SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Meeting the Availability Challenges of physical, Virtual and Geographically dispersed Systems, with Vision Solutions
Vision Solutions’ Corporate Profile Leading portfolio of information availability brands Supports Windows, Linux, Power Systems and Cloud Computing Aligned with Dell, HP, IBM, Microsoft, VMware and other leaders One of the world’s largest engineering and support teams Exclusive cross-pollination of ideas and technologies The best talent in the industry! Among the industry’s largest worldwide partner networks Unprecedented support for customers of all sizes and geos 2000+ partners, 25,000+ customers in 70+ countries Strong financial performance Privately held by Thoma Bravo inpartnership with management
Meeting the  Availability Challenge
Availability Challenges Downtime has a cost both to the business and to you How much does downtime cost you? Needs Reduce downtime to a minimum Downtime
Availability Challenges Data lost in outages adds to cost of downtime Lost revenue and lost productivity to recreate data Needs Failover to the latest valid version of data Intelligently protect the data of critical business applications  Data Loss
Availability Challenges Distance amplifies the challenges of Availability Non-IT personnel responsible for backups Less bandwidth available for network backups Remote data is no less important; same compliance requirements Needs Protect data at remote offices Protect data off-site for disaster recovery Maximize use of existing bandwidth Manage remote protection and DR centrally Geographic Distance
Availability Challenges Roughly 50% of workloads are virtualised now “Splitting” of the datacenter into two distinct environments creates challenges Management of two environments Less flexibility with each Needs Unify availability of both environments Leverage virtualisation to improve availability of even physical servers Ease the migration to a fully virtual environment Virtualization
Many Challenges – One Solution Virtualization Downtime Data Loss Geographic Distance Real-time Replication Minimize data loss and downtime Replicate over existing WAN bandwidth Virtualized Failover Protect vSphere or Hyper-V environments with host-level management and real-time replication Failover P2V, V2P, P2P, or V2V Application Protection Cluster Integration Replicate from clusters to standalone servers or clusters Create “Stretch Clusters” using the GeoCluster feature
Availability Challenges Replication  One word Few meanings Many interpretations What replication do you need?
Availability Challenges Replication  What replication do you need? folder local snapshot near-term system Near-continuous file real-time application byte Time synchronous off-site software asynchronous block storage transactional queue
Double-Take Availability 	Virtual recovery assistant VRA lets you protect a source physical or virtual machine to a virtual target machine running on either Microsoft Windows Server 2008 with Hyper-V or VMware ESX Server.  Data is replicated directly into the virtual machine’s virtual disk, which means that the target virtual machine can remain powered off until failover. Automatic failover can be configured if the source/target connection is lost. VRA provisions the target virtual machine for you. It can monitor the protected source machine. During protection setup, VRA lets you increase the drive size, memory, and number of processors on the target virtual machine 11
C:br />C:br />F:br />C:br />F:br />Datastore1 Console Datastore2 Double-Take Availability 	Virtual recovery assistant Console collects all job information. Resident in memory of client until job starts. Persisted by service in job file Appliance creates virtual source as specified disks for the virtual source can be located on different datastores NIC mappings are critical and left to the user to configure on the ESX server VMDK 1 NIC1 NIC2 VMDK 2 NIC1 NIC2 Appliance Virtual Source Source ESX Server
Double-Take Availability 	Virtual recovery assistant C:br />C:br />F:br />C:br />F:br />Datastore1 Console Datastore2 Appliance attaches virtual source VMDK files to the DTVRA appliance Mounts the disks to a mount point Appliance formats the mounted drives as NTFS (unless pre-staged) Appliance creates job between source and appliance, creates failover script file, connects/starts job, starts monitoring for failover. C:ountDirlt;GUID>_Cbr />VMDK 1 NIC1 NIC2 VMDK 2 NIC1 C:ountDirlt;GUID>_Fbr />NIC2 Appliance Virtual Source Source ESX Server
Double-Take Availability 	Virtual recovery assistantBehind the Scenes: Failover C:br />C:br />F:br />C:br />F:br />Datastore1 Console Datastore2 Appliance injects VM drivers into virtual source Appliance processes the short file names Mounted drives are dismounted Mounted ESX source VMDK files are dismounted Virtual source is booted Failover command is sent by the Appliance DT Job is deleted. Appliance uses DTCOM to shutdown Source server Appliance deletes the DT connect.sts file from virtual source VMDK 1 NIC1 C:ountDirlt;GUID>_Cbr />NIC2 VMDK 2 NIC1 C:ountDirlt;GUID>_Fbr />NIC2 Appliance Virtual Source Source ESX Server
Double-Take Availability 	Virtual recovery assistant Console can use a Virtual Center or work directly with an ESX server Console collects all information about connection from user prior to executing anything. Able to change amount of RAM, number of processors, and disk sizes of virtual source  ESX server configuration (network, stores, etc.) is left to the user. Once started, a DTVRA job is just like any Double-Take job.   Any Double-Take client can control the job. Once source is failed-over, Double-Take has no further interaction with the new virtual server.
Meeting the  Migration Challenge
Double-Take Move is … Effortless no downtime X2X Windows server and data migrations. Enables IT Managers and Administrators to consolidate data centers across the WAN, virtualize their physical hardware (P2V), create consistent virtual environments (V2V), refresh physical servers (P2P), all while allowing users to remain productive and working during the migration.          Effortless no downtime server and data migrations.      Effortless no downtime server and data migrations.
Migration Challenges You need to keep your servers available to your end-users, with minimal downtime. ,[object Object]
You don’t want to buy special hardware.
You want to use the network that is already in place.
You want it to just work – “Setup the migration and forget it till time to cutover.”,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Citrix XenDesktop Reference Architecture for 750 users
Citrix XenDesktop Reference Architecture for 750 usersCitrix XenDesktop Reference Architecture for 750 users
Citrix XenDesktop Reference Architecture for 750 usersX-IO Technologies
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage VirtualizationMehul Jariwala
 
