SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
Replication for Business Continuity,
Disaster Recovery and High Availability
Tony Pearson – IBM Master Inventor and Senior Managing Consultant
March 2013




                                                                    © 2013 IBM Corporation
Everyone Knows: Downtime is Bad!


    Lost brand equity
    Loss of goodwill and trust
    Lost loyalty
    Lost revenue and market share
    Lost productivity




    Causes:




2                                   © 2013 IBM Corporation
2013: continued                                       Metcalf’s Law:
                                                      Value of network
 acceleration of changes                                  increases
                                                    proportional to square
 in today’s business world….                           of # people on it




                                                                                                  5
                                                                                                  5
 Trust




                                                                                                Cross-Industry
                                                                                                Value Coalition
                                                                         4
                                                                         4
                                                                             Industry-Centric
                                                                               Value Web

                                                    3
                                                    3
                                                        Extended Value                                Core Business
                                                            Chain
                              2
                              2                                                                       Subsidiary/JV
                                  Select ‘Trusted
                                                                                                      Customer
                                     Partners’
             1
             1                                                                                        Partner/Channel
                  Isolated
                 Operations                                                                           Supplier/Outsourcer

                                                    Collaboration

| 3      3                                                                                                  © 2013 IBM Corporation
The “Business Process” is the Unit of Recovery
Business




                           Business     Business        Business         Business    Business      Business         Business
                          process A     process B       process C       process D    process E     process F       process G




                                                                                        3. The loss of both                          db2
Application




                                                              Application 2             applications affects two
                                       http://xyz.xml                                        Web
                                                                                        distinctly different
                                                                                            Sphere
                                                                                        business processes
                                 MQseries
                                            2. The error impacts               management                            Application 3
                                                  Analytics
                 Application 1              the ability of two or
                                                   report                        reports               decision
                                            more applications to SQL                                    point
                                            share critical data
Infrastructure




                                                                                        IT Business Continuity
                                       1. An error occurs on
                                       a storage device that                            must recover at the
                                       correspondingly
                                       corrupts a database
                                                                                        business process
                                                                                        level
  4                                                                                                                      © 2013 IBM Corporation
Overlap of valid data protection techniques


                                                    IT Data
                                                   Protection




          1. High Availability              2. Continuous Operations            3. Disaster Recovery
      Fault-tolerant, failure-resistant      Non-disruptive backups and       Protection against unplanned
        streamlined infrastructure        system maintenance coupled with       outages such as disasters
            with affordable cost               continuous availability of      through reliable, predictable
                foundation                           applications                       recovery


       Protection of critical Business data                  Operations continue after a disaster
       Recovery is predictable and reliable                  Costs are predictable and manageable


5                                                                                                © 2013 IBM Corporation
Timeline of a Disaster Recovery
      Recovery Point
      Objective (RPO).                                                                                 Recovery
      How much data                     Time
     must be recreated?
                                                                                                         Site
                                             Execute hardware, O/S,
    RPO               Assess
                                              data integrity recovery
                                                                                                                          Telecom Network




                                                                              Data
                    Management
                      Control
                                                                                                                              Physical Facilities


                                                                                           Operating System




       Outage
    Production   ☺                                                      Operations Staff
                                                                                                                       Network Staff



                                                                                             Applications Staff


                                                                                                                        Applications

                                 Recovery Time Objective (RTO)                       Software transaction
                                                                        RPO
                                   of hardware data integrity                           integrity recovery
    Δ Data


                                 Recovery Time Objective (RTO)
                                    of transaction integrity

                                                                                                                  Now we're done!


6                                                                                                                 © 2013 IBM Corporation
Technology drives the Recover Point Objective (RPO)

    For example:


              Wks    Days Hrs Mins Secs               Secs   Mins   Hrs Days Wks


                   Recovery Point                     Recovery Time


         Tape
         Backup      Periodic
                     Replication
                             Asynchronous
                             replication
                                         Synchronous
                                         replication / HA




7                                                                                  © 2013 IBM Corporation
Automation drives Recovery Time Objective (RTO)

    For example:

                Wks Days Hrs Mins Secs         Secs Mins    Hrs Days Wks


                   Recovery Point              Recovery Time



                                               End to end
                                               automated     Storage
     Recovery Time includes:                   clustering    automation Manual Tape
                                                                        Restore
       –   Fault detection
       –   Recovering data
       –   Bringing applications back online
       –   Network access

8                                                                          © 2013 IBM Corporation
Business Continuity Tiers

               Balancing recovery time objective with cost / value

               Recovery from a disk image                                       Recovery from tape copy



                          BC Tier 7 –Server or Storage replication with end-to-end automated server recovery
Cost / Value




                               BC Tier 6 –real-time continuous data replication, server or storage

                                         BC Tier 5 –Application/database integration to Backup/Restore

                                                     BC Tier 4 –Point in Time replication to Backup/Restore

                                                                      BC Tier 3 – VTL, Data De-Dup, Remote vault
                                                                                        BC Tier 2 – Tape libraries + Automation
                                                                                                           BC Tier 1 – Restore
                15 Min.    1-4 Hr..      4 -8 Hr..   8-12 Hr..   12-16 Hr..   24 Hr..      Days            from Tape
                                      Recovery Time Objective (guidelines only)


9                                                                                                                 © 2013 IBM Corporation
Ideal World for High Availability and Business Continuity (HA/BC)


Business processes drive strategies and they are integral to the Continuity of Business Operations. A company cannot be
resilient without having strategies for alternate workspace, staff members, call centers and communications channels.



Business Prioritization                                 Integration into IT                          Manage

                     Awareness, Regular Validation, Change Management, Quarterly Management Briefings                            Resilience
                                                                                                                                  Program
                                                               t                                                         d e Management
                                                             en                                                        e
                                                                                                                     at m
                                                          rr ility                                                 im y Ti
                                        RTO/RPO         Cu ab                                                    t
                                                           p                                                  Es ver
                                                        Ca                                                       co
                       business                                                                               Re
     risk                                 program             Program      Strategy                                      program
                         impact                                                               Implement
 assessment                              assessment            Design       Design                                      validation
                        analysis
                                      of
                 itie s           cts      • Maturity                                                1.    People
              bil               pa age
                                                                              High Availability
             a                                             crisis team
           er ts             Im ut           Model                                design
                                                                                                     2.    Processes
        uln rea                  O         • Measure                                                 3.    Plans
      ,V h                                                  business
    ks nd T                                  ROI                                 High Availability
 Ris a                                                     resumption                Servers         4.    Strategies
                                           • Roadmap                                                 5.    Networks
                                             for             disaster             Storage, Data      6.    Platforms
                                             Program         recovery              Replication       7.    Facilities
                                                               high
                                                                                  Database and
                                                            availability         Software design

                                                                                                          Source: IBM STG, IBM Global Services
 10                                                                                                                      © 2013 IBM Corporation
Data Strategy Defined




