17609: Continuous Data Protection Transforms the Game

Size: px
Start display at page:

Download "17609: Continuous Data Protection Transforms the Game"

Transcription

1 17609: Continuous Data Protection Transforms the Game Wednesday, August 12, 2015: 8:30 AM-9:30 AM Southern Hemishere 5 (Walt Disney World Dolhin) Tony Negro - EMC Rebecca Levesque 21 st Century Software

2 About the Seakers Rebecca M. Levesque is Chief Executive Officer of 21st Century Software and resonsible for shaing the comany s roduct strategy and vision. She has over 20 years exerience heling hundreds of comanies establish resiliency and recoverability strategies from any disrutive event. Tony Negro is currently a Cororate Systems Engineer in the Core Technologies Division of EMC Cororation. As a technical resource for VMAX and Mainframe Business Unit, Tony rovides in-deth roduct consulting to customers as well as Field Sales teams worldwide. About this Session Near Continuous Data Protection (CDP) is ossible but alication failover/high availability aroaches cannot guarantee batch data consistency and integrity rotection when disrutive events strike. If an unlanned outage occurs, does it matter whether it s an oerational event or disaster? When minutes count and you have multile coies and intertwined deendencies, how do you know which coy to use? This session rovides insight into what is needed, ossible, and attainable. 2

3 As We Begin Today, Consider This After a trio of high rofile outages, some industry analysts raised the question of whether such outages are inevitable in today s IT environment? Phone comanies used to offer % reliability, which allowed for about five minutes of downtime a year. Today s networks are far less exensive, infinitely more caable and nowhere near as reliable. The NYSE outage lasted about four hours, or nearly 50 years of allowable downtime using the five nines standard. Today s reliability roblems are a reflection of the comlexity and interdeendency of comuter systems, the ace of change, and insufficient organizational and cultural ractices. Information courtesy of Continuity Software 8/17/2015 3

4 Interesting Facts 71% of all Fortune 500 comanies have their core business on the mainframe 23 of the world s to 25 retailers use a mainframe 92% of the to 100 banks use a mainframe 10 out of 10 of the to insurers use a mainframe More than 225 state and local governments worldwide rely on a mainframe 9 of the to 10 global life and health insurance roviders rocess their highvolume transactions on mainframe From Enterrise Systems magazine July /17/2015 4

5 Coies how many? Which one is needed? More storage? Didn t we just buy for the next 3 years? I use built-in backus no one understands my a. Full volume, incrementals, sna, relication we ve got it covered! Comliance, audits, resource constraints does DR have the data? 8/17/2015 5

6 Faster RPO Made Possible through Evolution of Backu Surveys show organizations want a faster recovery oint objective (RPO) and recovery time objective (RTO) from their IT teams. It wasn't until backu roducts evolved to meet those windows that it became ossible. The study indicated that most users exect to recover crucial alications in faster than two hours, while most IT staffers said they cannot deliver recovery sooner than four hours. To meet these tighter RPO and RTO windows requires that secondary data be ositioned in a way that allows the alication to access it faster. Information courtesy of George Crum 8/17/2015 6

7 The State of Backu Organizations are seeking ways to easily, quickly and costeffectively ensure data is aroriately rotected Backu and recovery is one of the oldest and most frequently erformed data center oerations Data rotection aroaches of the ast may no longer suffice in meeting current much less future recovery requirements Adoting new technologies and roducts show an increased willingness to augment or even comletely switch backu/ recovery roviders to meet increasing service-level needs From Gartner Magic Quadrant Enterrise Backu June,

8 Why the gas, what goes wrong? Checkoints of consistent states are used to enable raid recovery to known good states (such as before a atch was alied to an OS, or the last time a database was reorganized) to ensure alication consistency of the data and to minimize the number of log transactions that must be alied. What if you don t have logs and journals batch? Have good data but it is not in sync with other alication deendencies (rile effect) Have too much good data which do I use? Frequent snashots alone do not equate to near CDP - achieving 100% or near-100% availability requires a to-down aroach into engineering availability into the alication, infrastructure and oerating architectures. (Gartner, 2014) 8/17/2015 8

