Linux: Beyond Backups An overview of restore and recovery technology, and Double-Take Availability

Size: px
Start display at page:

Download "Linux: Beyond Backups An overview of restore and recovery technology, and Double-Take Availability"

Transcription

1 Linux: Beyond Backups An overview of restore and recovery technology, and Double-Take Availability

2 Contents Introduction... 3 Backing up to Tape or Removable Disk... 5 Open Source DR, DIY and Other Variants DIY Linux Disaster Recovery... 6 Freeware DR... 6 Commercial DR Solutions... 6 Double-Take Availability for Linux... 7 Technical overview of Double-Take Availability for Linux... 7 Origination of Data... 7 Double-Take Availability for Linux File System Filter Driver Selecting the Data... 8 Initialization of a Connection... 9 Replication Mechanics... 9 Data Transmission Conclusion

3 Introduction Linux, once an operating system for computer enthusiasts and contrarians, is now installed on primary production servers in business computing environments around the globe. The deployment of Linux saw a dramatic uptick in 2008, in part because of macroeconomic events that took place in primary trade centers around the world. Today, Linux, in its various forms, is going strong. Even first-tier computer hardware manufacturers like IBM have embraced specific distros of Linux for their System x hardware. Regardless of whether you re running critical business applications on Linux, Windows, UNIX or another mainstream operating system, every organization faces critical intervals when system downtime is unwelcome whether it s planned or unplanned. Increasingly, shops that were able to accommodate modest periods of downtime for backups and system maintenance are finding increased server demands are closing backup windows. Globalization and expanding online business opportunities have been a big contributor to the unwelcomed contraction of periodic backup opportunities. Since nearly all organizations need to keep their systems available for increasing amounts of time, they are now realizing that a system outage of even a few hours will result in disruption, chaos and wasted capital. For many companies, exposure to anything more than an hour or two of downtime has become unpalatable. Current backup processes that include tape or removable disk media fall short of serving the availability and recovery needs of businesses. Shops that thought they weren t candidates for a high availability solution are now feeling an urgent need to start looking at high availability options. 3

4 The purpose of this white paper is to explore current disaster recovery strategies for Linux servers and provide an introduction to the costs and benefits of a Linux-based high availability strategy. Along with this overview of the different Linux protection strategies we will also provide a more in-depth overview of how the Double-Take Availability for Linux product provides a high availability solution for Linux servers. 4

5 Backing Up to Tape or Removable Disk If the axiom you get what you pay for is even somewhat true, then the use of open source software would seem to put a for profit enterprise at a disadvantage since it would seem functionality, reliability and support would be noticeably limited. For nearly 80% of companies in the small to medium range (SMB), their entire disaster recovery strategy consists of performing regular saves to tape or removable disk. This usually includes periodic saves of their entire system, daily incremental tape saves of changed or otherwise critical data, and then storing these tapes safely offsite. Unfortunately, if a failure occurs requiring a bare-metal restore that includes applications and system state settings, it is not unusual for the data recovery time to be up to 48 hours or longer, depending on the time it takes to repair or replace hardware, restore data from tape, and manually recreate all transactions since the last good save. And keep in mind that it is not unusual to run into media errors when restoring from tape. Once the system is running again you can expect a lot of fine tuning to follow and that could take days. There are a growing number of companies who have calculated the real cost of this downtime and as a result have introduced additional layers of protection to reduce data recovery time. Disaster Recovery and High Availability software is well suited for this kind of task. For Linux, there are both open-systems, freeware, do it yourself, and commercial options at your disposal. Open Source Disaster Recovery, DIY and Other Variants For better or worse, the notion of open source software is inextricably linked to the word free. If the axiom you get what you pay for is even somewhat true, then the use of open source software would seem to put a for profit enterprise at a disadvantage since it would seem functionality, reliability and support would be noticeably limited. Furthermore, the absence of operating capital for providers of open source code makes the long range survivability of the organizations that support these software solutions somewhat uncertain. Yet, open source software plays an important role in the grand scheme of things for several reasons. It may save you time if you re developing a system of your own and need a script to plug in It increases your number of options It creates an environment for innovation While open source disaster recovery and high availability solutions exist, disaster recovery is an area where it s best to know exactly what you re getting into. There are instances where open source offerings are embedded within productized solutions and hence, are enhanced, maintained and supported like commercial solutions. If you re getting into a large-scale software development project involving HA and DR functionality then there s a lot to consider. 5

