17609: Continuous Data Protection Transforms the Game
|
|
- Ursula Brown
- 8 years ago
- Views:
Transcription
1 17609: Continuous Data Protection Transforms the Game Wednesday, August 12, 2015: 8:30 AM-9:30 AM Southern Hemishere 5 (Walt Disney World Dolhin) Tony Negro - EMC Rebecca Levesque 21 st Century Software
2 About the Seakers Rebecca M. Levesque is Chief Executive Officer of 21st Century Software and resonsible for shaing the comany s roduct strategy and vision. She has over 20 years exerience heling hundreds of comanies establish resiliency and recoverability strategies from any disrutive event. Tony Negro is currently a Cororate Systems Engineer in the Core Technologies Division of EMC Cororation. As a technical resource for VMAX and Mainframe Business Unit, Tony rovides in-deth roduct consulting to customers as well as Field Sales teams worldwide. About this Session Near Continuous Data Protection (CDP) is ossible but alication failover/high availability aroaches cannot guarantee batch data consistency and integrity rotection when disrutive events strike. If an unlanned outage occurs, does it matter whether it s an oerational event or disaster? When minutes count and you have multile coies and intertwined deendencies, how do you know which coy to use? This session rovides insight into what is needed, ossible, and attainable. 2
3 As We Begin Today, Consider This After a trio of high rofile outages, some industry analysts raised the question of whether such outages are inevitable in today s IT environment? Phone comanies used to offer % reliability, which allowed for about five minutes of downtime a year. Today s networks are far less exensive, infinitely more caable and nowhere near as reliable. The NYSE outage lasted about four hours, or nearly 50 years of allowable downtime using the five nines standard. Today s reliability roblems are a reflection of the comlexity and interdeendency of comuter systems, the ace of change, and insufficient organizational and cultural ractices. Information courtesy of Continuity Software 8/17/2015 3
4 Interesting Facts 71% of all Fortune 500 comanies have their core business on the mainframe 23 of the world s to 25 retailers use a mainframe 92% of the to 100 banks use a mainframe 10 out of 10 of the to insurers use a mainframe More than 225 state and local governments worldwide rely on a mainframe 9 of the to 10 global life and health insurance roviders rocess their highvolume transactions on mainframe From Enterrise Systems magazine July /17/2015 4
5 Coies how many? Which one is needed? More storage? Didn t we just buy for the next 3 years? I use built-in backus no one understands my a. Full volume, incrementals, sna, relication we ve got it covered! Comliance, audits, resource constraints does DR have the data? 8/17/2015 5
6 Faster RPO Made Possible through Evolution of Backu Surveys show organizations want a faster recovery oint objective (RPO) and recovery time objective (RTO) from their IT teams. It wasn't until backu roducts evolved to meet those windows that it became ossible. The study indicated that most users exect to recover crucial alications in faster than two hours, while most IT staffers said they cannot deliver recovery sooner than four hours. To meet these tighter RPO and RTO windows requires that secondary data be ositioned in a way that allows the alication to access it faster. Information courtesy of George Crum 8/17/2015 6
7 The State of Backu Organizations are seeking ways to easily, quickly and costeffectively ensure data is aroriately rotected Backu and recovery is one of the oldest and most frequently erformed data center oerations Data rotection aroaches of the ast may no longer suffice in meeting current much less future recovery requirements Adoting new technologies and roducts show an increased willingness to augment or even comletely switch backu/ recovery roviders to meet increasing service-level needs From Gartner Magic Quadrant Enterrise Backu June,
8 Why the gas, what goes wrong? Checkoints of consistent states are used to enable raid recovery to known good states (such as before a atch was alied to an OS, or the last time a database was reorganized) to ensure alication consistency of the data and to minimize the number of log transactions that must be alied. What if you don t have logs and journals batch? Have good data but it is not in sync with other alication deendencies (rile effect) Have too much good data which do I use? Frequent snashots alone do not equate to near CDP - achieving 100% or near-100% availability requires a to-down aroach into engineering availability into the alication, infrastructure and oerating architectures. (Gartner, 2014) 8/17/2015 8
9 Backu Challenges & CDP Definition Continuous data rotection (CDP) is an aroach to recovery that continuously, or nearly continuously, catures and transmits changes to files or blocks of data while journaling these changes. This caability rovides the otion to recover to many more-granular oints in time to minimize data loss, and enables arbitrary recovery oints. Some CDP solutions can be configured to cature data either continuously (true CDP) or at scheduled times (near-cdp). The difference between near-cdp and regular backu is that backu is tyically erformed once a day, whereas near CDP is often done every few minutes or hours, roviding many more recovery otions and minimizing any otential data loss CDP can relace traditional backu, but in most testing scenarios it's only as good as your ability to get backed u data off-site. 8/17/2015 9
