TECHNICAL ADDENDUM 01
|
|
- Lynne Ray
- 5 years ago
- Views:
Transcription
1 TECHNICAL ADDENDUM 01
2 What Does An HA Environment Look Like? An HA environment will have a Source system that the database changes will be captured on and generate local journal entries. The journal entries will transfer via remote journaling to a Target system. On the Target system the replication software will read the remote journal data and apply the changes to the backup copy of the databases. The collecting of the data, transferring to the Target and applying into the backup database would be real time as the changes occur, which would provide a Target system with the same information as the Source so in an event that affected the Source system, the Target system could take over role of the Source system providing the HA environment. Replication Overview Types IBM s PowerHA is considered Hardware Replication while products like Maxava HA are known as Software (or logical) Replication. There are pros and cons with each approach. Hardware Replication is an option for businesses that have the infrastructure (SAN), bandwidth and implementation of iasp architecture, which is necessary for use of PowerHA. The IBM Lab Services group in Rochester teaches classes on how to use iasp with various applications. With Hardware Replication, the backup database is passive and is not available for use for other purposes such as query lookups or running reports. More importantly when it is being backed up changes are cached on the source system and during this period you do not have HA/DR. A total failure would mean lost data. The use of Metro Mirror assists in this area; however it is the more expensive option. Not only that, if someone was to update some of the data on the Target iasp whilst it was varied on being backed up, a full refresh would need to be performed to re-sync the data once more. This all requires extra time and effort. Logical Replication does not require iasps or SAN based storage (although they are supported by Maxava HA). The backup database can be used for non-update workload such as tape backups, queries and reporting without the need to halt the send of journal data from the source system. Logical Replication also has the ability to rollback any partial or corrupt transactions via journaling while Hardware Replication currently does not support this and any updates necessitate a full refresh. 02 Logical replication which allows Library Redirect also allows for multiple source systems to replicate to a single
3 large target system. This is useful where you have a system which cannot be LPARed for cost or other reasons. When considering the choice between Hardware and Software Replication, you should carefully assess your options in the context of how your production environment is setup, your technical minimum requirements, the project budget, ease of implementation and ongoing use and the technical skills and resources necessary and available to you. How Does HA Work? An Overview Of Remote Journaling On the Source system all database files that will be replicated will have local journaling attached to them. This local journal function will mean any activity performed on the database file will be recorded automatically by the IBM Operating System and recorded as journal data in the associated journal receiver attached to the local journal. With the journal data being recorded and stored in the journal receiver, the IBM remote journal feature can be associated to the local journal, which will allow a connection to be created to a Target system for the remote journal and when activated will transfer the same journal data being stored locally to be sent and stored on the Target system remotely. The remote journaling feature being native to the IBM i is all controlled by the IBM Operating System. The sending, receiving and validation of the remote journal data is all handled internally by the IBM i. Remote Journaling is part of the IBM i Operating System (ios) and is available at no extra cost on your IBM i. According to Larry Youngren (IBM i Developer of Remote Journaling), Remote Journaling is sometimes referred to as better plumbing for high availability environments. Part of that reputation stems from its ability to perform certain operations more efficiently than other approaches can. Data is written to local journals and then sent to duplicate remote journals on another LPARs or machines across any distance. It can be run in synchronous or asynchronous modes. In synchronous mode, the preferred choice, data is written to the backup database first and then it is written to the primary database. This option requires enough bandwidth to send in real time, otherwise jobs on the Source system have to wait for confirmation of the remote write before continuing. This method guarantees that data updates are written to the target journal before the Source and therefore there is little or no opportunity for entries to be lost if the Source system were to fail. In asynchronous mode, data is written to the primary database first and then sent to the target journal. Therefore, there is no wait restriction on locally running jobs. Most HA/DR sites operate in asynchronous mode. If all the activity is collected from the various journals on the Production Machine, the decision to be made is: 1. SORT the activity into the right sequence, and then SEND the activity to the Backup Machine or 2. SEND the activity to the Backup machine, then SORT the activity when it gets there IBM s introduction of remote journaling promotes the choice of SEND/SORT, as this gets the data sent quicker and takes the sort load off the Production Machine. The quicker it s sent, the less latency has been introduced. Data Activity is recorded in Data Journals by the IBM i OS. We have the option of reading the Local Data Journal or the Remote Data Journal, to discover the information we need to know about Data Activity. We need that information, so we can replicate it. So, a job must be running either on the Source to read the Local Journal, or on the backup, to read the Remote Journal. If we read the Local Journal, then we need our own mechanism to relay that information to the Backup. If we read the Remote Journal, the relaying is done for us by the OS at the microcode level. Maxava chose to read the Remote Data Journal, to take advantage of the auto-relaying by the OS, to ensure the information gets to the backup in real-time, rather than after-the-event, and to move any processing load off the Source system. Role Swap What Is It And How Does It Work Role Swap has two parts. There is the part that is controlled by the replication that processes the journal data and there is the part that is the environment. The replication component is based on the configurations, which perform the replication and these are *Primary types for the Source system and *Backup types for the Target system. 03
