Constant Replicator: An Introduction
|
|
- Julius Norton
- 8 years ago
- Views:
Transcription
1 Data Availability Storage Software Constant Replicator: An Introduction Configurations, Applications and Solutions of Constant Replicator A White Paper A Constant Data Technology Document August 2004
2 Copyright and Trademark Information Copyright Constant Data, Inc. All rights reserved. Unpublished -- Rights reserved under the copyright laws of the United States. RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS IMPORTANT NOTE TO USERS While every effort has been made to ensure the accuracy of all information in this document, Constant Data assumes no liability to any party for any loss or damage caused by errors or omissions or by statements of any kind in this document, its updates, supplements, or special editions, whether such errors are omissions or statements resulting from negligence, accident, or any other cause. Constant Data further assumes no liability arising out of the application or use of any product or system described herein; nor any liability for incidental or consequential damages arising from the use of this document. Constant Data disclaims all warranties regarding the information contained herein, whether expressed, implied or statutory, including implied warranties of merchantability or fitness for a particular purpose. Constant Data makes no representation that the interconnection of products in the manner described herein will not infringe on existing or future patent rights, nor do the descriptions contained herein imply the granting or license to make, use or sell equipment constructed in accordance with this description. Constant Data reserves the right to make changes without further notice to any products herein to improve reliability, function, or design. TRADEMARKS The Constant Data company name the Constant Data logo, the Constant Replicator, the OnDemand Replicator, the Constant HA Cluster, and the Sync2NAS product names are trademarks of Constant Data, Inc. which may be registered in some jurisdictions. All other brands and product names are trademarks or registered trademarks of their respective holders. The Constant Data name and swoosh logo, Constant Replicator, Constant Replicator DB, Constant HA Cluster toolkit, On-Demand Replicator and the Sync2NAS product names, are trademarks of Constant Data, Inc. All other brands and product names are trademarks or registered trademarks of their respective holders. Information supplied by Constant Data, Inc. is believed to be accurate and reliable. Constant Data, Inc. assumes no responsibility for any errors that appear in this white paper. All materials in this document are (and shall continue to be) owned exclusively by Constant Data, Inc. or other respective third party owners and are protected under applicable copyrights, patents, trademarks, trade dress and/or other proprietary rights. All right, title and interest not expressly granted is reserved to Constant Data, Inc. Constant Data, Inc. reserves the right, without notice, to make changes in product design or specification. Constant Data, Inc. is a member of SunTone and is applying for product certification. The Constant Replicator software product is a RedHat Certified Application, Novell/SUSE Certified Application, comprehensive IBM TotalStorage proven and IBM ServerProven. Headquarters Constant Data, Inc th Avenue South Hopkins, Minnesota Copyright 2004 Constant Data, Inc. Page 2 of 10
3 Table of Contents 1. Introduction Constant Data s Real-Time Data Replication Architecture Application Independence Successful Configurations Bi-Directional Configuration Hot-Standby Configuration Cascaded Configuration One-to-many Configuration Many-to-one Configuration Many-to-many Configuration Successful Applications Improved Backups Server Migrations and Data Migrations Simple Uni-Directional Replication combined with HA Cluster Long Distance Uni-Directional Replication of HA Clusters Bi-directional data replication between two servers on local area networks Bi-directional data replication between multiple servers on local area networks Bi-directional data replication over long distances Successful Solutions Storage Consolidation Storage Consolidation with an Integrated Failover Solution Content Distribution Universal Data Availability with Failover Universal Data Availability with Failover and Consolidation Conclusion Technical Highlights Full-Featured Product Evaluation Copyright 2004 Constant Data, Inc. Page 3 of 10
4 1. Introduction The following document describes common installed configurations of Constant Data s real-time data replication software solution - Constant Replicator. This paper presents a few examples how Constant Replicator can be used in an enterprise s existing heterogeneous IT environment. Constant Replicator is able to replicate between two server, from one server to many server (1:N), from many servers to one servers (N:1), and from many servers to many servers (M:N). 