Virtual deep dive-xendesktop_stephanpfister
Virtual deep dive-xendesktop_stephanpfisterVirtual deep dive-xendesktop_stephanpfister
Virtual deep dive-xendesktop_stephanpfisterDigicomp Academy AG
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?Digicomp Academy AG
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server VirtualisationAlan McSweeney
 
Scaling xen desktop and xenapp with solid state drives in healthcare
Scaling xen desktop and xenapp with solid state drives in healthcareScaling xen desktop and xenapp with solid state drives in healthcare
Scaling xen desktop and xenapp with solid state drives in healthcareIntel® Software
 
12 Things You Must Know About VDI
12 Things You Must Know About VDI12 Things You Must Know About VDI
12 Things You Must Know About VDIShivani Sehta
 
Introduction to virtualisation
Introduction to virtualisationIntroduction to virtualisation
Introduction to virtualisationsagaroceanic11
 
Microsoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private CloudMicrosoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private CloudMd Yousup Faruqu
 
The Virtual Desktop Revolution
The Virtual Desktop RevolutionThe Virtual Desktop Revolution
The Virtual Desktop RevolutionYankee Group
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructureGokulan Subramani
 
vDesk.works vs Microsoft Cloud 365 (VDI)
vDesk.works vs Microsoft Cloud 365 (VDI)vDesk.works vs Microsoft Cloud 365 (VDI)
vDesk.works vs Microsoft Cloud 365 (VDI)vDesk.Works
 
Citrix xen desktop by Naeem ali saifi from Ricoh
Citrix xen desktop by Naeem ali saifi from RicohCitrix xen desktop by Naeem ali saifi from Ricoh
Citrix xen desktop by Naeem ali saifi from Ricohctxnaeem
 
Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6Digicomp Academy AG
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Md Yousup Faruqu
 
Keynote talk on Windows 8 - Jeff Stokes
Keynote talk on Windows 8 - Jeff StokesKeynote talk on Windows 8 - Jeff Stokes
Keynote talk on Windows 8 - Jeff StokesJeff Stokes
 

Was ist angesagt? (18)

Citrix XenDesktop Reference Architecture for 750 users
Citrix XenDesktop Reference Architecture for 750 usersCitrix XenDesktop Reference Architecture for 750 users
Citrix XenDesktop Reference Architecture for 750 users
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Virtual deep dive-xendesktop_stephanpfister
Virtual deep dive-xendesktop_stephanpfisterVirtual deep dive-xendesktop_stephanpfister
Virtual deep dive-xendesktop_stephanpfister
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
 
3 migration
3 migration3 migration
3 migration
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
 
Scaling xen desktop and xenapp with solid state drives in healthcare
Scaling xen desktop and xenapp with solid state drives in healthcareScaling xen desktop and xenapp with solid state drives in healthcare
Scaling xen desktop and xenapp with solid state drives in healthcare
 
12 Things You Must Know About VDI
12 Things You Must Know About VDI12 Things You Must Know About VDI
12 Things You Must Know About VDI
 
Introduction to virtualisation
Introduction to virtualisationIntroduction to virtualisation
Introduction to virtualisation
 
Microsoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private CloudMicrosoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private Cloud
 
The Virtual Desktop Revolution
The Virtual Desktop RevolutionThe Virtual Desktop Revolution
The Virtual Desktop Revolution
 
VDI Design Guide
VDI Design GuideVDI Design Guide
VDI Design Guide
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
vDesk.works vs Microsoft Cloud 365 (VDI)
vDesk.works vs Microsoft Cloud 365 (VDI)vDesk.works vs Microsoft Cloud 365 (VDI)
vDesk.works vs Microsoft Cloud 365 (VDI)
 
Citrix xen desktop by Naeem ali saifi from Ricoh
Citrix xen desktop by Naeem ali saifi from RicohCitrix xen desktop by Naeem ali saifi from Ricoh
Citrix xen desktop by Naeem ali saifi from Ricoh
 
Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization
 
Keynote talk on Windows 8 - Jeff Stokes
Keynote talk on Windows 8 - Jeff StokesKeynote talk on Windows 8 - Jeff Stokes
Keynote talk on Windows 8 - Jeff Stokes
 

Andere mochten auch

Tjh e-alert-instructions
Tjh e-alert-instructionsTjh e-alert-instructions
Tjh e-alert-instructionsnbmorgan13
 
Escuela Domingo French
Escuela Domingo FrenchEscuela Domingo French
Escuela Domingo FrenchAlicia Bravino
 
Samples Presentation
Samples PresentationSamples Presentation
Samples PresentationKarenKrug
 
Catálogo formación AnyHelp International
Catálogo formación AnyHelp InternationalCatálogo formación AnyHelp International
Catálogo formación AnyHelp InternationalAnyTraining
 
Assistive Technology Presentation
Assistive Technology PresentationAssistive Technology Presentation
Assistive Technology Presentationmr03158
 
Literacy in the Information Age
Literacy in the Information AgeLiteracy in the Information Age
Literacy in the Information Agedudleyhorse
 
Récipes with cheese
Récipes with cheeseRécipes with cheese
Récipes with cheesejlgd
 
LOGIA O BALCON
LOGIA O BALCONLOGIA O BALCON
LOGIA O BALCONSMOG_INK
 
Práctica 1
Práctica 1Práctica 1
Práctica 1jlgd
 
Follow You Print Presentation
Follow You Print PresentationFollow You Print Presentation
Follow You Print PresentationKevinPorter331
 
Nuance Solutions Presentation
Nuance Solutions PresentationNuance Solutions Presentation
Nuance Solutions PresentationKevinPorter331
 

