SlideShare una empresa de Scribd logo
1 de 26
1© Copyright 2006 EMC Corporation. All rights reserved.
CENTRALIZACIÓN
DE COPIAS DE LAS OFICINAS
EMC Replistor - EMC OnCourse
Alberto Tapias
(Tapias_Alberto@emc.com)
4.- Consolidar oficinas remotas
WAN
3© Copyright 2006 EMC Corporation. All rights reserved.
Information Infrastructure Model – EMC View (Enterprise)
Networked Storage
DMX-2 DMX800 CX700 CX500 CENTERA Disk Backup
Connectrix
Celerra
Control
Centre
Lifecycle Management
PowerPath V4
Oncourse
Replistor
Storagescope
SanCopy
ARM
SRDF
Timefinder
Mirrorview
Snapview
SANMgr
LAN LAN
WAN
Networker
Xtender Family AutostartVMWare Product Family
Documentum /Captiva / Authentica Content Management Family
TAPE
SMARTS Management
INVISTA
SMARTS
InCharge
AX
Remote
Data
RainStorage
RainWall
DMX-3
NeoScale
RSA Secure Access
4© Copyright 2006 EMC Corporation. All rights reserved.
ILM Virtual Infrastructure Model – Next Generation
Central
Mgt
L1=MC
L4=Archive
L2=BC
L3=DEPT
Central
Mgt
Networked Storage
Virtual Storage
VLUN’s Remove the Badges
Virtual Servers – The Servers Becomes Data
L5=B-Up
Services Oriented Architecture
Universal, Description, Discovery and Integration (UDDI)
Object Storage
ServiceBasedManagement
Correlation/Analytics
5© Copyright 2006 EMC Corporation. All rights reserved.
EMC RepliStor
6© Copyright 2006 EMC Corporation. All rights reserved.
Exchange Recoverability
Ensure the recoverability of your Exchange
database
Data Recoverability
Secondary copy of production data located
on any server; provides quick recoverability;
and, for SQL Server 2005, ensured
recoverability with VSS
Data Distribution
A solution that propagates identical datasets
for sharing information
Branch-Office Data Protection
Ensure data at remote offices is protected
and backed up
Solutions for Data Recoverability—Use Cases
Compliance
All data is backed up
properly
End User
Access to e-mail
online/offline, personal
archiving
E-mail Administrator
Mailbox management,
risk/policy enforcement,
storage-cost management
Storage Administrator
Data protection, availability,
performance, and scalability
Records Manager
Corporate file-plan
creation; broad books and
records-policy
enforcement
7© Copyright 2006 EMC Corporation. All rights reserved.
Solution Benefits to RepliStor Exchange Recoverability
Benefits Description
Ensured
recoverability
Recover from a VSS snapshot,
if replica is not recoverable
Minimal impact Minimal operation/overhead on
Exchange production system
No impact on
the network
Does not increase network
load
Flexible server
configuration
Supports one-to-one, many-to-
one, and MSCS-to-MSCS
Flexible storage
configuration
Provides storage-agnostic
solutions
Scalability
Scales from small to large
deployments of Exchange;
efficient use of network
bandwidth
© Copyright 2006 EMC Corporation. All rights reserved.
8© Copyright 2006 EMC Corporation. All rights reserved.
Challenges to Data Recoverability
 Secondary copy of data needed to meet disaster-recovery
requirements
– Current RPO with traditional tape backup has high risk of data loss
 Restoring from tape can take weeks
– Long outages mean lost productivity and revenue
 Logical threats, such as
operator error, account
for 80% of outages
 Users need continuous
access to the data
Event
Recovery-Point Objective
(Data loss)
Recovery-Time Objective
(Time to recover)
Sec.DaysWeeks Hrs. Days WeeksSec. Min.Min.Hrs.
Replication
Replication
Tape backup
Restore from
tape
9© Copyright 2006 EMC Corporation. All rights reserved.
RepliStor Protects the Business
 Replicate data continuously to one or
more servers, regardless of distance
 Ensure data can be available
immediately after a fault
 Replicate open and closed files
 Replicate data from a Microsoft Cluster
 Ensure SQL Server 2005 data
recoverability with application-
consistent VSS snapshot
IP network
Site A or
Server A
Site B or
Server B
Asynchronous
Unlimited
distance
On a Server Fault…
 RepliStor restarts the application,
reconnects the data, and reconnects
the users at the secondary location
RepliStorRepliStor
10© Copyright 2006 EMC Corporation. All rights reserved.
What About Monitoring Application Faults?
 In the event of a site disaster, AutoStart
would relocate application resources
from Site A to Site B:
– Ensure read-write access to remote replica
– Start application resources
– Start RepliStor replication from Site B to Site A
 EMC AutoStart manages automated
application and data restart on an
alternate server, either local or remote
 AutoStart seamlessly transfers control
of application and storage resources to
a local or remote facility in the event of
an outage
 AutoStart provides functionality to
assist in automating failback of
services, applications, and data
 AutoStart manages RepliStor remote
replication as a data source
Site A Site B
Unlimited
distance
RepliStor
AutoStart AutoStart
RepliStor
11© Copyright 2006 EMC Corporation. All rights reserved.
RepliStor Ensures Remote-Office Data is Protected
Satellite office
RepliStor
Satellite office
RepliStor
Satellite office
Satellite office
RepliStor
Server A Server B
Storage
(data resides)
Primary site
RepliStor RepliStor
1111010100110100
1111010100110100
1111010100110100
11110101001
1111010100110100101010
RepliStor
12© Copyright 2006 EMC Corporation. All rights reserved.
Pause Updates
Throttling
RepliStor Provides Flexible Scheduling Options
Synchronization
You Determine When and How Replication Will Occur
13© Copyright 2006 EMC Corporation. All rights reserved.
RepliStor Provides Flexible Security Options
Protect Users’ Data During the Replication Process
Connection
Digital Signature
Encryption
14© Copyright 2006 EMC Corporation. All rights reserved.
RepliStor for Data Distribution
 Provides a secure and reliable solution for distributing data
across a variety of Windows server platforms
– Replicate data in one-to-one, one-to-many, many-to-one, or many-
to-many configurations
 Offers easy-to-configure performance settings to maximize
network efficiencies
– Bandwidth throttling
– Data compression
14© Copyright 2006 EMC Corporation. All rights reserved.
15© Copyright 2006 EMC Corporation. All rights reserved.
Summary of RepliStor Features and Functionality
Features Benefits
Ensured
recoverability
Recover from snapshot if replica is not recoverable
Continuous,
asynchronous,
byte-level
replication
Captures and replicates changes in real time over
unlimited distances with a negligible effect on
application performance
Consumes minimal server and network resources after
initial synchronization
Hardware-
independent
Does not require proprietary or specialized hardware
Data integrity Maintains write-order consistency to ensure data
integrity for all applications
Security
Provides three levels of security—Connection, Digital
Signature, and Encryption—to meet the most stringent
security requirements
Network-
bandwidth
throttling
Allows users to limit the amount of network bandwidth
used for RepliStor replication
Scalability
Scales from small to large deployments of Exchange;
efficient use of network bandwidth
Integration with
AutoStart
Provides full application and data restart for disaster
recovery© Copyright 2006 EMC Corporation. All rights reserved.
16© Copyright 2006 EMC Corporation. All rights reserved.
EMC OnCourse
Secure, Automated File Transfer Among
Heterogeneous Systems
17© Copyright 2006 EMC Corporation. All rights reserved.
What Does OnCourse Do?
 Policy-based software that
provides the most comprehensive,
scaleable, and secure solution for
automating file movement
 Automates the consolidation and
distribution of files among
distributed heterogeneous
systems
 Centrally managed and scalable
solution with intelligent process
automation
Edge to core, core to edge, edge to edge
Internet
Agent
10010110Agent
10010110
Corporate
Intranet
Agent
10010110
Agent
10010110
Agent
10010110
Heterogeneous
Transfer Agents
Transfer Manager
18© Copyright 2006 EMC Corporation. All rights reserved.
Usage Models
Secure, Automated Data Transfer Among Heterogeneous Systems
A A
Data Consolidation
Example: Centralized backups, centralized reporting
File Synchronization
Example: periodic replication for third site, collaborative
development, application integration (data level)
A
A
A A
A
A
A
A
A
AA
A
A
A
A
A
A
A
Content and Data Distribution
Example: Retail price lists to branches, B2B distribution, regulatory
for airlines, etc.
19© Copyright 2006 EMC Corporation. All rights reserved.
OnCourse Graphical User Interface
 Modeling business rules
 Scheduling
 Monitoring
