Module: Business Continuity
|
|
- Elwin Jasper Newton
- 8 years ago
- Views:
Transcription
1 Upon completion of this module, you should be able to: Describe business continuity and cloud service availability Describe fault tolerance mechanisms for cloud infrastructure Discuss data protection solutions Describe the key design strategies for cloud application resiliency 1
2 Cloud Computing Reference Model Business Continuity Cross-layer Function 2
3 Lesson: Business Continuity Overview This lesson covers the following topics: Business continuity Cloud service availability Causes of service unavailability Impact of cloud service unavailability Key methods to achieve the required cloud service availability 3
4 What is Business Continuity? Business Continuity BC entails preparing for, responding to, and recovering from service outage that adversely affects business operations. BC enables continuous availability of cloud services in the event of failure Helps to meet the required service level BC involves various proactive and reactive measures Disaster recovery is a part of BC, which coordinates the process of restoring infrastructure, including data Required to support ongoing cloud services, after a disaster occurs 4
5 Cloud Service Availability Cloud Service Availability Refers to the ability of a cloud service to perform its agreed function according to business requirements and customer expectations during its specified time of operation. Service availability is based on the agreed service time and the downtime Service availability (%) = Agreed service time Downtime Agreed service time (Agreed service time is the period where the service is supposed to be available) 5
6 Causes of Cloud Service Unavailability Application failure For example, due to catastrophic exceptions caused by bad logic Data loss Infrastructure component failure Failure of dependent services Data center or site down Refreshing IT infrastructure 7
7 Impact of Cloud Service Unavailability Cost of unavailability of services is greater than ever - Outages could cost millions of dollars per hour Unavailability of service also affects reputation - Customers, financial markets, banks, and business partners Loss of revenue - Direct loss, compensatory payments, future revenue loss, and investment loss 8
8 Methods to Achieve Required Cloud Service Availability Building resilient cloud infrastructure facilitates meeting the required service availability Building resilient cloud infrastructure requires various high availability solutions Implementing fault tolerance mechanisms Deploying redundancy at both cloud infrastructure component level and site level to avoid single point of failure Deploying data protection solutions such as backup and replication Implementing automated cloud service failover Architecting resilient cloud applications 9
9 Lesson Summary During this lesson the following topics were covered: Business continuity Cloud service availability Causes of service unavailability Impact of cloud service unavailability Methods to achieve the required cloud service availability 10
10 Lesson: Building Fault Tolerance Cloud Infrastructure 1 This lesson covers the following topics: Avoiding single points of failure Key fault tolerance mechanisms 11
11 Single Points of Failure Single Points of Failure Refers to any individual component or aspect of an infrastructure whose failure can make the entire system or service unavailable. Single points of failure may occur at Component level (compute, storage, and network) Site or data center level 12
12 Avoiding Single Points of Failure Single points of failure can be avoided by implementing fault tolerance mechanisms such as redundancy Implement redundancy at component level Compute Storage Network Implement multiple service availability zones Avoids single points of failure at data center (site) level Enable service failover globally It is important to have high availability mechanisms that enable automated service failover 13
13 Implementing Redundancy at Component Level Key techniques to protect compute Clustering VM live migration Key techniques to protect network connectivity Link and switch aggregation NIC teaming Multipathing In-service software upgrade Configuring redundant hot swappable components Key techniques to protect storage RAID and erasure coding Dynamic disk sparing Configuring redundant storage system components 14
14 Compute Clustering Compute Clustering A technique where at least two compute systems (or nodes) work together and are viewed as a single compute system to provide high availability and load balancing. Enables service failover in the event of compute system failure to another system to minimize or avoid any service outage Two common clustering implementations are: Active/active Active/passive Hypervisor cluster is a common clustering implementation in cloud environment 15
15 Hypervisor Cluster Multiple hypervisors running on different systems are clustered Provides continuous availability of services running on VMs even if a physical compute system or a hypervisor fails Typically a live instance (i.e., a secondary VM) of a primary VM is created on another compute system 16
16 Virtual Machine Live Migration Running services on VMs are moved from one physical compute system to another without any downtime Allows scheduled maintenance without any downtime Facilitates VM load balancing 17
17 Link and Switch Aggregation Link aggregation Combines links between two switches and also between a switch and a node Enables network traffic failover in the event of a link failure in the aggregation Enables distribution of network traffic across links in the aggregation Switch aggregation Provides fault tolerance against switch and link failures Improves node performance by providing more active paths and bandwidth 18
18 NIC Teaming NIC Teaming A link aggregation technique that groups NICs so that they appear as a single, logical NIC to the OS or hypervisor. Provides network traffic failover in the event of a NIC/link failure Distributes network traffic across NICs NICs within a team can be configured as active and standby 19
19 Multipathing Enables a compute system to use multiple paths for transferring data to a LUN Enables failover by redirecting I/O from a failed path to another active path Performs load balancing by distributing I/O across active paths Standby paths become active if one or more active paths fail 20
20 In-Service Software Upgrade (ISSU) Allows updating software on network devices (switches and routers) without impacting the network availability Eliminates the need to stop the ongoing process on a device Ensures network availability as a result of a network device maintenance or upgrade processes Typically requires a network device with redundant control plane elements (supervisor or routing engines) This setup allows the administrator to update the software image on one engine while the other maintains network availability 21