 The role of the basic “Data Strategy” for HA/BC purposes
     Define major data types “good enough”
      – i.e. by major application, by business line….
      – An ongoing journey                                                        Business Strategies
                                                         You have to
     For each data type:                                know your data                   IT Strategy
      –   Usage
      –   Performance and measurement
      –   Security                                                                    Data Strategy
                                                                                      Data Strategy
      –   Availability
      –   Criticality
      –   Organizational role                                                   Enterprise IT Architecture
      –   Who manages
      –   What standards for this data                    And have a
            • What type storage deployed on              basic strategy
            • What database
            • What virtualization                             for it

     Be pragmatic                                                                    IT Infrastructure
      – Create a basic, “good enough” data strategy for HA/BC purposes

                                                                                 People              Data
     Acquire tools that help you know your data
                                                                                Process
                                                                                                  Technology
                                                                                Structure



11                                                                                                   © 2013 IBM Corporation
A basic data strategy tells you how to categorize your data -
 looks something like this (step by step):
  Mission
  Critical

                           Mission – critical data
                            –    Mission-critical data that is the highest priority dtaa
                            –    Priority = uptime, with high value justification



                           Subset of data that is either mission-critical or
                           supports mission critical
                            –    Data that supports business lines
                            –    Balanced priorities = Uptime and cost/value


                                Knowledge of user and application data
                                 –   All data, whether active or not….
                                 –   Which eventually needs to be archived, retained
                                 –   Priority = cost



Lower        Virtualized             Not easy to know and categorize your data -
cost
              Storage
                                         But is the only foundation possible

  12                                                                                       © 2013 IBM Corporation
Then, your basic data strategy allows you to scope
 your HA/BC – something like this:
  Mission
  Critical

                           Continuous Availability (CA)
                            –    Finally, create the mission-critical subset with highest level of recovery
                            –    RTO = near continuous, RPO = small as possible (Tier 7)
                            –    Priority = uptime, with high value justification


                           Rapid Data Recovery (RDR)
                            –    Then create separate storage pools as required
                            –    RTO = minutes, to (approx. range): 2 to 6 hours
                            –    BC Tiers 4, 5 and 6
                            –    Balanced priorities = Uptime and cost/value
                                Backup/Restore (B/R)
                                 –   Virtualize, optimize cost, lay recovery capability foundation
                                 –   Provide universal 24 hour - 12 hour (approx) recovery capability
                                 –   Address requirements for archival, compliance, green energy
                                 –   Priority = cost

Lower        Virtualized             Not easy to and categorize your data - data -
                                           Know know and categorize your
cost
              Storage
                                      This is where only foundation possible
                                         But is the virtualization is the enabler

  13                                                                                     © 2013 IBM Corporation
Rule of Thumb for continuous replication bandwidth

                                Rule of Thumb:
                                 – Every 1 TB of mirrored disk storage generates
                                   about this much MB/sec of writes:

                                OLTP
                                 – 1-2 MB/sec of write bandwidth
                                Sequential/batch
                                 – 6-7 MB/sec of write bandwidth


                                Expect minimum 2.5x this to handle peaks
                                Expect normal data compression to be about 2:1

                                Example - you have 10 TB of disk to mirror:
                                 – OLTP: 10-20 MB/sec
             ROT:
                                 – Batch/sequential: 60-70 MB/sec
 one OC3 line = 15 MB/sec raw
     Effective transfer rate


14                                                                     © 2013 IBM Corporation
Short distance synchronous mirroring: 2 site



                               Short distance may not
                               meet DR requirements
                                                                    Ability to utilize server
                                                                    capacity in both sites for
                                                                    single instance of
                                                                    application data
     Potential/ability for
     non-disruptive failover
                                                        S
                                 P                              Additional copy of data might
                                                            F
                                                                be provided for testing or
                                                                testing may be done by
      Hardware solution gives data                              regular switch of sites
      consistency between multiple
      servers/applications and single
      management point


15                                                                                 © 2013 IBM Corporation
Long Distance Mirroring: 2 site

                          Longer distance to meet
                          regulatory requirements and
                          protect against regional events               Ability to utilize server
                                                                        capacity in both sites for
                                                                        applications with
                                Disruptive failover and less            separate/independent
                                potential to use DR                     data
                                solution for continuous
                                availability

                                   1
                                   0

                            P      0
                                   0
                                   0
                                                               S F
                                   1
                                   0



                           F S                                  P
                                                                     Additional copy of
     Asynchronous replication                                        data more likely to be
     more likely due to                                              provided for testing
     performance requirements



16                                                                                   © 2013 IBM Corporation
Sync versus Async

                                                                               Server I/O
           Server I/O                                                         1
            1
                                                                       2
                                                                                                3
     4
                             2

                                                                                   P                              S
                  P                          S                                                      4
                                 3

                 Metro Mirror                                                          Global Mirror
                                                                                  Asynchronous (any distance)
                Synchronous <300 km
                                                              •Write to primary volume
•Write to primary volume                                      •The primary site acknowledges to the host application
•The primary site initiates an I/O to the secondary site to    that the write is complete
 transfer the data                                            Some later time:
•Secondary indicates to the primary that the write is         •The primary site initiates an I/O to the secondary site to
 complete                                                      transfer the data
•Primary acknowledges to the host application that the        •Secondary indicates to the primary that the write is
 write is complete                                             complete
•Round-trip latency added to each Write I/O                   •Primary and secondary bitmap updated that data is in
                                                               sync

17                                                                                                       © 2013 IBM Corporation
3-Site Configurations


     Campus
     Local-1, Local-2   Local-1              Local-1   Remote-2
                                  Bunker-2




                          Remote-3               Remote-3
       Remote-3
18                                                      © 2013 IBM Corporation
Tivoli Storage Manager an integrated, end-to-end data protection and
                                unified recovery management solution
                                                                                                                          •DR Operations
•Mobile Offices      •Remote Office(s)                                     •Data Center                                   Archive / Off Site

                                                 Critical Applicat     Critical      VMware         Applications
                         Applications                                                               File Servers                 Information
                                                      Servers          Applicat      Servers
                         File Servers                                                              VMware Servers                  Archive
                        VMware Servers




                                                                      •FlashCopy                    •TSM Clients             Cloud
                                                          •FastBack
                                                                       •Manager                        •TDPs                Storage ProtecTIER
  FastBack for                  •TSM Clients
  Workstations                     •TDPs                                                                                         Tiers of
                                                                                    •TSM VE                Cloud                 Storage
                                                                                                          Gateway
                  FastBack
                                                      •DR
                                                                                               Tiers of
                                                                      •TSM Server              Storage                             •TSM Server
                                           WAN                                                                      WAN


                                                                                  • Install / Upgrade     • Configuration
                  Centralized Administration                                      • Monitoring            • Set Policies
                                                                                  • Reporting             • Execute Backup / Restore



                     “TSM is the grand-daddy of unified recovery management” --
                            Lauren Whitehouse, Enterprise Strategy Group
   19                                                                                                                          © 2013 IBM Corporation
Summary
          Understand today’s best
          practices
           – for IT High Availability and
             Business Continuity


          Strategies for:
           – Requirements, design,
             implementation
           – In-house vs. out-sourcing


          Step by step methodology
           – Essential role of virtualization
           – IBM technologies for replication
             and replication management


20                                       © 2013 IBM Corporation
21   © 2013 IBM Corporation
Resources and Information