6 DIY Linux Disaster Recovery Linux coders will tell you that part of the beauty of Linux lies in its modularity. Adroit technologists often consider this an invitation to write their own plug-ins or entire applications to accommodate the functionality their organization needs. Given the complexity of good automated disaster recovery systems and the huge collection of scripts that would be needed to mimic some of the functionality in commercial solutions, developing these scripts from scratch almost never shakes out to be a cost-effective approach. And long term maintenance often becomes a problem because people move on in the IT business, and external and internal documentation is often sketchy. Freeware DR While many of the points in the previous text on open source software apply to freeware, there are a few important distinctions with freeware that should be noted. First, with open source software you have access to source code, and with freeware you do not. If you have a penchant to fiddle with source code, then freeware is not the way to go. Freeware is offered on an as is bases. That said, there are several freeware DR solutions available and inevitably, some of them offer the features you need. Yet, you ll find that support, customization and documentation are also offered on an as is basis. Commercial Disaster Recovery Solutions for Linux Environments Because the for-profit model drives commercial software organizations, a productized solution such as Double-Take Availability for Linux is available with full feature sets and around-the-clock support. Double-Take Availability for Linux replicates full system state information, application data, and transactions at the byte-level to a physical, virtual or cloud-based target server in real time. Commercially available HA software is advantageous in the following ways: You have a binding agreement that details what the software is supposed to do. You have a support contract: If you have a problem, your vendor is being paid to fix it. Someone is available to support you during normal business hours or on a 24/7 basis if that s what you have agreed to. You can buy additional functionality or pay for customization. Commercially available software is more polished and typically offers extensive documentation. You can insist on extended backward compatibility. Productized offerings run more efficiently. Open source software systems are often larger than commercially available systems because several programmers collaborate in a less-structured way to achieve the end result. 6

7 Double-Take Availability for Linux Data is generated by the Linux operating system itself, in the form of updates to files through day-to-day changes across various system files. Data is more frequently generated by various applications that run on the server. One such option- Double-Take Availability for Linux is a commercially available disaster recovery and high availability solution. It continuously captures changes as they happen and replicates those changes to one or more servers at any location, over any distance, so you always have access to a current copy of your data, applications and operating system. You can replicate to a disaster recovery site as far away as necessary, over standard IP networks, for maximum protection against data loss and improve performance by compressing the protected data before sending. The likelihood of data loss when compatible databases such as Oracle and MySQL are deployed, is also dramatically reduced. Double-Take Availability for Linux also allows you to implement failover without shared storage or geographic limitations eliminating the single point of failure and providing the freedom to locate servers anywhere. Technical Overview of Double-Take Availability for Linux The following content provides a high-level overview of the basic theory of operations for Double-Take Availability for Linux. This solution employs a replication engine that works with physical or virtual servers running RedHat Enterprise Linux, Novell SuSE Linux Enterprise Server, CentOS Linux or Oracle Enterprise Linux. Origination of Data For the purposes of this discussion, the term data will refer to any digital information that can be visualized by a server as a series of one or more input/output (I/O) operations. Data is generated by the Linux operating system itself, in the form of updates to files through dayto-day changes across various system files. Data is more frequently generated by various applications that run on the server. This data may be non-transaction dependent (such as read and write operations on flat files) or transactional-dependent (such as read and write operations to database systems). In either case, the data will be translated into a stream of I/O operations that will be processed by the Linux file system and committed to disk. Data may be created by end-users, applications, or any other system that can read and write information to the server. Double-Take Availability for Linux File System Filter Driver Double-Take Availability for Linux uses a file system filter driver to integrate itself within the I/O stack on a server. This filter driver allows the Double-Take Availability process to see each I/O operation that flows through the stack to the file system. It should be noted the filter driver is a pseudo-file system mounted on top of the Linux native file systems such as EXT3/4 and ReiserFS. Any read/write operation performed by any application or by the Windows operating system will be visible to the Double-Take Availability driver and therefore, may be subject to replication depending on how Double-Take Availability is configured. 7

8 The Double-Take Availability filter driver is a kernel-mode driver. This means it exists as a kernel module a subset of system memory reserved for high-level operations that cannot be accessed directly by general applications or the end-users. This will permit the Double- Take Availability filter driver to act with minimal impact on the server itself, while still ensuring that each I/O operation is able to be examined. Since filters exist within the server s OS kernel, several safety features have been implemented to ensure they do not adversely impact the system in the event of an error. First, the filter itself only examines data and allows for a copy of required I/O operations to be moved out of the data stream. Double-Take Availability s filter driver is non-blocking, so it will not halt data flow in the event of an error. Instead, should an abnormal condition be created on the server, the Double-Take Availability filter will allow data to pass through unmodified, producing an error event to alert administrators, but not stopping applications and end-users from accessing data. Secondly, even when operating under normal conditions, the Double-Take Availability filter allows other applications (such as anti-virus scanners) to operate without hindrance, so that non-double-take Availability operations may continue as they did before installation of Double-Take Availability. Selecting the Data The replication set is the fundamental unit of data protection for Double-Take Availability on a server. It defines which areas of a file system will be protected, and which will be ignored by the Double-Take Availability during normal operations. These definitions are made using either the management console GUI, or via one of the interfaces supplied by Vision Solutions. Replication sets are defined as a series of rules which indicate to Double-Take Availability a logical unit of files within the server that should be protected. The replication set may contain a group of files, a directory, a group of directories, volume or group of volumes. In addition to the basic definitions, replication sets may also contain inclusion and exclusion information by wildcard (*) definition. Administrators may define extremely specific replication sets to protect only what a specific application would require for resumption of services, or may instead protect a much more general set of data up to and including an entire server. The replication set information is stored in a configuration file called DblTake.db. The Double-Take Availability service will use the replication set rules to determine which replication operations from the driver should be sent to the target. If the Double-Take Availability service sees replication activity from a file that is not within the replication set rules, then the service will notify the driver to not send any more information regarding that particular file. The filter driver will still see change activity for that file, but it will not send any further replication data to the service. Because of this, it s important to note that any changes to the replication set rules, while the connection is established, will require that the connection is disconnected and reconnected to ensure that the filter driver is reset with the updated rules. It should also be noted that no replication data is being passed from the filter driver until a Double-Take Availability connection is established with a target. 8