Andere mochten auch (11)

Tjh e-alert-instructions
Tjh e-alert-instructionsTjh e-alert-instructions
Tjh e-alert-instructions
 
Escuela Domingo French
Escuela Domingo FrenchEscuela Domingo French
Escuela Domingo French
 
Samples Presentation
Samples PresentationSamples Presentation
Samples Presentation
 
Catálogo formación AnyHelp International
Catálogo formación AnyHelp InternationalCatálogo formación AnyHelp International
Catálogo formación AnyHelp International
 
Assistive Technology Presentation
Assistive Technology PresentationAssistive Technology Presentation
Assistive Technology Presentation
 
Literacy in the Information Age
Literacy in the Information AgeLiteracy in the Information Age
Literacy in the Information Age
 
Récipes with cheese
Récipes with cheeseRécipes with cheese
Récipes with cheese
 
LOGIA O BALCON
LOGIA O BALCONLOGIA O BALCON
LOGIA O BALCON
 
Práctica 1
Práctica 1Práctica 1
Práctica 1
 
Follow You Print Presentation
Follow You Print PresentationFollow You Print Presentation
Follow You Print Presentation
 
Nuance Solutions Presentation
Nuance Solutions PresentationNuance Solutions Presentation
Nuance Solutions Presentation
 

Ähnlich wie London VMUG July 2011

www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwebhostingguy
 
Virtualization Landscape
Virtualization LandscapeVirtualization Landscape
Virtualization Landscapejpnaye
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructureKavaskar Ganesan
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giantseblake
 
Microsoft Virtualization for VMware Professionals
Microsoft Virtualization for VMware ProfessionalsMicrosoft Virtualization for VMware Professionals
Microsoft Virtualization for VMware ProfessionalsEduardo Castro
 
Ultan Kinahan Business Continuity & Dr With Virtualization And Doubletake
Ultan Kinahan   Business Continuity & Dr With Virtualization And DoubletakeUltan Kinahan   Business Continuity & Dr With Virtualization And Doubletake
Ultan Kinahan Business Continuity & Dr With Virtualization And DoubletakeNathan Winters
 
Windows 2008 R2 Virtualization
Windows 2008 R2 VirtualizationWindows 2008 R2 Virtualization
Windows 2008 R2 VirtualizationEduardo Castro
 
Server Virtualization Seminar Presentation
Server Virtualization Seminar PresentationServer Virtualization Seminar Presentation
Server Virtualization Seminar Presentationshabi_hassan
 
Win08 R2 It Pro Overview
Win08 R2 It Pro OverviewWin08 R2 It Pro Overview
Win08 R2 It Pro Overviewguest092b9a8
 
Windows Server 2008 R2
Windows Server 2008 R2Windows Server 2008 R2
Windows Server 2008 R2Rishu Mehra
 
Cio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final VirtualizationCio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final Virtualizationguestc900809
 
Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWarencceconnect
 
Workload Availability Solution Guide(Uk)
Workload Availability Solution Guide(Uk)Workload Availability Solution Guide(Uk)
Workload Availability Solution Guide(Uk)ianmasters
 
Improved Efficiency through Workload Optimisation
Improved Efficiency through Workload OptimisationImproved Efficiency through Workload Optimisation
Improved Efficiency through Workload Optimisationianmasters
 
TechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDITechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDILai Yoong Seng
 
Availability Considerations for SQL Server
Availability Considerations for SQL ServerAvailability Considerations for SQL Server
Availability Considerations for SQL ServerBob Roudebush
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization1CloudRoad.com
 

Ähnlich wie London VMUG July 2011 (20)

www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
 
Double-Take Software
Double-Take SoftwareDouble-Take Software
Double-Take Software
 
Virtualization Landscape
Virtualization LandscapeVirtualization Landscape
Virtualization Landscape
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
 