9 Backu Challenges & CDP Definition Continuous data rotection (CDP) is an aroach to recovery that continuously, or nearly continuously, catures and transmits changes to files or blocks of data while journaling these changes. This caability rovides the otion to recover to many more-granular oints in time to minimize data loss, and enables arbitrary recovery oints. Some CDP solutions can be configured to cature data either continuously (true CDP) or at scheduled times (near-cdp). The difference between near-cdp and regular backu is that backu is tyically erformed once a day, whereas near CDP is often done every few minutes or hours, roviding many more recovery otions and minimizing any otential data loss CDP can relace traditional backu, but in most testing scenarios it's only as good as your ability to get backed u data off-site. 8/17/2015 9

10 The Perfect World Customers Transactions ATM Online Commerce Claims Bill Pay Web as Data Data Data Financia l as Customer data Network, As, Servers, Mainframe, Storage Synchronous Relication Asynchronous Relication Fourth Coy Production

11 The Real World Customers Transactions ATM Online Commerce Claims Bill Pay Web as Data Batch data doesn t write until job finishes Data Cross-deendencies on comleted batch jobs become exosure to the business Data Financia l as Customer data Network, As, Servers, Mainframe, Storage Production Synchronous Relication Asynchronous Relication Fourth Coy

12 Batch Deendency Problem From htt:// 12

13 Understanding Data Consistency: The Deendent I/O Concet An alication concet where the start of one write is deendent on the comletion of a revious write A logical deendency, not a time deendency Examles Data base & log Catalogs, Volume Table of Contents Index & data comonents A A A A A A A A A A A A A A A A

14 The Deendent I/O Concet Works great for DBMS across the Enterrise What can be done about logical corrution? What can be done for BATCH cycle? Point-in-time coies (checkoints) 8/17/

15 Today s Gas - Physical vs Logical Existing solution addresses the hysical risk Multile coies continuous and oint in time Planned and Unlanned outage events EVERYTHING gets relicated Even the logical corrutions! Many sites use u to 2 additional full Point in Time (PIT) coies Coy 1: near real time (minutes behind) Coies 2 and 3: new PIT created every 12 hours 24 hours to find corrution U to 24 hours of data loss DC3 Asynchronous DC2 DC1

16 What is needed from a solution? Recovery from loss of data integrity Provides a more granular level of alication recovery from unintended changes to data stemming from Processing error Malicious intent Human error Solutions that focus on the logical Continuous oint in time coies Selectable recovery oints Automation Brings PIT recovery caability to non-database systems Provides alications with recovery caability when not designed-in Provides cross-alication recovery oint 8/17/

17 Secific Requirements from the Array Underlying technologies Easily manage many data coies Reduce imact Target-less SNAPSHOTS Increased agility Multile (~256) Snashots er source Ease of use User-defined name/version number Automatic exiration if desired Sna entire Storage Grou in single command Consistent scale (>20,000 volumes) 8/17/

18 What is needed from Automation side Recovery from loss of data integrity Host automation Execute locally or remotely No Asynchronous RPO imact Restore to Secondary from any snashot Create indeendent DR test coy Frequent creation/deletion of snashots Fast logical corrution recovery Requirements Granularity of minutes Select snashots to LINK by timestam Sace Considerations, monitoring, reorting Legacy systems/alication, batch will not be re-engineered from the to down 8/17/

19 Versioning Snashots with Alication Awareness Alication Table Source Devices JES exit to intelligently tag Snashots on behalf of alication Batch Job Inventory Backu Table Target Devices SNAPSHOT API LINK / UNLINK Snashots Original jobs stes / rocess Host volume Legend Timeline (minutes)

20 Restoration and Simulation Recover to a job or ste level from reviously snaed data Invokes data mover to recover the data necessary to reinitiate comromised job Recovery rocess driven through ISPF interface Simulation of the recovery identifies exosures in the recovery of alication(s) or entire environment Ability to run what if scenarios at any time are critical in a world of SLA s that must be met 20 20

21 Summary When downtime and continuous comuting is required fault-tolerant raid recovery alication environments are needed. With mainframes this includes both transactional and batch rocessing. Alications and databases have advanced transaction recovery features, but batch jobs resent a different roblem. For continuous comuting in mainframe environments continuous rotection of batch rocessing systems can also be required. Possibilities exist to achieve a more granular overall recovery than we know today Lines have blurred between oerational, disaster, or synergy between the next generation controller based snashots and intelligent host based automation is needed to bring near-cdp to mainframe alications 8/17/

