SlideShare a Scribd company logo
1 of 40
Workload Optimization Karl Oman, Sr. Solutions Architect Double-Take Software (Canada) [email_address] www.doubletake.com
Microsite  www.doubletake.com/vmware
www.doubletake.com About Double-Take Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
  Enterprise Customers
Workload Optimization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Double-Take provides a turnkey solution for Managed migration, centralization and backup of virtualized workloads”
Double-Take Availability www.doubletake.com
Double-Take Software  - Workload Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Real-Time Replication Production Standby
Virtualized Target Servers Failover Monitoring Replication Lower the TCO of your Disaster Recovery solution by implementing  Virtualized  target servers and Double-Take
Complete Virtualization Failover Monitoring Replication Lower the TCO of your entire infrastructure by implementing  Virtual  machines and Double-Take for all of your servers
How Real-Time Replication Works Operating System Hardware Layer File System Any IP Network Applications Operating System Double-Take Filter Hardware Layer File System Applications Initial Mirror of Data WAN Optimized Three Levels of Data Compression and Bandwidth Limiting Capabilities
How Application Failover Works www.doubletake.com Failover Monitoring User Data or Application Data Replication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source Target
How Failback Works www.doubletake.com Failover Monitoring Source Target ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Restoration of Changes Only Re-establish Replication job
Virtualized Target Servers Failover Monitoring Replication Lower the TCO of your Disaster Recovery solution by implementing  Virtualized  target servers and Double-Take
Virtual Recovery Assistant FS-System.vmdk FS-Data.vmdk EX-System.vmdk EX-Data.vmdk DB-System.vmdk DB-Data.vmdk C: System.vmdk DT-VRA FS-System FS-Data File Server Exchange Database C: E: EX-System.vmdk EX-Data.vmdk DB-System.vmdk DB-Data.vmdk C: System.vmdk DT-VRA FS-System.vmdk FS-Data.vmdk File Server C: E: EX-System EX-Data C: E: DB-System DB-Data C: E:
RPO and RTO time Time t=0.  Point of failure 24 hrs days RPO RTO seconds $ minutes Recovery Time Objective Recovery Point Objective NSI reduces the cost of both RPO and RTO significantly.
Host Level Protection: ESX & vSphere:  Intermittent w3-system.vmdk w3-data.vmdk WWW ex-system.vmdk ex-data.vmdk EX fs1-system.vmdk fs1-data.vmdk FS1 w3-system.vmdk w3-data.vmdk DRW ex-system.vmdk ex-data.vmdk EX2 fs1-system.vmdk fs1-data.vmdk FS2
ESX Host Level Protection: How it Works www.doubletake.com Committing (remove_snapshot) Source VM Files Replica VM Files Administrative Client *-delta.vmdk *.vmsd *-delta.vmdk *.vmsd Replicating (SCP) *-delta.vmdk *.vmsd *.vmdk *-flat.vmdk *.vmx Synchronizing (SCP) Source ESX Server Datastore (Source) Target ESX Server Datastore (Target) SSH SSH Web Services *.vmdk *-flat.vmdk *.vmx Monitoring (Time/Size)
Double-Take Backup www.doubletake.com
Double-Take Software  - Workload Solutions Vancouver Calgary Storage   Corporate Data Center Saskatoon ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Workload Backup ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.doubletake.com
Backup and Recovery www.doubletake.com Replication Recovery Recovery Protect Multiple Production Servers With One Backup Repository Recover Back to the Original Server, to New Hardware, or to a Virtual Machine Recovery Repository Server
Double-Take Backup ,[object Object],www.doubletake.com
Double-Take Backup ,[object Object],www.doubletake.com
Backup Console
Select Image for Recovery
How Backup Virtual Recovery Works DB-System.vmdk DB-Data.vmdk C: System.vmdk DT-VRA System.vmdk Backup VRA Source2 Image Source3 Image LiveWire Repository Server C: Source Image Source Data.vmdk Source System.vmdk Source Data.vmdk Source System.vmdk VMWare VMDKs are automatically provisioned by Backup Recover Server Image With Backup Virtual Recovery VMDKs are detached and started as a separate VM VMWare ESX
Comparing RPO Monday 12:00AM Tuesday 12:00AM Wednesday 12:00AM Thursday 12:00AM Friday 12:00AM ,[object Object],[object Object],[object Object],[object Object]
Double-Take Software  - Workload Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],San  Diego Real-Time Replication Production Standby Chicago Storage  Corporate Data Center Los Angeles Dallas ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Real-Time Replication New Hardware Old Hardware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],www.doubletake.com
Double-Take Move www.doubletake.com Double-Take replicates the workload in real-time while users remain online and working Once a full copy of the workload has been replicated, users can be migrated to the new server within minutes Old Server Target Server Double-Take Move Console
Workload Portability – Double-Take ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.doubletake.com
Double-Take Migrations Physical to Physical Physical to Virtual Virtual to Physical Virtual to Virtual Storage to Storage
Site to Site Migration Migrate workloads efficiently between sites over any distance Migrate from multiple sites for datacenter consolidation
Workload Portability – Double-Take ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.doubletake.com
How Migration Works (x2x) C: Volume Operating System and Applications Data Volumes User and Application Data Staging Area Replication Step 3:  Target Server is Rebooted Step 1:  System State Real-Time Replication Step 2:  System State is Applied Old Server Target Server
Physical to Virtual Migration FS-System.vmdk FS-Data.vmdk EX-System.vmdk EX-Data.vmdk DB-System.vmdk DB-Data.vmdk C: System.vmdk DT-VRA FS-System FS-Data Exchange Database C: E: EX-System.vmdk EX-Data.vmdk DB-System.vmdk DB-Data.vmdk C: System.vmdk DT-VRA FS-System.vmdk FS-Data.vmdk File Server C: E: EX-System EX-Data C: E: DB-System DB-Data C: E: File Server Double-Take automatically provisions VMDKs for each workload volume When a full workload is replicated, migration can be completed in minutes
Workload Portability – Double-Take ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.doubletake.com
Workload Optimization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Double-Take provides a turnkey solution for Managed migration, centralization and backup of virtualized workloads”
Microsite  www.doubletake.com/vmware
Q&A For More Information http://www.doubletake.com www.doubletake.com