2. Constant Data s Real-Time Data Replication Architecture Constant Data s data replication software, Constant Replicator, is a hybrid real-time software solution, combining both synchronous and asynchronous replication technology. In synchronous operations, data is written on the primary storage system then the data is written on the remote system. The synchronous operation is completed only after the data has been written to all storage systems. The advantages of this model are the guaranteed transfer of data changes from the local to the remote server, because the system is not allowed to proceed until the data is successfully committed to all storage systems and 100% synchronized. The disadvantages are distance limitations, a slow local response time of applications due to the higher server overhead and the higher risk of a break down, due to its sensitivity to latency, speed and bandwidth. In asynchronous operations, the order is chronological inverse of synchronous replication. First, the data is written to the primary storage system and then sent to a remote or secondary storage system at a later point in time. The asynchronous operation is usually unaware, if the data has been delivered to the secondary site or not. The advantages of asynchronous over synchronous replication are no distance limitations, a better performance due to low network overhead, and a higher degree of scalability than synchronous replication. The disadvantage can be seen in the lower level of guaranteed data transfer from the primary to the secondary storage system. In asynchronous operations, the secondary storage system does not always have an exact copy of the primary system, because the system allows the user to proceed with the operation. Continues proceeding in operations at the primary site opens a big window of vulnerability, due to the point in time snapshot. In other words, the moment the system starts replicating the data to the secondary site, the data is already outdated because the primary site continues its operations. It also takes the same amount of time to write the data at the secondary storage system than it took to write at the primary site. The window of vulnerability is based on this point in time snapshot and increases dramatically with the size of the replicated file. The bigger the file, the longer the replication process and therefore the window of vulnerability! Constant Data s hybrid replication software, changes data first on the source and starts to replicate these changes immediately with little or no lag time to the destination server. The application on the primary site is allowed to proceed, but in the meanwhile the data gets constantly synchronized with the secondary site. Constant Replicator reduces the window of vulnerability through real-time hybrid data mirroring technology. Real-time replication solutions have a constant lag time, which is independent of the file size. In case of Constant Replicator, the remote copy overlaps with the local copy, reducing the lag time and eliminating the dependence on the underlying file system size. Normal asynchronous solutions start replicating after local changes are finished on the local server. It also abolishes the restrictions of synchronous solutions. It provides a higher degree of scalability and imposes low server overhead, which results in better local system performance. It also eliminates the limits of high latency, long distance and unstable network environments. 3. Application Independence Constant Replicator works on commodity hardware. It installs on existing server and is platform independent. The replication software allows enterprises to use their existing operating system and even complements the installed operating system. Its Application Programming Interface (API) allows the software to be fully embedded Copyright 2004 Constant Data, Inc. Page 4 of 10
5 in the operating software and IT environment. The API enables IT staff to configure and monitor the software from any machine in the network running Constant Replicator. Constant Replicator supports any file system, network file system (NFS), or any proprietary protocol a customer may have developed in house. It also fits in existing direct attached storage (DAS), network attached storage (NAS) and in storage area networks (SAN) environments. 4. Successful Configurations The following examples provide an overview of configurations successfully used by Constant Data customers when configuring Constant Replicator continuous real-time data replication software in their server and network infrastructures. 4.1 Simple Uni-Directional Configuration Simple Uni-Directional Data Replication replicates data from one server (Source) to another server (Destination). In this configuration, the source server is the primary server and the destination server is a hot-standby server. 4.1 Bi-Directional Configuration Bi-Directional Data Replication connects two server using a local area network (LAN) or wide area network (WAN). It automatically mirrors data between existing servers to maintain enterprise-wide data consistency using existing networks. 4.2 Hot-Standby Configuration A Hot-Standby for Disaster Recovery is used to keep data available in the event of a disaster. If one of the two servers fails, data is immediately available due to the replica server. A unique feature of Constant Data s software solution allows data to be usable on both the master and remote/backup server with guaranteed data integrity, regardless of the distance between the servers. 4.3 Cascaded Configuration Cascaded Data Replication distributes content between servers by replicating among the participating servers. It allows each server to be configured as both a source and/or a destination. 4.4 One-to-many Configuration 4.5 Many-to-one Configuration One-To-Many Real-Time Guaranteed Data Distribution replicates data from one server to many server that run on several heterogeneous operating platforms like Linux, UNIX, Solaris, etc. The configuration solution enables geographically dispersed organizations to instantly and effectively access the same data, regardless of location. Many-To-One Real-Time Storage Consolidation allows an organization to consolidate many servers in realtime in a heterogeneous environment to a single destination server. The configuration solution enables an organization to mirror many remote servers to a central data center where the data can be consolidated and stored. This process reduces the operating cost and improves the efficiency of an organization by saving significant resources due to effectively managed data in central data centers and the consolidation of data and backups at one remote location. Copyright 2004 Constant Data, Inc. Page 5 of 10