4 04 Implementing The Complete HA Solution If your organisation is looking to introduce data replication for DR and HA and you are considering a logical replication solution then you need to consider the following questions: Does the product use Remote Journaling? Does it use the Audit Journal and if so, what impact will that have on the production machine? Is processing carried out on the Source of Back-up machines Is it truly a real-time solution? Are you confident that the solution will replicate your transaction workload without latency? Does the product enable Before and After image testing to ensure data integrity? What monitoring tools are available and can the environment be remotely monitored via Smartphone or tablet mobile device? Is the role-swap an uncomplicated process? Is role-swap testing included in the implementation? Not only do the systems need to be catered for, but also the Environment that the systems are located in, the power supply, network access and the redundancy requirement for all these utilities must be considered. Having the systems available will not provide HA if they cannot be accessed and used when needed. Design Building Your Hardware Topology Your systems must cater for more work than what they will be used for to allow for growth and for events that could temporarily increase work load on the systems (monthend, year-end, failover, processing delay catch-up, etc.) The Source and Target systems should ideally be the same specs, which allows for either system to be the Production environment. Under specing the Target system would allow replication to run and basic jobs to run on the Target (such as Backups or Reporting), but in an event of Role Swap or Failover the Target system may not perform or run the required processing as needed for a Production environment, which may mean restrictions are needed when the Target becomes the Production system. Also a major consideration is storage and how this is made up. High Input/Output (I/O) application perform better when there are more disk arms to process the I/O requests. If you have more disk arms on one system and less on the other, this can affect how the processing performs on the systems. Replication Model Application, Common Libraries/Folders When setting up replication it would be best practice to replicate all databases, but there should be planning as to what is critical to the business as the priority. Identifying the critical databases can allow for the configuration setup to group these together (or individualise them) but allow them to be configured as priority for replication and allow adequate apply groups to be set to perform the replication in the quickest way possible. Less critical databases can then be grouped separately and managed in a way that does not affect the priority replication from occurring first. Also by grouping the databases in certain configurations, this will allow activity such as upgrades or backups to be performed without having to stop unrelated replication occurring while the event is taking place. Network Topology Latency The ability to maintain near real-time updating depends on getting the transactions from the Source system to the Backup environment. Hardware replication transfers data at the iasp level. Software (Logical) replication solutions typically use either their own proprietary transfer protocols or utilise the Remote Journaling functionality of the IBM i operating system. Implementation Maxava HA Example Detailed below is the defined configuration scope for the setup of replication for each production environment. If your configuration requirements exceed the parameters shown then additional fees may apply.
5 Replication of production environments for a one [1] Primary system / LPARs and one [1] Target system / LPARs. Libraries Limit Maxava Configs Database replication In Scope 50 5 Object Limit Maxava Configs Object replication In Scope 15,000 All Groups Limit Maxava Configs IFS/MQ/QDLS replication In Scope 3 3 System access connection VPN (remote installation) A typical project will be delivered remotely and will be supported by your technical staff as required. After installation Maxava gives an assurance that your HA software will perform as designed and configured by providing technical support for thirty (30) days. Configure Enhanced Features Following the base install the enhanced Maxava HA features will be configured. The enhanced features include: Autonomics and work scheduling System auditing and reporting Configure replication for User Profile/ ID s and passwords and spool files Configure Sweeper Setup a test instance with a standard and IFS role swap test configuration to verify a role swap can be carried out Maxava HA Administration Training The Maxava HA Administration training is a series of online sessions based on a training configuration setup in your environment. The training covers the following topics: Day to day operations and navigation using the GUI Managing journals & using Maxava tools Troubleshooting problems Setup and performing a role swap Autonomics overview 05
6 Failover, Planning and Support The failover service provides technical assistance with the planning and preparation to support the fail over testing of the production environment based on a system outage scenario. Review failover requirements, assist with defining failover plans Review replication environment, verify Maxava setup Configure Maxava HA to support role swap plans Run full audits to verify the integrity of the data Prepare technical support for failover tests performed maxview Setup and Support The maxview service provides technical assistance with the planning and setup of the maxview monitoring software. Review PC, system and smartphone requirements Advise on considerations for security Install maxview on nominated PC and servers Setup maxview on nominated PC and servers Provide basic training overview on use Critical Considerations for HA Configuration Grouping of databases Journaling Remote Journaling ASP / iasp considerations Naming Apply Group settings Role Swap / Failover Change Control A Change Control system/process is critical not only to track and plan activity for your Production environment but once you are replicating it is critical to track and plan activity that can affect either system. Changes need to be looked at as to what they can or will affect, how they will be implemented and what 06
7 safeguards are in place if the change needs to be removed and the original setting put back in place. Changes at a system level need to take into account how the Target system would be affected if it becomes the Production system. Verify Your Implementation Works Once replication has been set up, there needs to be checks in place to verify what has been done and to verify the integrity of the environments as an ongoing process. Auditing is the main recommendation to verify the environment but local integrity checks may also be used as well. Once you have setup your checking processes, the next stage is to plan and test your DR or HA strategy. This would involve Role Swap, Failover and Simulated Role Swap planning and testing as an ongoing process for your validation needs. Checklist For Success Ensure Data Integrity In order to check the data and object consistency of target databases, audit capabilities need to exist within your HA/DR solution. If users or processes accidentally manage to update the target system there needs to be a means of checking the data stored and correcting it. Maxava HA provides flexible auditing at multiple levels for customers to check their target databases: Existence audits check that an object is physically on the target system. Description audits check the object and its key attributes Content audits check the data contained within the object The Maxava HA audits can be run for a given configuration, library, object, generic