one of the industry s largest providers of Business Continuity and Information Availability Solutions for Windows, IBM i (i5/os), AIX, Linux and Cloud environments. Vision s MIMIX, Double-Take and itera brands keep business-critical information continuously protected and available. With an emphasis on affordability and ease-of-use, Vision products and services help customers achieve their IT protection and recovery goals, which in-turn improves profitability, productivity, regulation compliance, customer satisfaction and quality of life. Vision Solutions oversees a global partner network that includes IBM, HP, Microsoft, VMware, Dell and hundreds of resellers and system integrators. Privately held by Thoma Bravo, Inc., Vision Solutions is headquartered in Irvine, California with development, support and sales offices worldwide. For more information call: (toll-free U.S. and Canada) or visit. Also find us on: Facebook: Twitter: YouTube: Vision Solutions Blog: Vision Solutions Inc, Barranca Parkway Irvine, CA Copyright 2012, Vision Solutions, Inc. All rights reserved. Windows is a trademark of Microsoft Corporation. Linux is a trademark of Linus Torvalds. WP_W_RealTimeRep_isBetter_E_
WHITE PAPER. Header Title. Side Bar Copy. Header Title. What To Consider When WHITEPAPER. Choosing Virtual Machine Protection.
Side Bar Copy Header Title Header Title What To Consider When Choosing Virtual Machine Protection. WHITEPAPER Table of Contents Introduction... 2 Real-time vs. Periodic Protection... 2 Availability vs.
More informationWHITE PAPER. Header Title. Side Bar Copy. Header Title. Seven Virtualization DR Myths WHITEPAPER
Side Bar Copy Header Title Header Title Seven Virtualization DR Myths WHITEPAPER Seven Virtualization DR Myths As IT departments across the world move more virtualization and virtual technologies into
More informationThe Cost of Free. The Hidden Costs of Server Migrations PERSPECTIVE
The Cost of Free The Hidden Costs of Server Migrations PERSPECTIVE Table of Contents The Hidden Costs of Server Migrations... 2 Why Migrate... 2 Migration Issues... 4 Cost of Free... 5 A More Cost Effective
More informationMaximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity
Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity task is resuming business critical operations. Having
More informationEffortless No Downtime Server and Storage Migrations
Double-Take Move Effortless No Downtime Server and Storage Migrations Migrating applications, systems and data has always been a challenge for IT staff; in fact, most have just gotten used to the pain
More informationWHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE
WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE Published: May 2006 Executive Summary Database Management Systems (DBMS) are the hidden engines behind some of a company's
More informationVirtualized Disaster Recovery from VMware and Vision Solutions Cost-efficient, dependable solutions for virtualized disaster recovery and business
Virtualized Disaster Recovery from VMware and Vision Solutions Cost-efficient, dependable solutions for virtualized disaster recovery and business continuity Cost-efficient, dependable solutions for virtualized
More informationLinux: Beyond Backups An overview of restore and recovery technology, and Double-Take Availability
Linux: Beyond Backups An overview of restore and recovery technology, and Double-Take Availability Contents Introduction... 3 Backing up to Tape or Removable Disk... 5 Open Source DR, DIY and Other Variants....
More informationProtecting Exchange 2010 An Executive Overview of Double-Take Availability
Protecting Exchange 2010 An Executive Overview of Double-Take Availability Introduction Native backup can provide higher levels of data and system protection, but the need for 3rd-party software and hardware
More informationBusiness Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time
Business Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time Introduction This is the third of a series of best practices workbooks designed to familiarize
More informationDouble-Take Cloud Migration Center (CMC) Tech Brief
Double-Take Cloud Migration Center (CMC) Tech Brief Overview Double-Take Cloud Migration Center is an online service that enables migrations from VMware vsphere and Amazon Web Services EC2 to Microsoft
More informationDouble-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server
Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server Double-Take Software, Inc. 257 Turnpike Road; Suite 210 Southborough,
More information(Formerly Double-Take Backup)
(Formerly Double-Take Backup) An up-to-the-minute copy of branch office data and applications can keep a bad day from getting worse. Double-Take RecoverNow for Windows (formerly known as Double-Take Backup)
More informationVeritas Cluster Server from Symantec
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
More informationWindows Server Multi-site Clustering
Windows Server Multi-site Clustering Windows Server Multi-site Clustering Vision Solutions provides market-leading solutions for data protection and recoverability. Applications, like all man-made creations,
More informationData Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key
More informationHow to Migrate Without Downtime
Side Bar Copy Header Title Header Title How to Migrate Without Downtime An Executive Overview Accuracy is the minimal criterion for measuring the success of the migration, but that alone is not adequate.