6 4.6 Many-to-many Configuration Many-To-Many Real- Time Data Availability solution distributes content between servers by replicating among the participating servers. Data at one location is immediately available at all the other locations in the network. Any analysis or transformation performed on the data will be immediately available within the network. Constant Replicator mirrors data between different operating systems with its true-cross platform capabilities. It also preserves security ACL metadata between Solaris and Linux servers, making it a good solution for data migration. 5. Successful Applications Constant Data improves operational efficiency and eliminates downtime with high performance data availability solutions. The solutions minimize risk, improve business processes and grow with enterprise to the next level. Constant Data s enterprise software makes the transition simple, and hassle-free. 5.1 Improved Backups Real-time data replication enhances existing backup strategies by maintaining an up-to-date centralized online backup available for immediate access in the event of a disaster or unplanned service outage. The destination server is maintained through real-time data replication and can be archived to tape from the destination server with existing backup technologies and no impact on primary server. 5.3 Simple Uni-Directional Replication combined with HA Cluster The following example illustrates simple unidirectional replication combined with a high availability cluster manager to create a HA Cluster. In this solution, a cluster manager controls the role of destination servers. One server actively assumes the role of a source and the other assumes the role of the destination as a passive hot-standby. Upon a failure of the primary active server, the passive standby server automatically takes over the role of the primary server. 5.2 Server Migrations and Data Migrations Constant Data's real-time replication products install and integrate easily in existing IT environments and guarantee data mirroring over existing networks in mixed operational environments. The Constant Replicator product line maintains a reliable, stable infrastructure to keep data synchronized by providing symmetric data mirroring between production UNIX servers and replacement Linux servers. There is no need to take the servers offline or install special hardware. Constant Data s products allow enterprises to migrate from their existing Solaris servers to new Linux servers. Desktop clients usually access file systems or applications on the primary server through a virtual IP and are not cognizant of which server is actually the active primary server. The cluster management software provides for automatic server and application failover. Constant Replicator seamlessly integrates into the existing cluster manager through the Constant HA Cluster toolkit and provides a common data set across servers. Constant Replicator allows the customer to maintain a common data store between local servers Copyright 2004 Constant Data, Inc. Page 6 of 10
7 without the requirement of a SAN or servers located in different remote offices. 5.4 Long Distance Uni-Directional Replication of HA Clusters The simple uni-directional replication from an active source server to the virtual IP of a remote cluster allows enterprises to maintain an identical cluster of web servers providing off-site disaster recovery combined with high availability clustering. Constant Replicator enables companies to enhance existing tape backup solution with the addition of a remote server through the installation of an affordable server-based replication solution. An online mirror replica decreases downtime and increases data and application availability. Normal operation: Failover operation: 5.5 Bi-directional data replication between two servers on local area networks Constant Replicator bidirectionally mirrors data between two servers. By bi-directionally mirroring data between two servers, enterprises are able to maintain data consistency between the source and destination server. Constant Data s software solution allows data to be usable on both the master and remote/backup server with guaranteed data integrity. This enables enterprises to instantly switch between the source and the available destination server in the event of a business interruption. However, data consistency is maintained between the servers in much the same way as NFS: whichever server writes last wins. 5.6 Bi-directional data replication between multiple servers on local area networks Constant Replicator also bidirectionally mirrors data between multiple servers and can be used for content distribution. It distributes data by replicating among the participating sites. Information collected at one site is immediately available at all the other sites. Data is able to be accessed and updated on any server in the network. However, whichever server writes last wins. 5.7 Bi-directional data replication over long distances Constant Data s software solution bi-directionally mirrors data over high latency long haul networks between different locations. Enterprises are able to turn remote offices/sites into off-site data "bunkers" for Disaster Recovery and convert their network into a backup solution. Furthermore, enterprises are able to access and update data on any server in the mirror. Constant Data's bi-directional replication solution provides the remote offices with access to the same data, at each remote site, all the time. Not only is a fast disaster recovery guaranteed through bi-directional data replication, enterprises will have a more efficient Copyright 2004 Constant Data, Inc. Page 7 of 10
