High Availability and Disaster Recovery
|
|
- Jessie Baker
- 5 years ago
- Views:
Transcription
1 High Availability and Disaster Recovery
2 Klaus Schmidt High Availability and Disaster Recovery Concepts, Design, Implementation With 83 Figures and 26 Tables 123
3 Klaus Schmidt Stockheimer Str Frankfurt Germany Library of Congress Control Number: ISBN Springer Berlin Heidelberg New York ISBN Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com Springer-Verlag Berlin Heidelberg 2006 Printed in Germany The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Typesetting: Joachim Schrod, Net & Publication Consultance GmbH, Rödermark Production: LE-TEX Jelonek, Schmidt & Vöckler GbR, Leipzig Cover design: KünkelLopka Werbeagentur, Heidelberg Printed on acid-free paper 45/3142/YL
4 For Helga, Andreas, and Katrin
5 Preface During the last 15 years I was involved in planning, deployment, and operations of IT systems for major companies. Those systems are missioncritical: the customers business depends on their availability. The systems are required to be highly available and to protect against all kinds of problems, like hardware failures, software issues, human errors, through to physical disasters. I learned that there are misunderstandings between customers, planners, and vendors about what high availability is, what can be achieved with IT systems, and where their limitations are. I also recognized that disaster recovery is only a feature of high availability, but is often seen as an independent topic. This book addresses this area with an end-to-end view and makes it available as single piece of material: from requirements gathering to planning, implementation, and operations. Another missing piece is supplied, an approach to develop an architecture which leads to highly available systems that are robust and are able to recover from the relevant failure scenarios. But identification of failure scenarios is still a kind of art, mostly based on individual experiences. Selection of a solution is driven by a process, and not by products that claim protection but do not consider the whole picture. With that end-to-end view, we get a structured approach that leads from requirements to possible failure scenarios to a successful solution. That was the motivation to write this book. It addresses these topics and is targeted at all parties involved, enabling them to speak a common language and manage their mutual expectations. The goal of this book is to explain and discuss architecture, technology, solutions, and processes. Since products and features are too short lived for the aim of this book, it does not review, compare, or recommend any particular products.
6 VIII Preface I thank my employer Electronic Data Systems (EDS) for the excellent work environment that I have had over many years, for a very successful working relationship, and for support in writing this book. I would like to thank the following friends and colleagues for their fruitful discussions, guidance, and reviews: J. Bankstahl (EDS), F. Haberhauer (Sun), H. Haupt (AES), F. Krämer (IBM), S. Krampen (EDS), F. Mittelbach (EDS), and Dr. F. Renner (Opel). I also thank all my many colleagues at EDS, especially from the Enterprise Technology Office. Their experience and insights helped me in understanding the full picture. Special thanks to Joachim Schrod from Network and Publication Consultance (NPC). Without his significant contributions, this book would not have been possible. Frankfurt, März 2006 Klaus Schmidt
7 Contents 1 Introduction Audience Roadmap of This Book Real-WorldExamples Elementary Concepts Business Issues Business Continuity as the Overall Goal Regulatory Compliance and Risk Management System and Outage Categorization High Availability Handling Minor Outages Availability Reliability Serviceability Disaster Recovery Handling Major Outages Quantifying Availability: %andReality Service Level Agreements Basic Approach: Robustness and Redundancy Layered Solution with Multiple Precautions Summary Architecture Objectives Conceptual Model System Model System Design Base Concepts SystemStack Redundancy and Replication RobustnessandSimplicity... 74