10 The Perfect World Customers Transactions ATM Online Commerce Claims Bill Pay Web as Data Data Data Financia l as Customer data Network, As, Servers, Mainframe, Storage Synchronous Relication Asynchronous Relication Fourth Coy Production
11 The Real World Customers Transactions ATM Online Commerce Claims Bill Pay Web as Data Batch data doesn t write until job finishes Data Cross-deendencies on comleted batch jobs become exosure to the business Data Financia l as Customer data Network, As, Servers, Mainframe, Storage Production Synchronous Relication Asynchronous Relication Fourth Coy
12 Batch Deendency Problem From htt:// 12
13 Understanding Data Consistency: The Deendent I/O Concet An alication concet where the start of one write is deendent on the comletion of a revious write A logical deendency, not a time deendency Examles Data base & log Catalogs, Volume Table of Contents Index & data comonents A A A A A A A A A A A A A A A A
14 The Deendent I/O Concet Works great for DBMS across the Enterrise What can be done about logical corrution? What can be done for BATCH cycle? Point-in-time coies (checkoints) 8/17/
15 Today s Gas - Physical vs Logical Existing solution addresses the hysical risk Multile coies continuous and oint in time Planned and Unlanned outage events EVERYTHING gets relicated Even the logical corrutions! Many sites use u to 2 additional full Point in Time (PIT) coies Coy 1: near real time (minutes behind) Coies 2 and 3: new PIT created every 12 hours 24 hours to find corrution U to 24 hours of data loss DC3 Asynchronous DC2 DC1
16 What is needed from a solution? Recovery from loss of data integrity Provides a more granular level of alication recovery from unintended changes to data stemming from Processing error Malicious intent Human error Solutions that focus on the logical Continuous oint in time coies Selectable recovery oints Automation Brings PIT recovery caability to non-database systems Provides alications with recovery caability when not designed-in Provides cross-alication recovery oint 8/17/
17 Secific Requirements from the Array Underlying technologies Easily manage many data coies Reduce imact Target-less SNAPSHOTS Increased agility Multile (~256) Snashots er source Ease of use User-defined name/version number Automatic exiration if desired Sna entire Storage Grou in single command Consistent scale (>20,000 volumes) 8/17/
18 What is needed from Automation side Recovery from loss of data integrity Host automation Execute locally or remotely No Asynchronous RPO imact Restore to Secondary from any snashot Create indeendent DR test coy Frequent creation/deletion of snashots Fast logical corrution recovery Requirements Granularity of minutes Select snashots to LINK by timestam Sace Considerations, monitoring, reorting Legacy systems/alication, batch will not be re-engineered from the to down 8/17/
19 Versioning Snashots with Alication Awareness Alication Table Source Devices JES exit to intelligently tag Snashots on behalf of alication Batch Job Inventory Backu Table Target Devices SNAPSHOT API LINK / UNLINK Snashots Original jobs stes / rocess Host volume Legend Timeline (minutes)
20 Restoration and Simulation Recover to a job or ste level from reviously snaed data Invokes data mover to recover the data necessary to reinitiate comromised job Recovery rocess driven through ISPF interface Simulation of the recovery identifies exosures in the recovery of alication(s) or entire environment Ability to run what if scenarios at any time are critical in a world of SLA s that must be met 20 20
21 Summary When downtime and continuous comuting is required fault-tolerant raid recovery alication environments are needed. With mainframes this includes both transactional and batch rocessing. Alications and databases have advanced transaction recovery features, but batch jobs resent a different roblem. For continuous comuting in mainframe environments continuous rotection of batch rocessing systems can also be required. Possibilities exist to achieve a more granular overall recovery than we know today Lines have blurred between oerational, disaster, or synergy between the next generation controller based snashots and intelligent host based automation is needed to bring near-cdp to mainframe alications 8/17/
22 Thank you! Rebecca Levesque Tony Negro
Achieving Disaster Recovery Success
Achieving Disaster Recovery Success Ros Schulman Hitachi Data Systems Technical Track, Session March, 0 :-:m About the Seakers Ros Schulman is Director, Data Protection at Hitachi Data Systems with over
More informationFDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES
Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents
More information17573: Availability and Time to Data How to Improve Your Resiliency and Meet Your SLAs
17573: Availability and Time to Data How to Improve Your Resiliency and Meet Your SLAs Ros Schulman Hitachi Data Systems Rebecca Levesque 21st Century Software August 13, 2015 10-11:00 am Southern Hemisphere
More informationStorage Basics Architecting the Storage Supplemental Handout
Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it
More informationSage Timberline Office
Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User
More informationAn important observation in supply chain management, known as the bullwhip effect,
Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National
More informationCitrix NetScaler and Citrix XenDesktop 7 Deployment Guide
Citrix NetScaler and Citrix XenDeskto 7 Deloyment Guide 2 Table of contents Executive summary and document overview 3 1. Introduction 3 1.1 Overview summary 3 2. Architectural overview 4 2.1 Physical view
More informationThe Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss
More informationSage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist
I Planning Guide The HR Software Buyer s Guide and Checklist Table of Contents Introduction... 1 Recent Trends in HR Technology... 1 Return on Emloyee Investment Paerless HR Workflows Business Intelligence
More informationFinding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network
Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs
More informationWeb Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State
Pay tream A D V I S O R S WHITE PAPER Web Inv Web Invoicing Strategic Imact of AP Automation What s Inside Inefficiencies in Current State Key Drivers for Automation Web Invoicing Comonents New Automation
More informationBravo Software Group e.commerce enablers... 2 RemoteDesk... 4
Table of Contents Bravo Software Grou e.commerce enablers... 2 RemoteDesk... 4 A suite of roducts for entering orders or invoices remotely, for direct osting to your central accounting system. RemoteDesk
More informationDrinking water systems are vulnerable to
34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental
More informationEvaluating a Web-Based Information System for Managing Master of Science Summer Projects
Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk
More informationMicrosoft Exchange 2013 Citrix NetScaler Deployment Guide
Microsoft Exchange 2013 Citrix NetScaler 2 Table of contents What s new in Microsoft Exchange 2013 3 Exchange 2013 Architecture 3 Load Balancing Exchange 2013 5 Lync and SharePoint integration 6 Mobility
More informationShareFile Enterprise: Security Whitepaper
ShareFile Enterrise: 2 Table of contents Introduction 4 SaaS alication tier 5 ShareFiles servers: Web, API, and database overview 5 SaaS alication tier security 6 Encrytion 6 Hash-based message authentication
More informationENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science
More informationBUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g
BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g ENABLED BY EMC VMAX 10K AND EMC RECOVERPOINT Technical Presentation EMC Solutions Group 1 Agenda Business case Symmetrix VMAX 10K overview RecoverPoint
More informationfor UK industrial and scientific companies managed by Business Marketing Online
for UK industrial and scientific comanies managed by Business Marketing Online This is a Google AdWords advertisement and so is this... and so is this......advertising with Google Adwords is now essential.
More informationManaging specific risk in property portfolios
Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading
More informationAn Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems
The International ournal of Soft Comuting and Software Engineering [SCSE], Vol., No., Secial Issue: The Proceeding of International Conference on Soft Comuting and Software Engineering 0 [SCSE ], San Francisco
More informationModule: Business Continuity
Upon completion of this module, you should be able to: Describe business continuity and cloud service availability Describe fault tolerance mechanisms for cloud infrastructure Discuss data protection solutions
More informationWhere you are Where you need to be How you get there Market Intelligence Competitive Insights Winning Strategies
Where you are Where you need to be How you get there Market Intelligence Cometitive Insights Winning Strategies The industrial and B2B market research and strategy firm Dominate Your Markets Whether you
More informationElectronic Commerce Research and Applications
Electronic Commerce Research and Alications 12 (2013) 246 259 Contents lists available at SciVerse ScienceDirect Electronic Commerce Research and Alications journal homeage: www.elsevier.com/locate/ecra
More informationSage Document Management. User's Guide Version 13.1
Sage Document Management User's Guide Version 13.1 This is a ublication of Sage Software, Inc. Version 13.1 Last udated: June 19, 2013 Coyright 2013. Sage Software, Inc. All rights reserved. Sage, the
More informationX How to Schedule a Cascade in an Arbitrary Graph
X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network
More informationSage Document Management. User's Guide Version 12.1
Sage Document Management User's Guide Version 12.1 NOTICE This is a ublication of Sage Software, Inc. Version 12.1. November, 2012 Coyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage
More informationBackup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
More informationCRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS
Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The
More informationLocal Connectivity Tests to Identify Wormholes in Wireless Networks
Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de
More informationEMC NETWORKER SNAPSHOT MANAGEMENT
White Paper Abstract This white paper describes the benefits of NetWorker Snapshot Management for EMC Arrays. It also explains the value of using EMC NetWorker for snapshots and backup. June 2013 Copyright
More informationContinuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs
EMC RECOVERPOINT FAMILY Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs ESSENTIALS EMC RecoverPoint Family Optimizes RPO
More informationCorporate Compliance Policy
Cororate Comliance Policy English Edition FOREWORD Dear Emloyees, The global nature of Bayer s oerations means that our activities are subject to a wide variety of statutory regulations and standards
More informationTitle: Stochastic models of resource allocation for services
Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, ralhb@vt.edu Phone : (54) 231-7688,
More informationconstruction eal estate health onstruction hospitality energyy healthcare infra PRACTICE AREAS IMPARTIAL. THOROUGH. EXPERIENCED.
