Publication Date: April 2007
|
|
- Stewart Mosley
- 8 years ago
- Views:
Transcription
1 white paper Boost Block-level Replication with GoldenGate s TDM Technology for 100% Business Continuity Publication Date: April 2007 Abstract: Recent natural disasters and government regulations have created a new demand for business continuity solutions. Many vendors have offered a variety of technologies for disaster recovery that focus on recovering data after a disaster i.e. physical disruptions but not necessarily enabling companies to prevent an interruption to their business when a logical disruption such as a human error occurs. To have continuous operations for critical business applications, companies need solutions that can handle interruptions caused by physical and logical failures. This paper describes the two leading business continuity solutions: block level data replication and Transactional Data Management (TDM). It evaluates how they complement each other in creating a solid and complete business continuity solution that enables not only disaster recovery, but also high availability (HA) of mission critical systems.
2 white paper: BOOST BLOCK-LEVEL REPLICATION WITH GOLDENGATE Table of Contents Section Page Number BUSINESS CONTINUITY VS. DISASTER RECOVERY BUILDING A COMPLETE BUSINESS CONTINUITY SOLUTION ) Business considerations ) Technical requirements BLOCK LEVEL REPLICATION TRANSACTIONAL DATA MANAGEMENT COMPARISON OF TECHNOLOGIES IN HANDLING DIFFERENT FAILURES Data storage hardware failure without data corruption Data storage hardware failure with data corruption System failure without data corruption System failure with data corruption Human error or application error creating data corruption Planned outages Performance problems due to overhead on production system CONCLUSION ABOUT GOLDENGATE SOFTWARE CONTACT INFORMATION
3 BUSINESS CONTINUITY VS. DISASTER RECOVERY The disruptive events companies have experienced in the recent years including power blackouts, hurricanes, tsunamis, along with new government regulations such as Sarbanes Oxley, compelled businesses to make business continuity planning a priority. Many companies have deployed disaster recovery solutions that focus on recovering their data after a disaster or a disruptive event occurs. Business continuity, however, is a broader term that includes strict requirements for high availability of systems and data files i.e. the ability to operate within acceptable criteria under a wide variety of damaging conditions or interruptions. While disaster recovery technologies aim to decrease mean time to recover (MTTR) in case of a physical failure, high availability solutions aim to maximize mean time to fail (MTTF). Since a typical business experiences interruptions approximately fifty percent 1 of the time due to human errors rather than large disasters, it is critical for companies to have a solid high availability technology to implement a complete business continuity solution. A high availability solution should be able to support the business in any of the three possible availability issues from the perspective of end-users: 1. Unplanned outages: These are the interruptions caused by system failures such as a power outage that stops all systems. Disaster recovery solutions focus on these unplanned outages, where the company can only react after it happens. 2. Planned outages: Planned outages happen when moving from one system to another, maintaining an existing system or upgrading it to the next version. During this time, end-users are not able to use the system and it interrupts the business operations that rely on this system. Most of the time businesses select times when the outage will cause minimum impact on the company. However, for mission-critical systems there is never an ideal time in which a business can afford not having the system available. For example, hospital medical systems that patients depend on for sustaining life are mission-critical systems and the hospital cannot afford to allow them to go down for even ten minutes on a weekend night. 3. Active state performance issues: Systems that are overloaded with a large number of users or stressed with high processing demands can experience performance issues even though all the underlying components are up and running. In such instances, end users may experience significant delays in response times, even receive error messages. These types of interruptions not only slow the business, but make end-users dissatisfied, resulting in retention issues and possible revenue loss when customers are the end users. For example, if an ATM system of a retail bank is slow and the users receive error messages that say the system cannot process the request at that time, it will negatively impact the customer s personal experience with the bank and may lead them to switch banks if repeat issues occur. Business continuity plans should address all of these three availability issues to make certain end users have access to the critical applications under any circumstances including maintenance and upgrades, as well as when the transaction volumes or processing requirements increase. 1 D. Patterson et al. Recovery Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies, UC Berkeley Technical Report UCB//CSD , March 2002.
