3 3 Introduction Combining the reliability and scalability of the IBM NAS storage and capabilities of Double-Take deliver solutions that: Enhance disaster recovery solutions Provide efficient answers to the shrinking backup window Offer lower Total Cost of Ownership alternatives to growth This paper introduces and explains how the IBM TotalStorage Network Attached Storage (NAS) appliances in conjunction with the replication engine Double-Take can provide a complete solution for enterprise storage networks. The IBM NAS portfolio of products is designed to deliver user value, advanced systems management capabilities and task-optimized operating system technology. The latest portfolio offers several enhancements to earlier product models, including: Enhanced hardware redundancy Improved client performance for Windows and UNIX systems Expanded tape backup capabilities Instant volume- and drive-level data restoration Double-Take is a real-time data replication and failover software product that allows replication of mission-critical data from a production appliance, a.k.a. the source, to a backup appliance, a.k.a. the target. Key Storage Challenges Enterprise and non-enterprise companies are accumulating files and looking for a means to efficiently manage these files. Today, it is not uncommon for a company to have multiple servers with different operating systems and thousands or millions of files scattered across the network. Administering and managing these servers can be a challenge, especially when the IT staff is already overworked. Geographical Dispersion In their quest for efficiency, businesses are becoming more geographically dispersed. Offices commonly cross time zones and employees work varying schedules with the advent of employee-friendly flexible work hours. The result is that the window of time available for administrative tasks, such as backups of the servers, is getting smaller. The shrinking window cannot accommodate the demands of increased storage capacity. Considering that data growth occurs where storage capacity is readily available, such as on any server or storage device, growth is takes place at different locations on the network, almost randomly, making it increasingly difficult for IT to manage the data. Data Protection As seen in recent current events, disaster recovery is an important issue for many businesses, and it is a requirement rather than an option. Businesses that already have a disaster recovery solution are reevaluating their existing plans for adequacy, and many are finding that they are not. As such, many businesses are searching for ways to increase the protection of their data by making their existing solutions disaster proof.
4 4 Time to Recover The need to access more data faster, even when the tape backup technology is advancing rapidly, is constantly becoming more important. For example, the total tape restoration times continue to increase. A typical 50 GB server could be restored in just over 16 hours at a rate of around 50 MB per minute with traditional tape backup technology. Even with the more advanced tape backup technologies, restoration of a 1 TB server at 900 MB per minute, or 52 GB per hour, will take over 19 hours to restore. During this time the data would be unavailable to users, making the minimum amount of time for users to access their data nearly a day. Double-Take Architecture Double-Take uses asynchronous byte-level replication to transfer data, allowing just the file changes to be captured and replicated. This means that if a 10 KB change is made to a 20 MB file, only the 10 KB of changed data is replicated across the network. Unlike synchronous technologies which can actually slow down the production server, the Double-Take replication process has little impact on the network and server resources during replication. On the target side, the data is readily available and accessible. There is no need to mount the volume or run any disk utilities, like checkdisk. Double-Take is a real-time replication engine that captures write operations at the file system level and before the operation is written to disk, it replicates it to the target. Because of where Double-Take resides within the operating system, it even replicates open files, like database files, without the need for an application backup agent. Operating System Double-Take File System Volume Manager Disk Driver Operating System Double-Take File System Volume Manager Disk Driver Double-Take resides at the operating system level and, as files write requests pass through the file system stack, it captures those requests and transmits them to the target. Technology Double-Take is based on the NSI patented Sequential Transfer Asynchronous Replication (STAR) technology:
5 5 Sequential Transfer The replication follows the same write sequence within and across multiple files, providing complete data integrity at all times. Asynchronous Replication A combination of source and target-based queuing capabilities allow the server to continue processing while replication occurs and allows for maximum performance. 1 Write File 1 2 Write File 2 3 Write File 2 4 Write File 2 5 Write File 1 6 Write File 3 7 Write File 2 8 Write File 1 In flight 6 Write File 3 7 Write File 2 8 Write File 1 1 Write File 1 2 Write File 2 3 Write File 2 4 Write File 2 5 Write File Write File 4 The technology utilizes sequenced write-order-preservation when replicating data. This means that data is always written to the target in the same order it is written on the source. By preserving the order of how data is written when it replicates Double-Take avoids the possibility of data corruption. Key Components Double-Take is based on four key components: mirroring, replication, failover, and restoration. The IBM NAS storage is based on Microsoft s Windows 2000 Advanced Server operating system or Windows Powered OS. A NAS storage product is a dedicated server that delivers highperformance, file-level access to network clients through the standard TCP/IP network protocol. Although they are dedicated file servers, the IBM NAS storage provide the same set of integrated scalability, reliability, availability, and management components as general-purpose Windows 2000 based servers. As such, Double-Take may be installed on IBM NAS storage, or a general purpose server, running Windows 2000 or the NAS variant, Windows Powered OS. Mirroring Mirroring is the process of transmitting user-specified data from the source to the target so that an identical copy of data exists on the target. When Double-Take initially performs mirroring, it copies all of the selected data including file attributes and permissions. Double-Take mirrors the data to initially synchronize the production, i.e. and secondary, i.e. servers. A variance of this option is called a partial mirror that allows the servers to synchronize based on individual file block checking and reduces network traffic.