9 Initialization of a Connection During replication, I/O operations for files that are being protected are processed through the source s file system. As these I/O operations are processed, they must pass through Double- Take Availability s filter driver as they make their way down the I/O stack toward the file system. Once the replication set is defined, it can be connected to a target server via the management console or through one of the Double-Take Availability supplied connection wizards. This will cause a series of events to occur based on the option selected during connection. Generally they are: 1. Double-Take Availability ensures that the target system is responding, that the proper version of Double-Take Availability is installed on the target and that the Double-Take Availability systems on that target are ready to receive information. 2. The connection is established using the repset rules previously defined and the target path that was provided in the connection information. If the target path doesn t exist on the target, it will be created. 3. Once the connection is established, a replication start command will be sent to the filter driver which will cause the driver to start sending up change data. At this time a mirror is also started. The mirror will enumerate the files within the replication set and will read the data from disk and send it to the target. The file structure will be created on the target underneath the target path provided by the connection information. The administrator may choose either a full mirror (over-writing any data on target) or differences only (by file-system blockchecksum) when creating the connection, and the chosen form of mirror operation will initiate on connection. While the mirror is occurring, any changes to the data within a repset will be replicated to the target. 4. After all the mirror data has been received by the target, the mirror process will update the attributes of the target directories to ensure that the attributes and last modify times are correct. The mirror operation will then complete and the connection statistics will report that the mirror is idle. 5. Replication will continue as long as the connection is established. Replication Mechanics Replication of changed data is a continuous process that only ends when the source and target lose communication to the point where queuing is no longer possible, a failover event occurs, or the administrator specifically directs Double-Take Availability to stop protection. Outside of those events, any new data written to any area of the file system within the replication set will be replicated and written to the target. During replication, I/O operations for files that are being protected are processed through the source s file system. As these I/O operations are processed, they must pass through Double-Take Availability s filter driver as they make their way down the I/O stack toward the file system. If the I/O operation is a read (meaning that it will not change the data), then the operation is passed through with no copy made. If the operation is a write, rename, delete or create (or any change to the file system), then as it passes through the filter, a copy of the I/O is extracted by the driver, with the original I/O passing forward through any other filters and eventually to the disk systems. Once the file system accepts the I/O operation, it will 9

10 notify the application that made the change that it successfully completed the operation. This completion is passed back up the I/O stack and at this point that the Double-Take Availability filter driver will package the data into a buffer and send it to the Double-Take Availability service as replication data. The Double-Take Availability service will parse the data being sent from the driver and determine if it is part of the replication set. If the data is not within the replication set rules, meaning that it s not part of the protection set, then the service will notify the driver to not send any further data for that file. If the data is part of the replication set, then the service will generate a Double-Take Availability file operation that would be queued for transmission to the target. This operation is placed in the send queue, which is generally in RAM, but depending on the system load and network latency, could be written to an extended queue location on disk. Data Transmission The Double-Take Availability file operations are temporarily stored within the Send queue on the source system. As always, the order of the operations is maintained within the queue and is consistent with the order in which data was written to disk. The send queue acts as a buffer to the network and in the event that the source cannot send data to the target as fast as it s being written to disk, then the send queue will store Double- Take Availability operations that need to be transmitted. Data will technically always flow through the queuing systems to allow for instantaneous queuing when an emergency bottleneck emerges, but barring such slow-downs or disconnections, file operations remain in the queues for a brief period of time before being transmitted. The Send queue will hand off file operations to the native Linux TCP/IP systems for packetization and transmission across the IP network between source and target. Before transmission, a copy of the operation is placed in the Acknowledgement queue on the source, so if there are errors within the transmission process, the operation can be re-transmitted. The Linux TCP/IP stack or networking system transmits the operations as a series of TCP/ IP datagrams over administrator-specified ports where the target system then receives the information via the target s TCP/IP stack. The Double-Take Availability service running on the target will take data from the network, where sub-systems examine the I/O and perform several integrity checks. Included among these checks are tests to ensure the I/O has been received in its entirety, in the correct I/O transactional order, and without errors. If any test fails, the target will request a re-transmission of any necessary operations from the Acknowledgement queue of the source, and the necessary packages are retransmitted and re-checked for integrity. Since all of these tests and checks are performed on the copy of the I/O taken from the acknowledgement queue, the source is not required to re-read live data. Once the file operation has passed all integrity checks, an acknowledgement packet is sent back to the source, at which point the source will remove the now successfully transmitted file operation from the Acknowledgement queue, freeing up queuing space. On the target, the validated file operations are passed to the Receive queue, where it will either temporarily be held (if there are any disk bottlenecks, etc) or sent to the file system to be written to disk. 10