4 white paper: BOOST BLOCK-LEVEL REPLICATION WITH GOLDENGATE BUILDING A COMPLETE BUSINESS CONTINUITY SOLUTION There are various technologies available to support business continuity of key applications, each with different levels of expected availability, recovery time objectives 2 (RTO) and recovery point objectives 3 (RPO). When building a complete business continuity solution IT organizations should evaluate not only the technical fit of the solution but also how it supports the business requirements. 1) Business considerations Certainly, not every application and its data is equally important to invest in maximum availability and fastest recovery times. For example, an online retail company can afford to have its human resource systems to be down for a day or two, or lose employee contact information, which can be easily replaced. However, it cannot have its order management system down. Similarly, it cannot afford to lose its customers order data since it would be almost impossible to replace all of them and would cause significant revenue loss. For many mission critical applications recovery time and recovery point objectives are very strict due to their crucial impact on the day-to-day, revenue generating operations. IT organizations should work with business groups to identify which applications are the ones that need the best investment for ensuring high availability and very granular data recovery points, and which applications can use the technologies that are less strict in availability and recovery objectives. As shown below on Chart 1 there are four categories of importance that an application and related data can fall into: critical, essential, important and normal. Working with business owners, IT organizations should assign recovery time and recovery point objectives for each application to help with selecting the right technology. In addition, IT teams should determine the cost of downtime and data loss for each application. With that information they can find out the expected return on investment by comparing the cost of different business continuity technologies to possible downtime scenarios when these technologies are not deployed. Another critical business consideration is service level agreements (SLA). If certain applications availability is directly or indirectly linked to meeting SLAs, those requirements should be considered when choosing a business continuity solution for applications. Chart 1: Matching Data Classification to Recovery Objectives RTO RPO 0 3 Sec Financial Services Healthcare Systems Critical Online Trading E-Commerce 10 Min 1 Hr 3 Sec 10 Min Call Centers Mail Services Essential Supply Chain Website 1 Hr 1 Day 10 Min 1 Day Information Billing Important Sales Analysis 1 Day 1 Day 1 Week HR Syste Finan Normal Historical Data 1 Day 2 Recovery time objective defines acceptable duration of outage 3 Recovery point objective defines maximum age of acceptable data after recovery
5 2) Technical requirements After identifying the business requirements, IT organizations should evaluate the applications at hand from a technical perspective. These considerations include: Source system performance: Does the HA solution create any overhead on the source system? Application I/O: What are the peak times for the source system? How do they impact other systems? Network limitations: Does the solution require additional bandwidth? Target database preferences: Does the solution support data movement only between similar systems and can the target database be actively used? Fail back strategy: How easy and fast does it fail back? Geographical distance: Are there any physical distance requirements for the back-up system? If so, what is the minimum distance requirement? BLOCK LEVEL REPLICATION Block level replication technology has been offered by a wide selection of vendors addressing disaster recovery requirements. Block level replication terminology is used for these solutions due to the fact that they replicate each block of data in the hard drive to a remote copy. This technology category is also further grouped into controller-based replication 4 and host-based replication 5 : Controller-based solutions create in-box clones, or snapshots of data, without using storage area network (SAN) or server resources. This technology creates copies of the source database byte-by-byte over limited or extended distances using synchronous and asynchronous modes of replication, respectively. Host based solutions replicate data from one server to another, using various methodologies, including file-write-based replication, disk-volume-based replication and database-log-based replication. In general, server-based replication requires near-identical software on each server. Block level replications tools have several advantages that have made them popular in disaster recovery space: Available in many different flavors, from a wide selection of vendors Provide fast recovery from hardware failures Replicate non-structured data and files as well Require minimal configuration depending on implementation Can be on cheaper hardware Create low overhead on the database 4 Also called array-based replication 5 Also called server-based replication
6 white paper: BOOST BLOCK-LEVEL REPLICATION WITH GOLDENGATE However, block level replication solutions have also disadvantages, including: High total cost of ownership (TCO) due to vendor dependencies Target machine cannot be accessed with controller-based replication 6 Distance constraints Cannot guarantee transactional data integrity Cannot provide granular RPO/point-in-time recovery Replicates the failure cause block-level problem or data corruption to the target database as well Requires significantly more bandwidth due to replicating all blocks Has to be implemented across identical systems Requires labor intensive and time consuming failover and recovery TRANSACTIONAL DATA MANAGEMENT Transactional data management (TDM) technology moves high volumes of transactional data across heterogeneous IT environments with sub-second latency, guaranteed accuracy, reliability, and integrity. TDM technology is not intrusive. The software reads the transaction logs of the source database and moves the changed data only after the transaction is committed. Because TDM moves data at the business transaction level, rather than copying disk blocks, and has dynamic rollback capabilities it enables high availability in the event of logical failures such as human errors. TDM fits well to improve the availability of mission-critical data due to its several unique strengths: Enables immediate failover to a secondary system. Also provides dual-active HA solutions Allows active use of the target database for writing via bi-directional data movement or for read-only activities, including real-time reporting Creates no overhead on source systems Does not have any distance constraints Moves transactional data in real-time Supports heterogeneous database systems which allows secondary systems to be on lower-cost platforms from different vendors Provides very granular point-in-time recovery Preserves transactional integrity by moving only committed transactions In addition to improving availability for mission-critical systems, TDM provides data integration capabilities that support data warehousing or real-time reporting. 6 Applies to majority of the technologies in this category