8 X Contents Virtualization Solution Roadmap List Failure Scenarios Evaluate Failure Scenarios Map Scenarios to Requirements DesignSolution Review Selected Solution Against Scenarios System Solution Patterns System Implementation Process Systems for All Process Steps UseCase:SAPServer Hardware Components and Computer Systems Disk Storage Raid Redundant Array of Independent Disks Storage Systems SANvs.NAS Journaling Is Essential for High Availability Virtualization of Resources Vendor Selection and Purchasing Decisions SystemInstallation System Maintenance and Operations Making Our Own Statistics Operating Systems Failover Clusters HowDoesItWork? Failover Cluster Implementation Experiences Load-Balancing Clusters Load-Balancing Approaches Target Selection for Load Balancing Cluster and Server Consolidation Virtualization and Moore s Law HostVirtualization Databases and Middleware Middleware Categories Database Servers High-Availability Options for Database Servers Disaster Recovery for Databases Web Servers Application Servers Messaging Servers
9 Contents XI 8 Applications Integration in a Cluster on the Operating System Level High Availability Through Middleware High Availability From Scratch Code Quality Is Important Testing for High Availability Infrastructure Network NetworkDevices LAN Segments DefaultGateway RoutinginLANsandWANs Firewalls and Network Address Translation Network Design for Disaster Recovery Infrastructure Services Dynamic Host Configuration Protocol (DHCP) Domain Name Service (DNS) Directory Server BackupandRestore Monitoring Disaster Recovery Concepts Approach Conceptual Design Scenarios for Major Outages Disaster-Recovery Scope Primary and Disaster-Recovery Sites State Synchronization Shared System, Hot or Cold Standby Time to Recovery Failback to the Primary Site Solutions MetroCluster FastRestore Application-Level or Middleware-Level Clustering Application Data Mirroring Disk Mirroring Matching Configuration Changes Disaster-Recovery Tests Test Goals and Categories Organizational Test Context Quality Characteristics Holistic View What Is Needed Besides Technology? Command Center and War Room
10 XII Contents Disaster-Recovery Emergency Pack A Prototypical Disaster-Recovery Project System Identification the Primary Site Business Requirements and Project Goals BusinessView SystemDesign Implementation Failover to Disaster-Recovery Site or Disaster-Recovery Systems General Approach Example Checklist for a Database Disaster- Recovery Server FailbacktothePrimarySystem A Reliability Calculations and Statistics A.1 MathematicalBasics A.2 Mean Time Between Failures and Annual Failure Rate A.3 Redundancy and Probability of Failures A.4 Raid Configurations A.5 ExampleCalculations A.6 Reliability over Time the Bathtub Curve B Data Centers B.1 RoomInstallation B.2 HeatandFireControl B.3 PowerControl B.4 ComputerSetup C Service Support Processes C.1 Incident Management C.2 Problem Management C.3 Configuration Management C.4 Change Management C.5 Release Management C.6 Information Gathering and Reporting References Index
Julien Masanès. Web Archiving. With 28 Figures and 6 Tables ABC
Web Archiving Julien Masanès Web Archiving With 28 Figures and 6 Tables ABC Author Julien Masanès European Web Archive 25 rue des envierges 75020 Paris, France julien.masanes@bnf.fr ACM Computing Classification
More informationAdvanced Data Mining Techniques
Advanced Data Mining Techniques David L. Olson Dursun Delen Advanced Data Mining Techniques Dr. David L. Olson Department of Management Science University of Nebraska Lincoln, NE 68588-0491 USA dolson3@unl.edu
More informationInterfacing with C++
Interfacing with C++ Jayantha Katupitiya Kim Bentley Interfacing with C++ Programming Real-World Applications ABC Dr. Jayantha Katupitiya Senior Lecturer School of Mechanical and Manufacturing Engineering
More informationSoftware Development for SAP R/3
Software Development for SAP R/3 Springer-Verlag Berlin Heidelberg GmbH Ulrich Mende Software Development for SAP R/3 Data Dictionary, ABAP/4, Interfaces With Diskette With 124 Figures and Many Example
More informationPhilipp von Weitershausen. Web Component Development with Zope 3
Philipp von Weitershausen Web Component Development with Zope 3 Philipp von Weitershausen Web Component Development with Zope 3 With 39 Figures and 10 Tables 123 Philipp von Weitershausen Goebenstraße
More informationEnabling Semantic Web Services
Enabling Semantic Web Services DieterFensel HolgerLausen AxelPolleres Jos de Bruijn Michael Stollberg Dumitru Roman John Domingue Enabling Semantic Web Services The Web Service Modeling Ontology With 41
More informationEnabling Technologies for Wireless E-Business