22 Thank you! Rebecca Levesque Tony Negro

Achieving Disaster Recovery Success

Achieving Disaster Recovery Success Achieving Disaster Recovery Success Ros Schulman Hitachi Data Systems Technical Track, Session March, 0 :-:m About the Seakers Ros Schulman is Director, Data Protection at Hitachi Data Systems with over

More information

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents

More information

17573: Availability and Time to Data How to Improve Your Resiliency and Meet Your SLAs

17573: Availability and Time to Data How to Improve Your Resiliency and Meet Your SLAs 17573: Availability and Time to Data How to Improve Your Resiliency and Meet Your SLAs Ros Schulman Hitachi Data Systems Rebecca Levesque 21st Century Software August 13, 2015 10-11:00 am Southern Hemisphere

More information

Storage Basics Architecting the Storage Supplemental Handout

Storage Basics Architecting the Storage Supplemental Handout Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it

More information

Sage Timberline Office

Sage Timberline Office Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

Citrix NetScaler and Citrix XenDesktop 7 Deployment Guide

Citrix NetScaler and Citrix XenDesktop 7 Deployment Guide Citrix NetScaler and Citrix XenDeskto 7 Deloyment Guide 2 Table of contents Executive summary and document overview 3 1. Introduction 3 1.1 Overview summary 3 2. Architectural overview 4 2.1 Physical view

More information

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss

More information

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist I Planning Guide The HR Software Buyer s Guide and Checklist Table of Contents Introduction... 1 Recent Trends in HR Technology... 1 Return on Emloyee Investment Paerless HR Workflows Business Intelligence

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs

More information

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State Pay tream A D V I S O R S WHITE PAPER Web Inv Web Invoicing Strategic Imact of AP Automation What s Inside Inefficiencies in Current State Key Drivers for Automation Web Invoicing Comonents New Automation

More information

Bravo Software Group e.commerce enablers... 2 RemoteDesk... 4

Bravo Software Group e.commerce enablers... 2 RemoteDesk... 4 Table of Contents Bravo Software Grou e.commerce enablers... 2 RemoteDesk... 4 A suite of roducts for entering orders or invoices remotely, for direct osting to your central accounting system. RemoteDesk

More information

Drinking water systems are vulnerable to

Drinking water systems are vulnerable to 34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental

More information

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk

More information

Microsoft Exchange 2013 Citrix NetScaler Deployment Guide

Microsoft Exchange 2013 Citrix NetScaler Deployment Guide Microsoft Exchange 2013 Citrix NetScaler 2 Table of contents What s new in Microsoft Exchange 2013 3 Exchange 2013 Architecture 3 Load Balancing Exchange 2013 5 Lync and SharePoint integration 6 Mobility

More information

ShareFile Enterprise: Security Whitepaper

ShareFile Enterprise: Security Whitepaper ShareFile Enterrise: 2 Table of contents Introduction 4 SaaS alication tier 5 ShareFiles servers: Web, API, and database overview 5 SaaS alication tier security 6 Encrytion 6 Hash-based message authentication

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science

More information

BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g

BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g ENABLED BY EMC VMAX 10K AND EMC RECOVERPOINT Technical Presentation EMC Solutions Group 1 Agenda Business case Symmetrix VMAX 10K overview RecoverPoint

More information

for UK industrial and scientific companies managed by Business Marketing Online

for UK industrial and scientific companies managed by Business Marketing Online for UK industrial and scientific comanies managed by Business Marketing Online This is a Google AdWords advertisement and so is this... and so is this......advertising with Google Adwords is now essential.