list of named objects or by object type. Audits can be run in reporting only and full fix modes. Audit results are shown in easy to view logs via the Maxava HA GUI or TUI interfaces. Audit warningsand actions taken are clearly shown and where an audit was run in reporting only mode, there is the option to manually sync listed objects. In conjunction with the Maxava HA Autonomics process, partial database content audits can also be configured to run for large files where the information is checked and repaired at the block level. Maxava HA Technology Choice Maxava HA provides flexible auditing at multiple levels Benefits of using Maxava HA Autonomics include: Easy to run Existence, Description and Content options Able to run at configuration, library or object levels Can be run in reporting only or full fix mode Easy to view logs. Work in conjunction with Maxava HA Autonomics Role Swap For successful role-swaps, regular testing is the key. Can you switch your network to connect users and devices to the alternative system and will the Backup be ready is it in-sync with the Source? Going to your target system and doing some non-update work on it, - say a few stock enquiries -, will prove that the data you happen to view is valid. What it does not tell you is how your main applications and user access will work out when a full swap is performed. To check data consistency audits can be run to verify that all objects are the same, not just some of them, full or partial audits can be run at regular intervals. This again lets you know your data is correct, however does not test that all the required libraries, objects and user profiles exist to allow you to run your business successfully on the target. Only a role swap or failover test will do that. In order to run a full role swap test where data is going to be updated on the target system and sent back to the source system, a standard role swap or failover processes can be used. If your testing is going to run work which you do not want sent back to your source system, (e.g. a new billing run or a month end), then you need to take one of the following actions : 07
8 End replication and take a full backup of your target system before you start the test. When finished restore back to the save point and allow replication to continue once more. End replication and then run your test. When complete take a fresh save from your source system and refresh the target databases. Allow replication to continue from the new save point. If you use Maxava HA, Initiate the Maxava HA Simulated Role Swap (SRS) process and have your target system suspend, update and switch to primary mode. Run your tests. When complete end the Maxava HA SRS process. It will then roll back as many changes as possible. If there is anything that cannot be recovered in full, an audit or re-sync can be configured to request the required object from the source system. To assist customers in checking that they are Role Swap ready, Maxava HA customers have the ability to test using the Maxava HA Simulated Role Swap (SRS) procedure. SRS is a process, which allows the current Backup system to be used as a test Primary environment whilst the current production system remains in use. The Maxava HA Simulated Role Swap (SRS) will place the Backup environment into a test state and once complete will recover back to how the replication was before the testing occurred with minimal or no user intervention required. Maxava HA Simulated Role Swap (SRS) is not a replacement for Maxava HA Role Swap or Maxava HA Failover, but is a feature that allows certain testing to be performed on the Back-up system, that relates to what Role Swap and Failover need to use if they were invoked. It is important to note that switching the network is a physical exercise that cannot be fully proven virtually. A full monthly trial Role Swap is the recommended approach if you need to check user access, network interfaces, data consistency and application performance. If the goal of a role swap test is simply to investigate application function and performance on the target system, then instead of Role Swapping the machines, then Role Swapping them back again our recommended approach is to use the Maxava HA SRS (Simulated Role Swap). This allows you to continue using your source system whilst testing on the target. So no production system outage and when complete it will roll back the changes made in most instances without the need for major saves and restores. Automation Over time the same tasks will need to be performed day in and day out or as part of weekly, monthly or role swap related events. The best way to cater for these is to automate the processes to make the task easier or quicker to perform. If you have access to a programmer and have the required license on your systems these could be done via programs. However, not all sites have these resources available to them. To help provide automation replication products can provide tools to allow customers to set-up these tasks without needing all the resource overhead programming can occur. Tools such as Command Script Function (CSF) provided with the Maxava HA replication product can be used simply and easily by customers to setup command scripts to perform difficult or repetitive tasks for these needs. This tool does not require any additional licensing to the system and does not require any programming skills. This tool just uses standard IBM i or Maxava HA commands as you would do from a command line, with the feature of being able to group the commands together to run as they normally would on the system. Information such as communications link failures, exceeding disk utilization thresholds and replication issues are delivered to your mobile device or browser. With maxview Manager the interactive feature allows certain actions and requests to be sent back to the system, so you can answer messages, run jobs, start and stop configurations, run audits, even remotely role swap your systems if required. With the intuitive maxview interface, you will see a visual alert of system status and your Maxava HA environment, and be able to take action immediately. For any HA product, a primary requirement is to make sure that all jobs that should be running are running. Monitoring And Control Various HA/DR solutions offer different approaches to monitoring, control and remote access. Maxava HA has always had a GUI as the primary interface that allowed the monitoring and configuration of multiple systems. and configurations. The GUI utilizes IBM Client Access connections to communicate with all the required systems. 08