 Reporting
20© Copyright 2006 EMC Corporation. All rights reserved.
Business Rules Creation via GUI
Package group
Collects groups of other objects
File transfer package
Controls file transfer processes
Remote command package
Controls execution of remote
commands
Process target package
Controls piping of output data
between systems
Business Rules Modeling Objects
21© Copyright 2006 EMC Corporation. All rights reserved.
Why are EMC Customers Buying OnCourse?
Data from over 200 closed and prospective customers
Backup
consolidation
Long-distance
disaster recovery
Branch office
data updates
Shared
information
Development
team synch
Directory
Synch
11%
Other
6%Software
Synch
6%
Data
Distribution
22%
File
Consolidation
55%
22© Copyright 2006 EMC Corporation. All rights reserved.
Example: Inter-company Distribution
 Opportunity:
– Geo-imaging company distributes new images to
its customers via CD
 Problems:
– High cost, manual intensive, slow, unreliable
– Hard to verify delivery and trigger invoice
 Solution:
– Automate distribution to resellers and customers
– Using certified delivery option to automatically
trigger invoicing
 Benefits:
– Significantly reduced distribution cost
– Immediate delivery, availability to users
– Improved TTR
Geo-imaging
company
Image
delivered
Delivery
confirmed
Invoice
sent
Customer
A
A
Internet
$
23© Copyright 2006 EMC Corporation. All rights reserved.
 Opportunity:
– Telecom company IT organization
maintains software levels consistency on
servers throughout the organization
 Solution specifics:
– Systems are remotely queried to determine
current rev level
– Appropriate updates and patches are
distributed automatically
– Update processes triggered automatically
after hours or after prerequisite process
complete
– Cascade topology used to service large
number of servers
Example: Software and Patch Management
Data Transfer
Manager
24© Copyright 2006 EMC Corporation. All rights reserved.
Security Architecture
 Tightly integrated security architecture
– Encryption and authentication fully integrated into framework
 Multiple levels of security:
– Source and target authentication
 Authentication handled by digital certificates
 Selectable encryption (none, XOR (64 bit), IDEA (128 bit), 3DES (168 bit), AES
(256 bit)
 Supports receipt confirmation (certified delivery)
A
A
A
A Agent
10010110
I am host2.emca.com (certificate)
I am host1.acme.com (certificate)
Agent
10010110
25© Copyright 2006 EMC Corporation. All rights reserved.
OnCourse Unique Functionality
 Bandwidth throttling—Allows you to limit the transmission bandwidth so you use only a fixed number of bytes
per second in the transmission channel, optimizing the use of the network without causing a bottleneck
 Incremental transfer—Users can choose to send only the changed bytes in a file to be transmitted, reducing
network usage
 Encryption—Users can choose difference encryption standards, up to 3DES encryption or external encryption
(Verisign, DOD, etc.)
 Synchronizing transfers—Users can make the directories on both sides exactly the same; files that are added at
the source node are shipped over to the target node, while unchanged data is skipped; fields that are deleted in
the source node will also be deleted in the target node
 Certified delivery—Immutable receipt; the log file in the DTM host will contain proof of delivery
 Notification—Users can enable e-mail notification of successful file transfers as well as failures; log files of the
submitted jobs can be attached in the e-mail
 Rollback—This function ensures that all the specified files arrive correctly in a group; otherwise, none of the files
are applied
 Move directories—This allows directories and their contents to be moved recursively so that the child directories
and their contents are also copied
 Core-to-edge, edge-to-core, peer-to-peer—The transfers can be in any direction, in both push and pull modes
 Content distribution—Securely copies large files over the Internet
 Content aggregation—Collects files from branch offices, back to the central office
 Directory synchronization—Users can use the synchronization option to replicate one remote directory to a local
directory, or vice versa
26© Copyright 2006 EMC Corporation. All rights reserved.