Enabling Technologies for Wireless E-Business Weidong Kou Yelena Yesha (Eds.) Enabling Technologies for Wireless E-Business With 141 Figures and 15 Tables ABC Editors Weidong Kou Chinese State Key Laboratory
More informationGeometric Modeling and Algebraic Geometry
Geometric Modeling and Algebraic Geometry Bert Jüttler Ragni Piene Editors Geometric Modeling and Algebraic Geometry 123 Bert Jüttler Institute of Applied Geometry Johannes Kepler University Altenberger
More informationGengsheng Lawrence Zeng. Medical Image Reconstruction. A Conceptual Tutorial
Gengsheng Lawrence Zeng Medical Image Reconstruction A Conceptual Tutorial Gengsheng Lawrence Zeng Medical Image Reconstruction A Conceptual Tutorial With 163 Figures Author Prof. Dr. Gengsheng Lawrence
More informationJinkun Liu Xinhua Wang. Advanced Sliding Mode Control for Mechanical Systems. Design, Analysis and MATLAB Simulation
Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis and MATLAB Simulation Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis
More informationContributions to Economics
Contributions to Economics Kesra Nermend Vector Calculus in Regional Development Analysis Comparative Regional Analysis Using the Example of Poland Physica Verlag A Springer Company Dr. inž. Kesra Nermend
More informationResearch on Industrial Security Theory
Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3
More informationThe Information Retrieval Series. Series Editor W. Bruce Croft
The Information Retrieval Series Series Editor W. Bruce Croft Sándor Dominich The Modern Algebra of Information Retrieval 123 Sándor Dominich Computer Science Department University of Pannonia Egyetem
More informationITIL 2011 At a Glance. John O. Long
ITIL 2011 At a Glance John O. Long SpringerBriefs in Computer Science Series Editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin Shen Borko Furht VS
More informationReal-Time Graphics Rendering Engine
Hujun Bao Wei Hua Real-Time Graphics Rendering Engine With 66 figures, 11 of them in color ADVANCED TOPICS IN SCIENCE AND TECHNOLOGY IN CHINA ADVANCED TOPICS IN SCIENCE AND TECHNOLOGY IN CHINA Zhejiang
More informationForm-Oriented Analysis
Form-Oriented Analysis Dirk Draheim Gerald Weber Form-Oriented Analysis A New Methodology to Model Form-Based Applications With 83 Figures 123 Dirk Draheim Institute of Computer Science Freie Universität
More informationGuide to OSI and TCP/IP Models
SPRINGER BRIEFS IN COMPUTER SCIENCE Mohammed M. Alani Guide to OSI and TCP/IP Models SpringerBriefs in Computer Science Series editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi
More informationGrid Computing Security
Grid Computing Security Anirban Chakrabarti Grid Computing Security With 87 Figures and 12 Tables 123 Anirban Chakrabarti Infosys Technologies Limited Electronic City Hosur Road 560100 Bangalore India
More informationComputer Architecture
Computer Architecture Springer-Verlag Berlin Heidelberg GmbH Silvia M. Mueller Wolfgang J. Paul Computer Architecture Complexity and Correctness With 214 Figures and 185 Tables Springer Silvia Melitta
More informationc-xsc R. Klatte U. Kulisch A. Wiethoff C. Lawo M. Rauch A C++ Class Library for Extended Scientific Computing Springer-Verlag Berlin Heidelberg GmbH
R. Klatte U. Kulisch A. Wiethoff C. Lawo M. Rauch c-xsc A C++ Class Library for Extended Scientific Computing Translated by G. F. Corliss C. Lawo R. Klatte A. Wiethoff C. Wolff Springer-Verlag Berlin Heidelberg
More informationLecture Notes in Mathematics Editors: J.--M. Morel, Cachan F. Takens, Groningen B. Teissier, Paris
Lecture Notes in Mathematics 1842 Editors: J.--M. Morel, Cachan F. Takens, Groningen B. Teissier, Paris 3 Berlin Heidelberg New York Hong Kong London Milan Paris Tokyo Trygve Johnsen Andreas Leopold Knutsen
More informationParallel Programming
Parallel Programming Thomas Rauber Gudula Rünger Parallel Programming For Multicore and Cluster Systems 123 Thomas Rauber Universität Bayreuth Computer Science Department 95440 Bayreuth Germany rauber@uni-bayreuth.de
More informationSpringerBriefs in Computer Science
SpringerBriefs in Computer Science Series Editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin (Sherman) Shen Borko Furht V.S. Subrahmanian Martial Hebert
More informationWhat s in Installing and Configuring Windows Server 2012 (70-410):
What s in Installing and Configuring Windows Server 2012 (70-410): The course provides skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.