Microsoft Virtualization for VMware Professionals
Microsoft Virtualization for VMware ProfessionalsMicrosoft Virtualization for VMware Professionals
Microsoft Virtualization for VMware Professionals
 
Ultan Kinahan Business Continuity & Dr With Virtualization And Doubletake
Ultan Kinahan   Business Continuity & Dr With Virtualization And DoubletakeUltan Kinahan   Business Continuity & Dr With Virtualization And Doubletake
Ultan Kinahan Business Continuity & Dr With Virtualization And Doubletake
 
VMware 2009
VMware 2009VMware 2009
VMware 2009
 
Windows 2008 R2 Virtualization
Windows 2008 R2 VirtualizationWindows 2008 R2 Virtualization
Windows 2008 R2 Virtualization
 
Server Virtualization Seminar Presentation
Server Virtualization Seminar PresentationServer Virtualization Seminar Presentation
Server Virtualization Seminar Presentation
 
Win08 R2 It Pro Overview
Win08 R2 It Pro OverviewWin08 R2 It Pro Overview
Win08 R2 It Pro Overview
 
Windows Server 2008 R2
Windows Server 2008 R2Windows Server 2008 R2
Windows Server 2008 R2
 
Cio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final VirtualizationCio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final Virtualization
 
Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWare
 
Workload Availability Solution Guide(Uk)
Workload Availability Solution Guide(Uk)Workload Availability Solution Guide(Uk)
Workload Availability Solution Guide(Uk)
 
Improved Efficiency through Workload Optimisation
Improved Efficiency through Workload OptimisationImproved Efficiency through Workload Optimisation
Improved Efficiency through Workload Optimisation
 
TechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDITechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDI
 
Virtulaisation
VirtulaisationVirtulaisation
Virtulaisation
 
Availability Considerations for SQL Server
Availability Considerations for SQL ServerAvailability Considerations for SQL Server
Availability Considerations for SQL Server
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization
 

Kürzlich hochgeladen

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Kürzlich hochgeladen (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