More Related Content

What's hot

Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to Cloud
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to CloudHybrid- and Multi-Cloud by design - IBM Cloud and your journey to Cloud
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to CloudAleksandar Francuz
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAnimesh Chaturvedi
 
Complex architectures for authentication and authorization on AWS
Complex architectures for authentication and authorization on AWSComplex architectures for authentication and authorization on AWS
Complex architectures for authentication and authorization on AWSBoyan Dimitrov
 
Azure Site Recovery
Azure Site RecoveryAzure Site Recovery
Azure Site RecoveryLalit Rawat
 
A Detailed Guide to Securing React applications with Keycloak - WalkingTree ...
A Detailed Guide to Securing React applications with Keycloak  - WalkingTree ...A Detailed Guide to Securing React applications with Keycloak  - WalkingTree ...
A Detailed Guide to Securing React applications with Keycloak - WalkingTree ...Ganesh Kumar
 
Major File On web Development
Major File On web Development Major File On web Development
Major File On web Development Love Kothari
 
PPT on Cloud computing
PPT on Cloud computingPPT on Cloud computing
PPT on Cloud computingVinny Vessel
 
Online Cab Booking (EpicRide 24x7)
Online Cab Booking (EpicRide 24x7)Online Cab Booking (EpicRide 24x7)
Online Cab Booking (EpicRide 24x7)Shadan Khan
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptA
 
OAuth 2.0 with IBM WebSphere DataPower
OAuth 2.0 with IBM WebSphere DataPowerOAuth 2.0 with IBM WebSphere DataPower
OAuth 2.0 with IBM WebSphere DataPowerShiu-Fun Poon
 
Instalación del servidor web en windows server 2008
Instalación del servidor web en windows server 2008Instalación del servidor web en windows server 2008
Instalación del servidor web en windows server 2008Michelle Gutierrez
 
Andy Jassy Illuminates Amazon Web Services
Andy Jassy Illuminates Amazon Web ServicesAndy Jassy Illuminates Amazon Web Services
Andy Jassy Illuminates Amazon Web ServicesMichael Skok
 