11 Since each file operation is written in the exact same order as it was written on the source, transactional integrity for any application writing through he file system will be preserved explicitly. This is true across multiple files or within a single file. This is how Double-Take Availability for Linux can safely protect MySQL, Oracle and other forms of transactiondependent data sets. Conclusion When it comes to maintaining the availability of Linux based servers; recovering from minor or major disasters, and ensuring data loss is kept to an absolute minimum, IT professionals have several options at their disposal. Some of these options involve little or no investment, while others are licensed by development houses that develop DR packages for living. There are advantages and disadvantages posed by all of these options that span the gamut of functionality, flexibility and cost of operation. This paper endeavors to help you choose wisely and also offers functional details on a commercial productized option from Vision Solutions called Double-Take Availability for Linux. Through this process of write-order intact byte-level I/O replication, Double-Take Availability for Linux can safely protect nearly any server running a mainstream distribution of Linux. This includes numerous release levels of RedHat Enterprise Linux, Novell SuSE Linux Enterprise Server, CentOS Linux and Oracle Enterprise Linux. About Vision Solutions With over 25,000 customers, Vision Solutions, Inc. is the world s leading provider of information availability software and services for ƒwindows, Linux, IBM Power Systems and Cloud Computing markets. Vision s trusted Double-Take, MIMIX and itera high availability and disaster recovery brands support business continuity, satisfy compliance requirements and increase productivity. Affordable and easy-to-use, Vision products are backed by certified worldwide 24X7 customer support centers and a global partner network that includes IBM (NYSE:IBM), HP (NYSE:HPQ), Microsoft (NASDAQ:MSFT), VMware (NYSE:VMW) and Dell (NASDAQ:DELL). Privately held by Thoma Bravo, Vision Solutions is headquartered in Irvine, California, USA with offices worldwide. For more information, visit, or call (toll-free U.S. and Canada) or Barranca Parkway Irvine, CA Copyright 2011, Vision Solutions, Inc. All rights reserved. IBM and Power Systems are trademarks of International Business Machines Corporation. Windows is a registered trademark of Microsoft Corporation. Linux is a registered trademark of Linus Torvalds.

WHITE PAPER. Header Title. Side Bar Copy. Real-Time Replication Is Better Than Periodic Replication WHITEPAPER. A Technical Overview

WHITE PAPER. Header Title. Side Bar Copy. Real-Time Replication Is Better Than Periodic Replication WHITEPAPER. A Technical Overview Side Bar Copy Header Title Why Header Real-Time Title Replication Is Better Than Periodic Replication A Technical Overview WHITEPAPER Table of Contents Introduction...1 Today s IT Landscape...2 What Replication

More information

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity task is resuming business critical operations. Having

More information

WHITE PAPER. Header Title. Side Bar Copy. Header Title. What To Consider When WHITEPAPER. Choosing Virtual Machine Protection.

WHITE PAPER. Header Title. Side Bar Copy. Header Title. What To Consider When WHITEPAPER. Choosing Virtual Machine Protection. Side Bar Copy Header Title Header Title What To Consider When Choosing Virtual Machine Protection. WHITEPAPER Table of Contents Introduction... 2 Real-time vs. Periodic Protection... 2 Availability vs.

More information

WHITE PAPER. Header Title. Side Bar Copy. Header Title. Seven Virtualization DR Myths WHITEPAPER

WHITE PAPER. Header Title. Side Bar Copy. Header Title. Seven Virtualization DR Myths WHITEPAPER Side Bar Copy Header Title Header Title Seven Virtualization DR Myths WHITEPAPER Seven Virtualization DR Myths As IT departments across the world move more virtualization and virtual technologies into

More information

Virtualized Disaster Recovery from VMware and Vision Solutions Cost-efficient, dependable solutions for virtualized disaster recovery and business

Virtualized Disaster Recovery from VMware and Vision Solutions Cost-efficient, dependable solutions for virtualized disaster recovery and business Virtualized Disaster Recovery from VMware and Vision Solutions Cost-efficient, dependable solutions for virtualized disaster recovery and business continuity Cost-efficient, dependable solutions for virtualized

More information

WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE

WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE Published: May 2006 Executive Summary Database Management Systems (DBMS) are the hidden engines behind some of a company's

More information

The Cost of Free. The Hidden Costs of Server Migrations PERSPECTIVE

The Cost of Free. The Hidden Costs of Server Migrations PERSPECTIVE The Cost of Free The Hidden Costs of Server Migrations PERSPECTIVE Table of Contents The Hidden Costs of Server Migrations... 2 Why Migrate... 2 Migration Issues... 4 Cost of Free... 5 A More Cost Effective

More information

An Introduction to System i High Availability. Get to know the core components of HA solutions and important installation considerations.