9 There is also a Green-screen alternative to the GUI, which allows the system it is running on to be monitored and administered. The Green-screen only requires 5250 access to be able to be run from a command line on the required system. The Green Screen interface is referred to as the TUI (Text User Interface). The GUI can show a composite view of all the Maxava HA environments for all machines (or LPARs) in a network. The TUI provides a view for one machine at a time. Maxava has also created maxview, with which you can access Maxava HA and key IBM i system resource information anywhere, anytime from a remote web device or Smartphone. Various maxview versions are provided with Maxava HA dependant on the particular version of Maxava HA selected. maxview and the GUI give an easy-to-read view of the current replication situation with alerts. The GUI also has a GUI traffic-light system (Red/Amber/Green) for highlighting any areas that may require attention. maxview makes real-time system information available remotely. Along with the system information, you can quickly view your Maxava HA environment, drill down to more detail and issue necessary commands if required. Most Maxava customers spend no more than 5 minutes per day, checking that everything is running normally and efficiently. Maxava HA issues alerts and other status information in such a way that it is extremely simple to integrate it into a Systems Management product. Managed Service Monitoring Packages are also available through the Maxava Services Department. the preferred method for whatever reason, the Maxava HA TUI allows you to perform most of the same functions available from the GUI, however just for that one system via the green screen interface. The maxview products allow system and HA monitoring to be accessible to not only the technical staff, but also management and operations. They allow you to be remote and still have control over your systems via your Smartphone. Best Practices In Implementing HA/DR The role of real-time HA/DR solutions is to maintain an identical copy of a production environment on a Backup system. The transactional activity that occurs on the Production environment must be recreated in real-time on the Backup system. The objective is to allow the customer to maintain two identical copies of their database, up to date to the second and often in locations many miles apart. It gives businesses the ability to switch or role-swap between the two database copies. Data can be replicated in various ways by a variety of products but at the fundamental level the options are Hardware Replication (Power HA) or Software Replication (often referred to as Logical Replication) such as Maxava HA. A primary responsibility of HA software should be to ensure all Object and Data Activity is relayed off the Source system with the absolute minimum of delay. HA/DR software must prepare for the possibility of the Source system failing without warning. Having activity which has occurred on the Source system but that has not yet been sent to the Back-up system will have the obvious repercussion of loss of data, an unacceptable result in today s time-critical business environments. Maxava Technology Choice Maxava HA provides multiple interfaces to allow monitoring and support of your systems no matter where you are. Benefits of using Maxava HA Interfaces include: Maxava has multiple interface choices. The Maxava HA GUI allows multiple systems to be configured, monitored and managed from a single interface. The Maxava GUI also has a traffic-light system (Red/ Amber/Green) for highlighting any areas that may require attention over and above the normal expected reporting options. If 5250 is the only communications option available or 09
IBM. Availability Implementing high availability. IBM i 7.1
IBM IBM i Availability Implementing high availability 7.1 IBM IBM i Availability Implementing high availability 7.1 Note Before using this information and the product it supports, read the information
More informationIBM i OS Journaling and High Availability
WHITE PAPER IBM i OS Journaling and High Availability A guide to understanding the foundation of software-based replication in IBM i environments Introduction IBM s midrange computers, from the earliest
More informationDisaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper By Anton Els
Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper By Anton Els Copyright 2017 Dbvisit Software Limited. All Rights Reserved V3, Oct 2017 Contents Executive Summary...
More informationAvailability Implementing High Availability with the solution-based approach Operator's guide
System i Availability Implementing High Availability with the solution-based approach Operator's guide Version 6 Release 1 System i Availability Implementing High Availability with the solution-based
More informationManaged Service. Managed Services. High Availability / Disaster Recovery Solutions. Cloud and Hosting Solutions. Security Solutions.
Managed Service Managed Services IBM i Intel AIX High Availability / Disaster Recovery Solutions Design & Implementation Monitoring Cloud and Hosting Solutions Security Solutions Single Sign-On Assessments
More informationAvailability Implementing high availability
System i Availability Implementing high availability Version 6 Release 1 System i Availability Implementing high availability Version 6 Release 1 Note Before using this information and the product it
More informationIBM i Version 7.3. Systems management Disk management IBM
IBM i Version 7.3 Systems management Disk management IBM IBM i Version 7.3 Systems management Disk management IBM Note Before using this information and the product it supports, read the information in
More informationCourse 6231A: Maintaining a Microsoft SQL Server 2008 Database
Course 6231A: Maintaining a Microsoft SQL Server 2008 Database About this Course This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2008
More informationIBM TS7700 grid solutions for business continuity
IBM grid solutions for business continuity Enhance data protection and business continuity for mainframe environments in the cloud era Highlights Help ensure business continuity with advanced features
More informationFour Essential Steps for Removing Risk and Downtime from Your POWER9 Migration
Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration Syncsort Four Essential Steps for Removing Risk and Downtime from Your POWER9 Migration With the introduction of IBM s POWER9
More informationHigh Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
More informationCarbonite Availability. Technical overview
Carbonite Availability Technical overview Table of contents Executive summary The availability imperative...3 True real-time replication More efficient and better protection... 4 Robust protection Reliably
More informationMaintaining a Microsoft SQL Server 2008 Database (Course 6231A)
Duration Five days Introduction Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2008
More informationThe Right Choice for DR: Data Guard, Stretch Clusters, or Remote Mirroring. Ashish Ray Group Product Manager Oracle Corporation
The Right Choice for DR: Data Guard, Stretch Clusters, or Remote Mirroring Ashish Ray Group Product Manager Oracle Corporation Causes of Downtime Unplanned Downtime Planned Downtime System Failures Data
More informationCourse 6231A: Maintaining a Microsoft SQL Server 2008 Database
Course 6231A: Maintaining a Microsoft SQL Server 2008 Database OVERVIEW About this Course Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the
More informationBUSINESS CONTINUITY: THE PROFIT SCENARIO
WHITE PAPER BUSINESS CONTINUITY: THE PROFIT SCENARIO THE BENEFITS OF A COMPREHENSIVE BUSINESS CONTINUITY STRATEGY FOR INCREASED OPPORTUNITY Organizational data is the DNA of a business it makes your operation
More informationDocument Version Number: 1.0 Publication Date: August 2010 Review Date: August 2010 Type: Instructional Security Classification Classified
Document Version Number: 1.0 Publication Date: August 2010 Review Date: August 2010 Type: Instructional Security Classification Classified maxview Lite From Copyright 2000-2010 Maximum Availability Ltd.