6 6 If subsequent mirroring operations are necessary, Double-Take can mirror specific files or blocks of changed data within files. By mirroring only files that have changed, network administrators can expedite the mirroring of data on the source and target machines. Initial whole file copy Replication Replication is the real-time transmission of file changes. Double-Take s replication process operates at the file system level and is able to track file changes independently from the file s related application. In terms of network resources and time, replicating changes is a more efficient method of maintaining a real-time copy of data than copying an entire file that has changed. Unlike mirroring which is complete when all of the files have been transmitted to the target, replication captures the changes as they are written to the source and sends them to the target continuously. Replication keeps the target up-to-date and synchronized with the source. Replication is based on individual byte-level changes and is real-time. With replication, it is possible to replicate files open by other applications like SQL or Exchange. Replication keeps the target data current with the source. File data update Failover Failover is a process in which a target machine stands in for a failed source machine. As a result, user and application requests that are directed to the failed source machine are routed to the
7 7 target machine. Double-Take monitors the status of machines by tracking network requests and responses exchanged between source and target machines. When a monitored machine misses a user-defined number of requests, Double-Take assumes that the machine has failed. Double- Take then prompts the network administrator to initiate failover, or, if configured, it occurs automatically. When used in data replication capabilities, failover routes user and application requests with minimal disruption and little or no data loss. In some cases, failover may be used without data replication to ensure high availability on a machine that only provides processing services, such as a web server. Failover Restoration Restoration provides an easy method for copying replicated data from the target back to its original location on the source. The process only requires selecting the source, target, and the appropriate replication set. Restoration can be used if the source data is lost due to a disk crash or when the most up-to-date data exists on the target due to failover. File update At the time of a source machine failure, the Double-Take target will contain the same data as the source. If the failover capabilities are employed, then users can continue updating data on the target machine while the problems on the source are resolved. Because of the continued updates on the target, when the source machine is ready to come back online, the two machines will no longer contain the same data. Restoration is the process of copying the up-to-date data from the target back to the original source or new source location when bringing the source back online.
8 8 Data Replication Scenarios Considering the flexibility of Double-Take, many scenarios can be developed to meet a diversity of business needs. These scenarios may be deployed independently or in combination to suit more complex situations. One-to-One A one-to-one scenario contains one target and one source. It can be active/passive where the target is dedicated to supporting one source machine or active/active where both machines are actively replicating. This scenario is appropriate for failover, offsite disaster recovery, and critical data backup, such as Exchange, SQL, and web servers. One-to-Many One source machine sends data to multiple target machines. The target machines may or may not be accessible by one another. This scenario provides offsite disaster recovery, redundant backups, and data distribution. For example, all data can be replicated to a local target machine and a subset of the data can be separately replicated to an offsite disaster recovery machine.
9 9 Many-to One Many source machines are protected by one target machine. This scenario is appropriate for offsite disaster recovery. It is also an excellent choice for providing centralized tape backup because it spreads the cost of one target machine among many source machines. In the case of Microsoft SQL Server, for example, in a one-to-one configuration, the SQL database should be replicated to the same location on the target so that failover is automatic. In a many-to-one configuration, each SQL data store will need to be replicated to a unique location and then renamed to the corresponding SQL directory on the source before failover occurs. Chained A source machine sends replicated data to a target machine, which in turn acts as a source machine, sending selected data to a final target machine, which is often offsite. This is a convenient approach for integrating local high availability with offsite disaster recovery.
