How well is your computer system protected if a disaster were to occur? This article explores the three ways of configuring computer systems in order to provide disaster tolerance: remote copy, remote computing, and wide area clustering. Improved technology in high-speed long distance interconnects such as Fibre Channel and ATM has allowed many vendors to offer disaster tolerant products and solutions. It is important to understand how well these disaster tolerant solutions work. One way to measure the quality of the solution is by how little time it takes to recover from the outage and resume operations. The ability to restore all of the data to the instant before a disaster occurs may not be sufficient. There are many technical solutions that can be used to capture data. Most of the solutions can even handle the multiple I/O transactions common to database applications. But how does your solution measure up in
Wednesday, 21 November 2007 23:14
Does Your Disaster Tolerant IT Solution Measure Up?Written by Robert Lyons
Leave a comment
Make sure you enter the (*) required information where indicated. HTML code is not allowed.