                            IBM Redbook: Business Continuity
                            Planning Guide


                            http://www.redbooks.ibm.com/abstra
                            cts/sg246547.html


                            In particular, chapters 3, 6, 7




22                                                     © 2013 IBM Corporation
Tony Pearson
                                                                                                           9000 S. Rita Road
                                                                                                           Bldg 9032 Room 1238
About the Speaker                                                             Master Inventor,
                                                                                                           Tucson, AZ 85744
                                                                              Senior Managing
                                                                              Consultant
                              Mr. Tony Pearson                                                             +1 520-799-4309 (Office)
                              Master Inventor,                                IBM System Storage™
                                                                                                           tpearson@us.ibm.com
                              Senior Managing Consultant
                              IBM System Storage


     Tony Pearson is a Master Inventor and Senior managing consultant for the IBM System Storage™ product line. Tony joined
     IBM Corporation in 1986 in Tucson, Arizona, USA, and has lived there ever since. In his current role, Tony presents briefings on
     storage topics covering the entire System Storage product line, Tivoli storage software products, and topics related to Cloud
     Computing. He interacts with clients, speaks at conferences and events, and leads client workshops to help clients with
     strategic planning for IBM’s integrated set of storage management software, hardware, and virtualization products.

     Tony writes the “Inside System Storage” blog, which is read by hundreds of clients, IBM sales reps and IBM Business Partners
     every week. This blog was rated one of the top 10 blogs for the IT storage industry by “Networking World” magazine, and #1
     most read IBM blog on IBM’s developerWorks. The blog has been published in series of books, Inside System Storage: Volume
     I through V.

     Over the past years, Tony has worked in development, marketing and customer care positions for various storage hardware and
     software products. Tony has a Bachelor of Science degree in Software Engineering, and a Master of Science degree in
     Electrical Engineering, both from the University of Arizona. Tony holds 19 IBM patents for inventions on storage hardware and
     software products.


23                                                                                                                    © 2013 IBM Corporation
Additional Resources
                       Email:
                       tpearson@us.ibm.com

                       Twitter:
                       http://twitter.com/az99Øtony

                       Blog:
                       http://ibm.co/brAeZØ

                       Books:
                       http://www.lulu.com/spotlight/99Ø_tony

                       IBM Expert Network:
                       http://www.slideshare.net/az99Øtony




                                                                                     24
24
24                                                              © 2013 IBM Corporation
Trademarks and disclaimers
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. IT
Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce. Intel, Intel logo, Intel
Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its
subsidiaries in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft, Windows, Windows NT, and
the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. ITIL is a registered trademark, and a registered community trademark of the Office
of Government Commerce, and is registered in the U.S. Patent and Trademark Office. UNIX is a registered trademark of The Open Group in the United States and other countries. Java
and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. Cell Broadband Engine is a trademark of Sony Computer Entertainment,
Inc. in the United States, other countries, or both and is used under license therefrom. Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM
Corp. and Quantum in the U.S. and other countries.

Other product and service names might be trademarks of IBM or other companies. Information is provided "AS IS" without warranty of any kind.


The customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and
performance characteristics may vary by customer.


Information concerning non-IBM products was obtained from a supplier of these products, published announcement material, or other publicly available sources and does not constitute an
endorsement of such products by IBM. Sources for non-IBM list prices and performance numbers are taken from publicly available information, including vendor announcements and
vendor worldwide homepages. IBM has not tested these products and cannot confirm the accuracy of performance, capability, or any other claims related to non-IBM products. Questions
on the capability of non-IBM products should be addressed to the supplier of those products.


All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.


Some information addresses anticipated future capabilities. Such information is not intended as a definitive statement of a commitment to specific levels of performance, function or delivery
schedules with respect to any future products. Such commitments are only made in IBM product announcements. The information is presented here to communicate IBM's current
investment and development activities as a good faith effort to help with our customers' future planning.


Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience
will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed.
Therefore, no assurance can be given that an individual user will achieve throughput or performance improvements equivalent to the ratios stated here.


Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contact your IBM
representative or Business Partner for the most current pricing in your geography.


Photographs shown may be engineering prototypes. Changes may be incorporated in production models.


© IBM Corporation 2013. All rights reserved.
References in this document to IBM products or services do not imply that IBM intends to make them available in every country.


Trademarks of International Business Machines Corporation in the United States, other countries, or both can be found on the
World Wide Web at http://www.ibm.com/legal/copytrade.shtml.                                                                                                          ZSP03490-USEN-00

25                                                                                                                                                                      © 2013 IBM Corporation

Mais conteúdo relacionado

Mais procurados

Gordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ieGordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ieDavid O'Dowd
 
Consolidating sap applications for improved operational costs looking at sap ...
Consolidating sap applications for improved operational costs looking at sap ...Consolidating sap applications for improved operational costs looking at sap ...
Consolidating sap applications for improved operational costs looking at sap ...IBM India Smarter Computing
 
Xoriant - Financial services expertise
Xoriant - Financial services expertiseXoriant - Financial services expertise
Xoriant - Financial services expertiseXoriant Corporation
 
Nari Viswanathan from Aberdeen Group on ‘The Supply Chain Executive's Strateg...
Nari Viswanathan from Aberdeen Group on ‘The Supply Chain Executive's Strateg...Nari Viswanathan from Aberdeen Group on ‘The Supply Chain Executive's Strateg...
Nari Viswanathan from Aberdeen Group on ‘The Supply Chain Executive's Strateg...eyefortransport
 
Ea Soa Maturity Model (070204)
Ea Soa Maturity Model (070204)Ea Soa Maturity Model (070204)
Ea Soa Maturity Model (070204)Steven Gorenbergh
 
Collaborate 2010 Dinesh Wp Oracle Siebel Public Sector Crm White Paper V3
Collaborate 2010  Dinesh Wp Oracle Siebel Public Sector Crm  White Paper V3Collaborate 2010  Dinesh Wp Oracle Siebel Public Sector Crm  White Paper V3
Collaborate 2010 Dinesh Wp Oracle Siebel Public Sector Crm White Paper V3Dr.Dinesh Chandrasekar PhD(hc)
 
Infosheet InfraVision and RemedyForce
Infosheet InfraVision and RemedyForceInfosheet InfraVision and RemedyForce
Infosheet InfraVision and RemedyForceInfraVision
 
SoMo CRM Introduction
SoMo CRM IntroductionSoMo CRM Introduction
SoMo CRM Introductionicollegeadmin
 
THE COST OF A NEW ADVANCED COLLABORATION PLATFORM
THE COST OF A NEW ADVANCED COLLABORATION PLATFORMTHE COST OF A NEW ADVANCED COLLABORATION PLATFORM
THE COST OF A NEW ADVANCED COLLABORATION PLATFORMdominion
 
Certified Technology Program Overview
Certified Technology Program OverviewCertified Technology Program Overview
Certified Technology Program Overviewbillwoerner
 
Enabling Supplier Communities
Enabling Supplier CommunitiesEnabling Supplier Communities
Enabling Supplier Communitiesbillwoerner
 
Gaining efficiency and business value through effective management of your IT...
Gaining efficiency and business value through effective management of your IT...Gaining efficiency and business value through effective management of your IT...
Gaining efficiency and business value through effective management of your IT...IBM India Smarter Computing
 

Mais procurados (19)

Electronic Business
Electronic BusinessElectronic Business
Electronic Business
 
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ieGordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ie
 
Consolidating sap applications for improved operational costs looking at sap ...
Consolidating sap applications for improved operational costs looking at sap ...Consolidating sap applications for improved operational costs looking at sap ...
Consolidating sap applications for improved operational costs looking at sap ...
 