London VMUG July 2011

  • 1. Meeting the Availability Challenges of physical, Virtual and Geographically dispersed Systems, with Vision Solutions
  • 2. Vision Solutions’ Corporate Profile Leading portfolio of information availability brands Supports Windows, Linux, Power Systems and Cloud Computing Aligned with Dell, HP, IBM, Microsoft, VMware and other leaders One of the world’s largest engineering and support teams Exclusive cross-pollination of ideas and technologies The best talent in the industry! Among the industry’s largest worldwide partner networks Unprecedented support for customers of all sizes and geos 2000+ partners, 25,000+ customers in 70+ countries Strong financial performance Privately held by Thoma Bravo inpartnership with management
  • 3. Meeting the Availability Challenge
  • 4. Availability Challenges Downtime has a cost both to the business and to you How much does downtime cost you? Needs Reduce downtime to a minimum Downtime
  • 5. Availability Challenges Data lost in outages adds to cost of downtime Lost revenue and lost productivity to recreate data Needs Failover to the latest valid version of data Intelligently protect the data of critical business applications Data Loss
  • 6. Availability Challenges Distance amplifies the challenges of Availability Non-IT personnel responsible for backups Less bandwidth available for network backups Remote data is no less important; same compliance requirements Needs Protect data at remote offices Protect data off-site for disaster recovery Maximize use of existing bandwidth Manage remote protection and DR centrally Geographic Distance
  • 7. Availability Challenges Roughly 50% of workloads are virtualised now “Splitting” of the datacenter into two distinct environments creates challenges Management of two environments Less flexibility with each Needs Unify availability of both environments Leverage virtualisation to improve availability of even physical servers Ease the migration to a fully virtual environment Virtualization
  • 8. Many Challenges – One Solution Virtualization Downtime Data Loss Geographic Distance Real-time Replication Minimize data loss and downtime Replicate over existing WAN bandwidth Virtualized Failover Protect vSphere or Hyper-V environments with host-level management and real-time replication Failover P2V, V2P, P2P, or V2V Application Protection Cluster Integration Replicate from clusters to standalone servers or clusters Create “Stretch Clusters” using the GeoCluster feature
  • 9. Availability Challenges Replication One word Few meanings Many interpretations What replication do you need?
  • 10. Availability Challenges Replication What replication do you need? folder local snapshot near-term system Near-continuous file real-time application byte Time synchronous off-site software asynchronous block storage transactional queue
  • 11. Double-Take Availability Virtual recovery assistant VRA lets you protect a source physical or virtual machine to a virtual target machine running on either Microsoft Windows Server 2008 with Hyper-V or VMware ESX Server. Data is replicated directly into the virtual machine’s virtual disk, which means that the target virtual machine can remain powered off until failover. Automatic failover can be configured if the source/target connection is lost. VRA provisions the target virtual machine for you. It can monitor the protected source machine. During protection setup, VRA lets you increase the drive size, memory, and number of processors on the target virtual machine 11
  • 12. C:br />C:br />F:br />C:br />F:br />Datastore1 Console Datastore2 Double-Take Availability Virtual recovery assistant Console collects all job information. Resident in memory of client until job starts. Persisted by service in job file Appliance creates virtual source as specified disks for the virtual source can be located on different datastores NIC mappings are critical and left to the user to configure on the ESX server VMDK 1 NIC1 NIC2 VMDK 2 NIC1 NIC2 Appliance Virtual Source Source ESX Server
  • 13. Double-Take Availability Virtual recovery assistant C:br />C:br />F:br />C:br />F:br />Datastore1 Console Datastore2 Appliance attaches virtual source VMDK files to the DTVRA appliance Mounts the disks to a mount point Appliance formats the mounted drives as NTFS (unless pre-staged) Appliance creates job between source and appliance, creates failover script file, connects/starts job, starts monitoring for failover. C:ountDirlt;GUID>_Cbr />VMDK 1 NIC1 NIC2 VMDK 2 NIC1 C:ountDirlt;GUID>_Fbr />NIC2 Appliance Virtual Source Source ESX Server
  • 14. Double-Take Availability Virtual recovery assistantBehind the Scenes: Failover C:br />C:br />F:br />C:br />F:br />Datastore1 Console Datastore2 Appliance injects VM drivers into virtual source Appliance processes the short file names Mounted drives are dismounted Mounted ESX source VMDK files are dismounted Virtual source is booted Failover command is sent by the Appliance DT Job is deleted. Appliance uses DTCOM to shutdown Source server Appliance deletes the DT connect.sts file from virtual source VMDK 1 NIC1 C:ountDirlt;GUID>_Cbr />NIC2 VMDK 2 NIC1 C:ountDirlt;GUID>_Fbr />NIC2 Appliance Virtual Source Source ESX Server
  • 15. Double-Take Availability Virtual recovery assistant Console can use a Virtual Center or work directly with an ESX server Console collects all information about connection from user prior to executing anything. Able to change amount of RAM, number of processors, and disk sizes of virtual source ESX server configuration (network, stores, etc.) is left to the user. Once started, a DTVRA job is just like any Double-Take job. Any Double-Take client can control the job. Once source is failed-over, Double-Take has no further interaction with the new virtual server.
  • 16. Meeting the Migration Challenge
  • 17. Double-Take Move is … Effortless no downtime X2X Windows server and data migrations. Enables IT Managers and Administrators to consolidate data centers across the WAN, virtualize their physical hardware (P2V), create consistent virtual environments (V2V), refresh physical servers (P2P), all while allowing users to remain productive and working during the migration. Effortless no downtime server and data migrations. Effortless no downtime server and data migrations.
  • 18.
  • 19. You don’t want to buy special hardware.
  • 20. You want to use the network that is already in place.
  • 21.
  • 22.
  • 23.