Exposing services with Azure API Management
Exposing services with Azure API ManagementExposing services with Azure API Management
Exposing services with Azure API ManagementCallon Campbell
 
MCA 6th Sem Project Report
MCA 6th Sem Project ReportMCA 6th Sem Project Report
MCA 6th Sem Project ReportPRADEEP GUPTA
 
E Commerce Website Landing Page Design Proposal PowerPoint Presentation Slides
E Commerce Website Landing Page Design Proposal PowerPoint Presentation SlidesE Commerce Website Landing Page Design Proposal PowerPoint Presentation Slides
E Commerce Website Landing Page Design Proposal PowerPoint Presentation SlidesSlideTeam
 
Building API-Driven Microservices with Amazon API Gateway - AWS Online Tech T...
Building API-Driven Microservices with Amazon API Gateway - AWS Online Tech T...Building API-Driven Microservices with Amazon API Gateway - AWS Online Tech T...
Building API-Driven Microservices with Amazon API Gateway - AWS Online Tech T...Amazon Web Services
 
[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...
[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...
[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...WSO2
 
Migrating your Data Centre to AWS
Migrating your Data Centre to AWSMigrating your Data Centre to AWS
Migrating your Data Centre to AWSAmazon Web Services
 
Cloud Migration Checklist | Microsoft Azure Migration
Cloud Migration Checklist | Microsoft Azure MigrationCloud Migration Checklist | Microsoft Azure Migration
Cloud Migration Checklist | Microsoft Azure MigrationIntellika
 

What's hot (20)

Mini Project- Virtual Network Project
Mini Project- Virtual Network ProjectMini Project- Virtual Network Project
Mini Project- Virtual Network Project
 
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to Cloud
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to CloudHybrid- and Multi-Cloud by design - IBM Cloud and your journey to Cloud
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to Cloud
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Complex architectures for authentication and authorization on AWS
Complex architectures for authentication and authorization on AWSComplex architectures for authentication and authorization on AWS
Complex architectures for authentication and authorization on AWS
 
Azure Site Recovery
Azure Site RecoveryAzure Site Recovery
Azure Site Recovery
 
A Detailed Guide to Securing React applications with Keycloak - WalkingTree ...
A Detailed Guide to Securing React applications with Keycloak  - WalkingTree ...A Detailed Guide to Securing React applications with Keycloak  - WalkingTree ...
A Detailed Guide to Securing React applications with Keycloak - WalkingTree ...
 
Major File On web Development
Major File On web Development Major File On web Development
Major File On web Development
 
PPT on Cloud computing
PPT on Cloud computingPPT on Cloud computing
PPT on Cloud computing
 
Online Cab Booking (EpicRide 24x7)
Online Cab Booking (EpicRide 24x7)Online Cab Booking (EpicRide 24x7)
Online Cab Booking (EpicRide 24x7)
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
OAuth 2.0 with IBM WebSphere DataPower
OAuth 2.0 with IBM WebSphere DataPowerOAuth 2.0 with IBM WebSphere DataPower
OAuth 2.0 with IBM WebSphere DataPower
 
Instalación del servidor web en windows server 2008
Instalación del servidor web en windows server 2008Instalación del servidor web en windows server 2008
Instalación del servidor web en windows server 2008
 
Andy Jassy Illuminates Amazon Web Services
Andy Jassy Illuminates Amazon Web ServicesAndy Jassy Illuminates Amazon Web Services
Andy Jassy Illuminates Amazon Web Services
 
Exposing services with Azure API Management
Exposing services with Azure API ManagementExposing services with Azure API Management
Exposing services with Azure API Management
 
MCA 6th Sem Project Report
MCA 6th Sem Project ReportMCA 6th Sem Project Report
MCA 6th Sem Project Report
 
E Commerce Website Landing Page Design Proposal PowerPoint Presentation Slides
E Commerce Website Landing Page Design Proposal PowerPoint Presentation SlidesE Commerce Website Landing Page Design Proposal PowerPoint Presentation Slides
E Commerce Website Landing Page Design Proposal PowerPoint Presentation Slides
 
Building API-Driven Microservices with Amazon API Gateway - AWS Online Tech T...
Building API-Driven Microservices with Amazon API Gateway - AWS Online Tech T...Building API-Driven Microservices with Amazon API Gateway - AWS Online Tech T...
Building API-Driven Microservices with Amazon API Gateway - AWS Online Tech T...
 