8 collaboration and workflow between the remote offices, because the data at each office is always in sync. 6.2 Storage Consolidation with an Integrated Failover Solution Constant Replicator bi-directionally mirrors data between servers located on wide area networks regardless of distance between servers. 6. Successful Solutions Constant Data real-time replication solution minimizes risk and improves business processes. Constant Replicator is flexible and versatile. It plays a critical role in safeguarding customer data when used for business continuance and disaster recovery. The real-time replication solution can be used to consolidate backups of build backup appliances or to automate content distribution. 6.1 Storage Consolidation Constant Replicator consolidates data between remote offices to a centralized data center enabling an organization to consolidate and store data. Its unique compression, encryption and bandwidth throttling allow replication to co-exist over existing networks. The real time software solution mirrors content automatically over low-bandwidth and high latency networks providing an affordable, scalable, simple and secure storage consolidation solution. Constant Replicator maintains a mirror of critical clusters of servers in the same way as individual servers. Companies increase the availability of data and application in remote offices by clustering an additional hot-standby server into the network. Data from the remote clusters is replicated as it changes to a central location where it can be backed up. In the event of a remote server failure, the server can be rebuilt at the main office and shipped to the remote location. 6.3 Content Distribution Constant Replicator is being used by customers to mirror critical data between data centers. This process reduces the operating cost and improves the efficiency of an organization by saving significant resources due to effectively managed data in central data centers and the consolidation of data and backups at one remote location. Consider a company providing data services from the main data centers in the U.S. to the main data center in Europe and to an alternate data center in the U.S. Business intelligence created during the hours of operation in each of these locations needs to be Copyright 2004 Constant Data, Inc. Page 8 of 10
9 propagated to the others. Using Constant Replicator, this organization makes data created at one of these locations available to the entire enterprise in the most efficient way possible. Constant Replicator ensures that only changed data is replicated, saving valuable network overhead. created in the West Replication Mesh are able to be retrieved from the East Replication Mesh and vice versa. At the same time, Constant Data s cross-platform technology reduced the company s IT costs by replacing a redundant in-house solution and freeing up employees to concentrate on the company s core business. Constant Replicator automatically updates all locations within the system right at the moment when changes occur. If an interruption occurs Constant Data s failover feature switches automatically to the remote location and allows the company to continue its business without any interference. 6.5 Universal Data Availability with Failover and Consolidation A variation of long distance replication clustering is the addition of real-time consolidation to a central server. In the following example, a customer is using Constant Replicator to distribute terabytes of multimedia in a telecommunications environment to remote data centers located across the country and guarantees the delivery of multimedia content. 6.4 Universal Data Availability with Failover Constant Replicator consolidates backups from a central location without impacting the production environment. 7. Conclusion Constant Data developed a fully connected and redundant replication mesh that assures that documents Constant Data offers a replication software solution that replicates only changed data from files and databases in real-time from one to one, one to many, many to one and many to many servers between different operating systems. The hybrid replication solution reduces the total cost of ownership by reducing system and configuration down time and by removing the required backup windows. Copyright 2004 Constant Data, Inc. Page 9 of 10