7 COMPARISON OF TECHNOLOGIES IN HANDLING DIFFERENT FAILURES When we compare these two separate technologies and their combination based on their effectiveness in enabling high availability and disaster recovery for different types of failure and interruption scenarios, we see that each have their own strength areas and complement each other in creating a complete business continuity solution. Data storage hardware failure without data corruption As shown on the table on the next page, block level replication tools are effective in handling physical disruptions such as disk corruption. Because these solutions replicate each byte in a disk to another disk, if the first disk cannot be read, the secondary one will be available for the users. If there is a physical damage to the primary site, a secondary, nearby site can be used to continue operations after bringing up the secondary database. Block level replication solutions are also an important investment to recover unstructured data such as image files. Because they can copy any byte in a disk, the users can have a mirrored copy of their unstructured data in another storage location. While TDM solutions do not support unstructured data, in the event of a physical damage to one site, a secondary site with up-to-date transactional data will be immediately available for failover. Data storage hardware failure with data corruption If a physical disruption such as a disk failure creates data corruption and shuts down the database management system, it can take anywhere from 30 minutes to hours to bring the system back online. Because an improper shutdown puts the database management system into recovery mode, it cannot be mounted immediately. During this recovery state, users cannot access it. In addition, because a block level replication tool copies each byte on the disk, it will also copy the faulty data to the target database. Hence, recovering the corrupted data will require significant effort and time. In many cases recovery teams will lose the data since the last snapshot or archive file. Because TDM does not replicate byte by byte, but only the committed transactions, the data corruption on one of the disks would not be transferred to the other database. The recovery team can switch over to the secondary database immediately since its data is not corrupt. They can then focus on understanding the failure and data corruption in the primary database. The TDM solution also allows two active databases to support a mission-critical system with bidirectional, real-time data movement between heterogeneous databases. It detects loops automatically and prevents the bi-directional movement from creating a continuous loop of the same data between databases. If one database goes down due to the data corruption, the other one can continue to support the system without any downtime. System failure without data corruption When the database shuts down improperly, restarting can be time consuming even if there is no data corruption. As mentioned above, the database system will be in recovery mode and will not be accessible. If the user wants to failover to the target system, that process will also be time consuming. After the secondary (target) system is set as the primary, it will be coming up slow, because it lacks the required files in its cache. With the TDM solution, the recovery team can switch over to the secondary database immediately. After the first database restarts, TDM s internal checkpoints will show which transactions were not applied to the first database. Using TDM solution s trail files which store all the changed data in a transportable format users can deliver new transactions to the first database and update it to a current state.
8 white paper: BOOST BLOCK-LEVEL REPLICATION WITH GOLDENGATE Table: Comparison of Technologies In Handling Different Failures or Interruptions Failure/Interruption type Scope Block level Replication Database storage hardware failure (structured data no data corruption) (such as EMC SRDF, Hitachi TruCopy, NetApp Snapmirror, Veritas Volume Replicator) Transactional Data Management (GoldenGate Software) Combined Solution: Block level replication & TDM HA DR 1 2 Database storage hardware failure (unstructured data no data corruption) Database storage hardware failure (with structured data corruption) Database system/os failure (without data corruption) Database system/os failure (with data corruption) Human error/ Application error (e.g. deleting data) Planned outage (migration, upgrade, maintenance) Performance problems due to overhead on production system HA DR HA DR HA DR HA DR 3 2 HA DR HA HA = Very effective in handling the failure scenario 1: In-flight transactions may be lost = Somewhat effective in handling the failure scenario = Not effective in handling the failure scenario 2: If block level replication stores the trail files of GoldenGate s TDM solution, there will be no loss of data when solutions are combined. 3: May permanently lose data since the last snapshot 4: During the restart few minutes of data may be lost
9 System failure with data corruption Replicating every byte of the database can be detrimental to availability and recovery also if there is a data corruption due to a system failure. When there are two corrupt instances of databases, a failover to the target system will require a significant amount of time and effort. In many cases, IT teams will have to use an outdated snapshot of the database to be able to recover from the disruption. This will result in the company losing data since the last snapshot or the archive file was created. As described above, TDM captures transactions from transaction logs. Because it looks for committed transactions it will not move a transaction to a secondary database if it contains corrupted data. After a database crash, the TDM solution provides a target database to which the application can switch. Once the primary database is up and running, TDM s internal checkpoints show the last transaction the primary database received and the delivery mechanism closes the gap between two databases using TDM s trail files. Human error or application error creating data corruption If a user or a faulty application logic e.g. a software bug creates data corruption, block level replication tools will copy the faulty data to the target database. Because both database copies will have incorrect data, failover to the target database will be futile. Recovery teams will need to use other tools to be able to fix the data corruption and restore the database. In this scenario, the database may lose the data since the last snapshot or archive file. On the other hand, TDM technology s dynamic rollback capability enables the users to reverse any unwanted action via the trail files which store all the change data operations. For example, if the data corruption happened because a user deleted