More informationIBM. Systems management Disk management. IBM i 7.1
IBM IBM i Systems management Disk management 7.1 IBM IBM i Systems management Disk management 7.1 Note Before using this information and the product it supports, read the information in Notices, on page
More information10 The next chapter of this Web Based Training module describe the two different Remote Equivalent Transfer Modes; synchronous and asynchronous.
Slide 0 Welcome to this Web Based Training session providing an introduction to the fundamentals of Remote Equivalent Copy. This is one of the ETERNUS DX Advanced Copy Functions available in Fujitsu ETERNUS
More informationIf you lost your data and don t have a plan, its too late to for DR! When Disaster strikes, will you have HA protection?
If you lost your data and don t have a plan, its too late to for DR! When Disaster strikes, will you have HA protection? Little about me Definitions History IBM I Disaster Recovery High Availability Disaster
More informationNew IBM i Technologies and Wine Make Backup and Recovery Better. Debbie Saugen Director, Business Continuity Services
New IBM i Technologies and Wine Make Backup and Recovery Better Debbie Saugen Director, Business Continuity Services debbie.saugen@helpsystems.com About the Speaker Debbie Saugen is recognized worldwide
More informationPlanning and Administering SharePoint 2016
Planning and Administering SharePoint 2016 20339-1; 5 Days; Instructor-led Course Description This five-day course will provide you with the knowledge and skills to plan and administer a Microsoft SharePoint
More informationDowntime Prevention Buyer s Guide. 6 QUESTIONS to help you choose the right availability protection for your applications
Downtime Prevention Buyer s Guide 6 QUESTIONS to help you choose the right availability protection for your applications Question 6 questions to help you choose the right availability protection for your
More informationBalancing RTO, RPO, and budget. Table of Contents. White Paper Seven steps to disaster recovery nirvana for wholesale distributors
White Paper Seven steps to disaster recovery nirvana for wholesale distributors Balancing RTO, RPO, and budget In our last white paper, Thinking through the unthinkable: Disaster recovery for wholesale
More informationTSM Paper Replicating TSM
TSM Paper Replicating TSM (Primarily to enable faster time to recoverability using an alternative instance) Deon George, 23/02/2015 Index INDEX 2 PREFACE 3 BACKGROUND 3 OBJECTIVE 4 AVAILABLE COPY DATA
More informationExadata Implementation Strategy
Exadata Implementation Strategy BY UMAIR MANSOOB 1 Who Am I Work as Senior Principle Engineer for an Oracle Partner Oracle Certified Administrator from Oracle 7 12c Exadata Certified Implementation Specialist
More informationPROTECT YOUR DATA FROM MALWARE AND ENSURE BUSINESS CONTINUITY ON THE CLOUD WITH NAVLINK MANAGED AMAZON WEB SERVICES MANAGED AWS
PROTECT YOUR DATA FROM MALWARE AND ENSURE BUSINESS CONTINUITY ON THE CLOUD WITH NAVLINK MANAGED AMAZON WEB SERVICES MANAGED AWS Improved performance Faster go-to-market Better security In today s disruptive
More informationAdmin Plus Pack Option. ExecView Web Console. Backup Exec Admin Console
WHITE PAPER Managing Distributed Backup Servers VERITAS Backup Exec TM 9.0 for Windows Servers Admin Plus Pack Option ExecView Web Console Backup Exec Admin Console VERSION INCLUDES TABLE OF CONTENTS STYLES
More informationExadata Implementation Strategy
BY UMAIR MANSOOB Who Am I Oracle Certified Administrator from Oracle 7 12c Exadata Certified Implementation Specialist since 2011 Oracle Database Performance Tuning Certified Expert Oracle Business Intelligence
More informationIBM iseries Models 800 and 810 for small to medium enterprises
Multi-platform management, exceptional price performance IBM iseries Models 800 and 810 for small to medium enterprises Highlights Simple, centralised Simple Windows ** Integration for management of multiple
More informationIBM Tivoli Storage Manager for AIX Version Installation Guide IBM
IBM Tivoli Storage Manager for AIX Version 7.1.3 Installation Guide IBM IBM Tivoli Storage Manager for AIX Version 7.1.3 Installation Guide IBM Note: Before you use this information and the product it
More informationHigh Availability for IBM i. A Technical Review of Softwareand Hardware-Based Solutions
High Availability for IBM i A Technical Review of Softwareand Hardware-Based Solutions Abstract This paper briefly describes what you need to know in order to make an informed decision with regard to IBM
More informationWhat s New. New and Enhanced Features in NetSupport DNA v4. Welcome Dashboard. Auto Discovery. Platform Support
What s New New and Enhanced Features in NetSupport DNA v4 Welcome to NetSupport DNA version 4, the fresh approach to IT Asset Management. With any new release, the focus is not only on introducing innovative
More informationHigh Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.