An Introduction to System i High Availability. Get to know the core components of HA solutions and important installation considerations. An Introduction to System i High Availability Get to know the core components of HA solutions and important installation considerations. Introduction Every company faces critical hours when system downtime

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

Effortless No Downtime Server and Storage Migrations

Effortless No Downtime Server and Storage Migrations Double-Take Move Effortless No Downtime Server and Storage Migrations Migrating applications, systems and data has always been a challenge for IT staff; in fact, most have just gotten used to the pain

More information

Double-Take Cloud Migration Center (CMC) Tech Brief

Double-Take Cloud Migration Center (CMC) Tech Brief Double-Take Cloud Migration Center (CMC) Tech Brief Overview Double-Take Cloud Migration Center is an online service that enables migrations from VMware vsphere and Amazon Web Services EC2 to Microsoft

More information

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss

More information

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key

More information

Protecting Exchange 2010 An Executive Overview of Double-Take Availability

Protecting Exchange 2010 An Executive Overview of Double-Take Availability Protecting Exchange 2010 An Executive Overview of Double-Take Availability Introduction Native backup can provide higher levels of data and system protection, but the need for 3rd-party software and hardware

More information

W H I T E P A P E R. Disaster Recovery Virtualization Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take

W H I T E P A P E R. Disaster Recovery Virtualization Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take W H I T E P A P E R Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take Contents Introduction...1 What is VMware Infrastructure?...1 What is Double-Take?...1 Data Protection

More information

(Formerly Double-Take Backup)

(Formerly Double-Take Backup) (Formerly Double-Take Backup) An up-to-the-minute copy of branch office data and applications can keep a bad day from getting worse. Double-Take RecoverNow for Windows (formerly known as Double-Take Backup)

More information

PROTECTING AND ENHANCING SQL SERVER WITH DOUBLE-TAKE AVAILABILITY

PROTECTING AND ENHANCING SQL SERVER WITH DOUBLE-TAKE AVAILABILITY PROTECTING AND ENHANCING SQL SERVER WITH DOUBLE-TAKE AVAILABILITY Whitepaper Double-Take Software, Inc. Published: October, 2009 With its ease of use, scalability, reliability and broad industry support,

More information

Business Continuity: Choosing the Right Technology Solution

Business Continuity: Choosing the Right Technology Solution Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail

More information

Affordable Remote Data Replication

Affordable Remote Data Replication SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted

More information

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Leveraging Virtualization for Disaster Recovery in Your Growing Business Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster

More information

Symantec Cluster Server powered by Veritas

Symantec Cluster Server powered by Veritas Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

Veritas Storage Foundation High Availability for Windows by Symantec

Veritas Storage Foundation High Availability for Windows by Symantec Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability

More information

Real-time Protection for Hyper-V

Real-time Protection for Hyper-V 1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate

More information

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

CA ARCserve Replication and High Availability Deployment Options for Hyper-V Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization

More information

Disaster Recovery for Oracle Database

Disaster Recovery for Oracle Database Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches

More information

Windows Server Multi-site Clustering

Windows Server Multi-site Clustering Windows Server Multi-site Clustering Windows Server Multi-site Clustering Vision Solutions provides market-leading solutions for data protection and recoverability. Applications, like all man-made creations,

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system Integrated and reliable the heart of your iseries system i5/os the next generation iseries operating system Highlights Enables the legendary levels of reliability and simplicity for which iseries systems

More information

Drobo How-To Guide. What You Will Need. Configure Replication for DR Using Double-Take Availability and Drobo iscsi SAN

Drobo How-To Guide. What You Will Need. Configure Replication for DR Using Double-Take Availability and Drobo iscsi SAN This document shows you how to use Drobo iscsi SAN storage with Double-Take Availability to deliver replication and DR for servers and applications. Double-Take Availability from Vision Solutions performs

More information

Veritas InfoScale Availability

Veritas InfoScale Availability Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale

More information

One solution to protect all Physical, Virtual and Cloud

One solution to protect all Physical, Virtual and Cloud One solution to protect all Physical, Virtual and Cloud Andy Ebbs Solution Architect andy.ebbs@visionsolutions.com +44 1905 728 023 +44 7917 326 602 Leaders Have Vision visionsolutions.com 1 What What

More information

Veritas Cluster Server by Symantec

Veritas Cluster Server by Symantec Veritas Cluster Server by Symantec Reduce application downtime Veritas Cluster Server is the industry s leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status

More information

NSI Solutions with Microsoft VSS

NSI Solutions with Microsoft VSS Published: March 2004 Abstract With the introduction of Volume Shadow Copy Service (VSS) in Microsoft Windows Server 2003 and Windows Storage Server 2003 and the strength of NSI Software Double-Take you