the customer list from the database, the TDM solution would first move that changed data i.e. the delete command for those customers to the target database. As soon as the error is noticed the user can find the erroneous delete command in TDM solution s trail files. The user can change that command right in the trail file in a way that it will fix the data corruption problem i.e. by changing the delete operation back to an insert of those customer names. The bi-directional TDM solution can reverse specific commands and apply them to the source database to remove the related issue. As a result, the business can continue to use the source database with complete and correct data. Planned outages In addition to logical disruptions, TDM allows high availability when a system migration or upgrade or maintenance is needed. For example, a database migration team can install a new database and then associate it as the target to the primary database so that the TDM software keeps it up-to-date with the changes that happen to the primary one. The team can then switch the system to the target (new) database, while the primary (old) database becomes the target for the new database in case a problem occurs requiring the team to switch back to the old one. Having these two heterogeneous databases in-synch enables a migration to a new database with zero downtime. Block level replication solutions cannot recover from unplanned outages without data loss, because they do not support bi-directional data movement. Performance problems due to overhead on production system Because block level replication tools are designed specifically for disaster recovery purposes, the secondary system cannot be accessed by end-users unless snapshots are mounted as point-in-time images of the data. However, TDM solutions allow the secondary system to be actively utilized for both read and write activities. Many businesses with TDM solutions use the target database for load balancing in addition to real-time reporting. When the production system is overloaded with many read-only queries, a secondary database with real-time updates from the primary system can be assigned for read-only activities, offloading the primary system and significantly improving performance.
10 white paper: BOOST BLOCK-LEVEL REPLICATION WITH GOLDENGATE All these different scenarios show us that these two technologies have their pros and cons in different types of disruptions. While block level replication has advantages in handling unstructured data and physical disruption related recoveries, TDM solutions are highly effective in handling logical corruptions. TDM solutions allow for immediate failover and HA, keeping business application running while repair is done on the primary systems. In addition, TDM technology offers solutions beyond HA its real-time data integration capabilities can be used for real-time business intelligence in data warehousing and reporting. The solution enables businesses to access mission-critical data from multiple, heterogeneous systems in real time. When combined these complementing technologies form a very strong and complete business continuity solution that enables high availability during physical or logical failures for both structured and unstructured data. CONCLUSION Disaster recovery investments are only a component of business continuity planning. High availability solutions for mission-critical transactional data play a very critical role in enabling continuous operations. Business continuity planning requires a thorough analysis of existing data. Identifying requirements for acceptable down times and acceptable data loss enables a business to find the right type of solution for each application. With many mature products available today in the market, block level replication solutions are a good fit for recovering non-mission critical, structured or unstructured data from physical disruptions. For mission-critical transactional data that impacts day-to-day operations, high availability and transactional integrity are vital for business health. Therefore companies should deploy a TDM solution for those systems that contain mission critical transactional data. Given the complementary protection strengths associated with different types of failures, block level replication solutions and TDM solutions offer a combined solution that provides a complete business continuity solution that enables high availability in all major failure or interruption cases. 10
11 ABOUT GOLDENGATE SOFTWARE GoldenGate Software, Inc. is the market leader in Transactional Data Management (TDM). GoldenGate s solutions enable customers to effectively maximize the performance, accessibility, and availability of the transactional data that drives their mission-critical business applications. Providing technologies for capturing, transforming, routing, delivering, and verifying data transactions in real-time and across major databases, GoldenGate helps organizations mitigate risk, reduce costs and increase revenues. Fortune 500 companies leverage GoldenGate solutions to manage critical initiatives for high availability/disaster recovery and real-time data integration. A privately held company, GoldenGate s more than 300 customers worldwide include Visa, Bank of America, US Bank, UBS, Sabre Holdings, DirecTV, Comcast, Federated Investors, Mayo Foundation and Overstock.com. GoldenGate broadens its global market reach through key relationships with leading application and infrastructure vendors including ACI Worldwide, Business Objects, Amdocs, Eclipsys, GE Healthcare, HP, IBM, Ingres, Oracle, Teradata, and others. 11
12 CONTACT INFORMATION Corporate Headquarters: GoldenGate Software, Inc. 301 Howard Street San Francisco, CA USA Tel: For a list of worldwide offices and for more company information, please visit: 12
Disaster Recovery for Oracle Database
Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches
More informationHigh Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper
High Availability with Postgres Plus Advanced Server An EnterpriseDB White Paper For DBAs, Database Architects & IT Directors December 2013 Table of Contents Introduction 3 Active/Passive Clustering 4
More informationEnsuring High Availability for Critical Systems and Applications
Ensuring High Availability for Critical Systems and Applications Using SharePlex to Ensure Your Oracle Databases Are Always Up and Running Bill Brunt, Product Manager, Dell Software Abstract Keeping business
More informationBusiness Continuity: Choosing the Right Technology Solution
Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail
More informationLeveraging the Cloud for Data Protection and Disaster Recovery
WHITE PAPER: Leveraging the Cloud for Data Protection and Disaster Recovery Leveraging the Cloud for Data Protection and Disaster Recovery Bennett Klein DATA MANAGEMENT CUSTOMER SOLUTIONS MARCH 2012 Table
More informationMySQL Enterprise Backup
MySQL Enterprise Backup Fast, Consistent, Online Backups A MySQL White Paper February, 2011 2011, Oracle Corporation and/or its affiliates Table of Contents Introduction... 3! Database Backup Terms...