10 The reduction of business risk associated with system downtime translates into higher availability and a reduction in the cost of backup operations because less staff time is spent on backups. Constant Replicator can be used to consolidate data, automate data distribution or provide universal data availability. Constant Replicator offers increased levels of data availability without impacting a company s IT system performance. 8. Technical Highlights Constant Data s hybrid data replication solution has the following technology benefits: Assures delivery of data due to highly resilient replication technology Authorizes dynamic reconfiguration that allows addition of remote replicas with no system downtime Allows true cross platform replication (Solaris- Linux; Linux-Solaris; Solaris-AIX; Linux-Mac OSX, etc.) Maximizes available network bandwidth and performance through unique compression and fast byte-level replication Runs on any specified TCP/IP port over existing networks - firewall friendly Provides flexible modes of replication (1-1, 1-N; N- 1; M-N; uni-directional or symmetric) Guarantees data integrity through data journaling for resiliency over both local and unreliable wide area networks Automates the deployment, configuration and management through user-friendly graphical user interface (GUI), command line interface (CLI) tools and optional programmable API toolkit. 9. Full-Featured Product Evaluation A full-featured evaluation copy of Constant Replicator software is available for download from Constant Data at Copyright 2004 Constant Data, Inc. Page 10 of 10
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key
More informationIBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
More informationEnsuring High Availability for Critical Systems and Applications
Ensuring High Availability for Critical Systems and Applications Using SharePlex to Ensure Your Oracle Databases Are Always Up and Running Bill Brunt, Product Manager, Dell Software Abstract Keeping business
More informationDisaster Recovery for Oracle Database
Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches
More informationArchive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration
Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta
More informationCROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION
1 E N D U R A D A T A EDpCloud: A File Synchronization, Data Replication and Wide Area Data Distribution Solution CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION 2 Resilient
More informationEMC RECOVERPOINT FAMILY
EMC RECOVERPOINT FAMILY Cost-effective local and remote data protection and disaster recovery solution ESSENTIALS Maximize application data protection and disaster recovery Protect business applications
More informationAchieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
More informationDeployment Options for Microsoft Hyper-V Server
CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES
More informationClustering and Queue Replication:
Clustering & Queue Replication Clustering and Queue Replication: How WatchGuard XCS Provides Fully Redundant Messaging Security Technical Brief WatchGuard Technologies, Inc. Published: March 2011 Introduction
More informationProtecting Microsoft SQL Server
Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary
More informationStoneFly SCVM TM for ESXi
StoneFly TM for ESXi Add StoneFly Storage Concentrator Virtual Machine () to your VMware ESXi Server and the possibilities are endless! Reduce your CapEx and OpEx by optimized utilization of servers and
More informationVERITAS Business Solutions. for DB2
VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................
More informationNon-Native Options for High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments Non-Native Options for High Availability by Non-Native Options for High Availability... 1 Suitability and Cost...
More informationUPSTREAM for Linux on System z
PRODUCT SHEET UPSTREAM for Linux on System z UPSTREAM for Linux on System z UPSTREAM for Linux on System z is designed to provide comprehensive data protection for your Linux on System z environment, leveraging
More informationHow To Use An Npm On A Network Device
WHITE PAPER: CA ARCserve Backup Network Data Management Protocol (NDMP) Network Attached Storage (NAS) Option: Integrated Protection for Heterogeneous NAS Environments CA ARCserve Backup: Protecting heterogeneous
More informationEMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers
EMC VPLEX FAMILY Continuous Availability and Data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is
More informationData Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery
Data replication for disaster recovery Overview Veritas Volume Replicator provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable recovery of critical
More informationEMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
More informationIBM Virtualization Engine TS7700 GRID Solutions for Business Continuity
Simplifying storage processes and ensuring business continuity and high availability IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity The risks are even greater for companies that
More informationCommVault Simpana Replication Software Optimized Data Protection and Recovery for Datacenter or Remote/Branch Office Environments
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Key Benefits Consolidates data over thin WAN connections and expedites local recovery Eliminates tape management at multiple locations by
More informationWhite Paper. Virtualization with Protection for SMBs Using the ReadyDATA 5200
White Paper Virtualization with Protection for SMBs Using the ReadyDATA For most small-to-medium size businesses, building a virtualization solution that provides scalability, reliability, and data protection
More informationEMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers
EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is
More informationProtect Microsoft Exchange databases, achieve long-term data retention
Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...