More information

High Availability & Disaster Recovery Development Project. Concepts, Design and Implementation

High Availability & Disaster Recovery Development Project. Concepts, Design and Implementation High Availability & Disaster Recovery Development Project Concepts, Design and Implementation High Availability & Disaster Recovery Development Project CONCEPTS Who: Schmooze Com Inc, maintainers, core

More information

Cloud Backup and Recovery

Cloud Backup and Recovery 1-888-674-9495 www.doubletake.com Cloud Backup and Recovery Software applications and electronic data are the life blood of a business. When they aren t available due to a disaster or outage, business

More information

Business Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time

Business Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time Business Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time Introduction This is the third of a series of best practices workbooks designed to familiarize

More information

Double-Take AVAILABILITY

Double-Take AVAILABILITY Double-Take AVAILABILITY Version 8.0.0 Double-Take Availability for Linux User's Guide Notices Double-Take Availability for Linux User's Guide Version 8.0, Monday, April 25, 2016 Check your service agreement

More information

Cloud Backup Service Service Description. PRECICOM Cloud Hosted Services

Cloud Backup Service Service Description. PRECICOM Cloud Hosted Services Cloud Backup Service Service Description PRECICOM Cloud Hosted Services Table of Contents Table of Contents 2 1. Cloud Backup Service Service Summary 3 2. Cloud Backup Service Service Definition 4 2.1.

More information

Using Symantec NetBackup with Symantec Security Information Manager 4.5

Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

System Migrations Without Business Downtime. An Executive Overview

System Migrations Without Business Downtime. An Executive Overview System Migrations Without Business Downtime An Executive Overview Businesses grow. Technologies evolve. System migrations may be inevitable, but business downtime isn t. All businesses strive for growth.

More information

Cloud Based Application Architectures using Smart Computing

Cloud Based Application Architectures using Smart Computing Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products

More information

Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server

Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server PARTNER SOLUTION BRIEF Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server Companies relying on the benefits of virtualized environments to reduce

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

High Availability for Microsoft SQL Server 7.0 Using Double-Take

High Availability for Microsoft SQL Server 7.0 Using Double-Take High Availability for Microsoft SQL Server 7.0 Using Double-Take High Availability for Microsoft SQL Server 7.0 Using Double-Take Revision 3.0.0 published July 2003 NSI and Double-Take are registered trademarks

More information

REDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION

REDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION REDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION SD003 V2.3 Issue Date 02 July 2014 1) SERVICE OVERVIEW The Managed Backup Service (MBS) is a streamlined alternative to traditional backup and restore

More information

Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server

Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server Double-Take Software, Inc. 257 Turnpike Road; Suite 210 Southborough,

More information

WHITE PAPER. The 5 Critical Steps for an Effective Disaster Recovery Plan

WHITE PAPER. The 5 Critical Steps for an Effective Disaster Recovery Plan WHITE PAPER The 5 Critical Steps for an Effective Disaster Recovery Plan 2 WHITE PAPER The 5 Critical Planning Steps For An Effective Disaster Recovery Plan Introduction In today s climate, most enterprises

More information

Data Loss in a Virtual Environment An Emerging Problem

Data Loss in a Virtual Environment An Emerging Problem Data Loss in a Virtual Environment An Emerging Problem Solutions to successfully meet the requirements of business continuity. An Altegrity Company 2 3 4 5 Introduction Common Virtual Data Loss Scenarios

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

An Esri White Paper January 2010 ArcGIS Server and Virtualization

An Esri White Paper January 2010 ArcGIS Server and Virtualization An Esri White Paper January 2010 ArcGIS Server and Virtualization Esri 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright 2010

More information

iscsi Top Ten Top Ten reasons to use Emulex OneConnect iscsi adapters

iscsi Top Ten Top Ten reasons to use Emulex OneConnect iscsi adapters W h i t e p a p e r Top Ten reasons to use Emulex OneConnect iscsi adapters Internet Small Computer System Interface (iscsi) storage has typically been viewed as a good option for small and medium sized

More information

VMware System, Application and Data Availability With CA ARCserve High Availability

VMware System, Application and Data Availability With CA ARCserve High Availability Solution Brief: CA ARCserve R16.5 Complexity ate my budget VMware System, Application and Data Availability With CA ARCserve High Availability Adding value to your VMware environment Overview Today, performing

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

Symantec NetBackup 7.1 What s New and Version Comparison Matrix

Symantec NetBackup 7.1 What s New and Version Comparison Matrix Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk

More information

Symantec NetBackup 7 Clients and Agents

Symantec NetBackup 7 Clients and Agents Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency

More information

PARALLELS SERVER BARE METAL 5.0 README

PARALLELS SERVER BARE METAL 5.0 README PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal

More information

Best practice: Simultaneously upgrade your Exchange and disaster recovery protection