More informationDisaster Recovery and Business Continuity Basics The difference between Disaster Recovery and Business Continuity
Disaster Recovery and Business Continuity Basics Both Business Continuity and Disaster Recovery are very important business issues for every organization. Global businesses cannot simply stop operating,
More informationAn Introduction to System i High Availability. Get to know the core components of HA solutions and important installation considerations.
An Introduction to System i High Availability Get to know the core components of HA solutions and important installation considerations. Introduction Every company faces critical hours when system downtime
More informationReducing the Costs and Risks of Branch Office Data Protection
Reducing the Costs and Risks of Branch Office Data Protection Is Your Branch Office Data Really Protected? Regardless of form or fury, disasters can take their toll on any business. In fact, the Department
More informationMIGRATING TO VIRTUAL MACHINES WITH THE DOUBLE-TAKE VIRTUAL RECOVERY ASSISTANT
MIGRATING TO VIRTUAL MACHINES WITH THE DOUBLE-TAKE VIRTUAL RECOVERY ASSISTANT TECHNICAL WHITEPAPER Double-Take Software, Inc. Published: January 2009 Abstract Though server virtualization technology has
More informationDrobo How-To Guide. What You Will Need. Configure Replication for DR Using Double-Take Availability and Drobo iscsi SAN
This document shows you how to use Drobo iscsi SAN storage with Double-Take Availability to deliver replication and DR for servers and applications. Double-Take Availability from Vision Solutions performs
More informationVeritas Cluster Server by Symantec
Veritas Cluster Server by Symantec Reduce application downtime Veritas Cluster Server is the industry s leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status
More informationSystem Migrations Without Business Downtime. An Executive Overview
System Migrations Without Business Downtime An Executive Overview Businesses grow. Technologies evolve. System migrations may be inevitable, but business downtime isn t. All businesses strive for growth.
More informationMayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation
Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup
More informationData Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery
Data replication for disaster recovery Overview Veritas Volume Replicator provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable recovery of critical
More informationUsing the cloud to improve business resilience
IBM Global Technology Services White Paper IBM Business Continuity and Resiliency Services Using the cloud to improve business resilience Choose the right managed services provider to limit reputational
More informationEMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers
EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is
More informationReal-time Protection for Hyper-V
1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate
More informationCA ARCserve Replication and High Availability Deployment Options for Hyper-V
Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization
More informationOne solution to protect all Physical, Virtual and Cloud
One solution to protect all Physical, Virtual and Cloud Andy Ebbs Solution Architect andy.ebbs@visionsolutions.com +44 1905 728 023 +44 7917 326 602 Leaders Have Vision visionsolutions.com 1 What What
More informationWindows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...
More informationIBM and Vision Solutions application availability and data protection for IBM PureFlex System
IBM and Vision Solutions application availability and data protection for IBM PureFlex System The integration of Vision Solutions MIMIX Availability with the IBM PureSystems platform ensures application
More informationVeritas Replicator from Symantec
Data replication across multi-vendor storage for cost effective disaster recovery Data Sheet: Disaster Recovery Overviewview provides organizations with a comprehensive solution for heterogeneous data
More informationW H I T E P A P E R. Disaster Recovery Virtualization Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take
W H I T E P A P E R Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take Contents Introduction...1 What is VMware Infrastructure?...1 What is Double-Take?...1 Data Protection
More informationCloud Backup and Recovery
1-888-674-9495 www.doubletake.com Cloud Backup and Recovery Software applications and electronic data are the life blood of a business. When they aren t available due to a disaster or outage, business
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationHelping MSPs Build Business Continuity & Disaster Recovery Services
CA ARCSERVE R16 Helping MSPs Build Business Continuity & Many IT organizations, especially small businesses, don t have the time, resources or knowledge to build a viable Business Continuity (BC) or Disaster
More informationCloud Based Application Architectures using Smart Computing
Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products
More informationENZO UNIFIED SOLVES THE CHALLENGES OF OUT-OF-BAND SQL SERVER PROCESSING
ENZO UNIFIED SOLVES THE CHALLENGES OF OUT-OF-BAND SQL SERVER PROCESSING Enzo Unified Extends SQL Server to Simplify Application Design and Reduce ETL Processing CHALLENGES SQL Server does not scale out
More informationVeritas Storage Foundation High Availability for Windows by Symantec
Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability
More informationWindows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described
More informationA Unique Approach to SQL Server Consolidation and High Availability with Sanbolic AppCluster
A Unique Approach to SQL Server Consolidation and High Availability with Sanbolic AppCluster Andrew Melmed VP, Enterprise Architecture Sanbolic, Inc. Introduction In a multi-billion dollar industry, Microsoft
More informationCA XOsoft Replication r12.5 and CA XOsoft High Availability r12.5
FREQUENTLY ASKED QUESTIONS: CA XOSOFT REPLICATION AND CA XOSOFT HIGH AVAILABILITY CA XOsoft Replication r12.5 and CA XOsoft High Availability r12.5 Q: What are CA XOsoft Replication and CA XOsoft High
More informationProtecting Microsoft SQL Server
Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary
More informationSymantec NetBackup 7 Clients and Agents
Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency
More informationSolution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware
Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery
More informationVERITAS Business Solutions. for DB2
VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................