Más contenido relacionado

La actualidad más candente

Cloud Infrastructure and Services (CIS) - Webinar
Cloud Infrastructure and Services (CIS) - WebinarCloud Infrastructure and Services (CIS) - Webinar
Cloud Infrastructure and Services (CIS) - WebinarEMC
 
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...CTI Group
 
EMC Academic Alliance overview
EMC Academic Alliance overviewEMC Academic Alliance overview
EMC Academic Alliance overviewEMC
 
Emc vi pr hdfs data service technical overview
Emc vi pr hdfs data service technical overviewEmc vi pr hdfs data service technical overview
Emc vi pr hdfs data service technical overviewsolarisyougood
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...ljaquet
 
Clo architecture for video surveillance service based on p2 p and cloud compu...
Clo architecture for video surveillance service based on p2 p and cloud compu...Clo architecture for video surveillance service based on p2 p and cloud compu...
Clo architecture for video surveillance service based on p2 p and cloud compu...manish bhandare
 
Visibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized EnterpriseVisibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized EnterpriseEMC
 
Wellmont Health System - EMC Customer Profile
Wellmont Health System - EMC Customer ProfileWellmont Health System - EMC Customer Profile
Wellmont Health System - EMC Customer ProfileDarren Ramsey
 
Cloud Computing and Data Centers
Cloud Computing and Data CentersCloud Computing and Data Centers
Cloud Computing and Data Centersbega karadza
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backupjpo1974
 
Emc isilon config requirements w tips & tricks
Emc isilon config requirements w tips & tricksEmc isilon config requirements w tips & tricks
Emc isilon config requirements w tips & trickskarlosgaleano
 
Designing Secure Cisco Data Centers
Designing Secure Cisco Data CentersDesigning Secure Cisco Data Centers
Designing Secure Cisco Data CentersCisco Russia
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase
 
Zte Co cloud ZTE U Sapphire Data Center
Zte Co cloud ZTE U Sapphire Data CenterZte Co cloud ZTE U Sapphire Data Center
Zte Co cloud ZTE U Sapphire Data CenterPT. Gomeds Netwotk
 
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRMFalconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM1CloudRoad.com
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...IBM Security
 

La actualidad más candente (20)

Cloud Infrastructure and Services (CIS) - Webinar
Cloud Infrastructure and Services (CIS) - WebinarCloud Infrastructure and Services (CIS) - Webinar
Cloud Infrastructure and Services (CIS) - Webinar
 
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
 
EMC Academic Alliance overview
EMC Academic Alliance overviewEMC Academic Alliance overview
EMC Academic Alliance overview
 
Emc vi pr hdfs data service technical overview
Emc vi pr hdfs data service technical overviewEmc vi pr hdfs data service technical overview
Emc vi pr hdfs data service technical overview
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
 
Emc storag
Emc storagEmc storag
Emc storag
 
Clo architecture for video surveillance service based on p2 p and cloud compu...
Clo architecture for video surveillance service based on p2 p and cloud compu...Clo architecture for video surveillance service based on p2 p and cloud compu...
Clo architecture for video surveillance service based on p2 p and cloud compu...
 