A New Generation of Tier 1 Enterprise Storage
A New Generation of Tier 1 Enterprise StorageA New Generation of Tier 1 Enterprise Storage
A New Generation of Tier 1 Enterprise Storage
 
Ucc by hp
Ucc by hpUcc by hp
Ucc by hp
 
Xoriant - Financial services expertise
Xoriant - Financial services expertiseXoriant - Financial services expertise
Xoriant - Financial services expertise
 
Nari Viswanathan from Aberdeen Group on ‘The Supply Chain Executive's Strateg...
Nari Viswanathan from Aberdeen Group on ‘The Supply Chain Executive's Strateg...Nari Viswanathan from Aberdeen Group on ‘The Supply Chain Executive's Strateg...
Nari Viswanathan from Aberdeen Group on ‘The Supply Chain Executive's Strateg...
 
Ea Soa Maturity Model (070204)
Ea Soa Maturity Model (070204)Ea Soa Maturity Model (070204)
Ea Soa Maturity Model (070204)
 
Collaborate 2010 Dinesh Wp Oracle Siebel Public Sector Crm White Paper V3
Collaborate 2010  Dinesh Wp Oracle Siebel Public Sector Crm  White Paper V3Collaborate 2010  Dinesh Wp Oracle Siebel Public Sector Crm  White Paper V3
Collaborate 2010 Dinesh Wp Oracle Siebel Public Sector Crm White Paper V3
 
Infosheet InfraVision and RemedyForce
Infosheet InfraVision and RemedyForceInfosheet InfraVision and RemedyForce
Infosheet InfraVision and RemedyForce
 
SoMo CRM Introduction
SoMo CRM IntroductionSoMo CRM Introduction
SoMo CRM Introduction
 
Walking on the Cloud
Walking on the Cloud Walking on the Cloud
Walking on the Cloud
 
Avaya Data Network
Avaya Data NetworkAvaya Data Network
Avaya Data Network
 
THE COST OF A NEW ADVANCED COLLABORATION PLATFORM
THE COST OF A NEW ADVANCED COLLABORATION PLATFORMTHE COST OF A NEW ADVANCED COLLABORATION PLATFORM
THE COST OF A NEW ADVANCED COLLABORATION PLATFORM
 
Certified Technology Program Overview
Certified Technology Program OverviewCertified Technology Program Overview
Certified Technology Program Overview
 
Internal Versus External Hotlines
Internal Versus External HotlinesInternal Versus External Hotlines
Internal Versus External Hotlines
 
Enabling Supplier Communities
Enabling Supplier CommunitiesEnabling Supplier Communities
Enabling Supplier Communities
 
Gaining efficiency and business value through effective management of your IT...
Gaining efficiency and business value through effective management of your IT...Gaining efficiency and business value through effective management of your IT...
Gaining efficiency and business value through effective management of your IT...
 
BPM enabled e-governance
BPM enabled e-governanceBPM enabled e-governance
BPM enabled e-governance
 

Destaque

IBM's Pure and Flexible Integrated Solution
IBM's Pure and Flexible Integrated SolutionIBM's Pure and Flexible Integrated Solution
IBM's Pure and Flexible Integrated SolutionTony Pearson
 
S ss0886 pendulum-swings-edge2015-v3
S ss0886 pendulum-swings-edge2015-v3S ss0886 pendulum-swings-edge2015-v3
S ss0886 pendulum-swings-edge2015-v3Tony Pearson
 
IBM Solid State in eX5 servers
IBM Solid State in eX5 serversIBM Solid State in eX5 servers
IBM Solid State in eX5 serversTony Pearson
 
Tony blogging-tips-itso30-v1310e
Tony blogging-tips-itso30-v1310eTony blogging-tips-itso30-v1310e
Tony blogging-tips-itso30-v1310eTony Pearson
 
Complete dd ex5
Complete dd ex5Complete dd ex5
Complete dd ex5s1170131
 
MM Health Capabilitiessmallerversion
MM Health CapabilitiessmallerversionMM Health Capabilitiessmallerversion
MM Health CapabilitiessmallerversionKassi Belz, APR
 
Staying Productive with Social Streams
Staying Productive with Social StreamsStaying Productive with Social Streams
Staying Productive with Social StreamsLuis Benitez
 
How To Build A Scalable Storage System with OSS at TLUG Meeting 2008/09/13
How To Build A Scalable Storage System with OSS at TLUG Meeting 2008/09/13How To Build A Scalable Storage System with OSS at TLUG Meeting 2008/09/13
How To Build A Scalable Storage System with OSS at TLUG Meeting 2008/09/13Gosuke Miyashita
 
Infographic OpenStack - Deployment Tools
Infographic OpenStack - Deployment ToolsInfographic OpenStack - Deployment Tools
Infographic OpenStack - Deployment ToolsStratoscale
 
S de0882 new-generation-tiering-edge2015-v3
S de0882 new-generation-tiering-edge2015-v3S de0882 new-generation-tiering-edge2015-v3
S de0882 new-generation-tiering-edge2015-v3Tony Pearson
 
SAP HANA Runs Better, Faster, Stronger on IBM Power
SAP HANA Runs Better, Faster, Stronger on IBM PowerSAP HANA Runs Better, Faster, Stronger on IBM Power
SAP HANA Runs Better, Faster, Stronger on IBM PowerDynamix
 
The Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsThe Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsTony Pearson
 
S cv3179 spectrum-integration-openstack-edge2015-v5
S cv3179 spectrum-integration-openstack-edge2015-v5S cv3179 spectrum-integration-openstack-edge2015-v5
S cv3179 spectrum-integration-openstack-edge2015-v5Tony Pearson
 
S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5Tony Pearson
 
Summit 16: StorPerf: Cinder Storage Performance Measurement
Summit 16: StorPerf: Cinder Storage Performance MeasurementSummit 16: StorPerf: Cinder Storage Performance Measurement
Summit 16: StorPerf: Cinder Storage Performance MeasurementOPNFV
 

Destaque (20)

Delitos cibernéticos
Delitos cibernéticosDelitos cibernéticos
Delitos cibernéticos
 
IBM's Pure and Flexible Integrated Solution
IBM's Pure and Flexible Integrated SolutionIBM's Pure and Flexible Integrated Solution
IBM's Pure and Flexible Integrated Solution
 
Exascale storage
Exascale storageExascale storage
Exascale storage
 
S ss0886 pendulum-swings-edge2015-v3
S ss0886 pendulum-swings-edge2015-v3S ss0886 pendulum-swings-edge2015-v3
S ss0886 pendulum-swings-edge2015-v3
 
IBM Solid State in eX5 servers
IBM Solid State in eX5 serversIBM Solid State in eX5 servers
IBM Solid State in eX5 servers
 