More informationHP StorageWorks Data Protection Strategy brief
HP StorageWorks Data Protection Strategy brief Your business depends on IT more than ever before. The availability of key application services and information is critical to maintain business processes,
More informationNetVault Backup, NDMP and Network Attached Storage
NetVault, NDMP and Network Attached Storage Simplicity and power for NAS Written by Adrian Moir, Dell Scott Hetrick, Dell Abstract This technical brief explains how Network Data Management Protocol (NDMP)
More informationHow To Use Shareplex
Data consolidation and distribution with SharePlex database replication Written by Sujith Kumar, Chief Technologist Executive summary In today s fast-paced mobile age, data continues to accrue by leaps
More informationHighest Application Availability with Oracle Optimized Solution for Disaster Recovery O R A C L E W H I T E P A P E R J U N E 2 0 1 5
Highest Application Availability with Oracle Optimized Solution for Disaster Recovery O R A C L E W H I T E P A P E R J U N E 2 0 1 5 Introduction Disaster recovery has come to the forefront of IT concerns
More informationEMC Disk Library with EMC Data Domain Deployment Scenario
EMC Disk Library with EMC Data Domain Deployment Scenario Best Practices Planning Abstract This white paper is an overview of the EMC Disk Library with EMC Data Domain deduplication storage system deployment
More informationHigh Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper
High Availability with Postgres Plus Advanced Server An EnterpriseDB White Paper For DBAs, Database Architects & IT Directors December 2013 Table of Contents Introduction 3 Active/Passive Clustering 4
More informationRapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide
Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide This IBM Redbooks Solution Guide provides an overview of how data backup and
More informationMirror File System for Cloud Computing
Mirror File System for Cloud Computing Twin Peaks Software Abstract The idea of the Mirror File System (MFS) is simple. When a user creates or updates a file, MFS creates or updates it in real time on
More informationVeritas Replicator from Symantec
Data replication across multi-vendor storage for cost effective disaster recovery Data Sheet: Disaster Recovery Overviewview provides organizations with a comprehensive solution for heterogeneous data
More informationContinuous Data Replicator 7.0
DATA PROTECTION ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Continuous Data Replicator 7.0 Continuous Data Protection (CDP) and Centralized Management of Remote Office Data Key Benefits Reduces management
More informationWHITE PAPER Overview of Data Replication
Overview of Data Replication 1 Abstract Replication is the process of making a copy of something, or of creating a replica. In different contexts, such as art (copies of a painting), bioscience (cloning),
More informationEMC CENTERA VIRTUAL ARCHIVE
White Paper EMC CENTERA VIRTUAL ARCHIVE Planning and Configuration Guide Abstract This white paper provides best practices for using EMC Centera Virtual Archive in a customer environment. The guide starts
More informationCommVault Simpana Remote and Branch Office Protection
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Key Benefits Consolidate data over thin WAN connections and expedite local recovery with multiple backup and recovery options. Save time
More informationPROTECTING MICROSOFT SQL SERVER TM
WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden
More informationUsing HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup
Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP
More informationEvery organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its
DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business
More informationReplication Overview
W H I T E P A P E R b y F r a n k M u s a c c h i a Taking control of your finances. PHD Virtual & Replication: Replication Overview Unmatched Value for Your Virtual World WWW.PHDVIRTUAL.COM PHD Virtual
More informationIBM Tivoli Storage Manager
Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing
More informationHelping MSPs protect Data Center resources
Helping MSPs protect Data Center resources Due to shrinking IT staffing and budgets, many IT organizations are turning to Service Providers for hosting of business-critical systems and applications (i.e.
More informationBackup and Recovery for SAP Environments using EMC Avamar 7
White Paper Backup and Recovery for SAP Environments using EMC Avamar 7 Abstract This white paper highlights how IT environments deploying SAP can benefit from efficient backup with an EMC Avamar solution.
More informationTABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models
1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint
More informationMicrosoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options
This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware
More informationUsing the cloud to improve business resilience
IBM Global Technology Services White Paper IBM Business Continuity and Resiliency Services Using the cloud to improve business resilience Choose the right managed services provider to limit reputational
More informationCA ARCserve Replication and High Availability Deployment Options for Hyper-V
Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization
More informationHigh availability and disaster recovery with Microsoft, Citrix and HP
High availability and disaster recovery White Paper High availability and disaster recovery with Microsoft, Citrix and HP Using virtualization, automation and next-generation storage to improve business
More informationArcserve Cloud. Arcserve Cloud Getting Started Guide