[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...
[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...
[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...
 
Migrating your Data Centre to AWS
Migrating your Data Centre to AWSMigrating your Data Centre to AWS
Migrating your Data Centre to AWS
 
Cloud Migration Checklist | Microsoft Azure Migration
Cloud Migration Checklist | Microsoft Azure MigrationCloud Migration Checklist | Microsoft Azure Migration
Cloud Migration Checklist | Microsoft Azure Migration
 

Viewers also liked

Double-Take Availability - Technical Presentation
Double-Take Availability - Technical PresentationDouble-Take Availability - Technical Presentation
Double-Take Availability - Technical PresentationMücahid Akçay
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwebhostingguy
 
WebHost Manager 7 User Guide
WebHost Manager 7 User GuideWebHost Manager 7 User Guide
WebHost Manager 7 User Guidewebhostingguy
 
Think asg double take migrations for the enterprise
Think asg double take migrations for the enterpriseThink asg double take migrations for the enterprise
Think asg double take migrations for the enterprisethinkASG
 
Big Data Expo 2015 - Vision Solutions Sharind Database Information
Big Data Expo 2015 - Vision Solutions Sharind Database InformationBig Data Expo 2015 - Vision Solutions Sharind Database Information
Big Data Expo 2015 - Vision Solutions Sharind Database InformationBigDataExpo
 
Business Continuity with the AWS Cloud
Business Continuity with the AWS CloudBusiness Continuity with the AWS Cloud
Business Continuity with the AWS CloudAmazon Web Services
 
AWS Webcast - Business Continuity in the AWS Cloud
AWS Webcast - Business Continuity in the AWS CloudAWS Webcast - Business Continuity in the AWS Cloud
AWS Webcast - Business Continuity in the AWS CloudAmazon Web Services
 
example of SAP Cut over strategy FI CO MM PS module
example of SAP Cut over strategy FI CO MM PS moduleexample of SAP Cut over strategy FI CO MM PS module
example of SAP Cut over strategy FI CO MM PS moduleCitra Nudiasari
 
Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3guest83fa4c
 
Staff development invitation2
Staff development invitation2Staff development invitation2
Staff development invitation2candipartridge
 
Khanna section
Khanna sectionKhanna section
Khanna sectionm
 
вяткинев презентация
вяткинев презентациявяткинев презентация
вяткинев презентацияMOUSOW20
 
Liz Murphy: Driving Traffic through Search and Display
Liz Murphy: Driving Traffic through Search and DisplayLiz Murphy: Driving Traffic through Search and Display
Liz Murphy: Driving Traffic through Search and DisplayLiz Murphy
 
L’Economie de la Fonctionnalité; une voie nouvelle pour une décroissance sout...
L’Economie de la Fonctionnalité; une voie nouvelle pour une décroissance sout...L’Economie de la Fonctionnalité; une voie nouvelle pour une décroissance sout...
L’Economie de la Fonctionnalité; une voie nouvelle pour une décroissance sout...Degrowth Conference
 

Viewers also liked (20)

Double-Take Availability - Technical Presentation
Double-Take Availability - Technical PresentationDouble-Take Availability - Technical Presentation
Double-Take Availability - Technical Presentation
 
Double take 6.0 實機體驗營
Double take 6.0 實機體驗營Double take 6.0 實機體驗營
Double take 6.0 實機體驗營
 
K.I.S.S In The Cloud with AWS
K.I.S.S In The Cloud with AWSK.I.S.S In The Cloud with AWS
K.I.S.S In The Cloud with AWS
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
 
WebHost Manager 7 User Guide
WebHost Manager 7 User GuideWebHost Manager 7 User Guide
WebHost Manager 7 User Guide
 
Think asg double take migrations for the enterprise
Think asg double take migrations for the enterpriseThink asg double take migrations for the enterprise
Think asg double take migrations for the enterprise
 