More information

Managing specific risk in property portfolios

Managing specific risk in property portfolios Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading

More information

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems The International ournal of Soft Comuting and Software Engineering [SCSE], Vol., No., Secial Issue: The Proceeding of International Conference on Soft Comuting and Software Engineering 0 [SCSE ], San Francisco

More information

Module: Business Continuity

Module: Business Continuity Upon completion of this module, you should be able to: Describe business continuity and cloud service availability Describe fault tolerance mechanisms for cloud infrastructure Discuss data protection solutions

More information

Where you are Where you need to be How you get there Market Intelligence Competitive Insights Winning Strategies

Where you are Where you need to be How you get there Market Intelligence Competitive Insights Winning Strategies Where you are Where you need to be How you get there Market Intelligence Cometitive Insights Winning Strategies The industrial and B2B market research and strategy firm Dominate Your Markets Whether you

More information

Electronic Commerce Research and Applications

Electronic Commerce Research and Applications Electronic Commerce Research and Alications 12 (2013) 246 259 Contents lists available at SciVerse ScienceDirect Electronic Commerce Research and Alications journal homeage: www.elsevier.com/locate/ecra

More information

Sage Document Management. User's Guide Version 13.1

Sage Document Management. User's Guide Version 13.1 Sage Document Management User's Guide Version 13.1 This is a ublication of Sage Software, Inc. Version 13.1 Last udated: June 19, 2013 Coyright 2013. Sage Software, Inc. All rights reserved. Sage, the

More information

X How to Schedule a Cascade in an Arbitrary Graph

X How to Schedule a Cascade in an Arbitrary Graph X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network

More information

Sage Document Management. User's Guide Version 12.1

Sage Document Management. User's Guide Version 12.1 Sage Document Management User's Guide Version 12.1 NOTICE This is a ublication of Sage Software, Inc. Version 12.1. November, 2012 Coyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage

More information

Backup and Recovery 1

Backup and Recovery 1 Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup

More information

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The

More information

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Local Connectivity Tests to Identify Wormholes in Wireless Networks Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de

More information

EMC NETWORKER SNAPSHOT MANAGEMENT

EMC NETWORKER SNAPSHOT MANAGEMENT White Paper Abstract This white paper describes the benefits of NetWorker Snapshot Management for EMC Arrays. It also explains the value of using EMC NetWorker for snapshots and backup. June 2013 Copyright

More information

Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs

Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs EMC RECOVERPOINT FAMILY Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs ESSENTIALS EMC RecoverPoint Family Optimizes RPO

More information

Corporate Compliance Policy

Corporate Compliance Policy Cororate Comliance Policy English Edition FOREWORD Dear Emloyees, The global nature of Bayer s oerations means that our activities are subject to a wide variety of statutory regulations and standards

More information

Title: Stochastic models of resource allocation for services

Title: Stochastic models of resource allocation for services Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, ralhb@vt.edu Phone : (54) 231-7688,

More information

construction eal estate health onstruction hospitality energyy healthcare infra PRACTICE AREAS IMPARTIAL. THOROUGH. EXPERIENCED.

construction eal estate health onstruction hospitality energyy healthcare infra PRACTICE AREAS IMPARTIAL. THOROUGH. EXPERIENCED. PRACTICE AREAS Real Estate. INTECH s early days in Risk Management were centred around suorting the Real Estate industry. Since then, we have continued to build our team of exerts, knowledge and techniques

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

Total Data Protection for your business

Total Data Protection for your business A platform to empower your business C Y K C K C K Total Data Protection for your business Protecting business data No matter where it lives At Breakwater we understand the importance of a dependable, extremely

More information

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems

More information

Achieve Continuous Computing for Mainframe Batch Processing. By Hitachi Data Systems and 21st Century Software

Achieve Continuous Computing for Mainframe Batch Processing. By Hitachi Data Systems and 21st Century Software Achieve Continuous Computing for Mainframe Batch Processing By Hitachi Data Systems and 21st Century Software February 2016 Contents Executive Summary... 2 Introduction... 3 Difficulties in Recovering

More information

IEEM 101: Inventory control

IEEM 101: Inventory control IEEM 101: Inventory control Outline of this series of lectures: 1. Definition of inventory. Examles of where inventory can imrove things in a system 3. Deterministic Inventory Models 3.1. Continuous review:

More information

with VMware vsphere 5.1 (ESXi)

with VMware vsphere 5.1 (ESXi) Scaling XenDeskto 7 to 5,000 users with VMware vshere 5.1 (ESXi) Citrix Solutions Lab Validated Solutions Design Guide 2 Table of contents Contents Citrix XenDeskto 7 6 Executive Summary 7 Project overview