Arcserve Cloud Arcserve Cloud Getting Started Guide This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationEnterprise Linux Business Continuity Solutions for Critical Applications
Enterprise Linux Business Continuity Solutions for Critical Applications Introducing SteelEye Protection Suite for Linux Multi-site Cluster May 15 2009 EMEA DataKeeper Our Expanding Family of Solutions
More informationDeploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems
Deploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems Application Notes Abstract: This document describes how to apply global clusters in site disaster
More informationProtecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationBig data management with IBM General Parallel File System
Big data management with IBM General Parallel File System Optimize storage management and boost your return on investment Highlights Handles the explosive growth of structured and unstructured data Offers
More informationIBM Tivoli Storage Manager Suite for Unified Recovery
IBM Tivoli Storage Manager Suite for Unified Recovery Comprehensive data protection software with a broad choice of licensing plans Highlights Optimize data protection for virtual servers, core applications
More informationDouble-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server
Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server Double-Take Software, Inc. 257 Turnpike Road; Suite 210 Southborough,
More informationCA Encryption Key Manager r14.5
PRODUCT SHEET CA Encryption Key Manager CA Encryption Key Manager r14.5 CA Encryption Key Manager is a z/os-based, software cryptographic solution that helps ensure the highest availability of encryption
More informationOVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available
Phone: (603)883-7979 sales@cepoint.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous
More informationReal-time Protection for Hyper-V
1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate
More informationHow To Protect Data On Network Attached Storage (Nas) From Disaster
White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains
More informationNetApp SnapMirror. Protect Your Business at a 60% lower TCO. Title. Name
NetApp SnapMirror Protect Your Business at a 60% lower TCO Name Title Disaster Recovery Market Trends Providing disaster recovery remains critical Top 10 business initiative #2 area for storage investment
More informationVMware System, Application and Data Availability With CA ARCserve High Availability
Solution Brief: CA ARCserve R16.5 Complexity ate my budget VMware System, Application and Data Availability With CA ARCserve High Availability Adding value to your VMware environment Overview Today, performing
More informationThe case for cloud-based disaster recovery
IBM Global Technology Services IBM SmartCloud IBM SmartCloud Virtualized Server Recovery i The case for cloud-based disaster recovery Cloud technologies help meet the need for quicker restoration of service
More informationWindows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication
More informationEMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All
More informationnext generation architecture created to safeguard in virtual & physical environments to deliver comprehensive UNIFIED DATA PROTECTION SOLUTION BRIEF
next generation architecture created to safeguard in virtual & physical environments to deliver comprehensive UNIFIED DATA PROTECTION SOLUTION BRIEF CA arcserve UDP Fueled by data growth and technology
More informationMicrosoft SQL Server Always On Technologies
Microsoft SQL Server Always On Technologies Hitachi Data Systems Contributes Always On Storage Solutions A Partner Solutions White Paper By Rick Andersen and Simon Pengelly December 2006 Executive Summary
More informationIP Storage On-The-Road Seminar Series
On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions
More informationLeveraging the Cloud for Data Protection and Disaster Recovery
WHITE PAPER: Leveraging the Cloud for Data Protection and Disaster Recovery Leveraging the Cloud for Data Protection and Disaster Recovery Bennett Klein DATA MANAGEMENT CUSTOMER SOLUTIONS MARCH 2012 Table
More informationAdvanced High Availability Architecture. White Paper
Advanced High Advanced High Production database servers are replicated in near-real time to a peer data center within the same geographic region in Asia Pacific Japan (APJ); Europe, Middle East and Africa
More informationEMC AVAMAR INTEGRATION WITH EMC DATA DOMAIN SYSTEMS
EMC AVAMAR INTEGRATION WITH EMC DATA DOMAIN SYSTEMS A Detailed Review ABSTRACT This white paper highlights integration features implemented in EMC Avamar with EMC Data Domain deduplication storage systems
More informationEnterprise Storage Services (ESS) for Windows
Add StoneFly ESS for Windows to your Windows Server and the possibilities are endless! Reduce your CapEx and OpEx by optimized utilization of servers and storage. Installing StoneFly ESS for Windows creates
More informationEMC VPLEX FAMILY. Transparent information mobility within, across, and between data centers ESSENTIALS A STORAGE PLATFORM FOR THE PRIVATE CLOUD
EMC VPLEX FAMILY Transparent information mobility within, across, and between data centers A STORAGE PLATFORM FOR THE PRIVATE CLOUD In the past, users have relied on traditional physical storage to meet
More informationEMC Data Domain Boost and Dynamic Interface Groups
EMC Data Domain Boost and Dynamic Interface Groups Maximize the Efficiency of Multiple Network Interfaces ABSTRACT EMC delivers dynamic interface groups to simplify the use of multiple network interfaces
More informationWHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE
WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE Published: May 2006 Executive Summary Database Management Systems (DBMS) are the hidden engines behind some of a company's