Big Data Expo 2015 - Vision Solutions Sharind Database Information
Big Data Expo 2015 - Vision Solutions Sharind Database InformationBig Data Expo 2015 - Vision Solutions Sharind Database Information
Big Data Expo 2015 - Vision Solutions Sharind Database Information
 
Business Continuity with the AWS Cloud
Business Continuity with the AWS CloudBusiness Continuity with the AWS Cloud
Business Continuity with the AWS Cloud
 
AWS Webcast - Business Continuity in the AWS Cloud
AWS Webcast - Business Continuity in the AWS CloudAWS Webcast - Business Continuity in the AWS Cloud
AWS Webcast - Business Continuity in the AWS Cloud
 
example of SAP Cut over strategy FI CO MM PS module
example of SAP Cut over strategy FI CO MM PS moduleexample of SAP Cut over strategy FI CO MM PS module
example of SAP Cut over strategy FI CO MM PS module
 
Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3
 
19 abril
19 abril19 abril
19 abril
 
Staff development invitation2
Staff development invitation2Staff development invitation2
Staff development invitation2
 
Khanna section
Khanna sectionKhanna section
Khanna section
 
вяткинев презентация
вяткинев презентациявяткинев презентация
вяткинев презентация
 
Liz Murphy: Driving Traffic through Search and Display
Liz Murphy: Driving Traffic through Search and DisplayLiz Murphy: Driving Traffic through Search and Display
Liz Murphy: Driving Traffic through Search and Display
 
Designing court websites for the 21st century
Designing court websites for the 21st centuryDesigning court websites for the 21st century
Designing court websites for the 21st century
 
L’Economie de la Fonctionnalité; une voie nouvelle pour une décroissance sout...
L’Economie de la Fonctionnalité; une voie nouvelle pour une décroissance sout...L’Economie de la Fonctionnalité; une voie nouvelle pour une décroissance sout...
L’Economie de la Fonctionnalité; une voie nouvelle pour une décroissance sout...
 
...
......
...
 
الصلاة
الصلاةالصلاة
الصلاة
 

Similar to Double-Take Software

HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1Tanawit Chansuchai
 
Workload Optimisation
Workload OptimisationWorkload Optimisation
Workload Optimisationianmasters
 
Server Virtualization Seminar Presentation
Server Virtualization Seminar PresentationServer Virtualization Seminar Presentation
Server Virtualization Seminar Presentationshabi_hassan
 
VMUG - Falconstor Presentation
VMUG - Falconstor PresentationVMUG - Falconstor Presentation
VMUG - Falconstor Presentation1CloudRoad.com
 
Hyper V High Availabitiy
Hyper V High AvailabitiyHyper V High Availabitiy
Hyper V High AvailabitiyEduardo Castro
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwebhostingguy
 
DRaaS on Microsoft Azure with Veeam Software
DRaaS on Microsoft Azure with Veeam SoftwareDRaaS on Microsoft Azure with Veeam Software
DRaaS on Microsoft Azure with Veeam SoftwareTanawit Chansuchai
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization1CloudRoad.com
 
Fastback Technical Enablementv1
Fastback Technical Enablementv1Fastback Technical Enablementv1
Fastback Technical Enablementv1petchpaitoon
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5BusinesstoVirtual
 
Cio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final VirtualizationCio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final Virtualizationguestc900809
 
Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...EMC Forum India
 
VMworld 2014: Data Protection for vSphere 101
VMworld 2014: Data Protection for vSphere 101VMworld 2014: Data Protection for vSphere 101
VMworld 2014: Data Protection for vSphere 101VMworld
 
Business Track session 2: udp solution selling made simple
Business Track session 2: udp solution selling made simpleBusiness Track session 2: udp solution selling made simple
Business Track session 2: udp solution selling made simplearcserve data protection
 
SQL Backup trough Veeam *AND* SQL
SQL Backup trough Veeam *AND* SQLSQL Backup trough Veeam *AND* SQL
SQL Backup trough Veeam *AND* SQLTanawit Chansuchai
 
Improved Efficiency through Workload Optimisation
Improved Efficiency through Workload OptimisationImproved Efficiency through Workload Optimisation
Improved Efficiency through Workload Optimisationianmasters
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMwareDevansh Chowdhary
 