21 RAID and Dynamic Disk Sparing RAID Combines multiple drives into a logical unit called a RAID set Provides data protection against drive failure Dynamic disk sparing Automatically replaces a failed drive with a spare drive to protect against data loss Multiple spare drives can be configured to improve availability A1 B1 C P A2 B P C Q A P B Q RAID 6 -Dual Distributed Parity A Q B2 C1 C2 22
22 Erasure Coding Provides space-optimal data redundancy to protect data loss against multiple drive failure A set of n disks is divided into m disks to hold data and k disks to hold coding information Coding information is calculated from data 23
23 Storage Resiliency Using Mirrored LUN Mirrored LUN is created using virtualization appliance Each I/O to the LUN is mirrored to the LUNs on the storage systems Mirrored LUN is continuously available to the compute system Even if one of the storage systems is unavailable due to failure 24
24 Lesson Summary During this lesson the following topics were covered: Single points of failure Clustering and VM live migration Aggregation and multipathing In-service software upgrade RAID, erasure coding, and dynamic drive sparing Storage resiliency using mirrored LUN 25
25 Lesson: Building Fault Tolerance Cloud Infrastructure 2 This lesson covers the following topics: Service availability zone Automated service failover across zones Active/passive and active/active zone configurations Live migrations across zones using stretched cluster 26
26 Service Availability Zones A service availability zone is a location with its own set of resources and isolated from other zones A zone can be a part of a data center or may even be comprised of the whole data center Enables running multiple service instances within and across zones to survive data center or site failure In the event of outage, the service should seamlessly failover across the zones Zones within a particular region are typically connected through low-latency network Enables faster cloud service failover 27
27 Automated Service Failover Across Zones Automated service failover Ensures robust and consistent failover Enables to meet stringent service levels Reduces RTO Automated failover process primarily depends on: Replication across zones Live migration with stretched cluster (zones in different remote locations) Reliable network infrastructure between zones Zones can be configured as active/passive and active/active configuration 28
28 Active/Passive Zone Configuration 29
29 Active/Active Zone Configuration 30
30 VM Migration Across Zones Using Stretched Cluster 31
31 Lesson Summary During this lesson the following topics were covered: Service availability zones Active/passive and active/active zone configurations VM migration across zones using stretched cluster 33
32 Lesson: Data Protection Solution Backup This lesson covers the following topics: Backup and recovery Backup requirements in a cloud environment Guest-level and image-level backup method Backup as a Service Backup service deployment options Deduplication for backup environment 34
33 Data Protection Overview Protecting critical data ensures availability of services Seamless service failover requires the availability of data Businesses also implement data protection solutions in order to comply with regulatory requirements Individual services and associated data sets have different business values, require different data protection strategies Two common data protection solutions: Backup Replication 35
34 Introduction to Backup and Recovery Backup An additional copy of production data, created and retained for the sole purpose of recovering lost or corrupted data. RPO and RTO are the primary considerations in selecting and implementing a specific backup strategy RPO specifies the time interval between two backups RTO relates to the time taken to recover data from backup RTO influences the type of backup target that should be used To implement a successful backup and recovery solution Service providers need to evaluate the backup methods along with their recovery considerations and retention requirements 36
35 Backup Requirements in a Cloud Environment Backup requires integration between backup application and management server of virtualized environment Backup requirements may differ from one service to another based on RTO and RPO Requires well-defined backup strategies to meet the requirements Recovery requires file level and/or full VM recovery Huge volume of redundant data in the backup environment Large number of VMs having identical data and configurations Backup and recovery operations need to be automated 37
36 Key Backup Components Backup client Gathers the data that is to be backed up Sends the data to the storage node Backup server Manages backup operations Maintains backup catalog Storage node Responsible for writing data to backup device Backup device (backup target) Tape library, disk library, and virtual tape library 38
37 Backup Targets Backup Targets Description Tape Library Tapes are portable and can be used for long term offsite storage Must be stored in locations with a controlled environment Not optimized to recognize duplicate content Data integrity and recoverability are major issues with tape-based backup media Disk Library Enhanced backup and recovery performance Disks also offer faster recovery when compared to tapes No inherent off-site capability, and is dependent on additional technologies such as replication to comply with off-site requirements Disk-based backup appliance includes features such as deduplication, compression, encryption, and replication to support business objectives Virtual Tape Library Disks are emulated and presented as tapes to backup software Does not require any additional modules or changes in the legacy backup software Provides better performance and reliability over physical tape Does not require the usual maintenance tasks associated with a physical tape drive, such as periodic cleaning and drive calibration 39
38 Backup Methods Two key backup methods: Guest-level Image-level 40
39 Guest-level Backup Backup agent is installed on each VM Performs file-level backup and recovery Does not backup VM configuration files Performing backup on multiple VMs on a compute system may consume more resources and lead to resource contention Impacts performance of applications running on VMs A A A = Backup Agent Application Servers Backup Server/ Storage Node Backup Device 41
40 Image-level Backup Creates a copy of the entire virtual disk and configuration data associated with a particular VM Backup is saved as a single entity called a VM image Provides VM image-level and file-level recovery No backup agent is required inside the VM to backup Backup processing is offloaded from VMs to a proxy server A Proxy Server Create Snapshot Mount the Snapshot Backup VM Snapshot Application Servers FS Volume Backup Device 42
41 Backup as a Service Enables consumers to procure backup services on demand Provides offsite backup for consumer desktops, laptops, and application servers Backs up data to the cloud storage Reduces the backup management overhead Transformation from CAPEX to OPEX Pay-per-use/subscription-based pricing Gives consumers the flexibility to select a backup technology based on their current requirements 43