More informationGeorge Grätzer. Practical L A TEX
Practical L A TEX George Grätzer Practical L A TEX 123 George Grätzer Toronto, ON, Canada Additional material to this book can be downloaded from http://extras.springer.com ISBN 978-3-319-06424-6 ISBN
More informationWhite Paper. How to select a cloud disaster recovery method that meets your requirements.
How to select a cloud disaster recovery method that meets your requirements. VS Table of contents Table of contents Page 2 Executive Summary Page 3 Introduction Page 3 Disaster Recovery Methodologies Page
More informationThe Architectural Logic of Database Systems
The Architectural Logic of Database Systems E. J. Yannakoudakis The Architectural Logic of Database Systems With 69 Figures Springer-Verlag london Berlin Heidelberg New York Paris Tokyo E. 1. Yannakoudakis,
More informationBusiness Continuity and Disaster Recovery. Ed Crowley Ch 12
Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster
More informationWindows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla
Windows 10 Revealed The Universal Windows Operating System for PC, Tablets, and Windows Phone Kinnary Jangla Windows 10 Revealed Kinnary Jangla Bing Maps San Francisco, California, USA ISBN-13 (pbk): 978-1-4842-0687-4
More informationWide Area 2D/3D Imaging
Wide Area 2D/3D Imaging Benjamin Langmann Wide Area 2D/3D Imaging Development, Analysis and Applications Benjamin Langmann Hannover, Germany Also PhD Thesis, University of Siegen, 2013 ISBN 978-3-658-06456-3
More informationPhilip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition
FPGA Design Philip Andrew Simpson FPGA Design Best Practices for Team-based Reuse Second Edition Philip Andrew Simpson San Jose, CA, USA ISBN 978-3-319-17923-0 DOI 10.1007/978-3-319-17924-7 ISBN 978-3-319-17924-7
More informationIBM Active Cloud Engine centralized data protection
IBM Active Cloud Engine centralized data protection Best practices guide Sanjay Sudam IBM Systems and Technology Group ISV Enablement December 2013 Copyright IBM Corporation, 2013 Table of contents Abstract...