Similar to Double-Take Software (20)

London VMUG July 2011
London VMUG July 2011London VMUG July 2011
London VMUG July 2011
 
HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1
 
Workload Optimisation
Workload OptimisationWorkload Optimisation
Workload Optimisation
 
Server Virtualization Seminar Presentation
Server Virtualization Seminar PresentationServer Virtualization Seminar Presentation
Server Virtualization Seminar Presentation
 
VMUG - Falconstor Presentation
VMUG - Falconstor PresentationVMUG - Falconstor Presentation
VMUG - Falconstor Presentation
 
Hyper V High Availabitiy
Hyper V High AvailabitiyHyper V High Availabitiy
Hyper V High Availabitiy
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
 
DRaaS on Microsoft Azure with Veeam Software
DRaaS on Microsoft Azure with Veeam SoftwareDRaaS on Microsoft Azure with Veeam Software
DRaaS on Microsoft Azure with Veeam Software
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization
 
Fastback Technical Enablementv1
Fastback Technical Enablementv1Fastback Technical Enablementv1
Fastback Technical Enablementv1
 
Commvault Story - CVTSP_1.pptx
Commvault Story - CVTSP_1.pptxCommvault Story - CVTSP_1.pptx
Commvault Story - CVTSP_1.pptx
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5
 
Cio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final VirtualizationCio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final Virtualization
 
Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...
 
VMworld 2014: Data Protection for vSphere 101
VMworld 2014: Data Protection for vSphere 101VMworld 2014: Data Protection for vSphere 101
VMworld 2014: Data Protection for vSphere 101
 
Business Track session 2: udp solution selling made simple
Business Track session 2: udp solution selling made simpleBusiness Track session 2: udp solution selling made simple
Business Track session 2: udp solution selling made simple
 
SQL Backup trough Veeam *AND* SQL
SQL Backup trough Veeam *AND* SQLSQL Backup trough Veeam *AND* SQL
SQL Backup trough Veeam *AND* SQL
 
Fb Sales Enbl 1 4
Fb Sales Enbl 1 4Fb Sales Enbl 1 4
Fb Sales Enbl 1 4
 
Improved Efficiency through Workload Optimisation
Improved Efficiency through Workload OptimisationImproved Efficiency through Workload Optimisation
Improved Efficiency through Workload Optimisation
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMware
 

More from 1CloudRoad.com

Enhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View DeploymentsEnhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View Deployments1CloudRoad.com
 
VMware vCloud Director 1.5 - What's New
VMware vCloud Director 1.5  - What's NewVMware vCloud Director 1.5  - What's New
VMware vCloud Director 1.5 - What's New1CloudRoad.com
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance 1CloudRoad.com
 
VMware - VMUG Montreal
VMware - VMUG MontrealVMware - VMUG Montreal
VMware - VMUG Montreal1CloudRoad.com
 
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRMFalconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM1CloudRoad.com
 
Dell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and IntegrationDell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and Integration1CloudRoad.com
 
Breakout HP Discover - Session 3400
Breakout HP Discover - Session 3400Breakout HP Discover - Session 3400
Breakout HP Discover - Session 34001CloudRoad.com
 
#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout1CloudRoad.com
 
#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout1CloudRoad.com
 
#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout1CloudRoad.com
 
Controlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP SoftwareControlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP Software1CloudRoad.com
 
Control Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP SoftwareControl Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP Software1CloudRoad.com
 
Enterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th GenerationEnterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th Generation1CloudRoad.com
 
Operating a World-Class Virtual Infrastructure
Operating a World-Class Virtual InfrastructureOperating a World-Class Virtual Infrastructure
Operating a World-Class Virtual Infrastructure1CloudRoad.com
 

More from 1CloudRoad.com (18)

Enhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View DeploymentsEnhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View Deployments
 
VMware vCloud Director 1.5 - What's New
VMware vCloud Director 1.5  - What's NewVMware vCloud Director 1.5  - What's New
VMware vCloud Director 1.5 - What's New
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
VMware - VMUG Montreal
VMware - VMUG MontrealVMware - VMUG Montreal
VMware - VMUG Montreal
 
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRMFalconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
 
Dell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and IntegrationDell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and Integration
 