Best practice: Simultaneously upgrade your Exchange and disaster recovery protection Best practice: Simultaneously upgrade your Exchange and disaster recovery protection March 2006 1601 Trapelo Road Waltham, MA 02451 1.866.WANSync www.xosoft.com Contents The Value Proposition... 1 Description

More information

Service Level Agreement (SLA) Arcplace Backup Enterprise Service

Service Level Agreement (SLA) Arcplace Backup Enterprise Service (SLA) Arcplace Backup Enterprise Service 1. Introduction This Service Level Agreement ( SLA ) forms an integral part of the Agreement between Arcplace and Customer. This SLA describes the Backup Enterprise

More information

Monitoring DoubleTake Availability

Monitoring DoubleTake Availability Monitoring DoubleTake Availability eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may

More information

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database An Oracle White Paper November 2010 Oracle Real Application Clusters One Node: The Always On Single-Instance Database Executive Summary... 1 Oracle Real Application Clusters One Node Overview... 1 Always

More information

Web-Based Data Backup Solutions

Web-Based Data Backup Solutions "IMAGINE LOSING ALL YOUR IMPORTANT FILES, IS NOT OF WHAT FILES YOU LOSS BUT THE LOSS IN TIME, MONEY AND EFFORT YOU ARE INVESTED IN" The fact Based on statistics gathered from various sources: 1. 6% of

More information

Virtualization Support - Real Backups of Virtual Environments

Virtualization Support - Real Backups of Virtual Environments Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in

More information

WINDOWS AZURE EXECUTION MODELS

WINDOWS AZURE EXECUTION MODELS WINDOWS AZURE EXECUTION MODELS Windows Azure provides three different execution models for running applications: Virtual Machines, Web Sites, and Cloud Services. Each one provides a different set of services,

More information

Data Protection and Recovery

Data Protection and Recovery Due to shrinking IT staffing and budgets, many IT organizations are turning to Service Providers for hosting of business-critical systems and applications (i.e., web hosting, email hosting, and database

More information

Backups in the Cloud Ron McCracken IBM Business Environment

Backups in the Cloud Ron McCracken IBM Business Environment Backups in the Cloud Ron McCracken IBM August 8, 2011 Session 9844 Legal Information The following are trademarks of the International Business Machines Corporation in the United States and/or other countries.

More information

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National

More information

Availability and Disaster Recovery: Basic Principles

Availability and Disaster Recovery: Basic Principles Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer

More information

Protecting Microsoft SQL Server

Protecting Microsoft SQL Server Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary

More information

More Efficient Virtualization Management: Templates

More Efficient Virtualization Management: Templates White Paper More Efficient Virtualization Management: Templates Learn more at www.swsoft.com/virtuozzo Published: November 2006 Revised: November 2006 Table of Contents Table of Contents... 2 OS, Middleware

More information

VERITAS Business Solutions. for DB2

VERITAS Business Solutions. for DB2 VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................

More information

IBM Enterprise Linux Server

IBM Enterprise Linux Server IBM Systems and Technology Group February 2011 IBM Enterprise Linux Server Impressive simplification with leading scalability, high availability and security Table of Contents Executive Summary...2 Our

More information

High Availability for Internet Information Server Using Double-Take 4.x

High Availability for Internet Information Server Using Double-Take 4.x High Availability for Internet Information Server Using Double-Take 4.x High Availability for Internet Information Server Using Double-Take 4.x published December 2002 NSI and Double-Take are registered

More information

Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES

Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES Product Brief DC-Protect Content based backup and recovery solution By DATACENTERTECHNOLOGIES 2002 DATACENTERTECHNOLOGIES N.V. All rights reserved. This document contains information proprietary and confidential

More information

DR-to-the- Cloud Best Practices

DR-to-the- Cloud Best Practices DR-to-the- Cloud Best Practices HOW TO EFFECTIVELY CONFIGURE YOUR OWN SELF-MANAGED RECOVERY PLANS AND THE REPLICATION OF CRITICAL VMWARE VIRTUAL MACHINES FROM ON-PREMISES TO A CLOUD SERVICE PROVIDER CONTENTS

More information

IP Storage On-The-Road Seminar Series

IP Storage On-The-Road Seminar Series On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions

More information

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1

More information

Moving beyond tape backup.

Moving beyond tape backup. IBM Global Services January 2008 Moving beyond tape backup. Addressing the data protection challenges for midsize businesses Page 2 Contents 2 Introduction 2 Data protection challenges 2 Under resourced

More information

Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases

Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases Backup and Recovery What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases CONTENTS Introduction 3 Terminology and concepts 3 Database files that make up a database 3 Client-side

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

High Availability for Microsoft SQL Server 2000 Using Double-Take

High Availability for Microsoft SQL Server 2000 Using Double-Take High Availability for Microsoft SQL Server 2000 Using Double-Take High Availability for Microsoft SQL Server 2000 Using Double-Take Revision 3.0.0 published July 2003 NSI and Double-Take are registered

More information

Uni Vault. An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service. White Paper Solution Brief