More informationHigh Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach
High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many
More informationSoftware-Defined Networks Powered by VellOS
WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible
More informationPolyServe Matrix Server for Linux
PolyServe Matrix Server for Linux Highly Available, Shared Data Clustering Software PolyServe Matrix Server for Linux is shared data clustering software that allows customers to replace UNIX SMP servers
More informationIBM Infrastructure for Long Term Digital Archiving
IBM Infrastructure for Long Term Digital Archiving A new generation of archival storage Rudolf Hruška Information Infrastructure Leader IBM Systems & Technology Group rudolf_hruska@cz.ibm.com 2010 IBM
More informationContents. SnapComms Data Protection Recommendations
Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery
More informationSOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery www.citrix.com Contents Introduction... 3 Fitting Disaster Recovery to the Cloud... 3 Considerations for Disaster Recovery
More informationAn Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices
An Oracle White Paper June 2011 Oracle Database Firewall 5.0 Sizing Best Practices Introduction... 1 Component Overview... 1 Database Firewall Deployment Modes... 2 Sizing Hardware Requirements... 2 Database
More informationCOMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE
COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE Complementary technologies provide unique advantages over traditional storage architectures Often seen as competing technologies, Storage Area
More informationOptimizing Backup & Recovery Performance with Distributed Deduplication
Optimizing Backup & Recovery Performance with Distributed Deduplication Using NetVault Backup with EMC DD Boost Written by: Shad Nelson Product Manager Dell Software Executive Summary Backup applications
More informationInformix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11
Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node
More informationMaximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity
Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity task is resuming business critical operations. Having
More informationRedefining Microsoft SQL Server Data Management
Redefining Microsoft SQL Server Data Management Contact Actifio Support As an Actifio customer, you can get support for all Actifio products through the Support Portal at http://support.actifio.com/. Copyright,
More informationVMware Solutions for Small and Midsize Business
SOLUTION BRIEF VMware Solutions for Small and Midsize Business Protect Your Business, Simplify and Save on IT, and Empower Your Employees AT A GLANCE VMware is a leader in virtualization and cloud infrastructure
More informationsecure Agent Secure Enterprise Solutions
secure Agent Secure Enterprise Solutions SecureAgent Software The Secure Data Solution U.S. Patent 7,293,179; European Patent 1669872; and Others Pending Midrange Systems SecureAgent Software 2448 E 81
More informationHP StorageWorks D2D Backup Systems and StoreOnce
AUtOMATEyour data protection. HP StorageWorks D2D Backup Systems and StoreOnce The combination that right-sizes your storage capacity. Solution brief Regardless of size and industry, many of today s organizations
More informationSolution Overview. Business Continuity with ReadyNAS
Business Continuity with ReadyNAS What is ReadyNAS? ReadyNAS is a family of network storage solutions for small and medium businesses, workgroups, and remote/home offices. ReadyNAS delivers unified storage
More informationW H I T E P A P E R. Disaster Recovery Virtualization Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take
W H I T E P A P E R Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take Contents Introduction...1 What is VMware Infrastructure?...1 What is Double-Take?...1 Data Protection
More informationStorage Backup and Disaster Recovery: Using New Technology to Develop Best Practices
Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,
More informationHow To Virtualize A Storage Area Network (San) With Virtualization
A New Method of SAN Storage Virtualization Table of Contents 1 - ABSTRACT 2 - THE NEED FOR STORAGE VIRTUALIZATION 3 - EXISTING STORAGE VIRTUALIZATION METHODS 4 - A NEW METHOD OF VIRTUALIZATION: Storage
More informationNetwork Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
More informationRedbooks Redpaper. IBM TotalStorage NAS Advantages of the Windows Powered OS. Roland Tretau
Redbooks Redpaper Roland Tretau IBM TotalStorage NAS Advantages of the Windows Powered OS Copyright IBM Corp. 2002. All rights reserved. ibm.com/redbooks 1 What is Network Attached Storage (NAS) Storage
More informationIBM Enterprise Linux Server
IBM Systems and Technology Group February 2011 IBM Enterprise Linux Server Impressive simplification with leading scalability, high availability and security Table of Contents Executive Summary...2 Our
More informationActifio Big Data Director. Virtual Data Pipeline for Unstructured Data
Actifio Big Data Director Virtual Data Pipeline for Unstructured Data Contact Actifio Support As an Actifio customer, you can get support for all Actifio products through the Support Portal at http://support.actifio.com/.
More informationAsigra Cloud Backup V13.0 Provides Comprehensive Virtual Machine Data Protection Including Replication
Datasheet Asigra Cloud Backup V.0 Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as the
More informationOracle Database Backup Service. Secure Backup in the Oracle Cloud
Oracle Database Backup Service Secure Backup in the Oracle Cloud Today s organizations are increasingly adopting cloud-based IT solutions and migrating on-premises workloads to public clouds. The motivation
More information