42 Backup Service Deployment Options Managed Backup Service - Suitable when a cloud service provider already hosts consumer applications and data - Backup service is offered by the provider to protect consumer s data - Backup is managed by the service provider Replicated Backup Service - Service provider only manages data replication and IT infrastructure at disaster recovery site - Local backups are managed by consumers Remote Backup Service - Service provider receives data from consumers - Backup is managed by the service provider 44
43 Drivers for Optimizing Backup 45
44 Introduction to Data Deduplication Data Deduplication The process of detecting and identifying the unique data segments within a given set of data to eliminate redundancy. Deduplication process Chunk the data set Identify duplicate chunk Eliminate the redundant chunk Deduplication After Deduplication Unique segments = 3 Before Deduplication Total segments = 39 46
45 Deduplication Granularity Level File-level deduplication Detects and removes redundant copies of identical files Only one copy of the file is stored; the subsequent copies are replaced with a pointer to the original file Does not address the problem of duplicate content inside the files Sub-file level deduplication Breaks files down to smaller segments Detects redundant data within and across files Two methods: Fixed-length block Variable-length block 47
46 Deduplication Method Source-based deduplication Eliminates redundant data at the source (backup client) Client sends only new, unique segments across the network Reduces storage and network bandwidth requirements Increases overhead on the backup client Target-based deduplication Offloads deduplication process from the backup client Data is deduplicated at the target either inline or post-process 48
47 Lesson Summary During this lesson the following topics were covered: Backup requirements in a cloud environment Guest-level and image-level backup methods Backup as a Service Backup service deployment options Source-based and target-based deduplication 50
48 Lesson: Data Protection Solution-Replication This lesson covers the following topics: Replication and its types Snapshot and mirroring Synchronous and asynchronous remote replication Continuous Data Protection (CDP) Disaster Recovery as a Service (DRaaS) 51
49 Introduction to Replication Replication Process of creating an exact copy (replica) of the data for ensuring availability of services. Replica copies are used to restore and restart services if data loss occurs Based on the SLA for the service being offered to the consumers, data can be replicated to one or more locations Replication can be classified Local replication Snapshot and mirroring Remote replication Synchronous and asynchronous 52
50 Local Replication: Snapshot A virtual copy of a set of files, or volume as they appeared in a particular PIT Provides the ability to restore the files or volumes if there is a data loss or corruption Virtual machine snapshot is a common snapshot technique, that preserves the state and data of a VM at a specific PIT When a snapshot is created, a child virtual disk (delta disk file) is created from the base image or parent virtual disk Successive snapshots generate a new child virtual disk from the previous child virtual disk Snapshots hold only changed blocks 53
51 Local Replication: Mirroring 54
52 Remote Replication: Synchronous Write is committed to both the source and the remote replica before it is acknowledged to the compute system Ensures that the source and the replica have identical data at all times Provides near zero RPO Compute System Compute system writes data to source. 2. Data from source is replicated to replica (target). 3. Target acknowledges back to source. 4. Source acknowledges write complete to the compute system. Storage (Source) Primary Zone (Source site) 2 3 Secondary Zone (Remote Site) Storage (Replica) 55
53 Remote Replication: Asynchronous A write is committed to the source and immediately acknowledged to the compute system Data is buffered at the source and transmitted to the remote site later Replica will be behind the source by a finite amount (finite RPO) Compute System Compute system writes data to source. 2. Write is immediately acknowledged to compute system. 3. Data is transmitted to the replica (target). 4. Target acknowledges back to source. Storage (Source) 3 4 Storage (Replica) Primary Zone (Source Site) Secondary Zone (Remote Site) 56
54 Advanced Replication Solution: CDP Provides the ability to restore data to any previous PIT Enables to meet the required recovery level for an application Data changes are continuously captured and stored in a separate location from the production data Supports both local and remote replication To meet operational and disaster recovery respectively 57
55 Key CDP Components Journal volume Contains all the data that has changed from the time the replication session started to the production volume Journal size determines how far back in time the recovery points can go CDP appliance Intelligent hardware platform that runs the CDP software Manages both the local and the remote replications Write splitter Intercept writes to the production volume from the compute system and splits each write into two copies Can be implemented at the compute, fabric, or storage system 58
56 CDP Operations: Local and Remote Replication 59
57 Replication Use Case: DRaaS Service provider offers resources to enable consumers to run their IT services in the event of a disaster Resources at the service provider location can be dedicated to the consumer or they can be shared Replication is a key technique used by the service provider in order to offer DRaaS to the consumers Service provider should design, implement, and document a DRaaS solution specific to the customer s infrastructure 60
58 DRaaS Normal Production Operation IT services run at the consumer s production data center Replication occurs from the consumer production environment to the service provider s data center over the network Data is usually encrypted while replicating to the provider s location VM instances are not allocated Network Storage Compute Systems Consumer Production Data Center Storage Replication Cloud Service Provider 61
59 DRaaS Business Disruption Business operations failover to the provider s infrastructure in the event of a disaster at consumer s data center Users at the consumer organization are redirected to the cloud Typically VM instances are created from a pool of compute Connect replicated storage to each of the newly activated VMs Disaster VM instances are invoked to run the service Network Compute Systems Storage Consumer Production Data Center Cloud Service Provider 62
60 Lesson Summary During this lesson the following topics were covered: Snapshot and mirroring Synchronous and asynchronous remote replication Continuous Data Protection Disaster Recovery as a Service 63