Uni Vault. An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service. White Paper Solution Brief Uni Vault An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service White Paper Solution Brief Contents The Challenges of Traditional Backup... 3 The Uni Systems Data Protection as a Service

More information

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number

More information

Integrated System Continuity Solutions for Virtual System Consolidation

Integrated System Continuity Solutions for Virtual System Consolidation Integrated System Continuity Solutions for Virtual System Consolidation Introduction Virtualization and server consolidation address the needs of today s data center environment by taking a large step

More information

Feature Guide DOUBLE-TAKE AVAILABILITY

Feature Guide DOUBLE-TAKE AVAILABILITY Feature Guide DOUBLE-TAKE AVAILABILITY Double-Take Availability provides affordable data protection, ensures minimal data loss and enables immediate recovery from any system outage. Double- Take Availability

More information

VMware Backup and Deduplication. Written by: Anton Gostev Product Manager Veeam Software

VMware Backup and Deduplication. Written by: Anton Gostev Product Manager Veeam Software VMware Backup and Deduplication Written by: Anton Gostev Product Manager Veeam Software Copyright 2005 2009 Veeam Software Inc. All rights reserved worldwide. No part of this publication may be reproduced,

More information

Protecting Microsoft SQL Server with Asigra Cloud Backup

Protecting Microsoft SQL Server with Asigra Cloud Backup Technical Note Protecting Microsoft SQL Server with Asigra Cloud Backup Table of Contents Introduction 3 Overview - Asigra Cloud Backup Software Platform 3 Microsoft SQL Server Backup Set in Asigra DS-Client

More information

How to Configure Double-Take on Microsoft Exchange Server

How to Configure Double-Take on Microsoft Exchange Server High Availability for Exchange Server 5.0 and 5.5 Using Double-Take 4.x High Availability for Exchange Server 5.0 and 5.5 Using Double-Take 4.x published August 2002 NSI and Double-Take are registered

More information

Key Elements of a Successful Disaster Recovery Strategy: Virtual and Physical by Greg Shields, MS MVP & VMware vexpert

Key Elements of a Successful Disaster Recovery Strategy: Virtual and Physical by Greg Shields, MS MVP & VMware vexpert ebook Key Elements of a Successful Disaster Recovery Strategy: Virtual and Physical by Greg Shields, MS MVP & VMware vexpert Greg Shields MS MVP & VMware vexpert Greg Shields is a Senior Partner with Concentrated

More information

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective An Oracle White Paper July, 2012 Evolution from the Traditional Data Center to Exalogic: 1 Disclaimer The following is intended to outline our general product capabilities. It is intended for information

More information

Planning and Deploying a Disaster Recovery Solution

Planning and Deploying a Disaster Recovery Solution Planning and Deploying a Disaster Recovery Solution Produced by SearchStorage.com Presenters: Jon Bock and Ian Selway Sponsored by Copyright 2008 HP. All Rights Reserved. Reproduction, adaptation, or translation

More information

Veritas NetBackup 6.0 Server Now from Symantec

Veritas NetBackup 6.0 Server Now from Symantec Veritas NetBackup 6.0 Server Now from Symantec Innovative data protection As the recognized leader for enterprise-class backup and recovery, Veritas NetBackup Server software is designed to help provide

More information

Helping MSPs Build Business Continuity & Disaster Recovery Services

Helping MSPs Build Business Continuity & Disaster Recovery Services CA ARCSERVE R16 Helping MSPs Build Business Continuity & Many IT organizations, especially small businesses, don t have the time, resources or knowledge to build a viable Business Continuity (BC) or Disaster

More information

Reducing the Costs and Risks of Branch Office Data Protection

Reducing the Costs and Risks of Branch Office Data Protection Reducing the Costs and Risks of Branch Office Data Protection Is Your Branch Office Data Really Protected? Regardless of form or fury, disasters can take their toll on any business. In fact, the Department

More information

Secure Your Business with EVault Cloud-Connected Solutions

Secure Your Business with EVault Cloud-Connected Solutions Secure Your Business with EVault Cloud-Connected Solutions Winfried Posthumus Channel Sales Manager NL Winfried.Posthumus@evault.com 11/22/2012 2012 EVault, Inc. All Rights Reserved 1 Agenda Who is EVault

More information

TECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY

TECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY INTRONIS CLOUD BACKUP & RECOVERY TECHNOLOGY OVERVIEW CONTENTS Introduction 3 Ease-of-Use 3 Simple Installation 3 Automatic Backup 3 Backup Status Dashboard 4 Off-Site Storage 4 Scalability 4 File Restoration

More information

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication

More information

Managed Services - A Paradigm for Cloud- Based Business Continuity

Managed Services - A Paradigm for Cloud- Based Business Continuity Managed Services - A Paradigm for Cloud- Based Business Continuity Ron McCracken IBM 6 February 2013 Session Number 12993 Agenda This session is intended to expose key requirements for support of enterprise

More information

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available Phone: (603)883-7979 sales@cepoint.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous

More information