PRACTICE AREAS Real Estate. INTECH s early days in Risk Management were centred around suorting the Real Estate industry. Since then, we have continued to build our team of exerts, knowledge and techniques
More informationA Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm
International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This
More informationSage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software
I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll
More informationThe Online Freeze-tag Problem
The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,
More informationTotal Data Protection for your business
A platform to empower your business C Y K C K C K Total Data Protection for your business Protecting business data No matter where it lives At Breakwater we understand the importance of a dependable, extremely
More informationMemory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs
Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems
More informationAchieve Continuous Computing for Mainframe Batch Processing. By Hitachi Data Systems and 21st Century Software
Achieve Continuous Computing for Mainframe Batch Processing By Hitachi Data Systems and 21st Century Software February 2016 Contents Executive Summary... 2 Introduction... 3 Difficulties in Recovering
More informationIEEM 101: Inventory control
IEEM 101: Inventory control Outline of this series of lectures: 1. Definition of inventory. Examles of where inventory can imrove things in a system 3. Deterministic Inventory Models 3.1. Continuous review:
More informationwith VMware vsphere 5.1 (ESXi)
Scaling XenDeskto 7 to 5,000 users with VMware vshere 5.1 (ESXi) Citrix Solutions Lab Validated Solutions Design Guide 2 Table of contents Contents Citrix XenDeskto 7 6 Executive Summary 7 Project overview
More informationWeb Application Scalability: A Model-Based Approach
Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research
More informationEliminating End User and Application Downtime:
Eliminating End User and Application Downtime: Architecting the Right Continuous Availability and Disaster Recovery Environment March 2010 Table of Contents Introduction 3 Where to Start 3 Moving to Continuous
More informationHigh Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach
High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many
More informationProject Management and. Scheduling CHAPTER CONTENTS
6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method
More informationLeveraging Virtualization for Disaster Recovery in Your Growing Business
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
More informationCOST CALCULATION IN COMPLEX TRANSPORT SYSTEMS
OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information
More informationIETF 94 - NMRG 38 meeting Intent Based Network Modeling (IBNEMO) Bert Wijnen
IETF 94 - NMRG 38 meeting Intent Based Network Modeling (IBNEMO) Bert Wijnen 1 Ga between APP and Network APP wants A connection between two sites APP doesn t want Configurations of each device between
More informationTime-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes
Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal
More informationA Novel Architecture Style: Diffused Cloud for Virtual Computing Lab
A Novel Architecture Style: Diffused Cloud for Virtual Comuting Lab Deven N. Shah Professor Terna College of Engg. & Technology Nerul, Mumbai Suhada Bhingarar Assistant Professor MIT College of Engg. Paud
More informationFailure Behavior Analysis for Reliable Distributed Embedded Systems
Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of
More informationSMALL BUSINESS GRANTS PROGRAM GUIDELINES
SMALL BUSINESS GRANTS PROGRAM GUIDELINES S GARTON STREET Small Business Grants Program Suorting our community The City of Melbourne offers a wide range of grants and sonsorshi oortunities to suort the
More informationToday s Agile, Complex and Heterogeneous Data Centers
Managing PRESENTATION Backup TITLE and GOES Recovery HERE in Today s Agile, Complex and Heterogeneous Data Centers Maria Pressley, Chief Evangelist Unitrends Gene Nagle, Vice President Technical Services
More informationComparing Dissimilarity Measures for Symbolic Data Analysis
Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,
More informationBusiness Life Insurance 18.5 - 12.1.1
Changing Nothing Risks Everything. The New Style of IT demands a new approach to Backup, Recovery and Archive Bill Philbin VP Data Protection & Retention, Software Defined Storage HP Storage, Enterprise
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article aeared in a journal ublished by Elsevier. The attached coy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution
More information457 DEFERRED COMPENSATION PLAN EMERGENCY WITHDRAWAL PACKET
457 DEFERRED COMPENSATION PLAN EMERGENCY WITHDRAWAL PACKET This booklet contains the following forms: 457 Deferred Comensation Plan Emergency Withdrawal Form 457 Deferred Comensation Plan Emergency Withdrawal
More informationDEFINING THE RIGH DATA PROTECTION STRATEGY
DEFINING THE RIGH DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions By Cindy LaChapelle, Principal Consultant, ISG www.isg-one.com INTRODUCTION Most organizations have traditionally
More informationNUTSS: A SIP-based Approach to UDP and TCP Network Connectivity
NUTSS: A SIP-based Aroach to UDP and TCP Network Connectivity Saikat Guha Det. of Comuter Science Cornell University Ithaca, NY 14853 saikat@cs.cornell.edu Yutaka Takeda Panasonic Communications San Diego,
More informationRummage Web Server Tuning Evaluation through Benchmark
IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.
More informationSOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY
SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY Among the priorities for efficient storage management is an appropriate protection architecture. This paper will examine how to architect storage
More informationImplementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer
4 th International Conference on Industrial Engineering and Industrial Management IV Congreso de Ingeniería de Organización Donostia- an ebastián, etember 8 th - th Imlementation of tatistic Process Control
More informationFrom Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling
From to Exeriment: A Case Study on Multirocessor Task Scheduling Sascha Hunold CNRS / LIG Laboratory Grenoble, France sascha.hunold@imag.fr Henri Casanova Det. of Information and Comuter Sciences University
More informationEMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
More informationSQL Server Storage Best Practice Discussion Dell EqualLogic
SQL Server Storage Best Practice Discussion Dell EqualLogic What s keeping you up at night? Managing the demands of a SQL environment Risk Cost Data loss Application unavailability Data growth SQL Server
More informationThe Benefits of Virtualization for Your DR Plan
E-Guide The Benefits of Virtualization for Your DR Plan Server virtualization is making a positive impact in the area of disaster recovery. Through virtualization, organizations can save money, as well
More informationProtecting Microsoft Hyper-V 3.0 Environments with CA ARCserve
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while
More informationThe risk of using the Q heterogeneity estimator for software engineering experiments
Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for
More informationVirtual Disaster Recovery
Virtual Disaster Recovery White Paper September 16, 2008 Kelly Laughton Davenport Group Consultant Davenport Group 2008. All rights reserved. Introduction Today s data center has evolved into a complex,
More informationRisk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7
Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk
More informationSecure synthesis and activation of protocol translation agents
Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see
More informationLearning Human Behavior from Analyzing Activities in Virtual Environments
Learning Human Behavior from Analyzing Activities in Virtual Environments C. BAUCKHAGE 1, B. GORMAN 2, C. THURAU 3 & M. HUMPHRYS 2 1) Deutsche Telekom Laboratories, Berlin, Germany 2) Dublin City University,
More informationLunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar
Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar Kevin Horn Principal Product Manager Enterprise Data Protection Solutions March
More informationSolving Your Big Data Problems with Fast Data (Better Decisions and Instant Action)
Solving Your Big Data Problems with Fast Data (Better Decisions and Instant Action) Does your company s integration strategy support your mobility, big data, and loyalty projects today and are you prepared
More informationConcurrent Program Synthesis Based on Supervisory Control
010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract
More informationMigration to Object Oriented Platforms: A State Transformation Approach
Migration to Object Oriented Platforms: A State Transformation Aroach Ying Zou, Kostas Kontogiannis Det. of Electrical & Comuter Engineering University of Waterloo Waterloo, ON, N2L 3G1, Canada {yzou,
More informationThings You Need to Know About Cloud Backup
Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing
More informationContinuous Data Protection
Continuous Data Protection CDP: A State Analysis A Tutorial created and presented by: David Hill & Dan Tanner Mesabi Group LLC (Hill) ProgresSmart (Tanner) Storage World Conference 2005, Mesabi Group LLC.,
More informationFive Secrets to SQL Server Availability
Five Secrets to SQL Server Availability EXECUTIVE SUMMARY Microsoft SQL Server has become the data management tool of choice for a wide range of business critical systems, from electronic commerce to online
More informationRedefining Oracle Database Management
Redefining Oracle Database Management Actifio PAS Specification A Single Solution for Backup, Recovery, Disaster Recovery, Business Continuity and Rapid Application Development for Oracle. MAY, 2013 Contents
More informationBeyond Traditional Disaster Recovery Goals Augmenting the Recovery Consistency Characteristics