High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. Table of Contents Section I: The Need for Warm Standby...2 The Business Problem...2 Section II:
More informationTable of Contents WHITE PAPER
Table of Contents Abstract.................................................................. 3 Executive Summary...4 Overview...5 Unique IBM i Platform Technologies Explained...5 Hardware Technologies
More information2788 : Designing High Availability Database Solutions Using Microsoft SQL Server 2005
2788 : Designing High Availability Database Solutions Using Microsoft SQL Server 2005 Introduction Elements of this syllabus are subject to change. This three-day instructor-led course provides students
More informationZYNSTRA TECHNICAL BRIEFING NOTE
ZYNSTRA TECHNICAL BRIEFING NOTE Backup What is Backup? Backup is a service that forms an integral part of each Cloud Managed Server. Its purpose is to regularly store an additional copy of your data and
More information10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING. By: Vinod Mohan
10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING By: Vinod Mohan 10 Best Practices to Streamline Network Monitoring Introduction As a network admin, you are tasked with keeping your organization s network
More informationTANDBERG Management Suite - Redundancy Configuration and Overview
Management Suite - Redundancy Configuration and Overview TMS Software version 11.7 TANDBERG D50396 Rev 2.1.1 This document is not to be reproduced in whole or in part without the permission in writing
More informationMicrosoft SQL Server Fix Pack 15. Reference IBM
Microsoft SQL Server 6.3.1 Fix Pack 15 Reference IBM Microsoft SQL Server 6.3.1 Fix Pack 15 Reference IBM Note Before using this information and the product it supports, read the information in Notices
More informationWindows Server 2016 MCSA Bootcamp
Course Overview This course will provide experienced IT professionals who wish to either upgrade their skills for the purpose of certifying on Microsoft Windows Server 2016 or who wish to gain information
More informationNew England Data Camp v2.0 It is all about the data! Caregroup Healthcare System. Ayad Shammout Lead Technical DBA
New England Data Camp v2.0 It is all about the data! Caregroup Healthcare System Ayad Shammout Lead Technical DBA ashammou@caregroup.harvard.edu About Caregroup SQL Server Database Mirroring Selected SQL
More informationUnified Management for Virtual Storage
Unified Management for Virtual Storage Storage Virtualization Automated Information Supply Chains Contribute to the Information Explosion Zettabytes Information doubling every 18-24 months Storage growing
More informationAn Introduction to High Availability for Power Systems Running IBM i Get to know the core components of HA solutions and important installation
An Introduction to High Availability for Power Systems Running IBM i Get to know the core components of HA solutions and important installation considerations. Introduction Every company faces critical
More informationVeritas Cluster Server from Symantec
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overviewview protects your most important applications from planned and unplanned downtime.
More informationMicrosoft Core Solutions of Microsoft SharePoint Server 2013
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20331 - Core Solutions of Microsoft SharePoint Server 2013 Length 5 days Price $4290.00 (inc GST) Version B Overview This course will provide you with the
More informationBusiness Continuity and Disaster Recovery. Ed Crowley Ch 12
Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster
More informationDell PowerVault MD3600f/MD3620f Remote Replication Functional Guide
Dell PowerVault MD3600f/MD3620f Remote Replication Functional Guide Page i THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT
More informationDouble-Take vs. Steeleye DataKeeper Cluster Edition
Double-Take vs. Steeleye DataKeeper Cluster Edition A Competitive Analysis July 2012 Double- Take from Vision Solutions is compared to Steeleye DataKeeper Cluster Edition. A summary of the performance
More informationUNITRENDS CLOUD BACKUP FOR OFFICE 365
UNITRENDS CLOUD BACKUP FOR OFFICE 365 FREQUENTLY ASKED QUESTIONS Unitrends Cloud Backup for Office 365 provides full, automatic protection that is purpose-built for Microsoft SaaS applications, eliminating
More informationAchieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX
Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX Introduction Planning for recovery is a requirement in businesses of all sizes. In implementing an operational
More informationVeritas Volume Replicator Option by Symantec
Veritas Volume Replicator Option by Symantec Data replication for disaster recovery The provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable
More informationCourse Outline. Administering Microsoft SQL Server 2012 Databases (Course & Lab) ( Add-On )
Course Outline Administering Microsoft SQL Server 2012 Databases (Course & Lab) 07 Jul 2018 ( Add-On ) Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Data Sheet: Storage Management Overview Veritas Storage Foundation 6.0 for Windows brings advanced online storage management
More informationA Practical Guide to Cost-Effective Disaster Recovery Planning
White Paper PlateSpin A Practical Guide to Cost-Effective Disaster Recovery Planning Organizations across the globe are finding disaster recovery increasingly important for a number of reasons. With the
More informationHow to Lift-and-Shift a Line of Business Application onto Google Cloud Platform
How to Lift-and-Shift a Line of Business Application onto Google Cloud Platform by Andy Wu, Solutions Architect, Magenic White Paper How to Lift-and-Shift a Line of Business Application onto Google Cloud
More informationThe Microsoft Large Mailbox Vision
WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more email has many advantages. Large mailboxes
More informationDELL EMC UNITY: REPLICATION TECHNOLOGIES
DELL EMC UNITY: REPLICATION TECHNOLOGIES A Detailed Review ABSTRACT This white paper explains the replication solutions for Dell EMC Unity systems. This paper outlines the native and non-native options
More informationMIMIX. Version 7.0 MIMIX Global Operations 5250
MIMIX Version 7.0 MIMIX Global Operations 5250 Published: September 2010 level 7.0.01.00 Copyrights, Trademarks, and tices Contents Version 7.0 MIMIX Global Operations 5250 Who this book is for... 5 What
More information10 Reasons Why Your DR Plan Won t Work
10 Reasons Why Your DR Plan Won t Work Jim Damoulakis CTO, GlassHouse Technologies, Inc. Sept. 29, 2005 DR Vision Imagine Prepared to handle multiple categories of disaster Clearly documented policies
More informationA: PLANNING AND ADMINISTERING SHAREPOINT 2016
ABOUT THIS COURSE This five-day course will provide you with the knowledge and skills to plan and administer a Microsoft SharePoint 2016 environment. The course teaches you how to deploy, administer, and
More informationNetwork Performance, Security and Reliability Assessment
Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD
More informationC H A P T E R Overview Figure 1-1 What is Disaster Recovery as a Service?