61 Lesson: Application Resiliency for Cloud This lesson covers the following topics: Resilient cloud application Key design strategies for application resiliency Monitoring applications for availability 64
62 Resilient Cloud Applications Overview Cloud applications have to be designed to deal with IT resources failure to guarantee the required availability Fault resilient applications have logic to detect and handle transient fault conditions to avoid application downtime Key application design strategies for improving availability Graceful degradation of application functionality Retry logic in application code Persistent application state model Event-driven processing 65
63 Graceful Degradation Application maintains the limited functionality even when some of the modules or supporting services are not available Unavailability of certain application components or modules should not bring down the entire application For example, an e-commerce site can continue to collect orders even if its payment gateway is unavailable Provides the ability to process orders when the payment gateway is once again available or after failing over to a secondary gateway 66
64 Fault Detection and Retry Logic Refers to a mechanism that implements a logic in the code of an application to improve the availability To detect and retry the service that is temporarily down May result in successful restore of service A retry strategy must be defined to state how many retries can be attempted before deciding the fault is not transient A successful retry attempt typically goes unnoticed to the application users 67
65 Persistent Application State Model and Eventdriven Processing Persistent application state model Application state information is stored out of the memory Stored in a data repository If an instance fails, the state information is still available in the repository Asynchronous event-driven processing Applications are written in a way to process the user request from a queue asynchronously instead of synchronous call Allows multiple applications instances to process requests If an instance is lost, the impact is minimal 68
66 Monitoring Application Availability Specialized tools provide the capability to monitor the availability of application instance that runs on VMs Minimizes downtime associated with the application failure Typically this tool is integrated with VM management software When there is an error or failure in an application The tool attempts to restart the application within the VM If the application does not restart successfully, the tool communicates to VM management software VM management software in turn automatically restart the VM 69
67 Lesson Summary During this lesson the following topics were covered: Graceful degradation of application functionality Retry logic in application code Persistent application state model Event-driven processing Monitoring application availability 70
68 Concepts in Practice EMC backup and deduplication products EMC replication products VMware BC solutions 71
69 EMC Backup and Deduplication Products NetWorker Avamar Data Domain/ ProtectPoint Software that centralizes, automates, and accelerates data backup and recovery Supports multiplexing Supports source-based, and target-based deduplication capabilities by integrating with EMC Avamar and EMC Data Domain, respectively Disk-based backup and recovery solution that provides inherent sourcebased deduplication Avamar provides a variety of options for backup, including guest OS-level backup and image-level backup Data Domain - Target-based data deduplication solution - Data Domain Boost software increases backup performance by distributing parts of deduplication process to backup server ProtectPoint - Backs up data directly from primary storage to Data Domain system 72
70 EMC Replication Products VNX Snapshot/SnapView TimeFinder/SRDF RecoverPoint/VPLEX VNX Snapshot - Creates a PIT copy of a source LUN SnapView - EMC VNX array-based local replication software - Creates pointer-based virtual copy and full-volume mirror of the source using SnapView Snapshot and Clone respectively TimeFinder - EMC VMAX array-based local replication software - Uses TimeFinder/Snap to create pointer-based virtual copy and TimeFinder/Clone for pointer-based full-volume replica SRDF - A family of remote replication solutions for EMC VMAX arrays - Includes SRDF/Synchronous, SRDF/Asynchronous, and SRDF/Star RecoverPoint - Solution for both local and remote CDP - Enables to access data for any previous PIT VPLEX - Enables mirroring data of a virtual volume both within and across locations - Uses a clustering architecture and data caching techniques 74
71 VMware BC Solutions vcenter Site Recovery Manager A VMware tool that makes disaster recovery rapid, reliable, and manageable Provides an interface for setting up recovery plans Automates both failover and failback process that ensures highly predictable RPO and RTO Integrates tightly with replication products, vsphere, and vcenter Server VMware FT Provides continuous availability for application in the event of server failure Creates a live shadow instance of a VM that is in virtual lockstep with the primary instance FT eliminates even the smallest chance of data loss or disruption VMware HA Provides high availability for applications running in virtual machines In the event of the physical compute system failure, affected VMs are automatically restarted on other compute systems 75
72 VMware BC Solutions (Cont'd) vmotion Enables live migration of running VMs from one physical server to another without any downtime Capable of migrating VMs running any OS across any type of hardware and storage supported by ESXi Storage vmotion Enables live migration of VM disk files within and across storage arrays with no downtime Enables to perform proactive storage migrations, improve VM storage performance and free up valuable storage capacity 76
73 Module Summary Key points covered in this module: Business continuity Cloud service availability Fault tolerance mechanisms for cloud infrastructure Backup and deduplication Local and remote replication Fault resilient cloud application design strategies 77
Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs
EMC RECOVERPOINT FAMILY Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs ESSENTIALS EMC RecoverPoint Family Optimizes RPO
More informationEMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers
EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is
More informationWindows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication
More informationRedefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved.
Redefining Backup for VMware Environment 1 Agenda VMware infrastructure backup and recovery challenges Introduction to EMC Avamar Avamar solutions for VMware infrastructure Key takeaways Copyright 2009
More informationVeritas Storage Foundation High Availability for Windows by Symantec
Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability
More informationEMC AVAMAR. Deduplication backup software and system. Copyright 2012 EMC Corporation. All rights reserved.