Tony blogging-tips-itso30-v1310e
Tony blogging-tips-itso30-v1310eTony blogging-tips-itso30-v1310e
Tony blogging-tips-itso30-v1310e
 
Complete dd ex5
Complete dd ex5Complete dd ex5
Complete dd ex5
 
MM Health Capabilitiessmallerversion
MM Health CapabilitiessmallerversionMM Health Capabilitiessmallerversion
MM Health Capabilitiessmallerversion
 
Staying Productive with Social Streams
Staying Productive with Social StreamsStaying Productive with Social Streams
Staying Productive with Social Streams
 
How To Build A Scalable Storage System with OSS at TLUG Meeting 2008/09/13
How To Build A Scalable Storage System with OSS at TLUG Meeting 2008/09/13How To Build A Scalable Storage System with OSS at TLUG Meeting 2008/09/13
How To Build A Scalable Storage System with OSS at TLUG Meeting 2008/09/13
 
Infographic OpenStack - Deployment Tools
Infographic OpenStack - Deployment ToolsInfographic OpenStack - Deployment Tools
Infographic OpenStack - Deployment Tools
 
S de0882 new-generation-tiering-edge2015-v3
S de0882 new-generation-tiering-edge2015-v3S de0882 new-generation-tiering-edge2015-v3
S de0882 new-generation-tiering-edge2015-v3
 
Planetas
PlanetasPlanetas
Planetas
 
SAP HANA Runs Better, Faster, Stronger on IBM Power
SAP HANA Runs Better, Faster, Stronger on IBM PowerSAP HANA Runs Better, Faster, Stronger on IBM Power
SAP HANA Runs Better, Faster, Stronger on IBM Power
 
Cedaspy perfumes
Cedaspy perfumesCedaspy perfumes
Cedaspy perfumes
 
The Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsThe Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged Environments
 
S cv3179 spectrum-integration-openstack-edge2015-v5
S cv3179 spectrum-integration-openstack-edge2015-v5S cv3179 spectrum-integration-openstack-edge2015-v5
S cv3179 spectrum-integration-openstack-edge2015-v5
 
Sg248107 Implementing the IBM Storwize V3700
Sg248107 Implementing the IBM Storwize V3700Sg248107 Implementing the IBM Storwize V3700
Sg248107 Implementing the IBM Storwize V3700
 
S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5
 
Summit 16: StorPerf: Cinder Storage Performance Measurement
Summit 16: StorPerf: Cinder Storage Performance MeasurementSummit 16: StorPerf: Cinder Storage Performance Measurement
Summit 16: StorPerf: Cinder Storage Performance Measurement
 

Semelhante a Replication for Business Continuity, Disaster Recovery and High Availability

Innovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle CoherenceInnovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle CoherenceBob Rhubart
 
Innovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle CoherenceInnovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle CoherenceBob Rhubart
 
Datacenter
DatacenterDatacenter
Datacenterjayconde
 
IT Shared Services Costing
IT Shared Services CostingIT Shared Services Costing
IT Shared Services CostingMiguel Garcia
 
Openly Replacing ERPs with Sugar | SugarCon 2011
Openly Replacing ERPs with Sugar | SugarCon 2011Openly Replacing ERPs with Sugar | SugarCon 2011
Openly Replacing ERPs with Sugar | SugarCon 2011SugarCRM
 
Skellig gpn-service-seeker-brochure
Skellig gpn-service-seeker-brochureSkellig gpn-service-seeker-brochure
Skellig gpn-service-seeker-brochurevermasunil
 
Customer MDM Is Key To Strategic Business Success
Customer MDM Is Key To Strategic Business SuccessCustomer MDM Is Key To Strategic Business Success
Customer MDM Is Key To Strategic Business SuccessJerome Leonard
 
Complexity and Risk: Effective Business Community Management through Integration
Complexity and Risk: Effective Business Community Management through IntegrationComplexity and Risk: Effective Business Community Management through Integration
Complexity and Risk: Effective Business Community Management through Integrationjgatrell
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...HyTrust
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012Cisco Public Relations
 
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET Journal
 
Enabling agility with continuous integration testing
Enabling agility with continuous integration testingEnabling agility with continuous integration testing
Enabling agility with continuous integration testingIBM Rational software
 
Anything as a Service ?
Anything as a Service  ?Anything as a Service  ?
Anything as a Service ?SaibalDC
 
Crm On Demand For 2009
Crm On Demand For 2009Crm On Demand For 2009
Crm On Demand For 2009prospectordie
 
Stand and deliver bpm v4
Stand and deliver   bpm v4Stand and deliver   bpm v4
Stand and deliver bpm v4David Cabassa
 
Bull vision VA
Bull vision VABull vision VA
Bull vision VABull
 
Implications Of The Cloud
Implications Of The CloudImplications Of The Cloud
Implications Of The CloudMatt Deacon
 

Semelhante a Replication for Business Continuity, Disaster Recovery and High Availability (20)

Stream 1 - Cloud Computing
Stream 1 - Cloud ComputingStream 1 - Cloud Computing
Stream 1 - Cloud Computing
 
Enterprise Mashups Deliver Business Value
Enterprise Mashups Deliver Business ValueEnterprise Mashups Deliver Business Value
Enterprise Mashups Deliver Business Value
 
Innovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle CoherenceInnovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle Coherence
 
Innovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle CoherenceInnovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle Coherence
 
Datacenter
DatacenterDatacenter
Datacenter
 
IT Shared Services Costing
IT Shared Services CostingIT Shared Services Costing
IT Shared Services Costing
 
Openly Replacing ERPs with Sugar | SugarCon 2011
Openly Replacing ERPs with Sugar | SugarCon 2011Openly Replacing ERPs with Sugar | SugarCon 2011
Openly Replacing ERPs with Sugar | SugarCon 2011
 
Skellig gpn-service-seeker-brochure
Skellig gpn-service-seeker-brochureSkellig gpn-service-seeker-brochure
Skellig gpn-service-seeker-brochure
 
Customer MDM Is Key To Strategic Business Success
Customer MDM Is Key To Strategic Business SuccessCustomer MDM Is Key To Strategic Business Success
Customer MDM Is Key To Strategic Business Success
 
Complexity and Risk: Effective Business Community Management through Integration
Complexity and Risk: Effective Business Community Management through IntegrationComplexity and Risk: Effective Business Community Management through Integration
Complexity and Risk: Effective Business Community Management through Integration
 
Data Insight Action
Data Insight ActionData Insight Action
Data Insight Action
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012
 
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
 
Enabling agility with continuous integration testing
Enabling agility with continuous integration testingEnabling agility with continuous integration testing
Enabling agility with continuous integration testing
 
Anything as a Service ?
Anything as a Service  ?Anything as a Service  ?
Anything as a Service ?
 