Avamar 7 2010
Avamar 7 2010Avamar 7 2010
Avamar 7 2010
 
Visibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized EnterpriseVisibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized Enterprise
 
Wellmont Health System - EMC Customer Profile
Wellmont Health System - EMC Customer ProfileWellmont Health System - EMC Customer Profile
Wellmont Health System - EMC Customer Profile
 
Cloud Computing and Data Centers
Cloud Computing and Data CentersCloud Computing and Data Centers
Cloud Computing and Data Centers
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backup
 
Emc isilon config requirements w tips & tricks
Emc isilon config requirements w tips & tricksEmc isilon config requirements w tips & tricks
Emc isilon config requirements w tips & tricks
 
DDS Best Practices
DDS Best PracticesDDS Best Practices
DDS Best Practices
 
Designing Secure Cisco Data Centers
Designing Secure Cisco Data CentersDesigning Secure Cisco Data Centers
Designing Secure Cisco Data Centers
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
 
Zte Co cloud ZTE U Sapphire Data Center
Zte Co cloud ZTE U Sapphire Data CenterZte Co cloud ZTE U Sapphire Data Center
Zte Co cloud ZTE U Sapphire Data Center
 
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRMFalconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
 

Destacado

Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Omega Peripherals
 
Presentación Omega Peripherals 2012
Presentación Omega Peripherals 2012Presentación Omega Peripherals 2012
Presentación Omega Peripherals 2012Omega Peripherals
 
vSphere 5 la tecnología de nueva generación (Omega Peripherals Bilbao)
vSphere 5 la tecnología de nueva generación (Omega Peripherals Bilbao)vSphere 5 la tecnología de nueva generación (Omega Peripherals Bilbao)
vSphere 5 la tecnología de nueva generación (Omega Peripherals Bilbao)Omega Peripherals
 
Soluciones de backup y archivado de Symantec
Soluciones de backup y archivado de SymantecSoluciones de backup y archivado de Symantec
Soluciones de backup y archivado de SymantecOmega Peripherals
 
Presentación Nuevas Soluciones de Almacenamiento Fujitsu y Omega Peripherals
Presentación Nuevas Soluciones de Almacenamiento Fujitsu y Omega PeripheralsPresentación Nuevas Soluciones de Almacenamiento Fujitsu y Omega Peripherals
Presentación Nuevas Soluciones de Almacenamiento Fujitsu y Omega PeripheralsOmega Peripherals
 
Soluciones de almacenamiento de IBM
Soluciones de almacenamiento de IBMSoluciones de almacenamiento de IBM
Soluciones de almacenamiento de IBMOmega Peripherals
 
Presentación Evento SAP GRC Barcelona Dell Software y Omega Peripherals
Presentación Evento SAP GRC Barcelona Dell Software y Omega PeripheralsPresentación Evento SAP GRC Barcelona Dell Software y Omega Peripherals
Presentación Evento SAP GRC Barcelona Dell Software y Omega PeripheralsOmega Peripherals
 
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Omega Peripherals
 

Destacado (8)

Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1
 
Presentación Omega Peripherals 2012
Presentación Omega Peripherals 2012Presentación Omega Peripherals 2012
Presentación Omega Peripherals 2012
 
vSphere 5 la tecnología de nueva generación (Omega Peripherals Bilbao)
vSphere 5 la tecnología de nueva generación (Omega Peripherals Bilbao)vSphere 5 la tecnología de nueva generación (Omega Peripherals Bilbao)
vSphere 5 la tecnología de nueva generación (Omega Peripherals Bilbao)
 
Soluciones de backup y archivado de Symantec
Soluciones de backup y archivado de SymantecSoluciones de backup y archivado de Symantec
Soluciones de backup y archivado de Symantec
 
Presentación Nuevas Soluciones de Almacenamiento Fujitsu y Omega Peripherals
Presentación Nuevas Soluciones de Almacenamiento Fujitsu y Omega PeripheralsPresentación Nuevas Soluciones de Almacenamiento Fujitsu y Omega Peripherals
Presentación Nuevas Soluciones de Almacenamiento Fujitsu y Omega Peripherals
 
Soluciones de almacenamiento de IBM
Soluciones de almacenamiento de IBMSoluciones de almacenamiento de IBM
Soluciones de almacenamiento de IBM
 