EMC AVAMAR Deduplication backup software and system 1 IT Pressures 2009 2020 0.8 zettabytes 35.2 zettabytes DATA DELUGE BUDGET DILEMMA Transformation INFRASTRUCTURE SHIFT COMPLIANCE and DISCOVERY 2 EMC
More informationDISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES
DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 The Business Maturity Model V Enabled Web
More informationEMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers
EMC VPLEX FAMILY Continuous Availability and Data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is
More informationSymantec Storage Foundation High Availability for Windows
Symantec Storage Foundation High Availability for Windows Storage management, high availability and disaster recovery for physical and virtual Windows applications Data Sheet: High Availability Overview
More informationWHITE PAPER. www.fusionstorm.com. The Double-Edged Sword of Virtualization:
WHiTE PaPEr: Easing the Way to the cloud: 1 WHITE PAPER The Double-Edged Sword of Virtualization: Solutions and Strategies for minimizing the challenges and reaping the rewards of Disaster recovery in
More informationComplete Storage and Data Protection Architecture for VMware vsphere
Complete Storage and Data Protection Architecture for VMware vsphere Executive Summary The cost savings and agility benefits of server virtualization are well proven, accounting for its rapid adoption.
More informationSTRATEGIC PLANNING ASSUMPTION(S)
STRATEGIC PLANNING ASSUMPTION(S) By 2016, one-third of organizations will change backup vendors due to frustration over cost, complexity and/or capability. By 2014, 80% of the industry will choose disk-based
More informationIMPROVING VMWARE DISASTER RECOVERY WITH EMC RECOVERPOINT Applied Technology
White Paper IMPROVING VMWARE DISASTER RECOVERY WITH EMC RECOVERPOINT Applied Technology Abstract EMC RecoverPoint provides full support for data replication and disaster recovery for VMware ESX Server
More informationBusiness Continuity with the. Concerto 7000 All Flash Array. Layers of Protection for Here, Near and Anywhere Data Availability
Business Continuity with the Concerto 7000 All Flash Array Layers of Protection for Here, Near and Anywhere Data Availability Version 1.0 Abstract Concerto 7000 All Flash Array s Continuous Data Protection
More informationEPIC EHR: BUILDING HIGH AVAILABILITY INFRASTRUCTURES
EPIC EHR: BUILDING HIGH AVAILABILITY INFRASTRUCTURES BEST PRACTICES FOR PROTECTING EPIC EHR ENVIRONMENTS EMC HEALTHCARE GROUP ABSTRACT Epic Electronic Health Records (EHR) is at the core of delivering
More informationEMC BACKUP-AS-A-SERVICE
Reference Architecture EMC BACKUP-AS-A-SERVICE EMC AVAMAR, EMC DATA PROTECTION ADVISOR, AND EMC HOMEBASE Deliver backup services for cloud and traditional hosted environments Reduce storage space and increase
More informationMicrosoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options
This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware
More informationStorage Based Replications
Storage Based Replications Miroslav Vraneš EMC Technology Group miroslav.vranes@emc.com 1 Protecting Information Is a Business Decision Recovery point objective (RPO): How recent is the point in time for
More informationDR-to-the- Cloud Best Practices
DR-to-the- Cloud Best Practices HOW TO EFFECTIVELY CONFIGURE YOUR OWN SELF-MANAGED RECOVERY PLANS AND THE REPLICATION OF CRITICAL VMWARE VIRTUAL MACHINES FROM ON-PREMISES TO A CLOUD SERVICE PROVIDER CONTENTS
More informationMaximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing
1 Maximize Your Virtual Environment Investment with EMC Avamar Rob Emsley Senior Director, Product Marketing 2 Private Cloud is the Vision Virtualized Data Center Internal Cloud Trusted Flexible Control
More informationEliminating End User and Application Downtime:
Eliminating End User and Application Downtime: Architecting the Right Continuous Availability and Disaster Recovery Environment March 2010 Table of Contents Introduction 3 Where to Start 3 Moving to Continuous
More informationOptimization, Business Continuity & Disaster Recovery in Virtual Environments. Darius Spaičys, Partner Business manager Baltic s 2012-06-14
Optimization, Business Continuity & Disaster Recovery in Virtual Environments Darius Spaičys, Partner Business manager Baltic s 2012-06-14 Agenda Business Continuity and Disaster Recovery Challenges How
More informationNutanix Tech Note. Configuration Best Practices for Nutanix Storage with VMware vsphere
Nutanix Tech Note Configuration Best Practices for Nutanix Storage with VMware vsphere Nutanix Virtual Computing Platform is engineered from the ground up to provide enterprise-grade availability for critical
More informationHRG Assessment: Stratus everrun Enterprise
HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at
More informationBrian LaGoe, Systems Administrator Benjamin Jellema, Systems Administrator Eastern Michigan University
Brian LaGoe, Systems Administrator Benjamin Jellema, Systems Administrator Eastern Michigan University 1 Backup & Recovery Goals and Challenges Traditional/EMU s Old Environment Avamar Key Features EMU
More informationWestek Technology Snapshot and HA iscsi Replication Suite
Westek Technology Snapshot and HA iscsi Replication Suite Westek s Power iscsi models have feature options to provide both time stamped snapshots of your data; and real time block level data replication
More informationNutanix Solution Note
Nutanix Solution Note Version 1.0 April 2015 2 Copyright 2015 Nutanix, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Nutanix is
More informationDPAD Introduction. EMC Data Protection and Availability Division. Copyright 2011 EMC Corporation. All rights reserved.