More informationOverview Western 12.-13.9.2012 Mariusz Gieparda
Overview Western 12.-13.9.2012 Mariusz Gieparda 1 Corporate Overview Company Global Leader in Business Continuity Easy. Affordable. Innovative. Technology Protection Operational Excellence Compliance Customer
More informationIBM TotalStorage IBM TotalStorage Virtual Tape Server
IBM TotalStorage IBM TotalStorage Virtual Tape Server A powerful tape storage system that helps address the demanding storage requirements of e-business storag Storage for Improved How can you strategically
More informationDeployment Options for Microsoft Hyper-V Server
CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES
More informationPROTECTING AND ENHANCING SQL SERVER WITH DOUBLE-TAKE AVAILABILITY
PROTECTING AND ENHANCING SQL SERVER WITH DOUBLE-TAKE AVAILABILITY Whitepaper Double-Take Software, Inc. Published: October, 2009 With its ease of use, scalability, reliability and broad industry support,
More informationThe Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss
More informationEMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers
EMC VPLEX FAMILY Continuous Availability and Data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is
More informationHA / DR Jargon Buster High Availability / Disaster Recovery
HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster
More informationSymantec Cluster Server powered by Veritas
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
More informationVirtual Machine Protection with Symantec NetBackup 7
Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing to embrace the promise of virtualization for
More informationConstant Replicator: An Introduction
Data Availability Storage Software Constant Replicator: An Introduction Configurations, Applications and Solutions of Constant Replicator A White Paper A Constant Data Technology Document August 2004 Copyright
More informationAn Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database
An Oracle White Paper November 2010 Oracle Real Application Clusters One Node: The Always On Single-Instance Database Executive Summary... 1 Oracle Real Application Clusters One Node Overview... 1 Always
More informationMANAGED SERVICE PROVIDERS SOLUTION BRIEF
MANAGED SERVICE PROVIDERS SOLUTION BRIEF The Assured Recovery Services Platform The data protection world has drastically changed in the past few years. Protection and recovery of data and systems has
More informationAchieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
More informationCompellent Source Book
Source Book Remote Instant Replay Thin Replication Compellent Corporate Office Compellent Technologies 12982 Valley View Road Eden Prairie, Minnesota 55344 www.compellent.com Contents Contents...2 Document
More informationSymantec NetBackup 7.1 What s New and Version Comparison Matrix
Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk
More informationWhitepaper Continuous Availability Suite: Neverfail Solution Architecture
Continuous Availability Suite: Neverfail s Continuous Availability Suite is at the core of every Neverfail solution. It provides a comprehensive software solution for High Availability (HA) and Disaster
More informationServer Consolidation Consolidated Recovery Hardware Migration Server Provisioning Data Center Relocation Data Center Optimization
Server Consolidation Consolidated Recovery Hardware Migration Server Provisioning Data Center Relocation Data Center Optimization Anywhere-to-Anywhere Portability and Protection for all s in the Data
More informationVeritas InfoScale Availability
Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale
More informationHRG Assessment: Stratus everrun Enterprise
HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at
More informationEnabling Cloud Architecture for Globally Distributed Applications
The increasingly on demand nature of enterprise and consumer services is driving more companies to execute business processes in real-time and give users information in a more realtime, self-service manner.
More informationContinuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs
EMC RECOVERPOINT FAMILY Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs ESSENTIALS EMC RecoverPoint Family Optimizes RPO
More informationPowering Linux in the Data Center
Powering Linux in the Data Center Solution Brief: Platform Solutions Powering Linux in the Data Center Contents Symantec and Linux in the data center...................................................................