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

Eliminating End User and Application Downtime:

Eliminating End User and Application Downtime: Eliminating End User and Application Downtime: Architecting the Right Continuous Availability and Disaster Recovery Environment March 2010 Table of Contents Introduction 3 Where to Start 3 Moving to Continuous

More information

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many

More information

Project Management and. Scheduling CHAPTER CONTENTS

Project Management and. Scheduling CHAPTER CONTENTS 6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method

More information

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Leveraging Virtualization for Disaster Recovery in Your Growing Business Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster

More information

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information

More information

IETF 94 - NMRG 38 meeting Intent Based Network Modeling (IBNEMO) Bert Wijnen

IETF 94 - NMRG 38 meeting Intent Based Network Modeling (IBNEMO) Bert Wijnen IETF 94 - NMRG 38 meeting Intent Based Network Modeling (IBNEMO) Bert Wijnen 1 Ga between APP and Network APP wants A connection between two sites APP doesn t want Configurations of each device between

More information

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal

More information

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab A Novel Architecture Style: Diffused Cloud for Virtual Comuting Lab Deven N. Shah Professor Terna College of Engg. & Technology Nerul, Mumbai Suhada Bhingarar Assistant Professor MIT College of Engg. Paud

More information

Failure Behavior Analysis for Reliable Distributed Embedded Systems

Failure Behavior Analysis for Reliable Distributed Embedded Systems Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of

More information

SMALL BUSINESS GRANTS PROGRAM GUIDELINES

SMALL BUSINESS GRANTS PROGRAM GUIDELINES SMALL BUSINESS GRANTS PROGRAM GUIDELINES S GARTON STREET Small Business Grants Program Suorting our community The City of Melbourne offers a wide range of grants and sonsorshi oortunities to suort the

More information

Today s Agile, Complex and Heterogeneous Data Centers

Today s Agile, Complex and Heterogeneous Data Centers Managing PRESENTATION Backup TITLE and GOES Recovery HERE in Today s Agile, Complex and Heterogeneous Data Centers Maria Pressley, Chief Evangelist Unitrends Gene Nagle, Vice President Technical Services

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

Business Life Insurance 18.5 - 12.1.1

Business Life Insurance 18.5 - 12.1.1 Changing Nothing Risks Everything. The New Style of IT demands a new approach to Backup, Recovery and Archive Bill Philbin VP Data Protection & Retention, Software Defined Storage HP Storage, Enterprise

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article aeared in a journal ublished by Elsevier. The attached coy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

457 DEFERRED COMPENSATION PLAN EMERGENCY WITHDRAWAL PACKET

457 DEFERRED COMPENSATION PLAN EMERGENCY WITHDRAWAL PACKET 457 DEFERRED COMPENSATION PLAN EMERGENCY WITHDRAWAL PACKET This booklet contains the following forms: 457 Deferred Comensation Plan Emergency Withdrawal Form 457 Deferred Comensation Plan Emergency Withdrawal

More information

DEFINING THE RIGH DATA PROTECTION STRATEGY

DEFINING THE RIGH DATA PROTECTION STRATEGY DEFINING THE RIGH DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions By Cindy LaChapelle, Principal Consultant, ISG www.isg-one.com INTRODUCTION Most organizations have traditionally

More information

NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity

NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity NUTSS: A SIP-based Aroach to UDP and TCP Network Connectivity Saikat Guha Det. of Comuter Science Cornell University Ithaca, NY 14853 saikat@cs.cornell.edu Yutaka Takeda Panasonic Communications San Diego,

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY

SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY Among the priorities for efficient storage management is an appropriate protection architecture. This paper will examine how to architect storage

More information

Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer

Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer 4 th International Conference on Industrial Engineering and Industrial Management IV Congreso de Ingeniería de Organización Donostia- an ebastián, etember 8 th - th Imlementation of tatistic Process Control

More information

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling From to Exeriment: A Case Study on Multirocessor Task Scheduling Sascha Hunold CNRS / LIG Laboratory Grenoble, France sascha.hunold@imag.fr Henri Casanova Det. of Information and Comuter Sciences University