DPAD Introduction EMC Data Protection and Availability Division 1 EMC 的 備 份 與 回 復 的 解 決 方 案 Data Domain Avamar NetWorker Data Protection Advisor 2 EMC 雙 活 資 料 中 心 的 解 決 方 案 移 動 性 ( Mobility ) 可 用 性 ( Availability
More informationUsing Live Sync to Support Disaster Recovery
Using Live Sync to Support Disaster Recovery SIMPANA VIRTUAL SERVER AGENT FOR VMWARE Live Sync uses backup data to create and maintain a warm disaster recovery site. With backup and replication from a
More informationEMC SOLUTIONS TO OPTIMIZE EMR INFRASTRUCTURE FOR CERNER
EMC SOLUTIONS TO OPTIMIZE EMR INFRASTRUCTURE FOR CERNER ESSENTIALS Mitigate project risk with the proven leader, many of largest EHR sites run on EMC storage Reduce overall storage costs with automated
More informationEMC AVAMAR. a reason for Cloud. Deduplication backup software Replication for Disaster Recovery
EMC AVAMAR a reason for Cloud Deduplication backup software Replication for Disaster Recovery Bogdan Stefanescu (Bogs) EMC Data Protection Solutions bogdan.stefanescu@emc.com 1 BUSINESS DRIVERS Increase
More informationSolution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware
Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery
More informationSoftverski definirani data centri - 2. dio
Softverski definirani data centri - 2. dio Vmware NSX To Deliver a Software Defined Data Center Implementation Automated Operational Model Programmatically Create, Snapshot, Store, Move, Delete, Restore
More informationImplementing a Holistic BC/DR Strategy with VMware
Implementing a Holistic BC/DR Strategy with VMware VMware vforum, 2014 2014 VMware Inc. All rights reserved. What s on the agenda? Defining the problem Definitions VMware technologies that provide BC and
More informationEMC MID-RANGE STORAGE AND THE MICROSOFT SQL SERVER I/O RELIABILITY PROGRAM
White Paper EMC MID-RANGE STORAGE AND THE MICROSOFT SQL SERVER I/O RELIABILITY PROGRAM Abstract This white paper explains the integration of EMC Mid-range Storage arrays with the Microsoft SQL Server I/O
More informationHigh Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach
High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many
More informationDATA PROTECTION IN A VIRTUALIZED ENVIRONMENT - ISSUES AND SOLUTIONS
International Journal of Computer Science Engineering and Information Technology Research Vol.1, Issue.1 (2011) 1-9 TJPRC Pvt. Ltd., DATA PROTECTION IN A VIRTUALIZED ENVIRONMENT - ISSUES AND SOLUTIONS
More informationDESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTION NS FOR VSPEXX PRIVATE CLOUD EMC VSPEX December 2014
DESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTIONS FOR VSPEX PRIVATE CLOUD EMC VSPEX December 2014 Copyright 2013-2014 EMC Corporation. All rights reserved. Published in USA. Published December,
More informationHigh Availability with Windows Server 2012 Release Candidate
High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions
More informationDATA PROTECTION CONSIDERATIONS FOR VBLOCK INFRASTRUCTURE PLATFORMS
VCE Word Template Table of Contents www.vce.com DATA PROTECTION CONSIDERATIONS FOR VBLOCK INFRASTRUCTURE PLATFORMS March 2012 1 Contents Executive Summary... 3 What is Data Protection?... 3 Industry Data
More informationSolution brief: Modernized data protection with Veeam and HP Storage
Solution brief: Modernized data protection with Veeam and HP Storage Modern Data Protection Built for Virtualization November, 2013 Contents Executive summary....3 Key points...3 Virtual machine data protection
More informationMicrosoft Exchange 2013 on VMware Availability and Recovery Options
This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware
More informationVeritas InfoScale Availability
Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale
More informationZerto Virtual Manager Administration Guide
Zerto Virtual Manager Administration Guide AWS Environment ZVR-ADVA-4.0U2-01-23-07-15 Copyright 2015, Zerto Ltd. All rights reserved. Information in this document is subject to change without notice and
More informationHow To Backup With Ec Avamar
BACKUP AND RECOVERY FOR MICROSOFT-BASED PRIVATE CLOUDS LEVERAGING THE EMC DATA PROTECTION SUITE A Detailed Review ABSTRACT This white paper highlights how IT environments which are increasingly implementing
More informationVirtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric
Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance
More informationVMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationSQL Server Storage Best Practice Discussion Dell EqualLogic
SQL Server Storage Best Practice Discussion Dell EqualLogic What s keeping you up at night? Managing the demands of a SQL environment Risk Cost Data loss Application unavailability Data growth SQL Server
More informationMicrosoft SQL Server on VMware Availability and Recovery Options
This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware
More informationSymantec Cluster Server powered by Veritas
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
More informationefficient protection, and impact-less!!