10 10 Solutions The following are some applications that, when deployed with NSI Double-Take and IBM NAS appliances or SAN storage products deliver robust, cost efficient solutions for availability, storage consolidation, business continuity and enhanced backup. High Availability Clustering products for the Windows platform improves both availability and manageability to reduce planned and unplanned downtime. Deploying clustering improves the availability of applications by providing failover capability in the event of a hardware or software error. Microsoft Cluster Server (MSCS) supports 2-node failover on Windows 2000 Advanced Server and 4-node failover with Windows Datacenter Server. Double-Take provides a reliable local or remote replication solution for Microsoft clusters. Commonly, MSCS is implemented with both nodes in close physical proximity. In the event of a site disaster, the cluster could be lost. Setting-up with Double-Take a local or remote failover from one cluster to another, protection is available from a site disaster, cluster failure and even routine cluster maintenance. Double-Take supports Active/Active, as well as Active/Passive configurations. The following diagram illustrates a high availability MSCS configuration with Double-Take installed on clustered IBM NAS gateways. Client Client NAS Gateway (node 0) NAS Gateway (node 1) MSCS Active/Active MSCS Active/Active NAS Gateway (node 0) NAS Gateway (node 1) FC Switch FC Switch FC Switch FC Switch RAID Array RAID Array Atlanta Miami
11 11 Storage Consolidation To keep the growing amounts of essential data available, but still keep storage affordable, businesses are looking for ways to better utilize existing resources. To deal with these problems, they are turning to storage consolidation to increase efficiency and save valuable resources. Most businesses have many servers from different vendors, often running different operating systems. Managing these islands of computing in a rapid growth of stored data is difficult to manage and costly. Consolidating storage via storage networking allows bringing together the storage into a centralized, easy-to-manage combined data pool. NAS and Storage Area Networks (SAN) are the established types of storage networks relevant to storage consolidation Double-Take can be used to mirror and replicate the data to the NAS appliance. Once the NAS device is synchronized with the old machines, the cutover period between the old and the new storage devices is reduced.. Business Continuity Restoring data from tape is a common practice when recovering after a disaster. The time to become operational again can be considerable, even with fast tape drives or libraries. With Double-Take, the data is always live and accessible on the target. The common practice for a tape solution is to backup the data nightly. This could potentially allow a window of lost data of an entire business day. Because Double-Take is a real-time replication engine, the data is up-to-date the moment that the production data is lost. Tape
12 12 Enhanced Backup Tape backup can introduce significant overhead to a production server, seriously impacting performance. While the impact of periodic full system backups may be obvious, even nightly incremental backups must walk the file system to examine every file system object and then read any file that has changed in its entirety for backup. Performing this process across a network adds additional overhead as this entire process must happen across the wire. Double-Take can offload the burden of periodic tape backup from multiple production servers to a dedicated backup system and enable centralized backup, thus potentially reducing management cost and improving reliability. Double-Take eliminates the need for a backup agent on the production server because of its interaction with the file system and ability to access files even if they are open. On the target, if a file is being backed up via tape, the changes to that file will be queued automatically and applied once the file is released by the backup process. Summary Using Double-Take with your NAS storage solution can help you overcome many of the business needs of today as well as overcome the storage needs for the future. Double-Take allows a company to utilize their NAS storage more efficiently by empowering you to consolidate data, ignore backup windows, and increase server performance by offloading backup responsibilities.
13 13 International Business Machines Corporation 2002 IBM America Department CNPA PO Box Research Triangle Park NC U.S.A. Printed in the United States 09/02 All rights reserved IBM, the IBM logo, DB2, DB2 Universal Database, eserver logo, Enterprise Storage Server, FlashCopy, ThinkPad, TotalStorage, and xseries are trademarks or registered trademarks of International Business Machines Corporation. Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation in the United States, other countries, or both. Tivoli is a registered trademark of Tivoli Systems, Inc. UNIX is a registered trademark of The Open Group in the United States and other countries. Other product names are trademarks or registered trademarks of their respective companies. This material has not been submitted to any formal IBM test and is published AS IS. It has not been the subject of rigorous review. IBM assumes no responsibility for its accuracy or completeness. The use of this information or the implementation of any of these techniques is a customer responsibility and depends upon the customer s ability to evaluate and integrate them into the customer s operational environment. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm \products should be addressed to the suppliers of those products. References in this information to non-ibm Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part the materials for this IBM product and use of those Web sites is at your own risk. The authors have utilized their professional expertise in preparing this report. However, neither International Business Machines Corporation nor the authors make any representation or warranties with respect to the contents of this report. Rather, this report is provided on an AS IS basis, without warranty, express or implied, INCLUDING A FULL DISCLAIMER OF THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node