VMworld2011 Recap
VMworld2011 RecapVMworld2011 Recap
VMworld2011 Recap
 
Breakout HP Discover - Session 3400
Breakout HP Discover - Session 3400Breakout HP Discover - Session 3400
Breakout HP Discover - Session 3400
 
Virtensys
VirtensysVirtensys
Virtensys
 
#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout
 
#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout
 
#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
Controlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP SoftwareControlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP Software
 
Control Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP SoftwareControl Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP Software
 
Workload Optimization
Workload OptimizationWorkload Optimization
Workload Optimization
 
Enterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th GenerationEnterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th Generation
 
Operating a World-Class Virtual Infrastructure
Operating a World-Class Virtual InfrastructureOperating a World-Class Virtual Infrastructure
Operating a World-Class Virtual Infrastructure
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Double-Take Software

  • 1. Workload Optimization Karl Oman, Sr. Solutions Architect Double-Take Software (Canada) [email_address] www.doubletake.com
  • 3.
  • 4. Enterprise Customers
  • 5.
  • 7.
  • 8. Virtualized Target Servers Failover Monitoring Replication Lower the TCO of your Disaster Recovery solution by implementing Virtualized target servers and Double-Take
  • 9. Complete Virtualization Failover Monitoring Replication Lower the TCO of your entire infrastructure by implementing Virtual machines and Double-Take for all of your servers
  • 10. How Real-Time Replication Works Operating System Hardware Layer File System Any IP Network Applications Operating System Double-Take Filter Hardware Layer File System Applications Initial Mirror of Data WAN Optimized Three Levels of Data Compression and Bandwidth Limiting Capabilities
  • 11.
  • 12.
  • 13. Virtualized Target Servers Failover Monitoring Replication Lower the TCO of your Disaster Recovery solution by implementing Virtualized target servers and Double-Take
  • 14. Virtual Recovery Assistant FS-System.vmdk FS-Data.vmdk EX-System.vmdk EX-Data.vmdk DB-System.vmdk DB-Data.vmdk C: System.vmdk DT-VRA FS-System FS-Data File Server Exchange Database C: E: EX-System.vmdk EX-Data.vmdk DB-System.vmdk DB-Data.vmdk C: System.vmdk DT-VRA FS-System.vmdk FS-Data.vmdk File Server C: E: EX-System EX-Data C: E: DB-System DB-Data C: E:
  • 15. RPO and RTO time Time t=0. Point of failure 24 hrs days RPO RTO seconds $ minutes Recovery Time Objective Recovery Point Objective NSI reduces the cost of both RPO and RTO significantly.
  • 16. Host Level Protection: ESX & vSphere: Intermittent w3-system.vmdk w3-data.vmdk WWW ex-system.vmdk ex-data.vmdk EX fs1-system.vmdk fs1-data.vmdk FS1 w3-system.vmdk w3-data.vmdk DRW ex-system.vmdk ex-data.vmdk EX2 fs1-system.vmdk fs1-data.vmdk FS2
  • 17. ESX Host Level Protection: How it Works www.doubletake.com Committing (remove_snapshot) Source VM Files Replica VM Files Administrative Client *-delta.vmdk *.vmsd *-delta.vmdk *.vmsd Replicating (SCP) *-delta.vmdk *.vmsd *.vmdk *-flat.vmdk *.vmx Synchronizing (SCP) Source ESX Server Datastore (Source) Target ESX Server Datastore (Target) SSH SSH Web Services *.vmdk *-flat.vmdk *.vmx Monitoring (Time/Size)
  • 19.
  • 20.
  • 21. Backup and Recovery www.doubletake.com Replication Recovery Recovery Protect Multiple Production Servers With One Backup Repository Recover Back to the Original Server, to New Hardware, or to a Virtual Machine Recovery Repository Server
  • 22.
  • 23.
  • 25. Select Image for Recovery
  • 26. How Backup Virtual Recovery Works DB-System.vmdk DB-Data.vmdk C: System.vmdk DT-VRA System.vmdk Backup VRA Source2 Image Source3 Image LiveWire Repository Server C: Source Image Source Data.vmdk Source System.vmdk Source Data.vmdk Source System.vmdk VMWare VMDKs are automatically provisioned by Backup Recover Server Image With Backup Virtual Recovery VMDKs are detached and started as a separate VM VMWare ESX
  • 27.
  • 28.
  • 29.
  • 30. Double-Take Move www.doubletake.com Double-Take replicates the workload in real-time while users remain online and working Once a full copy of the workload has been replicated, users can be migrated to the new server within minutes Old Server Target Server Double-Take Move Console
  • 31.
  • 32. Double-Take Migrations Physical to Physical Physical to Virtual Virtual to Physical Virtual to Virtual Storage to Storage
  • 33. Site to Site Migration Migrate workloads efficiently between sites over any distance Migrate from multiple sites for datacenter consolidation
  • 34.
  • 35. How Migration Works (x2x) C: Volume Operating System and Applications Data Volumes User and Application Data Staging Area Replication Step 3: Target Server is Rebooted Step 1: System State Real-Time Replication Step 2: System State is Applied Old Server Target Server
  • 36. Physical to Virtual Migration FS-System.vmdk FS-Data.vmdk EX-System.vmdk EX-Data.vmdk DB-System.vmdk DB-Data.vmdk C: System.vmdk DT-VRA FS-System FS-Data Exchange Database C: E: EX-System.vmdk EX-Data.vmdk DB-System.vmdk DB-Data.vmdk C: System.vmdk DT-VRA FS-System.vmdk FS-Data.vmdk File Server C: E: EX-System EX-Data C: E: DB-System DB-Data C: E: File Server Double-Take automatically provisions VMDKs for each workload volume When a full workload is replicated, migration can be completed in minutes
  • 37.
  • 38.
  • 40. Q&A For More Information http://www.doubletake.com www.doubletake.com