Converged, Hyper- or Flash Sample photo. Replace if desired. efficient protection, and impact-less!! Bogdan Stefanescu (..aka Bogs) EMC Data Protection Solutions bogdan.stefanescu@emc.com 1 ALL DATA HAS
More informationABSTRACT. February, 2014 EMC WHITE PAPER
EMC APPSYNC SOLUTION FOR MANAGING PROTECTION OF MICROSOFT SQL SERVER SLA-DRIVEN, SELF-SERVICE CAPABILITIES FOR MAXIMIZING AND SIMPLIFYING DATA PROTECTION AND RECOVERABILITY ABSTRACT With Microsoft SQL
More informationThe Benefits of Virtualization for Your DR Plan
E-Guide The Benefits of Virtualization for Your DR Plan Server virtualization is making a positive impact in the area of disaster recovery. Through virtualization, organizations can save money, as well
More informationVMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
More informationEMC NETWORKER SNAPSHOT MANAGEMENT
White Paper Abstract This white paper describes the benefits of NetWorker Snapshot Management for EMC Arrays. It also explains the value of using EMC NetWorker for snapshots and backup. June 2013 Copyright
More informationNutanix Tech Note. Data Protection and Disaster Recovery
Nutanix Tech Note Data Protection and Disaster Recovery Nutanix Virtual Computing Platform is engineered from the ground-up to provide enterprise-grade availability for critical virtual machines and data.
More informationVMware vsphere Data Protection
FREQUENTLY ASKED QUESTIONS VMware vsphere Data Protection vsphere Data Protection Advanced Overview Q. What is VMware vsphere Data Protection Advanced? A. VMware vsphere Data Protection Advanced is a backup
More informationHigh Availability & Disaster Recovery Development Project. Concepts, Design and Implementation
High Availability & Disaster Recovery Development Project Concepts, Design and Implementation High Availability & Disaster Recovery Development Project CONCEPTS Who: Schmooze Com Inc, maintainers, core
More informationE20-005. http://www.gratisexam.com/ Number: E20-005 Passing Score: 800 Time Limit: 120 min
E20-005 Number: E20-005 Passing Score: 800 Time Limit: 120 min http://www.gratisexam.com/ www.yesuse.com Exam A QUESTION 1 Which statement defines retention period? A. Amount of time available for restoring
More informationMicrosoft SMB File Sharing Best Practices Guide
Technical White Paper Microsoft SMB File Sharing Best Practices Guide Tintri VMstore, Microsoft SMB 3.0 Protocol, and VMware 6.x Author: Neil Glick Version 1.0 06/15/2016 @tintri www.tintri.com Contents
More informationTurbo Charge Your Data Protection Strategy
Turbo Charge Your Data Protection Strategy Data protection for the hybrid cloud 1 WAVES OF CHANGE! Data GROWTH User EXPECTATIONS Do It YOURSELF Can t Keep Up Reliability and Visibility New Choices and
More informationProtecting Microsoft Hyper-V 3.0 Environments with CA ARCserve
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while
More informationCA ARCserve Replication and High Availability Deployment Options for Hyper-V
Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization
More informationGetting the Most Out of Virtualization of Your Progress OpenEdge Environment. Libor Laubacher Principal Technical Support Engineer 8.10.
Getting the Most Out of Virtualization of Your Progress OpenEdge Environment Libor Laubacher Principal Technical Support Engineer 8.10.2013 Agenda Virtualization Terms, benefits, vendors, supportability,
More informationBUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g
BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g ENABLED BY EMC VMAX 10K AND EMC RECOVERPOINT Technical Presentation EMC Solutions Group 1 Agenda Business case Symmetrix VMAX 10K overview RecoverPoint
More informationHP StorageWorks Data Protection Strategy brief
HP StorageWorks Data Protection Strategy brief Your business depends on IT more than ever before. The availability of key application services and information is critical to maintain business processes,
More informationOmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman
OmniCube SimpliVity OmniCube and Multi Federation ROBO Reference Architecture White Paper Authors: Bob Gropman Date: April 13, 2015 SimpliVity and OmniCube are trademarks of SimpliVity Corporation. All
More informationTHE VIRTUAL DATA CENTER OF THE FUTURE
THE VIRTUAL DATA CENTER OF THE FUTURE An Introduction to VMAX and VPLEX Ron Davidi EMC Israel 1 2 EMC Petabyte Club Customers with > 1 PB EMC storage 1,000 10 2002 2003 2004 2005 2006 2007 2008 2009 2010
More informationW H I T E P A P E R C o n t i n u o u s R e p l i c a t i o n f o r B u s i n e s s - C r i t i c a l A p p l i c a t i o n s
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R C o n t i n u o u s R e p l i c a t i o n f o r B u s i n e s s - C r i t i c
More informationEMC RecoverPoint Continuous Data Protection and Replication Solution
EMC RecoverPoint Continuous Data Protection and Replication Solution Simple. Efficient. Consistent Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 Real Time
More informationTOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS
TOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS Leverage EMC and VMware To Improve The Return On Your Oracle Investment ESSENTIALS Better Performance At Lower Cost Run
More informationIntroduction. Setup of Exchange in a VM. VMware Infrastructure
Introduction VMware Infrastructure is deployed in data centers for deploying mission critical applications. Deployment of Microsoft Exchange is a very important task for the IT staff. Email system is an
More informationBackup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
More informationEMC NETWORKER AND DATADOMAIN
EMC NETWORKER AND DATADOMAIN Capabilities, options and news Madis Pärn Senior Technology Consultant EMC madis.parn@emc.com 1 IT Pressures 2009 0.8 Zettabytes 2020 35.2 Zettabytes DATA DELUGE BUDGET DILEMMA
More informationEMC RECOVERPOINT FAMILY
EMC RECOVERPOINT FAMILY Cost-effective local and remote data protection and disaster recovery solution ESSENTIALS Maximize application data protection and disaster recovery Protect business applications