Crm On Demand For 2009
Crm On Demand For 2009Crm On Demand For 2009
Crm On Demand For 2009
 
Stand and deliver bpm v4
Stand and deliver   bpm v4Stand and deliver   bpm v4
Stand and deliver bpm v4
 
Bull vision VA
Bull vision VABull vision VA
Bull vision VA
 
Implications Of The Cloud
Implications Of The CloudImplications Of The Cloud
Implications Of The Cloud
 

Mais de Tony Pearson

Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfTony Pearson
 
L203326 intro-maria db-techu2020-v9
L203326 intro-maria db-techu2020-v9L203326 intro-maria db-techu2020-v9
L203326 intro-maria db-techu2020-v9Tony Pearson
 
S200743 storage-announcements-ist2020-v2001a
S200743 storage-announcements-ist2020-v2001aS200743 storage-announcements-ist2020-v2001a
S200743 storage-announcements-ist2020-v2001aTony Pearson
 
S200516 copy-data-management-ist2020-v2001c
S200516 copy-data-management-ist2020-v2001cS200516 copy-data-management-ist2020-v2001c
S200516 copy-data-management-ist2020-v2001cTony Pearson
 
S200515 storage-insights-ist2020-v2001d
S200515 storage-insights-ist2020-v2001dS200515 storage-insights-ist2020-v2001d
S200515 storage-insights-ist2020-v2001dTony Pearson
 
F200612 deliver-message-ist2020-v2001c
F200612 deliver-message-ist2020-v2001cF200612 deliver-message-ist2020-v2001c
F200612 deliver-message-ist2020-v2001cTony Pearson
 
Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aTony Pearson
 
G111614 top-trends-sydney2019-v1910a
G111614 top-trends-sydney2019-v1910aG111614 top-trends-sydney2019-v1910a
G111614 top-trends-sydney2019-v1910aTony Pearson
 
G111416 personal-brand-sydney-v1910b
G111416 personal-brand-sydney-v1910bG111416 personal-brand-sydney-v1910b
G111416 personal-brand-sydney-v1910bTony Pearson
 
Z109889 z4 r-storage-dfsms-vegas-v1910b
Z109889 z4 r-storage-dfsms-vegas-v1910bZ109889 z4 r-storage-dfsms-vegas-v1910b
Z109889 z4 r-storage-dfsms-vegas-v1910bTony Pearson
 
Z110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cZ110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cTony Pearson
 
Z109889 z4 r-storage-dfsms-jburg-v1909d
Z109889 z4 r-storage-dfsms-jburg-v1909dZ109889 z4 r-storage-dfsms-jburg-v1909d
Z109889 z4 r-storage-dfsms-jburg-v1909dTony Pearson
 
S111477 scale-in-cloud-jburg-v1909d
S111477 scale-in-cloud-jburg-v1909dS111477 scale-in-cloud-jburg-v1909d
S111477 scale-in-cloud-jburg-v1909dTony Pearson
 
S110646 storage-for-ai-jburg-v1909c
S110646 storage-for-ai-jburg-v1909cS110646 storage-for-ai-jburg-v1909c
S110646 storage-for-ai-jburg-v1909cTony Pearson
 
G108263 personal-brand-berlin-v1904a
G108263 personal-brand-berlin-v1904aG108263 personal-brand-berlin-v1904a
G108263 personal-brand-berlin-v1904aTony Pearson
 
S108283 svc-storwize-lagos-v1905d
S108283 svc-storwize-lagos-v1905dS108283 svc-storwize-lagos-v1905d
S108283 svc-storwize-lagos-v1905dTony Pearson
 
G108277 ds8000-resiliency-lagos-v1905c
G108277 ds8000-resiliency-lagos-v1905cG108277 ds8000-resiliency-lagos-v1905c
G108277 ds8000-resiliency-lagos-v1905cTony Pearson
 
G108276 public-speaking-lagos-v1905b
G108276 public-speaking-lagos-v1905bG108276 public-speaking-lagos-v1905b
G108276 public-speaking-lagos-v1905bTony Pearson
 
G108266 stack-the-deck-lagos-v1905c
G108266 stack-the-deck-lagos-v1905cG108266 stack-the-deck-lagos-v1905c
G108266 stack-the-deck-lagos-v1905cTony Pearson
 
G107984 personal-brand-atlanta-v1904a
G107984 personal-brand-atlanta-v1904aG107984 personal-brand-atlanta-v1904a
G107984 personal-brand-atlanta-v1904aTony Pearson
 

Mais de Tony Pearson (20)

Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdf
 
L203326 intro-maria db-techu2020-v9
L203326 intro-maria db-techu2020-v9L203326 intro-maria db-techu2020-v9
L203326 intro-maria db-techu2020-v9
 
S200743 storage-announcements-ist2020-v2001a
S200743 storage-announcements-ist2020-v2001aS200743 storage-announcements-ist2020-v2001a
S200743 storage-announcements-ist2020-v2001a
 
S200516 copy-data-management-ist2020-v2001c
S200516 copy-data-management-ist2020-v2001cS200516 copy-data-management-ist2020-v2001c
S200516 copy-data-management-ist2020-v2001c
 
S200515 storage-insights-ist2020-v2001d
S200515 storage-insights-ist2020-v2001dS200515 storage-insights-ist2020-v2001d
S200515 storage-insights-ist2020-v2001d
 
F200612 deliver-message-ist2020-v2001c
F200612 deliver-message-ist2020-v2001cF200612 deliver-message-ist2020-v2001c
F200612 deliver-message-ist2020-v2001c
 
Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910a
 
G111614 top-trends-sydney2019-v1910a
G111614 top-trends-sydney2019-v1910aG111614 top-trends-sydney2019-v1910a
G111614 top-trends-sydney2019-v1910a
 
G111416 personal-brand-sydney-v1910b
G111416 personal-brand-sydney-v1910bG111416 personal-brand-sydney-v1910b
G111416 personal-brand-sydney-v1910b
 
Z109889 z4 r-storage-dfsms-vegas-v1910b
Z109889 z4 r-storage-dfsms-vegas-v1910bZ109889 z4 r-storage-dfsms-vegas-v1910b
Z109889 z4 r-storage-dfsms-vegas-v1910b
 
Z110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cZ110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909c
 
Z109889 z4 r-storage-dfsms-jburg-v1909d
Z109889 z4 r-storage-dfsms-jburg-v1909dZ109889 z4 r-storage-dfsms-jburg-v1909d
Z109889 z4 r-storage-dfsms-jburg-v1909d
 
S111477 scale-in-cloud-jburg-v1909d
S111477 scale-in-cloud-jburg-v1909dS111477 scale-in-cloud-jburg-v1909d
S111477 scale-in-cloud-jburg-v1909d
 
S110646 storage-for-ai-jburg-v1909c
S110646 storage-for-ai-jburg-v1909cS110646 storage-for-ai-jburg-v1909c
S110646 storage-for-ai-jburg-v1909c
 
G108263 personal-brand-berlin-v1904a
G108263 personal-brand-berlin-v1904aG108263 personal-brand-berlin-v1904a
G108263 personal-brand-berlin-v1904a
 
S108283 svc-storwize-lagos-v1905d
S108283 svc-storwize-lagos-v1905dS108283 svc-storwize-lagos-v1905d
S108283 svc-storwize-lagos-v1905d
 
G108277 ds8000-resiliency-lagos-v1905c
G108277 ds8000-resiliency-lagos-v1905cG108277 ds8000-resiliency-lagos-v1905c
G108277 ds8000-resiliency-lagos-v1905c
 