Published: March 2004 Abstract With the introduction of Volume Shadow Copy Service (VSS) in Microsoft Windows Server 2003 and Windows Storage Server 2003 and the strength of NSI Software Double-Take you
Data Availability Storage Software Constant Replicator: An Introduction Configurations, Applications and Solutions of Constant Replicator A White Paper A Constant Data Technology Document August 2004 Copyright
W H I T E P A P E R Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take Contents Introduction...1 What is VMware Infrastructure?...1 What is Double-Take?...1 Data Protection
(Formerly Double-Take Backup) An up-to-the-minute copy of branch office data and applications can keep a bad day from getting worse. Double-Take RecoverNow for Windows (formerly known as Double-Take Backup)
Reference Architecture EMC BACKUP-AS-A-SERVICE EMC AVAMAR, EMC DATA PROTECTION ADVISOR, AND EMC HOMEBASE Deliver backup services for cloud and traditional hosted environments Reduce storage space and increase
WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden
Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP
1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate
IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management firstname.lastname@example.org Why Snapshots Are Useful for Backup Faster backups without taking applications
High Availability for Microsoft SQL Server 7.0 Using Double-Take High Availability for Microsoft SQL Server 7.0 Using Double-Take Revision 3.0.0 published July 2003 NSI and Double-Take are registered trademarks
IBM DS5020 Express Manage growth, complexity, and risk with scalable, high-performance storage Highlights Mixed host interfaces support (Fibre Channel/iSCSI) enables SAN tiering Balanced performance well-suited
High Availability for Microsoft SQL Server 2000 Using Double-Take High Availability for Microsoft SQL Server 2000 Using Double-Take Revision 3.0.0 published July 2003 NSI and Double-Take are registered
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE Complementary technologies provide unique advantages over traditional storage architectures Often seen as competing technologies, Storage Area
HP StorageWorks Data Protection Strategy brief Your business depends on IT more than ever before. The availability of key application services and information is critical to maintain business processes,
Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES By: Edward Whalen Performance Tuning Corporation INTRODUCTION There are a number of clustering products available on the market today, and clustering has become
HP ProLiant Storage Server family Radically simple storage The HP ProLiant Storage Server family delivers affordable, easy-to-use network attached storage (NAS) solutions that simplify storage management
White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains
New!! - Higher performance for Windows and UNIX environments The IBM TotalStorage Network Attached Storage Gateway 300 (NAS Gateway 300) is designed to act as a gateway between a storage area network (SAN)
On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions
Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server Double-Take Software, Inc. 257 Turnpike Road; Suite 210 Southborough,
Phone: (603)883-7979 email@example.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous
PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this
Paper SAS1897-2015 Planning for the Worst SAS Grid Manager and Disaster Recovery ABSTRACT Glenn Horton and Doug Haigh, SAS Institute Inc. Many companies use geographically dispersed data centers running
StoneFly TM for ESXi Add StoneFly Storage Concentrator Virtual Machine () to your VMware ESXi Server and the possibilities are endless! Reduce your CapEx and OpEx by optimized utilization of servers and
Contingency Planning and Disaster Recovery Best Practices Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge Date: October 2014 2014 Perceptive Software. All rights reserved Perceptive
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments Non-Native Options for High Availability by Non-Native Options for High Availability... 1 Suitability and Cost...
High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions
Simplifying storage processes and ensuring business continuity and high availability IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity The risks are even greater for companies that
EMC Disk Library with EMC Data Domain Deployment Scenario Best Practices Planning Abstract This white paper is an overview of the EMC Disk Library with EMC Data Domain deduplication storage system deployment
Application Brief: Using Titan for MS Abstract Businesses rely heavily on databases for day-today transactions and for business decision systems. In today s information age, databases form the critical
White Paper HIGHLY AVAILABLE MULTI-DATA CENTER WINDOWS SERVER SOLUTIONS USING EMC VPLEX METRO AND SANBOLIC MELIO 2010 Abstract This white paper demonstrates key functionality demonstrated in a lab environment
This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware
IBM Global Technology Services September 2007 NAS systems scale out to meet Page 2 Contents 2 Introduction 2 Understanding the traditional NAS role 3 Gaining NAS benefits 4 NAS shortcomings in enterprise
Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability
White Paper Backup and Recovery for SAP Environments using EMC Avamar 7 Abstract This white paper highlights how IT environments deploying SAP can benefit from efficient backup with an EMC Avamar solution.