More informationLeveraging Virtualization for Disaster Recovery in Your Growing Business
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
More informationTechnical Considerations in a Windows Server Environment
Technical Considerations in a Windows Server Environment INTRODUCTION Cloud computing has changed the economics of disaster recovery and business continuity options. Accordingly, it is time many organizations
More informationEnabling Disaster Recovery Through Data Replication Technology June 7, 2010
Enabling Disaster Recovery Through Data Replication Technology June 7, 2010 Christophe Bertrand, BA (Hons), MBA Roselinda Schulman, CBCP Hitachi Data Systems 2005 Hitachi Data Systems About This Session
More informationEonStor DS remote replication feature guide
EonStor DS remote replication feature guide White paper Version: 1.0 Updated: Abstract: Remote replication on select EonStor DS storage systems offers strong defense against major disruption to IT continuity,
More informationBUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g
BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g ENABLED BY EMC VMAX 10K AND EMC RECOVERPOINT Technical Presentation EMC Solutions Group 1 Agenda Business case Symmetrix VMAX 10K overview RecoverPoint
More informationDISASTER RECOVERY ebook FACING DISASTERS HEAD ON
DISASTER RECOVERY ebook FACING DISASTERS HEAD ON CHAPTER 1: Facing Reality CHAPTER 2: Disaster Recovery Considerations CHAPTER 3: Making the Best Choices CHAPTER 4: A Single, Unified Solution CHAPTER 5:
More informationVERITAS Business Solutions. for DB2
VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................
More informationRPO represents the data differential between the source cluster and the replicas.
Technical brief Introduction Disaster recovery (DR) is the science of returning a system to operating status after a site-wide disaster. DR enables business continuity for significant data center failures
More informationUsing Hitachi Protection Manager and Hitachi Storage Cluster software for Rapid Recovery and Disaster Recovery in Microsoft Environments
Using Hitachi Protection Manager and Hitachi Storage Cluster software for Rapid Recovery and Disaster Recovery in Microsoft Environments Robert Burch, Advanced Technical Consultant Leland Sindt, Principal
More informationVeritas Cluster Server by Symantec
Veritas Cluster Server by Symantec Reduce application downtime Veritas Cluster Server is the industry s leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status
More informationDISASTER RECOVERY STRATEGIES FOR ORACLE ON EMC STORAGE CUSTOMERS Oracle Data Guard and EMC RecoverPoint Comparison
DISASTER RECOVERY STRATEGIES FOR ORACLE ON EMC STORAGE CUSTOMERS Oracle Data Guard and EMC RecoverPoint Comparison Document Control Change Record 3 Date Author Version Change Reference 15-Aug-2007 Ravi
More informationDISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES
DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 The Business Maturity Model V Enabled Web
More informationHA / DR Jargon Buster High Availability / Disaster Recovery
HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster
More informationThe Secret to Affordably Protecting Critical Data
The Secret to Affordably Protecting Critical Data Using StoneFly Backup Advantage All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc.
More informationMicrosoft Cross-Site Disaster Recovery Solutions
Microsoft Cross-Site Disaster Recovery Solutions End-to-End Solutions Enabled by Windows 2008 Failover Clustering, Hyper-V, and Partner Solutions for Data Replication Published: December 2009 Introduction:
More informationTABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models
1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint
More informationRedefining Oracle Database Management
Redefining Oracle Database Management Actifio PAS Specification A Single Solution for Backup, Recovery, Disaster Recovery, Business Continuity and Rapid Application Development for Oracle. MAY, 2013 Contents
More informationDatabase Storage Management with Veritas Storage Foundation by Symantec Manageability, availability, and superior performance for databases
Database Storage Management with Veritas Storage Foundation by Symantec Manageability, availability, and superior performance for databases Solution Brief: Database Storage Management Database Storage
More informationSnapManager 5.0 for Microsoft Exchange Best Practices Guide
NETAPP TECHNICAL REPORT SnapManager 5.0 for Microsoft Exchange s Guide Shannon Flynn, NetApp November 2008 TR-3730 Table of Contents 1 EXECUTIVE SUMMARY... 3 1.1 PURPOSE AND SCOPE... 3 1.2 INTENDED AUDIENCE...