CHAPTER 1 Cisco Disaster Recovery as a Service Solution (DRaaS) architecture described in this document is designed to provide a new set of related capabilities allowing Virtualized Multi-Tenant Data Center
More informationInstalling and Administering a Satellite Environment
IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00 IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00
More informationBest Practices for Alert Tuning. This white paper will provide best practices for alert tuning to ensure two related outcomes:
This white paper will provide best practices for alert tuning to ensure two related outcomes: 1. Monitoring is in place to catch critical conditions and alert the right people 2. Noise is reduced and people
More informationWHITE PAPER. Header Title. Side Bar Copy. Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER
Side Bar Copy Header Title Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER Introduction Due to the complexity of protecting ever-changing infrastructures and the
More informationMIMIX Availability. Version 7.1 MIMIX Operations 5250
MIMIX Availability Version 7.1 MIMIX Operations 5250 Notices MIMIX Operations - 5250 User Guide April 2014 Version: 7.1.21.00 Copyright 1999, 2014 Vision Solutions, Inc. All rights reserved. The information
More informationBackup and Restore Operations
Backup Data Type, page 1 Backup and Restore Repositories, page 2 On-Demand and Scheduled Backups, page 3 Cisco ISE Restore Operation, page 8 Export Authentication and Authorization Policy Configuration,
More informationHow Cisco IT Deployed Enterprise Messaging on Cisco UCS
Cisco IT Case Study July 2012 Enterprise Messaging on Cisco UCS How Cisco IT Deployed Enterprise Messaging on Cisco UCS Messaging platform upgrade and new servers reduce costs and improve management, availability,
More informationBenefits of Multi-Node Scale-out Clusters running NetApp Clustered Data ONTAP. Silverton Consulting, Inc. StorInt Briefing
Benefits of Multi-Node Scale-out Clusters running NetApp Clustered Data ONTAP Silverton Consulting, Inc. StorInt Briefing BENEFITS OF MULTI- NODE SCALE- OUT CLUSTERS RUNNING NETAPP CDOT PAGE 2 OF 7 Introduction
More informationHow Viper2 Can Help You!
How Viper2 Can Help You! December 6, 2007 Matt Emmerton DB2 Performance and Solutions Development IBM Toronto Laboratory memmerto@ca.ibm.com How Can Viper2 Help DBAs? By putting intelligence and automation
More informationCourse : Planning and Administering SharePoint 2016
Course Outline Course 20339-1: Planning and Administering SharePoint 2016 Duration: 5 days About this course This five-day course will provide you with the knowledge and skills to plan and administer a
More informationSAP HANA Disaster Recovery with Asynchronous Storage Replication
Technical Report SAP HANA Disaster Recovery with Asynchronous Storage Replication Using SnapCenter 4.0 SAP HANA Plug-In Nils Bauer, Bernd Herth, NetApp April 2018 TR-4646 Abstract This document provides
More informationOutwood Grange Academies Trust ensures teaching continuity with Arcserve UDP
Customer Case Study December 2015 Outwood Grange Academies Trust ensures teaching continuity with Arcserve UDP CLIENT PROFILE Industry: Education Organisation: Outwood Grange Academies Trust Employees:
More informationEMC RecoverPoint. EMC RecoverPoint Support
Support, page 1 Adding an Account, page 2 RecoverPoint Appliance Clusters, page 3 Replication Through Consistency Groups, page 4 Group Sets, page 22 System Tasks, page 24 Support protects storage array
More informationOracle Rdb Hot Standby Performance Test Results
Oracle Rdb Hot Performance Test Results Bill Gettys (bill.gettys@oracle.com), Principal Engineer, Oracle Corporation August 15, 1999 Introduction With the release of Rdb version 7.0, Oracle offered a powerful
More informationPlanning and Administering SharePoint 2016
Planning and Administering SharePoint 2016 Course 20339A 5 Days Instructor-led, Hands on Course Information This five-day course will combine the Planning and Administering SharePoint 2016 class with the
More informationEMC VPLEX with Quantum Stornext
White Paper Application Enabled Collaboration Abstract The EMC VPLEX storage federation solution together with Quantum StorNext file system enables a stretched cluster solution where hosts has simultaneous
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.0 for Windows brings advanced online storage management to Microsoft Windows Server environments.