Beyond Traditional Disaster Recovery Goals Augmenting the Recovery Consistency Characteristics Octavian Paul ROTARU American Sentinel University Octavian.Rotaru@ACM.org Abstract For most organizations
More informationDevOps and Container Security
DevOs and Container Security Mike Bartock IT Secialist NIST Paul Cichonski Cloud Architect Lanco John Morello Chief Technology Officer Twistlock Raghu Yeluri Princial Engineer Intel Certain commercial
More informationForensic Science International
Forensic Science International 214 (2012) 33 43 Contents lists available at ScienceDirect Forensic Science International jou r nal h o me age: w ww.els evier.co m/lo c ate/fo r sc iin t A robust detection
More informationDAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON
DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad
More informationFluent Software Training TRN-99-003. Solver Settings. Fluent Inc. 2/23/01
Solver Settings E1 Using the Solver Setting Solver Parameters Convergence Definition Monitoring Stability Accelerating Convergence Accuracy Grid Indeendence Adation Aendix: Background Finite Volume Method
More informationNew Approaches to Idea Generation and Consumer Input in the Product Development
New roaches to Idea Generation and Consumer Inut in the Product Develoment Process y Olivier Toubia Ingénieur, Ecole Centrale Paris, 000 M.S. Oerations Research, Massachusetts Institute of Technology,
More informationOmgeo. Omgeo Deploys EMC Multi-Regional Business Continuity Solution SOLUTION SNAPSHOT. Customer Focus on Business Continuity
Omgeo Omgeo Deploys EMC Multi-Regional Business Continuity Solution SOLUTION SNAPSHOT Omgeo has replicated all trade data across multiple data centers spanning more than 1,000 miles in New York, Boston,
More informationWhite Paper. 1 800 FASTFILE / www.ironmountain.ca Page 1
White Paper LIVEVAULT Top 10 Reasons for Using Online Server Backup and Recovery Introduction Backup of vital company information is critical to a company s survival, no matter what size the company. Recent
More informationFIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012
FIrch Worksho Brussels 22 nd February 2012 Towards Future Internet rchitecture lex Galis University College London a.galis@ee.ucl.ac.uk www.ee.ucl.ac.uk/~agalis FIrch Worksho Brussels 22 nd February 2012
More informationRajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747
Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Introduction Rajesh Gupta - rajgupta@deloitte.com Solution Network
More informationPerforce Backup Strategy & Disaster Recovery at National Instruments
Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir National Instruments Perforce User Conference April 2005-1 - Contents 1. Introduction 2. Development Environment 3. Architecture
More information401K Plan. Effective January 1, 2014
401K Plan Effective January 1, 2014 Summary Plan Descrition Particiation...2 Contributions...2 Disabled Particiants...4 Definition of Comensation...4 Legal Limits on Contributions...4 Enrollment...5 Investment
More informationBreakthrough Data Recovery for IBM AIX Environments
TECHNICAL ISSUES Best Practices in Availability. Breakthrough Data Recovery for IBM AIX Environments How New Technologies Are Making Data Protection, Recovery and High Availability Easier and More Affordable
More informationWebinar: Modern Data Protection For Next-Gen Apps and Databases
Enterprise Strategy Group Getting to the bigger truth. Webinar: Modern Data Protection For Next-Gen Apps and Databases Nik Rouda, Senior Analyst, ESG Group Tarun Thakur, Co-Founder and CEO, Datos IO Speakers
More informationRETAIL INDUSTRY. Shaping the Customer s Experience: How Humans Drive Retail Sales in a Ferocious Economy
RETAIL INDUSTRY Shaing the Customer s Exerience: How Humans Drive Retail Sales in a Ferocious Economy Who Energizes Customer Exerience Management? Senior Executives define the retail strategy with strategic
More informationWHITE PAPER Overview of Data Replication
Overview of Data Replication 1 Abstract Replication is the process of making a copy of something, or of creating a replica. In different contexts, such as art (copies of a painting), bioscience (cloning),
More informationEMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise
EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise ESSENTIALS Easy-to-use, single volume, single file system architecture Highly scalable with
More informationDisaster Recovery for Oracle Database
Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches
More information