More informationSystem Migrations Without Business Downtime. An Executive Overview
System Migrations Without Business Downtime An Executive Overview Businesses grow. Technologies evolve. System migrations may be inevitable, but business downtime isn t. All businesses strive for growth.
More informationMicrosoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options
This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware
More informationDisaster Recovery of Tier 1 Applications on VMware vcenter Site Recovery Manager
Disaster Recovery of Tier 1 Applications on VMware vcenter Site Recovery Manager This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by
More informationAn Oracle White Paper March 2014. Best Practices for Real-Time Data Warehousing
An Oracle White Paper March 2014 Best Practices for Real-Time Data Warehousing Executive Overview Today s integration project teams face the daunting challenge that, while data volumes are exponentially
More informationHRG Assessment: Stratus everrun Enterprise
HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at
More informationAchieve Continuous Computing for Mainframe Batch Processing. By Hitachi Data Systems and 21st Century Software
Achieve Continuous Computing for Mainframe Batch Processing By Hitachi Data Systems and 21st Century Software February 2016 Contents Executive Summary... 2 Introduction... 3 Difficulties in Recovering
More informationEMC RECOVERPOINT FAMILY
EMC RECOVERPOINT FAMILY Cost-effective local and remote data protection and disaster recovery solution ESSENTIALS Maximize application data protection and disaster recovery Protect business applications
More informationVeritas InfoScale Availability
Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale
More informationPervasive PSQL Meets Critical Business Requirements
Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL White Paper May 2012 Table of Contents Introduction... 3 Data Backup... 3 Pervasive Backup Agent... 3 Pervasive PSQL VSS Writer... 5 Pervasive
More informationCA XOsoft Replication and CA XOsoft High Availability CA Partner Frequently Asked Questions
Q1. What do the terms Replication and High Availability mean? A. In the context of these two products, replication refers to the process of copying all application data from one server to another over
More informationVeritas Cluster Server from Symantec
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
More informationHow to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems
W H I T E P A P E R How to Manage Critical Data Stored in Microsoft Exchange Server 2010 By Hitachi Data Systems April 2012 2 Table of Contents Executive Summary and Introduction 3 Mission-critical Microsoft
More informationPROTECTING MICROSOFT SQL SERVER TM
WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden
More informationHigh Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach
High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many
More informationRemote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays
Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays V Tsutomu Akasaka (Manuscript received July 5, 2005) This paper gives an overview of a storage-system remote copy function and the implementation
More informationImproving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint
Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint Applied Technology Abstract This white paper covers how EMC NetWorker and EMC NetWorker modules can be used effectively in
More informationConnectivity. Alliance Access 7.0. Database Recovery. Information Paper
Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery
More informationCA XOsoft Replication r12.5 and CA XOsoft High Availability r12.5
FREQUENTLY ASKED QUESTIONS: CA XOSOFT REPLICATION AND CA XOSOFT HIGH AVAILABILITY CA XOsoft Replication r12.5 and CA XOsoft High Availability r12.5 Q: What are CA XOsoft Replication and CA XOsoft High
More informationSOLUTION BRIEF: KEY CONSIDERATIONS FOR DISASTER RECOVERY
SOLUTION BRIEF: KEY CONSIDERATIONS FOR DISASTER RECOVERY A Disaster Recovery and Business Continuity plan is specific to the circumstances, priorities and expense versus the value decisions of the organization,
More informationWindows Geo-Clustering: SQL Server
Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering
More informationConnectivity. Alliance Access 7.0. Database Recovery. Information Paper
Connectivity Alliance 7.0 Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Loss Business Impact... 6 2.2 Recovery Tools... 8 3 Manual Recovery Method...
More informationVeritas Storage Foundation High Availability for Windows by Symantec
Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability
More informationWHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE
WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE Published: May 2006 Executive Summary Database Management Systems (DBMS) are the hidden engines behind some of a company's
More informationOracle Active Data Guard
Oracle Active Data Guard Real-Time Data Protection and Availability ORACLE WHITE PAPER OCTOBER 2015 Table of Contents Introduction 1 Oracle Active Data Guard An Overview 2 How Data Guard Synchronizes Standby
More informationIMPROVING MICROSOFT EXCHANGE SERVER RECOVERY WITH EMC RECOVERPOINT
White Paper IMPROVING MICROSOFT EXCHANGE SERVER RECOVERY WITH EMC RECOVERPOINT Applied Technology Abstract This white paper outlines the challenges faced by Microsoft Exchange administrators in managing
More informationImplementing Disaster Recovery? At What Cost?