G108276 public-speaking-lagos-v1905b
G108276 public-speaking-lagos-v1905bG108276 public-speaking-lagos-v1905b
G108276 public-speaking-lagos-v1905b
 
G108266 stack-the-deck-lagos-v1905c
G108266 stack-the-deck-lagos-v1905cG108266 stack-the-deck-lagos-v1905c
G108266 stack-the-deck-lagos-v1905c
 
G107984 personal-brand-atlanta-v1904a
G107984 personal-brand-atlanta-v1904aG107984 personal-brand-atlanta-v1904a
G107984 personal-brand-atlanta-v1904a
 

Replication for Business Continuity, Disaster Recovery and High Availability

  • 1. Replication for Business Continuity, Disaster Recovery and High Availability Tony Pearson – IBM Master Inventor and Senior Managing Consultant March 2013 © 2013 IBM Corporation
  • 2. Everyone Knows: Downtime is Bad! Lost brand equity Loss of goodwill and trust Lost loyalty Lost revenue and market share Lost productivity Causes: 2 © 2013 IBM Corporation
  • 3. 2013: continued Metcalf’s Law: Value of network acceleration of changes increases proportional to square in today’s business world…. of # people on it 5 5 Trust Cross-Industry Value Coalition 4 4 Industry-Centric Value Web 3 3 Extended Value Core Business Chain 2 2 Subsidiary/JV Select ‘Trusted Customer Partners’ 1 1 Partner/Channel Isolated Operations Supplier/Outsourcer Collaboration | 3 3 © 2013 IBM Corporation
  • 4. The “Business Process” is the Unit of Recovery Business Business Business Business Business Business Business Business process A process B process C process D process E process F process G 3. The loss of both db2 Application Application 2 applications affects two http://xyz.xml Web distinctly different Sphere business processes MQseries 2. The error impacts management Application 3 Analytics Application 1 the ability of two or report reports decision more applications to SQL point share critical data Infrastructure IT Business Continuity 1. An error occurs on a storage device that must recover at the correspondingly corrupts a database business process level 4 © 2013 IBM Corporation
  • 5. Overlap of valid data protection techniques IT Data Protection 1. High Availability 2. Continuous Operations 3. Disaster Recovery Fault-tolerant, failure-resistant Non-disruptive backups and Protection against unplanned streamlined infrastructure system maintenance coupled with outages such as disasters with affordable cost continuous availability of through reliable, predictable foundation applications recovery Protection of critical Business data Operations continue after a disaster Recovery is predictable and reliable Costs are predictable and manageable 5 © 2013 IBM Corporation
  • 6. Timeline of a Disaster Recovery Recovery Point Objective (RPO). Recovery How much data Time must be recreated? Site Execute hardware, O/S, RPO Assess data integrity recovery Telecom Network Data Management Control Physical Facilities Operating System Outage Production ☺ Operations Staff Network Staff Applications Staff Applications Recovery Time Objective (RTO) Software transaction RPO of hardware data integrity integrity recovery Δ Data Recovery Time Objective (RTO) of transaction integrity Now we're done! 6 © 2013 IBM Corporation
  • 7. Technology drives the Recover Point Objective (RPO) For example: Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Recovery Point Recovery Time Tape Backup Periodic Replication Asynchronous replication Synchronous replication / HA 7 © 2013 IBM Corporation
  • 8. Automation drives Recovery Time Objective (RTO) For example: Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Recovery Point Recovery Time End to end automated Storage Recovery Time includes: clustering automation Manual Tape Restore – Fault detection – Recovering data – Bringing applications back online – Network access 8 © 2013 IBM Corporation
  • 9. Business Continuity Tiers Balancing recovery time objective with cost / value Recovery from a disk image Recovery from tape copy BC Tier 7 –Server or Storage replication with end-to-end automated server recovery Cost / Value BC Tier 6 –real-time continuous data replication, server or storage BC Tier 5 –Application/database integration to Backup/Restore BC Tier 4 –Point in Time replication to Backup/Restore BC Tier 3 – VTL, Data De-Dup, Remote vault BC Tier 2 – Tape libraries + Automation BC Tier 1 – Restore 15 Min. 1-4 Hr.. 4 -8 Hr.. 8-12 Hr.. 12-16 Hr.. 24 Hr.. Days from Tape Recovery Time Objective (guidelines only) 9 © 2013 IBM Corporation
  • 10. Ideal World for High Availability and Business Continuity (HA/BC) Business processes drive strategies and they are integral to the Continuity of Business Operations. A company cannot be resilient without having strategies for alternate workspace, staff members, call centers and communications channels. Business Prioritization Integration into IT Manage Awareness, Regular Validation, Change Management, Quarterly Management Briefings Resilience Program t d e Management en e at m rr ility im y Ti RTO/RPO Cu ab t p Es ver Ca co business Re risk program Program Strategy program impact Implement assessment assessment Design Design validation analysis of itie s cts • Maturity 1. People bil pa age High Availability a crisis team er ts Im ut Model design 2. Processes uln rea O • Measure 3. Plans ,V h business ks nd T ROI High Availability Ris a resumption Servers 4. Strategies • Roadmap 5. Networks for disaster Storage, Data 6. Platforms Program recovery Replication 7. Facilities high Database and availability Software design Source: IBM STG, IBM Global Services 10 © 2013 IBM Corporation
  • 11. Data Strategy Defined The role of the basic “Data Strategy” for HA/BC purposes Define major data types “good enough” – i.e. by major application, by business line…. – An ongoing journey Business Strategies You have to For each data type: know your data IT Strategy – Usage – Performance and measurement – Security Data Strategy Data Strategy – Availability – Criticality – Organizational role Enterprise IT Architecture – Who manages – What standards for this data And have a • What type storage deployed on basic strategy • What database • What virtualization for it Be pragmatic IT Infrastructure – Create a basic, “good enough” data strategy for HA/BC purposes People Data Acquire tools that help you know your data Process Technology Structure 11 © 2013 IBM Corporation
  • 12. A basic data strategy tells you how to categorize your data - looks something like this (step by step): Mission Critical Mission – critical data – Mission-critical data that is the highest priority dtaa – Priority = uptime, with high value justification Subset of data that is either mission-critical or supports mission critical – Data that supports business lines – Balanced priorities = Uptime and cost/value Knowledge of user and application data – All data, whether active or not…. – Which eventually needs to be archived, retained – Priority = cost Lower Virtualized Not easy to know and categorize your data - cost Storage But is the only foundation possible 12 © 2013 IBM Corporation
  • 13. Then, your basic data strategy allows you to scope your HA/BC – something like this: Mission Critical Continuous Availability (CA) – Finally, create the mission-critical subset with highest level of recovery – RTO = near continuous, RPO = small as possible (Tier 7) – Priority = uptime, with high value justification Rapid Data Recovery (RDR) – Then create separate storage pools as required – RTO = minutes, to (approx. range): 2 to 6 hours – BC Tiers 4, 5 and 6 – Balanced priorities = Uptime and cost/value Backup/Restore (B/R) – Virtualize, optimize cost, lay recovery capability foundation – Provide universal 24 hour - 12 hour (approx) recovery capability – Address requirements for archival, compliance, green energy – Priority = cost Lower Virtualized Not easy to and categorize your data - data - Know know and categorize your cost Storage This is where only foundation possible But is the virtualization is the enabler 13 © 2013 IBM Corporation