More informationComputer Science Workbench. Editor: Tosiyasu L. Kunii
Computer Science Workbench Editor: Tosiyasu L. Kunii H. Kitagawa T.L. Kunii The U nnortnalized Relational Data Model F or Office Form Processor Design With 78 Figures Springer-Verlag Tokyo Berlin Heidelberg
More informationHuman-Survey Interaction
Lars Kaczmirek Human-Survey Interaction Usability and Nonresponse in Online Surveys Herbert von Halem Verlag Bibliografische Information der Deutschen Bibliothek Die deutsche Bibliothek verzeichnet diese
More informationORACLE DATABASE LIFECYCLE MANAGEMENT PACK
ORACLE DATABASE LIFECYCLE MANAGEMENT PACK ORACLE DATABASE LIFECYCLE MANAGEMENT PACK KEY FEATURES Auto Discovery of hosts Inventory tracking and reporting Database provisioning Schema and data change management
More informationSpringer Series in. advanced microelectronics 18
Springer Series in advanced microelectronics 18 Springer Series in advanced microelectronics Series Editors: K. Itoh T. Lee T. Sakurai W. M. C. Sansen D. Schmitt-Landsiedel The Springer Series in Advanced
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationRobust SRAM Designs and Analysis
Robust SRAM Designs and Analysis Jawar Singh Saraju P. Mohanty Dhiraj K. Pradhan Robust SRAM Designs and Analysis 123 Jawar Singh Indian Institute of Information Technology Design and Manufacturing Dumna
More informationLow Level X Window Programming
Low Level X Window Programming Ross J. Maloney Low Level X Window Programming An Introduction by Examples 123 Dr. Ross J. Maloney Yenolam Corporation Booragoon, WA Australia ISBN 978-3-319-74249-6 ISBN
More informationLecture Notes in Computer Science 2001 Edited by G. Goos, J. Hartmanis and J. van Leeuwen
Lecture Notes in Computer Science 2001 Edited by G. Goos, J. Hartmanis and J. van Leeuwen 3 Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Gul A. Agha Fiorella De Cindio
More informationFailure-Modes-Based Software Reading
SPRINGER BRIEFS IN COMPUTER SCIENCE Yang-Ming Zhu Failure-Modes-Based Software Reading SpringerBriefs in Computer Science More information about this series at http://www.springer.com/series/10028 Yang-Ming
More informationStefan Waldmann. Topology. An Introduction
Topology Stefan Waldmann Topology An Introduction 123 Stefan Waldmann Julius Maximilian University of Würzburg Würzburg Germany ISBN 978-3-319-09679-7 ISBN 978-3-319-09680-3 (ebook) DOI 10.1007/978-3-319-09680-3
More informationEMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange Enabled by MirrorView/S
Enterprise Solutions for Microsoft Exchange 2007 EMC CLARiiON CX3-40 Metropolitan Exchange Recovery (MER) for Exchange in a VMware Environment Enabled by MirrorView/S Reference Architecture EMC Global
More informationWeb Development with Java
Web Development with Java Tim Downey Web Development with Java Using Hibernate, JSPs and Servlets Tim Downey, BS, MS Florida International University Miami, FL 33199, USA British Library Cataloguing in
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationInside Relational Databases with Examples in Access
Inside Relational Databases with Examples in Access Inside Relational Databases with Examples in Access Mark Whitehorn and Bill Marklyn 123 Mark Whitehorn Applied Computing Division, University of Dundee,
More informationBPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.
BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...
More informationFundamentals of Operating Systems. Fifth Edition
Fundamentals of Operating Systems Fifth Edition Fundamentals of Operating Systems A.M. Lister University of Queensland R. D. Eager University of Kent at Canterbury Fifth Edition Springer Science+Business
More informationVMware BCDR Accelerator Service
AT A GLANCE The rapidly deploys a business continuity and disaster recovery (BCDR) solution with a limited, pre-defined scope in a non-production environment. The goal of this service is to prove the solution
More informationSpringer-Verlag Berlin Heidelberg GmbH
D( Script Springer-Verlag Berlin Heidelberg GmbH s. Hamann H. Hell D. Pankow R. Wunderer DigiScript Edits Digital Manuscripts With CD-ROM Springer Sabine Hamann Hauke Hell Detlef Pankow Robert Wunderer
More informationDisaster Recovery Solution Achieved by EXPRESSCLUSTER
Disaster Recovery Solution Achieved by EXPRESSCLUSTER November, 2015 NEC Corporation, Cloud Platform Division, EXPRESSCLUSTER Group Index 1. Clustering system and disaster recovery 2. Disaster recovery
More information"Charting the Course to Your Success!" MOC B Core Solutions of Microsoft Lync Server 2013 Course Summary
MOC 20336 B Core Solutions of Microsoft Lync Course Summary Description This instructor-led course teaches IT professionals how to plan, design, deploy, configure, and administer a Microsoft Lync solution.