EonStor DS remote replication feature guide White paper Version: 1.0 Updated: Abstract: Remote replication on select EonStor DS storage systems offers strong defense against major disruption to IT continuity,
Dell PowerVault DL Backup to Disk Appliance Powered by CommVault Centralized data management for remote and branch office (Robo) environments Contents Executive summary Return on investment of centralizing
EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is
Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &
Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail
CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering
Whitepaper - Disaster Recovery with StepWise Copyright Invizion Pty Ltd. All rights reserved. First Published October, 2010 Invizion believes the information in this publication is accurate as of its publication
Microsoft Corporation & Dell Using Network Attached Storage for Reliable Backup and Recovery Microsoft Corporation Published: July 2003 Abstract Tape-based backup and restore technologies have for decades
White Paper EMC MID-RANGE STORAGE AND THE MICROSOFT SQL SERVER I/O RELIABILITY PROGRAM Abstract This white paper explains the integration of EMC Mid-range Storage arrays with the Microsoft SQL Server I/O
IBM Storage Manager for Virtual Environments Non-disruptive backup and instant recovery: Simplified and streamlined Highlights Simplify management of the backup and restore process for virtual machines
Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS
Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1
Backups in the Cloud Ron McCracken IBM August 8, 2011 Session 9844 Legal Information The following are trademarks of the International Business Machines Corporation in the United States and/or other countries.
IBM TotalStorage IBM TotalStorage Virtual Tape Server A powerful tape storage system that helps address the demanding storage requirements of e-business storag Storage for Improved How can you strategically
WHITE PAPER: Leveraging the Cloud for Data Protection and Disaster Recovery Leveraging the Cloud for Data Protection and Disaster Recovery Bennett Klein DATA MANAGEMENT CUSTOMER SOLUTIONS MARCH 2012 Table
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
Site-Wide Disaster Recovery and Business Continuity Solutions Enterprises need an effective disaster recovery and business continuity plan to safeguard critical business processes. This article presents
IBM Tivoli Storage Manager Suite for Unified Recovery Comprehensive data protection software with a broad choice of licensing plans Highlights Optimize data protection for virtual servers, core applications
IBM Software Thought Leadership White Paper September 2010 Effective storage management and data protection for cloud computing Protecting data in private, public and hybrid environments 2 Effective storage
Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations
DATASHEET VERITAS Storage Foundation 4.3 for Windows Advanced Volume Management Technology for Windows In distributed client/server environments, users demand that databases, mission-critical applications
IBM Rational SCM solutions for distributed development August 2004 Successfully managing geographically distributed development Karen Wade SCM Product Marketing Manager IBM Software Group Page 2 Contents
Active-Active and High Availability Advanced Design and Setup Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge, R&D Date: July 2015 2015 Perceptive Software. All rights reserved. Lexmark
The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview
W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication
VERITAS Volume Replicator in an Oracle Environment Introduction Remote replication of online disks and volumes is emerging as the technique of choice for protecting enterprise data against disasters. VERITAS
WHITE PAPER Intelligent Disaster Recovery VERITAS Backup Exec 9.1 for Windows Servers Intelligent Disaster Recovery Option 11/20/2003 1 TABLE OF CONTENTS Introduction...3 Solution: Point-in-Time Disaster
Eight Considerations for Evaluating Disk-Based Backup Solutions 1 Introduction The movement from tape-based to disk-based backup is well underway. Disk eliminates all the problems of tape backup. Backing
Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
WHITE PAPER: DATA PROTECTION Veritas NetBackup for Microsoft Exchange Server Solution Guide Bill Roth January 2008 White Paper: Veritas NetBackup for Microsoft Exchange Server Solution Guide Content 1.
IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical
VIRTUALIZATION TECHNOLOGIES AND THEIR IMPACT ON DISASTER RECOVERY PLANNING BUSINESS VALUE WHITEPAPER Double-Take Software, Inc. Published: April 2007 Abstract Virtual server technologies provide companies
Remote Site Business Continuity with Syncsort XRS White Paper bex30101907wprs-xrs Remote Site Business Continuity with Syncsort XRS Introduction As companies increasingly migrate to distributed business
an introduction to networked storage How networked storage can simplify your data management The key differences between SAN, DAS, and NAS The business benefits of networked storage Introduction Historical
Side Bar Copy Header Title Why Header Real-Time Title Replication Is Better Than Periodic Replication A Technical Overview WHITEPAPER Table of Contents Introduction...1 Today s IT Landscape...2 What Replication
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology (IJCET), ENGINEERING ISSN 0976-6367(Print), ISSN 0976 & 6375(Online) TECHNOLOGY Volume 4, Issue (IJCET) 3,
WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS
SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted
WHITE PAPER Citrix XenApp High Availability for Citrix XenApp Enhancing XenApp Availability with NetScaler Reference Architecture www.citrix.com Contents Contents... 2 Introduction... 3 Desktop Availability...
IBM Global Technology Services IBM SmartCloud IBM SmartCloud Virtualized Server Recovery i The case for cloud-based disaster recovery Cloud technologies help meet the need for quicker restoration of service