  • 14. Rule of Thumb for continuous replication bandwidth Rule of Thumb: – Every 1 TB of mirrored disk storage generates about this much MB/sec of writes: OLTP – 1-2 MB/sec of write bandwidth Sequential/batch – 6-7 MB/sec of write bandwidth Expect minimum 2.5x this to handle peaks Expect normal data compression to be about 2:1 Example - you have 10 TB of disk to mirror: – OLTP: 10-20 MB/sec ROT: – Batch/sequential: 60-70 MB/sec one OC3 line = 15 MB/sec raw Effective transfer rate 14 © 2013 IBM Corporation
  • 15. Short distance synchronous mirroring: 2 site Short distance may not meet DR requirements Ability to utilize server capacity in both sites for single instance of application data Potential/ability for non-disruptive failover S P Additional copy of data might F be provided for testing or testing may be done by Hardware solution gives data regular switch of sites consistency between multiple servers/applications and single management point 15 © 2013 IBM Corporation
  • 16. Long Distance Mirroring: 2 site Longer distance to meet regulatory requirements and protect against regional events Ability to utilize server capacity in both sites for applications with Disruptive failover and less separate/independent potential to use DR data solution for continuous availability 1 0 P 0 0 0 S F 1 0 F S P Additional copy of Asynchronous replication data more likely to be more likely due to provided for testing performance requirements 16 © 2013 IBM Corporation
  • 17. Sync versus Async Server I/O Server I/O 1 1 2 3 4 2 P S P S 4 3 Metro Mirror Global Mirror Asynchronous (any distance) Synchronous <300 km •Write to primary volume •Write to primary volume •The primary site acknowledges to the host application •The primary site initiates an I/O to the secondary site to that the write is complete transfer the data Some later time: •Secondary indicates to the primary that the write is •The primary site initiates an I/O to the secondary site to complete transfer the data •Primary acknowledges to the host application that the •Secondary indicates to the primary that the write is write is complete complete •Round-trip latency added to each Write I/O •Primary and secondary bitmap updated that data is in sync 17 © 2013 IBM Corporation
  • 18. 3-Site Configurations Campus Local-1, Local-2 Local-1 Local-1 Remote-2 Bunker-2 Remote-3 Remote-3 Remote-3 18 © 2013 IBM Corporation
  • 19. Tivoli Storage Manager an integrated, end-to-end data protection and unified recovery management solution •DR Operations •Mobile Offices •Remote Office(s) •Data Center Archive / Off Site Critical Applicat Critical VMware Applications Applications File Servers Information Servers Applicat Servers File Servers VMware Servers Archive VMware Servers •FlashCopy •TSM Clients Cloud •FastBack •Manager •TDPs Storage ProtecTIER FastBack for •TSM Clients Workstations •TDPs Tiers of •TSM VE Cloud Storage Gateway FastBack •DR Tiers of •TSM Server Storage •TSM Server WAN WAN • Install / Upgrade • Configuration Centralized Administration • Monitoring • Set Policies • Reporting • Execute Backup / Restore “TSM is the grand-daddy of unified recovery management” -- Lauren Whitehouse, Enterprise Strategy Group 19 © 2013 IBM Corporation
  • 20. Summary Understand today’s best practices – for IT High Availability and Business Continuity Strategies for: – Requirements, design, implementation – In-house vs. out-sourcing Step by step methodology – Essential role of virtualization – IBM technologies for replication and replication management 20 © 2013 IBM Corporation
  • 21. 21 © 2013 IBM Corporation
  • 22. Resources and Information IBM Redbook: Business Continuity Planning Guide http://www.redbooks.ibm.com/abstra cts/sg246547.html In particular, chapters 3, 6, 7 22 © 2013 IBM Corporation
  • 23. Tony Pearson 9000 S. Rita Road Bldg 9032 Room 1238 About the Speaker Master Inventor, Tucson, AZ 85744 Senior Managing Consultant Mr. Tony Pearson +1 520-799-4309 (Office) Master Inventor, IBM System Storage™ tpearson@us.ibm.com Senior Managing Consultant IBM System Storage Tony Pearson is a Master Inventor and Senior managing consultant for the IBM System Storage™ product line. Tony joined IBM Corporation in 1986 in Tucson, Arizona, USA, and has lived there ever since. In his current role, Tony presents briefings on storage topics covering the entire System Storage product line, Tivoli storage software products, and topics related to Cloud Computing. He interacts with clients, speaks at conferences and events, and leads client workshops to help clients with strategic planning for IBM’s integrated set of storage management software, hardware, and virtualization products. Tony writes the “Inside System Storage” blog, which is read by hundreds of clients, IBM sales reps and IBM Business Partners every week. This blog was rated one of the top 10 blogs for the IT storage industry by “Networking World” magazine, and #1 most read IBM blog on IBM’s developerWorks. The blog has been published in series of books, Inside System Storage: Volume I through V. Over the past years, Tony has worked in development, marketing and customer care positions for various storage hardware and software products. Tony has a Bachelor of Science degree in Software Engineering, and a Master of Science degree in Electrical Engineering, both from the University of Arizona. Tony holds 19 IBM patents for inventions on storage hardware and software products. 23 © 2013 IBM Corporation
  • 24. Additional Resources Email: tpearson@us.ibm.com Twitter: http://twitter.com/az99Øtony Blog: http://ibm.co/brAeZØ Books: http://www.lulu.com/spotlight/99Ø_tony IBM Expert Network: http://www.slideshare.net/az99Øtony 24 24 24 © 2013 IBM Corporation
  • 25. Trademarks and disclaimers Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office. UNIX is a registered trademark of The Open Group in the United States and other countries. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and other countries. Other product and service names might be trademarks of IBM or other companies. Information is provided "AS IS" without warranty of any kind. The customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. Information concerning non-IBM products was obtained from a supplier of these products, published announcement material, or other publicly available sources and does not constitute an endorsement of such products by IBM. Sources for non-IBM list prices and performance numbers are taken from publicly available information, including vendor announcements and vendor worldwide homepages. IBM has not tested these products and cannot confirm the accuracy of performance, capability, or any other claims related to non-IBM products. Questions on the capability of non-IBM products should be addressed to the supplier of those products. All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Some information addresses anticipated future capabilities. Such information is not intended as a definitive statement of a commitment to specific levels of performance, function or delivery schedules with respect to any future products. Such commitments are only made in IBM product announcements. The information is presented here to communicate IBM's current investment and development activities as a good faith effort to help with our customers' future planning. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput or performance improvements equivalent to the ratios stated here. Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contact your IBM representative or Business Partner for the most current pricing in your geography. Photographs shown may be engineering prototypes. Changes may be incorporated in production models. © IBM Corporation 2013. All rights reserved. References in this document to IBM products or services do not imply that IBM intends to make them available in every country. Trademarks of International Business Machines Corporation in the United States, other countries, or both can be found on the World Wide Web at http://www.ibm.com/legal/copytrade.shtml. ZSP03490-USEN-00 25 © 2013 IBM Corporation