More informationMobile Phone Security and Forensics
Mobile Phone Security and Forensics Iosif I. Androulidakis Mobile Phone Security and Forensics A Practical Approach Second Edition Iosif I. Androulidakis Pedini Ioannina Greece ISBN 978-3-319-29741-5
More informationLearning to Rank for Information Retrieval
Learning to Rank for Information Retrieval Tie-Yan Liu Learning to Rank for Information Retrieval Tie-Yan Liu Microsoft Research Asia Bldg #2, No. 5, Dan Ling Street Haidian District Beijing 100080 People
More informationData Sheet: High Availability Veritas Cluster Server from Symantec Reduce Application Downtime
Reduce Application Downtime Overview is an industry-leading high availability solution for reducing both planned and unplanned downtime. By monitoring the status of applications and automatically moving
More informationFUJITSU. Service BS2000 Portfolio. ETERNUS Storage Cluster für BS2000. Barbara Stadler T.
FUJITSU Service BS2000 Portfolio ETERNUS Storage Cluster für BS2000 Barbara Stadler Barbara.Stadler@ts.fujitsu.com T. +49 89 62060 1978 0 Copyright 2018 FUJITSU FUJITSU Service BS2000 Portfolio ETERNUS
More informationHyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale
Enterprise Strategy Group Getting to the bigger truth. White Paper Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale By Mike Leone, ESG Senior Analyst;
More informationWhitestein Series in software Agent Technologies. About whitestein Technologies
Whitestein Series in software Agent Technologies Series Editors: Marius Walliser Stefan Brantschen Monique Calisti Thomas Hempfling This series reports new developments in agent-based software technologies
More informationAvailability Implementing high availability
System i Availability Implementing high availability Version 6 Release 1 System i Availability Implementing high availability Version 6 Release 1 Note Before using this information and the product it
More informationData-Centric Systems and Applications
Data-Centric Systems and Applications Series Editors M.J. Carey S. Ceri Editorial Board P. Bernstein U. Dayal C. Faloutsos J.C. Freytag G. Gardarin W. Jonker V. Krishnamurthy M.-A. Neimat P. Valduriez
More informationThe ITIL Process Map for Microsoft Visio. Examples and Overview of Contents
The ITIL Process Map for Microsoft Visio Examples and Overview of Contents Contents Structure of the ITIL Process Map Page 3 ITIL Process Diagrams Examples Page 4 Index of Process Diagrams contained in
More informationContingency Planning and Disaster Recovery
Contingency Planning and Disaster Recovery Best Practices Version: 7.2.x Written by: Product Knowledge, R&D Date: April 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International
More informationMCSA: Windows Server MCSA 2016 Windows 2016 Server 2016 MCSA 2016 MCSA : Installation, Storage, and Compute with Windows Server 2016
indows Server 2016 MCSA 2016 MCSA: Windows Server MCSA 2016 Windows 2016 Server 2016 MCSA 2016 MCSA 2016 70-740: Installation, Storage, and Compute with Windows Server 2016 70-741: Networking with Windows
More informationMATLAB Programming for Numerical Analysis. César Pérez López
MATLAB Programming for Numerical Analysis César Pérez López MATLAB Programming for Numerical Analysis Copyright 2014 by César Pérez López This work is subject to copyright. All rights are reserved by the
More information"Charting the Course... MOC 6435 B Designing a Windows Server 2008 Network Infrastructure Course Summary
MOC 6435 B Designing a Windows Network Infrastructure Course Summary Description This five-day course will provide students with an understanding of how to design a Windows Network Infrastructure that
More informationOracle Fusion Middleware
Oracle Fusion Middleware Planning an Installation of Oracle Fusion Middleware 12c (12.2.1.2) E76887-02 November 2016 Documentation for installers and system administrators that describes how to plan and
More informationExpressCluster X 2.0 for Linux
ExpressCluster X 2.0 for Linux Installation and Configuration Guide 03/31/2009 3rd Edition Revision History Edition Revised Date Description First 2008/04/25 New manual Second 2008/10/15 This manual has
More information10 Reasons Why Your DR Plan Won t Work
10 Reasons Why Your DR Plan Won t Work Jim Damoulakis CTO, GlassHouse Technologies, Inc. Sept. 29, 2005 DR Vision Imagine Prepared to handle multiple categories of disaster Clearly documented policies
More informationVirtual Disaster Recovery
The Essentials Series: Managing Workloads in a Virtual Environment Virtual Disaster Recovery sponsored by by Jaime Halscott Vir tual Disaster Recovery... 1 Virtual Versus Physical Disaster Recovery...