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

SQL Server Storage Best Practice Discussion Dell EqualLogic

SQL Server Storage Best Practice Discussion Dell EqualLogic SQL Server Storage Best Practice Discussion Dell EqualLogic What s keeping you up at night? Managing the demands of a SQL environment Risk Cost Data loss Application unavailability Data growth SQL Server

More information

The Benefits of Virtualization for Your DR Plan

The Benefits of Virtualization for Your DR Plan E-Guide The Benefits of Virtualization for Your DR Plan Server virtualization is making a positive impact in the area of disaster recovery. Through virtualization, organizations can save money, as well

More information

Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve

Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while

More information

The risk of using the Q heterogeneity estimator for software engineering experiments

The risk of using the Q heterogeneity estimator for software engineering experiments Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for

More information

Virtual Disaster Recovery

Virtual Disaster Recovery Virtual Disaster Recovery White Paper September 16, 2008 Kelly Laughton Davenport Group Consultant Davenport Group 2008. All rights reserved. Introduction Today s data center has evolved into a complex,

More information

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7 Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk

More information

Secure synthesis and activation of protocol translation agents

Secure synthesis and activation of protocol translation agents Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see

More information

Learning Human Behavior from Analyzing Activities in Virtual Environments

Learning Human Behavior from Analyzing Activities in Virtual Environments Learning Human Behavior from Analyzing Activities in Virtual Environments C. BAUCKHAGE 1, B. GORMAN 2, C. THURAU 3 & M. HUMPHRYS 2 1) Deutsche Telekom Laboratories, Berlin, Germany 2) Dublin City University,

More information

Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar

Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar Kevin Horn Principal Product Manager Enterprise Data Protection Solutions March

More information

Solving Your Big Data Problems with Fast Data (Better Decisions and Instant Action)

Solving Your Big Data Problems with Fast Data (Better Decisions and Instant Action) Solving Your Big Data Problems with Fast Data (Better Decisions and Instant Action) Does your company s integration strategy support your mobility, big data, and loyalty projects today and are you prepared

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

Migration to Object Oriented Platforms: A State Transformation Approach

Migration to Object Oriented Platforms: A State Transformation Approach Migration to Object Oriented Platforms: A State Transformation Aroach Ying Zou, Kostas Kontogiannis Det. of Electrical & Comuter Engineering University of Waterloo Waterloo, ON, N2L 3G1, Canada {yzou,

More information

Things You Need to Know About Cloud Backup

Things You Need to Know About Cloud Backup Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing

More information

Continuous Data Protection

Continuous Data Protection Continuous Data Protection CDP: A State Analysis A Tutorial created and presented by: David Hill & Dan Tanner Mesabi Group LLC (Hill) ProgresSmart (Tanner) Storage World Conference 2005, Mesabi Group LLC.,

More information

Five Secrets to SQL Server Availability

Five Secrets to SQL Server Availability Five Secrets to SQL Server Availability EXECUTIVE SUMMARY Microsoft SQL Server has become the data management tool of choice for a wide range of business critical systems, from electronic commerce to online

More information

Redefining Oracle Database Management

Redefining Oracle Database Management Redefining Oracle Database Management Actifio PAS Specification A Single Solution for Backup, Recovery, Disaster Recovery, Business Continuity and Rapid Application Development for Oracle. MAY, 2013 Contents

More information

Beyond Traditional Disaster Recovery Goals Augmenting the Recovery Consistency Characteristics

Beyond Traditional Disaster Recovery Goals Augmenting the Recovery Consistency Characteristics Beyond Traditional Disaster Recovery Goals Augmenting the Recovery Consistency Characteristics Octavian Paul ROTARU American Sentinel University Octavian.Rotaru@ACM.org Abstract For most organizations

More information

DevOps and Container Security

DevOps and Container Security DevOs and Container Security Mike Bartock IT Secialist NIST Paul Cichonski Cloud Architect Lanco John Morello Chief Technology Officer Twistlock Raghu Yeluri Princial Engineer Intel Certain commercial

More information

Forensic Science International

Forensic Science International Forensic Science International 214 (2012) 33 43 Contents lists available at ScienceDirect Forensic Science International jou r nal h o me age: w ww.els evier.co m/lo c ate/fo r sc iin t A robust detection