Implementing Disaster Recovery? At What Cost? Whitepaper Viktor Babkov Technical Director Business Continuity Copyright Business Continuity May 2010 In today s environment, minimizing IT downtime has become
More informationDisaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper
Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1
More informationHigh availability and disaster recovery with Microsoft, Citrix and HP
High availability and disaster recovery White Paper High availability and disaster recovery with Microsoft, Citrix and HP Using virtualization, automation and next-generation storage to improve business
More informationSymantec Cluster Server powered by Veritas
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
More informationEMC NETWORKER SNAPSHOT MANAGEMENT
White Paper Abstract This white paper describes the benefits of NetWorker Snapshot Management for EMC Arrays. It also explains the value of using EMC NetWorker for snapshots and backup. June 2013 Copyright
More informationABSTRACT. February, 2014 EMC WHITE PAPER
EMC APPSYNC SOLUTION FOR MANAGING PROTECTION OF MICROSOFT SQL SERVER SLA-DRIVEN, SELF-SERVICE CAPABILITIES FOR MAXIMIZING AND SIMPLIFYING DATA PROTECTION AND RECOVERABILITY ABSTRACT With Microsoft SQL
More informationNetApp SnapMirror. Protect Your Business at a 60% lower TCO. Title. Name
NetApp SnapMirror Protect Your Business at a 60% lower TCO Name Title Disaster Recovery Market Trends Providing disaster recovery remains critical Top 10 business initiative #2 area for storage investment
More informationBusiness Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time
Business Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time Introduction This is the third of a series of best practices workbooks designed to familiarize
More informationStorage Based Replications
Storage Based Replications Miroslav Vraneš EMC Technology Group miroslav.vranes@emc.com 1 Protecting Information Is a Business Decision Recovery point objective (RPO): How recent is the point in time for
More informationSanovi DRM for Oracle Database
Application Defined Continuity Sanovi DRM for Oracle Database White Paper Copyright@2012, Sanovi Technologies Table of Contents Executive Summary 3 Introduction 3 Audience 3 Oracle Protection Overview
More informationIBM Virtualization Engine TS7700 GRID Solutions for Business Continuity
Simplifying storage processes and ensuring business continuity and high availability IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity The risks are even greater for companies that
More informationComplete Online Microsoft SQL Server Data Protection
WHITE PAPER Complete Online Microsoft SQL Server Data Protection VERITAS BACKUP EXEC TM 10 FOR WINDOWS SERVERS Agent for Microsoft SQL Server SQL Server 7.0 SQL Server 2000 1/17/2005 1 TABLE OF CONTENTS
More informationContents. SnapComms Data Protection Recommendations
Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery
More informationVirtual Infrastructure Security
Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both
More informationSTORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER
STORAGE CENTER DATASHEET STORAGE CENTER Go Beyond the Boundaries of Traditional Storage Systems Today s storage vendors promise to reduce the amount of time and money companies spend on storage but instead
More informationAbstract... 2. Introduction... 2. Overview of Insight Dynamics VSE and Logical Servers... 2
HP Insight Recovery Technical white paper Abstract... 2 Introduction... 2 Overview of Insight Dynamics VSE and Logical Servers... 2 Disaster Recovery Concepts... 4 Recovery Time Objective (RTO) and Recovery
More informationEMC Invista: The Easy to Use Storage Manager
EMC s Invista SAN Virtualization System Tested Feb. 2006 Page 1 of 13 EMC Invista: The Easy to Use Storage Manager Invista delivers centrally managed LUN Virtualization, Data Mobility, and Copy Services
More informationThe Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss
More informationOracle Database Disaster Recovery Using Dell Storage Replication Solutions
Oracle Database Disaster Recovery Using Dell Storage Replication Solutions This paper describes how to leverage Dell storage replication technologies to build a comprehensive disaster recovery solution
More informationSnapshot Technology: Improving Data Availability and Redundancy
Snapshot Technology: Improving Data Availability and Redundancy. All rights reserved. Table of Contents Introduction...3 Snapshot Overview...3 Functional Description...6 Creating Snapshots...7 Other Snapshot
More informationHigh Availability Database Solutions. for PostgreSQL & Postgres Plus
High Availability Database Solutions for PostgreSQL & Postgres Plus An EnterpriseDB White Paper for DBAs, Application Developers and Enterprise Architects November, 2008 High Availability Database Solutions
More informationWindows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication
More informationThings You Need to Know About Cloud Backup
Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing
More informationBest Practices for Architecting Storage in Virtualized Environments
Best Practices for Architecting Storage in Virtualized Environments Leverage Advances in Storage Technology to Accelerate Performance, Simplify Management, and Save Money in Your Virtual Server Environment
More informationApplication Brief: Using Titan for MS SQL
Application Brief: Using Titan for MS Abstract Businesses rely heavily on databases for day-today transactions and for business decision systems. In today s information age, databases form the critical
More informationDISASTER RECOVERY THE DIFFERENCE BETWEEN SUCCESS AND FAILURE FOR SMALL BUSINESSES
DISASTER RECOVERY THE DIFFERENCE BETWEEN SUCCESS AND FAILURE FOR SMALL BUSINESSES BUSINESS VALUE WHITEPAPER Double-Take Software, Inc. Published: October 2006 Abstract Relying on native backup for your