More informationIMPROVING MICROSOFT EXCHANGE SERVER RECOVERY WITH EMC RECOVERPOINT
White Paper IMPROVING MICROSOFT EXCHANGE SERVER RECOVERY WITH EMC RECOVERPOINT Applied Technology Abstract This white paper outlines the challenges faced by Microsoft Exchange administrators in managing
More informationADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3
ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT Overview EXHIBIT E to Amendment No. 60 The Disaster Recovery (DR) Services, a Tier-Level DR Solution, addresses the
More informationTake Advantage of Data De-duplication for VMware Backup
Take Advantage of Data De-duplication for VMware Backup Lauren Whitehouse Analyst, Enterprise Strategy Group Tom Martin Avamar Product Management, EMC Mike Zolla Avamar Chief Architect, EMC 1 EMC Avamar
More informationBacking Up the CTERA Portal Using Veeam Backup & Replication. CTERA Portal Datacenter Edition. May 2014 Version 4.0
Backing Up the CTERA Portal Using Veeam Backup & Replication CTERA Portal Datacenter Edition May 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may
More informationServer and Storage Virtualization with IP Storage. David Dale, NetApp
Server and Storage Virtualization with IP Storage David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this
More informationUnderstanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection
More informationUnderstanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features that reduce the complexity of managing data protection
More informationEMC VPLEX FAMILY. Transparent information mobility within, across, and between data centers ESSENTIALS A STORAGE PLATFORM FOR THE PRIVATE CLOUD
EMC VPLEX FAMILY Transparent information mobility within, across, and between data centers A STORAGE PLATFORM FOR THE PRIVATE CLOUD In the past, users have relied on traditional physical storage to meet
More informationHigh-Availability Fault Tolerant Computing for Remote and Branch Offices HA/FT solutions for Cisco UCS E-Series servers and VMware vsphere
Table of Contents UCS E-Series Availability and Fault Tolerance... 3 Solid hardware... 3 Consistent management... 3 VMware vsphere HA and FT... 3 Storage High Availability and Fault Tolerance... 4 Quick-start
More informationTRANSFORMING DATA PROTECTION
TRANSFORMING DATA PROTECTION Moving from Reactive to Proactive Mark Galpin 1 Our Protection Strategy: Best Of Breed Performance LEADER HIGH-END STORAGE VMAX Low Service Level LEADER SCALE-OUT NAS STORAGE
More informationDell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell
Dell PowerVault DL2200 & BE 2010 Power Suite Owen Que Channel Systems Consultant Dell Dell PowerVault DL2200 powered by Symantec Backup Exec 2010 1 Replace Tape with Deduplication Customer Storage Challenge
More informationEMC DATA PROTECTION. Backup ed Archivio su cui fare affidamento
EMC DATA PROTECTION Backup ed Archivio su cui fare affidamento 1 Challenges with Traditional Tape Tightening backup windows Lengthy restores Reliability, security and management issues Inability to meet
More informationMaxDeploy Hyper- Converged Reference Architecture Solution Brief
MaxDeploy Hyper- Converged Reference Architecture Solution Brief MaxDeploy Reference Architecture solutions are configured and tested for support with Maxta software- defined storage and with industry
More informationBuilding the Virtual Information Infrastructure
Technology Concepts and Business Considerations Abstract A virtual information infrastructure allows organizations to make the most of their data center environment by sharing computing, network, and storage
More informationSolution Overview VMWARE PROTECTION WITH EMC NETWORKER 8.2. White Paper
White Paper VMWARE PROTECTION WITH EMC NETWORKER 8.2 Solution Overview Abstract This white paper describes the integration of EMC NetWorker with VMware vcenter. It also includes details on the NetWorker
More informationAvailability Guide for Deploying SQL Server on VMware vsphere. August 2009
Availability Guide for Deploying SQL Server on VMware vsphere August 2009 Contents Introduction...1 SQL Server 2008 with vsphere and VMware HA/DRS...2 Log Shipping Availability Option...4 Database Mirroring...
More informationNative Data Protection with SimpliVity. Solution Brief
Native Data Protection with SimpliVity Solution Brief SimpliVity is the market-leading hyperconverged infrastructure that delivers native data protection. A fundamental requirement of hyperconvergence,
More informationSILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE
VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak
More informationAccelerate Your Virtualisation Journey With Backup Built For VMWare. Frederick Enslin. BRS Technology Consultant. Copyright 2011 EMC Corporation
Accelerate Your Virtualisation Journey With Backup Built For VMWare Frederick Enslin BRS Technology Consultant 1 Agenda Virtualization trend and benefits Must-have list Deduplication Avamar is optimized
More informationEnterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011
Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number
More informationTECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage
TECHNICAL PAPER Veeam Backup & Replication with Nimble Storage Document Revision Date Revision Description (author) 11/26/2014 1. 0 Draft release (Bill Roth) 12/23/2014 1.1 Draft update (Bill Roth) 2/20/2015
More informationCloud Computing Disaster Recovery (DR)
Cloud Computing Disaster Recovery (DR) Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Need for Disaster Recovery (DR) What happens when you
More informationMAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products
TECHNOLOGY REVIEW MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products AUGUST 2015 All businesses have a core set of applications and services that are critical
More informationCERNER EMR: OPTIMIZING IT INFRASTRUCTURES
CERNER EMR: OPTIMIZING IT INFRASTRUCTURES Guidance for maximizing performance, availability and mobility of Cerner Millennium environments ABSTRACT Cerner Millennium EMR plays a critical role in delivering
More information