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

Fluent Software Training TRN-99-003. Solver Settings. Fluent Inc. 2/23/01

Fluent Software Training TRN-99-003. Solver Settings. Fluent Inc. 2/23/01 Solver Settings E1 Using the Solver Setting Solver Parameters Convergence Definition Monitoring Stability Accelerating Convergence Accuracy Grid Indeendence Adation Aendix: Background Finite Volume Method

More information

New Approaches to Idea Generation and Consumer Input in the Product Development

New Approaches to Idea Generation and Consumer Input in the Product Development New roaches to Idea Generation and Consumer Inut in the Product Develoment Process y Olivier Toubia Ingénieur, Ecole Centrale Paris, 000 M.S. Oerations Research, Massachusetts Institute of Technology,

More information

Omgeo. Omgeo Deploys EMC Multi-Regional Business Continuity Solution SOLUTION SNAPSHOT. Customer Focus on Business Continuity

Omgeo. Omgeo Deploys EMC Multi-Regional Business Continuity Solution SOLUTION SNAPSHOT. Customer Focus on Business Continuity Omgeo Omgeo Deploys EMC Multi-Regional Business Continuity Solution SOLUTION SNAPSHOT Omgeo has replicated all trade data across multiple data centers spanning more than 1,000 miles in New York, Boston,

More information

White Paper. 1 800 FASTFILE / www.ironmountain.ca Page 1

White Paper. 1 800 FASTFILE / www.ironmountain.ca Page 1 White Paper LIVEVAULT Top 10 Reasons for Using Online Server Backup and Recovery Introduction Backup of vital company information is critical to a company s survival, no matter what size the company. Recent

More information

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012 FIrch Worksho Brussels 22 nd February 2012 Towards Future Internet rchitecture lex Galis University College London a.galis@ee.ucl.ac.uk www.ee.ucl.ac.uk/~agalis FIrch Worksho Brussels 22 nd February 2012

More information

Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747

Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Introduction Rajesh Gupta - rajgupta@deloitte.com Solution Network

More information

Perforce Backup Strategy & Disaster Recovery at National Instruments

Perforce Backup Strategy & Disaster Recovery at National Instruments Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir National Instruments Perforce User Conference April 2005-1 - Contents 1. Introduction 2. Development Environment 3. Architecture

More information

401K Plan. Effective January 1, 2014

401K Plan. Effective January 1, 2014 401K Plan Effective January 1, 2014 Summary Plan Descrition Particiation...2 Contributions...2 Disabled Particiants...4 Definition of Comensation...4 Legal Limits on Contributions...4 Enrollment...5 Investment

More information

Breakthrough Data Recovery for IBM AIX Environments

Breakthrough Data Recovery for IBM AIX Environments TECHNICAL ISSUES Best Practices in Availability. Breakthrough Data Recovery for IBM AIX Environments How New Technologies Are Making Data Protection, Recovery and High Availability Easier and More Affordable

More information

Webinar: Modern Data Protection For Next-Gen Apps and Databases

Webinar: Modern Data Protection For Next-Gen Apps and Databases Enterprise Strategy Group Getting to the bigger truth. Webinar: Modern Data Protection For Next-Gen Apps and Databases Nik Rouda, Senior Analyst, ESG Group Tarun Thakur, Co-Founder and CEO, Datos IO Speakers

More information

RETAIL INDUSTRY. Shaping the Customer s Experience: How Humans Drive Retail Sales in a Ferocious Economy

RETAIL INDUSTRY. Shaping the Customer s Experience: How Humans Drive Retail Sales in a Ferocious Economy RETAIL INDUSTRY Shaing the Customer s Exerience: How Humans Drive Retail Sales in a Ferocious Economy Who Energizes Customer Exerience Management? Senior Executives define the retail strategy with strategic

More information

WHITE PAPER Overview of Data Replication

WHITE PAPER Overview of Data Replication Overview of Data Replication 1 Abstract Replication is the process of making a copy of something, or of creating a replica. In different contexts, such as art (copies of a painting), bioscience (cloning),

More information

EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise

EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise ESSENTIALS Easy-to-use, single volume, single file system architecture Highly scalable with

More information

Disaster Recovery for Oracle Database

Disaster Recovery for Oracle Database Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches

More information