More informationVERITAS Volume Replicator in an Oracle Environment
VERITAS Volume Replicator in an Oracle Environment Introduction Remote replication of online disks and volumes is emerging as the technique of choice for protecting enterprise data against disasters. VERITAS
More informationBest practice: Simultaneously upgrade your Exchange and disaster recovery protection
Best practice: Simultaneously upgrade your Exchange and disaster recovery protection March 2006 1601 Trapelo Road Waltham, MA 02451 1.866.WANSync www.xosoft.com Contents The Value Proposition... 1 Description
More informationVirtual Disaster Recovery
Virtual Disaster Recovery White Paper September 16, 2008 Kelly Laughton Davenport Group Consultant Davenport Group 2008. All rights reserved. Introduction Today s data center has evolved into a complex,
More informationRealizing the True Potential of Software-Defined Storage
Realizing the True Potential of Software-Defined Storage Who should read this paper Technology leaders, architects, and application owners who are looking at transforming their organization s storage infrastructure
More informationNear-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper
Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper bex30102507wpor Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies Introduction Are you a database administrator
More information(Formerly Double-Take Backup)
(Formerly Double-Take Backup) An up-to-the-minute copy of branch office data and applications can keep a bad day from getting worse. Double-Take RecoverNow for Windows (formerly known as Double-Take Backup)
More informationCreating A Highly Available Database Solution
WHITE PAPER Creating A Highly Available Database Solution Advantage Database Server and High Availability TABLE OF CONTENTS 1 Introduction 1 High Availability 2 High Availability Hardware Requirements
More informationSynchronous Data Replication
S O L U T I O N S B R I E F Synchronous Data Replication Hitachi Data Systems Synchronous Data Replication Business continuity has become one of the top issues facing businesses and organizations all around
More informationDeltaV Virtualization High Availability and Disaster Recovery
DeltaV Distributed Control System Whitepaper October 2014 DeltaV Virtualization High Availability and Disaster Recovery This document describes High Availiability and Disaster Recovery features supported
More informationIP Storage On-The-Road Seminar Series
On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions
More informationFour Steps to Disaster Recovery and Business Continuity using iscsi
White Paper Four Steps to Disaster Recovery and Business Continuity using iscsi It s a fact of business life physical, natural, and digital disasters do occur, and they interrupt operations and impact
More informationVirtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric
Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance
More informationBest practices for data migration.
IBM Global Technology Services June 2007 Best practices for data migration. Methodologies for planning, designing, migrating and validating data migration Page 2 Contents 2 Executive summary 4 Introduction
More informationSymantec Storage Foundation High Availability for Windows
Symantec Storage Foundation High Availability for Windows Storage management, high availability and disaster recovery for physical and virtual Windows applications Data Sheet: High Availability Overview
More informationServer and Storage Virtualization with IP Storage. David Dale, NetApp
Server and Storage Virtualization with IP Storage David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this
More informationTraditional Disaster Recovery versus Cloud based DR
Traditional Disaster Recovery versus Cloud based DR May 2014 Executive Summary Many businesses want Disaster Recovery (DR) services to prevent either man-made or natural disasters from causing expensive
More informationFinancial Services Need More than Just Backup... But they don t need to spend more! axcient.com
Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com Introduction Financial institutions need to keep their businesses up and running more than ever now. Considering
More informationLunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar
Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar Kevin Horn Principal Product Manager Enterprise Data Protection Solutions March
More informationRajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747
Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Introduction Rajesh Gupta - rajgupta@deloitte.com Solution Network
More informationProtecting Microsoft SQL Server
Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary
More informationConstant Replicator: An Introduction
Data Availability Storage Software Constant Replicator: An Introduction Configurations, Applications and Solutions of Constant Replicator A White Paper A Constant Data Technology Document August 2004 Copyright
More informationSQL Server Storage Best Practice Discussion Dell EqualLogic
SQL Server Storage Best Practice Discussion Dell EqualLogic What s keeping you up at night? Managing the demands of a SQL environment Risk Cost Data loss Application unavailability Data growth SQL Server
More informationNetApp and Microsoft Virtualization: Making Integrated Server and Storage Virtualization a Reality
NETAPP TECHNICAL REPORT NetApp and Microsoft Virtualization: Making Integrated Server and Storage Virtualization a Reality Abhinav Joshi, NetApp Chaffie McKenna, NetApp August 2008 TR-3701 Version 1.0
More informationMayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation
Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup
More information