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationFoundations of 3D Graphics Programming
Foundations of 3D Graphics Programming Jim X. Chen Edward J. Wegman Foundations of 3D Graphics Programming Using JOGL and Java3D With 139 Figures Jim X. Chen, PhD Computer Science Department George Mason
More informationEXPRESSCLUSTER D Product Introduction
EXPRESSCLUSTER D Product Introduction May, 2016 EXPRESSCLUSTER Group, Cloud Platform Division, NEC Corporation 2 NEC Corporation 2016 Agenda Product Introduction 1. What is HA Cluster? 2. Achievement 3.
More informationStereo Scene Flow for 3D Motion Analysis
Stereo Scene Flow for 3D Motion Analysis Andreas Wedel Daniel Cremers Stereo Scene Flow for 3D Motion Analysis Dr. Andreas Wedel Group Research Daimler AG HPC 050 G023 Sindelfingen 71059 Germany andreas.wedel@daimler.com
More informationDELIVERING PERFORMANCE, SCALABILITY, AND AVAILABILITY ON THE SERVICENOW NONSTOP CLOUD
DELIVERING PERFORMANCE, SCALABILITY, AND AVAILABILITY ON THE SERVICENOW NONSTOP CLOUD Overview Organizations, regardless of size, rely upon access to IT and business data and services for their continued
More informationOracle Cloud Getting Started with Oracle WebCenter Portal Cloud Service
Oracle Cloud Getting Started with Oracle WebCenter Portal Cloud Service E85144-11 April 2018 Oracle Cloud Getting Started with Oracle WebCenter Portal Cloud Service, E85144-11 Copyright 2017, 2018, Oracle
More informationGraphics Programming in c++
Graphics Programming in c++ Springer London Berlin Heidelberg New York Barcelona Budapest Hong Kong Milan Paris Santa Clara Singapore Tokyo Mark Walmsley Graphics Programming in c++ Writing Graphics Applications
More informationEMC Integrated Infrastructure for VMware. Business Continuity
EMC Integrated Infrastructure for VMware Business Continuity Enabled by EMC Celerra and VMware vcenter Site Recovery Manager Reference Architecture Copyright 2009 EMC Corporation. All rights reserved.
More informationInstalling and Configuring Windows Server 2012
Course Code: M20410 Vendor: Microsoft Course Overview Duration: 5 RRP: POA Installing and Configuring Windows Server 2012 Overview Get hands-on instruction and practice installing and configuring Windows
More informationMaximum Availability Architecture. Oracle Best Practices For High Availability
Oracle Database 10g Release 2: Roadmap to Maximum Availability Architecture Oracle Maximum Availability Architecture White Paper April 2006 Maximum Availability Architecture Oracle Best Practices For High
More information"Charting the Course... MOC B Core Solutions of Microsoft Skype for Business Course Summary
MOC 20334 B Core Solutions of Microsoft Skype for Description Course Summary This course provides students with the knowledge and skills required to plan, deploy, configure, and administer a Skype for
More informationMemorandum APPENDIX 2. April 3, Audit Committee
APPENDI 2 Information & Technology Dave Wallace, Chief Information Officer Metro Hall 55 John Street 15th Floor Toronto, Ontario M5V 3C6 Memorandum Tel: 416 392-8421 Fax: 416 696-4244 dwwallace@toronto.ca
More informationTest Report for Testing and Integration of iternity Software with IBM System x and IBM System Storage (DS4000, N Series and DR550 FSG)
IBM System Storage Test Report for Testing and Integration of iternity Software with IBM System x and IBM System Storage (DS4000, N Series and DR550 FSG) This document can be found on the web, www.ibm.com/support/techdocs
More informationWindows Server Security Best Practices
University Information Technology Services Windows Server Security Best Practices Page 1 of 13 Initial Document Created by: 2009 Windows Server Security Best Practices Committee Document Creation Date:
More information"Charting the Course to Your Success!" MOC D Installing and Configuring Windows Server Course Summary
Description Course Summary Get hands-on instruction and practice installing and configuring Windows Server 2012, including Windows Server 2012 R2, in this five-day Microsoft Official Course. This course
More informationReplace Single Server or Cluster
Caution Because this process is designed to work as a server replacement, you must perform it in the live environment. Cisco does not recommend doing this process on a dead net because a duplication of
More informationContents. Chapter 3: Chapter 4: Critical Server Ranking Classifying Systems for Recovery Priority Mission-Critical Only, Please...