More informationIBM i Version 7 Release 3. Availability High availability overview IBM
IBM i Version 7 Release 3 Availability High availability overview IBM IBM i Version 7 Release 3 Availability High availability overview IBM Note Before using this information and the product it supports,
More informationBranch Office Data Consolidation
Branch Office Data Consolidation A New Paradigm in Data Protection Published: February 2004 Abstract Many companies today face the growing challenge of protecting rapidly proliferating data dispersed throughout
More informationPowerHA Tools for IBM i
IBM Power Systems PowerHA Tools for IBM i Full System Copy Services Manager 4.3 Version 2 Capabilities and requirements Perform full system backups with minimal downtime 2 Features Automates managing IBM
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationMarkLogic Server. Database Replication Guide. MarkLogic 6 September, Copyright 2012 MarkLogic Corporation. All rights reserved.
Database Replication Guide 1 MarkLogic 6 September, 2012 Last Revised: 6.0-1, September, 2012 Copyright 2012 MarkLogic Corporation. All rights reserved. Database Replication Guide 1.0 Database Replication
More informationEMC VPLEX Geo with Quantum StorNext
White Paper Application Enabled Collaboration Abstract The EMC VPLEX Geo storage federation solution, together with Quantum StorNext file system, enables a global clustered File System solution where remote
More informationAras Innovator 11. Backup and Recovery Procedures
Document #: 11.0.02015040601 Last Modified: 1/4/2018 Copyright Information Copyright 2018 Aras Corporation. All Rights Reserved. Aras Corporation 300 Brickstone Square Suite 700 Andover, MA 01810 Phone:
More informationAsset Bank - Shared Hosting. Service Description
Asset Bank - Shared Hosting Service Description Date: 12th December 2016 Version: Status: d19 Released Introduction This document describes Bright Interactive s Shared Hosting Service, the hosting environment
More informationAre you out on the ledge with your DR? 2013 Progress Software Corporation. All rights reserved.
Are you out on the ledge with your DR? 1 Business Continuity & Disaster Recovery OpenEdge Management and OpenEdge Replication Chas Chesler Sr. Account Executive cchesler@progress.com "The best way to get
More informationWelcome to Staying Ahead Webinar
Welcome to Staying Ahead Webinar Migrating to NNMi 1 Footer Goes Here Agenda 1. NNMi features and benefits 2. PSQS / Education offerings around NNMi 3. Q&A 2 Footer Goes Here Streamline your network operations
More informationEMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 31 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
More informationDesigning Database Solutions for Microsoft SQL Server 2012
Course 20465 : Designing Database Solutions for Microsoft SQL Server 2012 Page 1 of 6 Designing Database Solutions for Microsoft SQL Server 2012 Course 20465: 4 days; Instructor-Led Introduction This course
More informationData Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION
Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION 1 TABLE OF CONTENTS VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS...1
More information"Charting the Course... MOC /2: Planning, Administering & Advanced Technologies of SharePoint Course Summary
Description Course Summary This five-day course will provide you with the knowledge and skills to plan and administer a Microsoft environment. The course teaches you how to deploy, administer, and troubleshoot
More informationIBM System Storage DS6800
Enterprise-class storage in a small, scalable package IBM System Storage DS6800 Highlights Designed to deliver Designed to provide over enterprise-class functionality, 1600 MBps performance for with open
More informationCOURSE OUTLINE: OD10961B Automating Administration with Windows PowerShell
Course Name OD10961B Automating Administration with Windows Course Duration 2 Days Course Structure Online Course Overview Learn how with Windows 4.0, you can remotely manage multiple Windows based servers
More informationThe 10 Disaster Planning Essentials For A Small Business Network
The 10 Disaster Planning Essentials For A Small Business Network If your data is important to your business and you cannot afford to have your operations halted for days or even weeks due to data loss
More informationLive Partition Mobility Update
Power Systems ATS Live Partition Mobility Update Ron Barker Power Advanced Technical Sales Support Dallas, TX Agenda Why you should be planning for partition mobility What are your options? Which is best
More informationESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES
ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what
More informationExperiences in Clustering CIFS for IBM Scale Out Network Attached Storage (SONAS)
Experiences in Clustering CIFS for IBM Scale Out Network Attached Storage (SONAS) Dr. Jens-Peter Akelbein Mathias Dietz, Christian Ambach IBM Germany R&D 2011 Storage Developer Conference. Insert Your
More informationCONTENTS. Cisco Internet Streamer CDS 3.0 Software Configuration Guide iii OL CHAPTER 1 Product Overview 1-1
CONTENTS Preface xvii Document Revision History xvii Audience xvii Objective xviii Document Organization xviii Document Conventions xix Related Publications xx Obtaining Documentation and Submitting a
More information