More informationRed Hat Enterprise linux 5 Continuous Availability
Red Hat Enterprise linux 5 Continuous Availability Businesses continuity needs to be at the heart of any enterprise IT deployment. Even a modest disruption in service is costly in terms of lost revenue
More informationVision Solutions Migration Assurance Program
Vision Solutions Migration Assurance Program Migrations are Mission-Critical Whether you re starting a new migration services practice or upgrading your practice to Vision s industry-leading migration
More informationHigh availability and disaster recovery with Microsoft, Citrix and HP
High availability and disaster recovery White Paper High availability and disaster recovery with Microsoft, Citrix and HP Using virtualization, automation and next-generation storage to improve business
More informationWindows Geo-Clustering: SQL Server
Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering
More informationVERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION DATASHEET. Product Highlights
VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION As the recognized leader for enterprise-class backup and recovery, VERITAS NetBackup Enterprise Server software is designed to help provide
More informationCA Cloud Overview Benefits of the Hyper-V Cloud
Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter
More informationHigh Availability with Windows Server 2012 Release Candidate
High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions
More informationThe One Essential Guide to Disaster Recovery: How to Ensure IT and Business Continuity
The One Essential Guide to Disaster Recovery: How to Ensure IT and Business Continuity Start Here: Basic DR Only six percent of companies suffering from a catastrophic data loss survive, while 43 percent
More informationwww.rackwareinc.com RackWare Solutions Disaster Recovery
RackWare Solutions Disaster Recovery RackWare Solutions Disaster Recovery Overview Business Continuance via Disaster Recovery is an essential element of IT and takes on many forms. The high end consists
More informationProtecting Microsoft Hyper-V 3.0 Environments with CA ARCserve
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while
More informationSymantec NetBackup 7.5 for VMware
V-Ray visibility into virtual machine protection Solution Overview: Data Protection Overview There is little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped
More informationbe architected pool of servers reliability and
TECHNICAL WHITE PAPER GRIDSCALE DATABASE VIRTUALIZATION SOFTWARE FOR MICROSOFT SQL SERVER Typical enterprise applications are heavily reliant on the availability of data. Standard architectures of enterprise
More informationAddressing Microsoft Windows 7 Deployments with VMware Mirage WHITE PAPER
Addressing Microsoft Windows 7 Deployments with VMware Mirage WHITE PAPER Storage I/O Performance on VMware vsphere 5.1 over 16 Gigabit Fibre Channel Table of Contents Abstract.... 3 The Problem with Windows
More informationFive Reasons Why Smaller Organizations Should Consider High Availability
Five Reasons Why Smaller Organizations Should Consider High Availability Dramatic changes in cost and ease of use have made downtime-reducing technologies more accessible. Overview Until recently, IBM
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationPROTECTING MICROSOFT SQL SERVER TM
WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden
More informationLeveraging the Cloud for Data Protection and Disaster Recovery
WHITE PAPER: Leveraging the Cloud for Data Protection and Disaster Recovery Leveraging the Cloud for Data Protection and Disaster Recovery Bennett Klein DATA MANAGEMENT CUSTOMER SOLUTIONS MARCH 2012 Table
More informationThe Benefits of Virtualizing
T E C H N I C A L B R I E F The Benefits of Virtualizing Aciduisismodo Microsoft SQL Dolore Server Eolore in Dionseq Hitachi Storage Uatummy Environments Odolorem Vel Leveraging Microsoft Hyper-V By Heidi
More informationProtecting Miscrosoft Hyper-V Environments
Protecting Miscrosoft Hyper-V Environments Who should read this paper Technical White Papers are designed to introduce Veritas partners and end users to key technologies and technical concepts that are
More informationJournaling and High Availability Understanding the Foundation of Logical Data Replication in IBM i Environments
Journaling and High Availability Understanding the Foundation of Logical Data Replication in IBM i Environments Introduction The reputation and legacy of IBM's midgrange computers, from the earliest System
More informationWindows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication
More informationNon-Native Options for High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments Non-Native Options for High Availability by Non-Native Options for High Availability... 1 Suitability and Cost...
More informationVeeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
More informationParagon Protect & Restore
Paragon Protect & Restore ver. 3 Centralized and Disaster Recovery for virtual and physical environments Tight Integration with hypervisors for agentless backups, VM replication and seamless restores Paragon
More informationWHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression
WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression Sponsored by: Oracle Steven Scully May 2010 Benjamin Woo IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA
More informationData Protection and Recovery
Due to shrinking IT staffing and budgets, many IT organizations are turning to Service Providers for hosting of business-critical systems and applications (i.e., web hosting, email hosting, and database
More informationHigh Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach
High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many
More informationLeveraging Virtualization for Disaster Recovery in Your Growing Business
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
More informationCloud-ready network architecture
IBM Systems and Technology Thought Leadership White Paper May 2011 Cloud-ready network architecture 2 Cloud-ready network architecture Contents 3 High bandwidth with low latency 4 Converged communications
More information