Editor's Notes

  1. SPLA 12-15K average sale 30-45 Average Close time 250 software services Champion/Terramake
  2. 10/20/10 Page With traditional backup, protection is generally a disruptive daily event that has to be scheduled and managed. When there is a problem with the backup, it can fail, schedules can overlap and you are left to clean up a whole mess and try to reschedule or give up and have an even greater exposure to data loss until the next scheduled backup. The backup window has been a real nightmare for administrators, and the shift to global trade and 7 X 24 hour operation has made this impossible in some circumstances. The open file managers and specialized backup APIs have helped (when they work) by making it possible to keep files semi-open during backup. However, in reality, they do a “rolling close” and slow down operations considerably, requiring that backups still be scheduled for times where system activity is very low. Snapshots can help reduce the gaps in protection associated with backup to a point. Snapshots typically rely on proprietary hardware deployments, so cannot be used universally in a mixed environment. There are practical (often vendor imposed) limitations on the number of snapshots that can be maintained, and on how active the system can be. Integration with backup and applications is complex, and may require professional services or experienced consultants to implement and update. Replication maintains an at or near real time image of the primary dataset. While this can be helpful in the case of physical interruption, it does nothing to protect against logical corruption, nor does it provide a time dimension. Corruption or accidental deletion on the primary dataset is instantaneously replicated to the secondary – corruption time 2 phenomenon. Third mirror splits and BCVs (Business Continuance Volumes – an EMC term) may be used to “freeze” points in time. However, these are costly and complex, both in terms of disk usage and operational management. Generally, customized scripting and vendor verification are required, and this still does not eliminate the gaps in coverage between splits. TimeData continuously captures all changes that are made to the data on the server, including changes to the meta data (permissions, attributes). This is an automatic process that occurs in real time. There is no scheduling involved, and no need to pre-select times to snapshot data. Everything is captured, and no intervention is required. TimeData offers the best Recovery Point Objective available, eliminating the protection gaps inherent with backup, snapshot and replication. No pre-selection or psychic awareness required Meaningful events, such as database checkpoints, transactions, file save events, are captured and marked Data is captured exactly as it is written to the primary file system – (no secondary processing or reconstruction of blocks to file) This is not a series of granular snapshots or points in time – ALL changes are captured as and when they occur Changes are ordered and applied in the sequence in which they occur, thereby maintaining congruence at all times
  3. SPLA 12-15K average sale 30-45 Average Close time 250 software services Champion/Terramake