Chapter 1: Building a Disaster Recovery Plan The Need...... 1 The Need............................ 3 Plan for All Types of Disasters................ 11 Reasons for Planning.................... 13 Let s
More informationOracle Fusion Middleware
Oracle Fusion Middleware Installing and Configuring Oracle SOA Suite and Oracle Business Process Management 12c (12.2.1) E57273-07 October 2016 Documentation for installers and system administrators that
More informationControlling Costs and Driving Agility in the Datacenter
Controlling Costs and Driving Agility in the Datacenter Optimizing Server Infrastructure with Microsoft System Center Microsoft Corporation Published: November 2007 Executive Summary To help control costs,
More informationFUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series Non-Stop Storage Reference Architecture Configuration Guide
FUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series Non-Stop Storage Reference Architecture Configuration Guide Non-stop storage is a high-availability solution that combines ETERNUS SF products
More informationOracle Fusion Middleware Installing and Configuring Oracle SOA Suite and Oracle Business Process Management. 12c ( )
Oracle Fusion Middleware Installing and Configuring Oracle SOA Suite and Oracle Business Process Management 12c (12.2.1.3.0) E95730-01 May 2018 Oracle Fusion Middleware Installing and Configuring Oracle
More informationMicrosoft Certified Solutions Expert (MCSE)
Microsoft Certified Solutions Expert (MCSE) Installing and Configuring Windows Server 2012 (70-410) Module 1: Deploying and Managing Windows Server 2012 Windows Server 2012 Overview Overview of Windows
More informationInterSystems High Availability Solutions
InterSystems High Availability Solutions Version 2018.1.1 2018-08-13 InterSystems Corporation 1 Memorial Drive Cambridge MA 02142 www.intersystems.com InterSystems High Availability Solutions InterSystems
More informationNon-uniform memory access machine or (NUMA) is a system where the memory access time to any region of memory is not the same for all processors.
CS 320 Ch. 17 Parallel Processing Multiple Processor Organization The author makes the statement: "Processors execute programs by executing machine instructions in a sequence one at a time." He also says
More informationEMC VSPEX FOR VIRTUALIZED MICROSOFT EXCHANGE 2013 WITH MICROSOFT HYPER-V
IMPLEMENTATION GUIDE EMC VSPEX FOR VIRTUALIZED MICROSOFT EXCHANGE 2013 WITH MICROSOFT HYPER-V EMC VSPEX Abstract This describes the steps required to deploy a Microsoft Exchange Server 2013 solution on
More informationRoadmap to Availability
Roadmap to Availability 1 Agenda Business and Availability in 2005 Our Availability Challenges in 2005 Building Your Availability Roadmap Managing Availability some insight 1 Business and Availability
More informationA CommVault White Paper: Business Continuity: Architecture Design Guide
A CommVault White Paper: Business Continuity: Architecture Design Guide CommVault Corporate Headquarters 2 Crescent Place Oceanport, New Jersey 07757-0900 USA Telephone: 888.746.3849 or 732.870.4000 2007
More informationDell Storage Compellent Integration Tools for VMware
Dell Storage Compellent Integration Tools for VMware Administrator s Guide Version 3.1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery
More informationWireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada
Wireless Networks Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada More information about this series at http://www.springer.com/series/14180 Sachin Shetty Xuebiao Yuchi
More informationHigh Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
More information