Presentación Evento SAP GRC Barcelona Dell Software y Omega Peripherals
Presentación Evento SAP GRC Barcelona Dell Software y Omega PeripheralsPresentación Evento SAP GRC Barcelona Dell Software y Omega Peripherals
Presentación Evento SAP GRC Barcelona Dell Software y Omega Peripherals
 
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
 

Similar a 3 oficinas remotas - repli stor oncourse

VMAX : répondez aux niveaux de services applicatifs les plus élevés
VMAX : répondez aux niveaux de services applicatifs les plus élevésVMAX : répondez aux niveaux de services applicatifs les plus élevés
VMAX : répondez aux niveaux de services applicatifs les plus élevésRSD
 
EMC VPLEX Continuous availability and non disruptive
EMC VPLEX Continuous availability and non disruptiveEMC VPLEX Continuous availability and non disruptive
EMC VPLEX Continuous availability and non disruptivesolarisyougood
 
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0xKinAnx
 
Transforming Mission Critical Applications
Transforming Mission Critical ApplicationsTransforming Mission Critical Applications
Transforming Mission Critical ApplicationsCenk Ersoy
 
illustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introductionillustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introductionillustro
 
Emc data domain technical deep dive workshop
Emc data domain  technical deep dive workshopEmc data domain  technical deep dive workshop
Emc data domain technical deep dive workshopsolarisyougood
 
Srm suite technical presentation nrm - tim piqueur
Srm suite technical presentation   nrm - tim piqueurSrm suite technical presentation   nrm - tim piqueur
Srm suite technical presentation nrm - tim piqueurEMC Nederland
 
Business Track Session 1: The Power of udp
Business Track Session 1: The Power of udpBusiness Track Session 1: The Power of udp
Business Track Session 1: The Power of udparcserve data protection
 
Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400RaGaZoMe
 
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...Netgear Italia
 
Emc vspex customer_presentation_private_cloud_virtualized_share_point
Emc vspex customer_presentation_private_cloud_virtualized_share_pointEmc vspex customer_presentation_private_cloud_virtualized_share_point
Emc vspex customer_presentation_private_cloud_virtualized_share_pointxKinAnx
 
Presentation integration vmware with emc storage
Presentation   integration vmware with emc storagePresentation   integration vmware with emc storage
Presentation integration vmware with emc storagesolarisyourep
 
Presentation cloud services
Presentation   cloud servicesPresentation   cloud services
Presentation cloud servicesxKinAnx
 
AWS Partner Presentation - Accenture Digital Supply Chain In The Cloud
AWS Partner Presentation - Accenture Digital Supply Chain In The CloudAWS Partner Presentation - Accenture Digital Supply Chain In The Cloud
AWS Partner Presentation - Accenture Digital Supply Chain In The CloudAmazon Web Services
 
Emc vi pr software defined storage
Emc vi pr software defined storageEmc vi pr software defined storage
Emc vi pr software defined storagesolarisyougood
 
Emc vi pr software defined storage
Emc vi pr software defined storageEmc vi pr software defined storage
Emc vi pr software defined storagesolarisyougood
 

Similar a 3 oficinas remotas - repli stor oncourse (20)

VMAX : répondez aux niveaux de services applicatifs les plus élevés
VMAX : répondez aux niveaux de services applicatifs les plus élevésVMAX : répondez aux niveaux de services applicatifs les plus élevés
VMAX : répondez aux niveaux de services applicatifs les plus élevés
 
EMC VPLEX Continuous availability and non disruptive
EMC VPLEX Continuous availability and non disruptiveEMC VPLEX Continuous availability and non disruptive
EMC VPLEX Continuous availability and non disruptive
 
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0
Emc vspex customer_presentation_euc_citrix_xen_desktop5.6_2.0
 
Transforming Mission Critical Applications
Transforming Mission Critical ApplicationsTransforming Mission Critical Applications
Transforming Mission Critical Applications
 
illustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introductionillustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introduction
 
Emc data domain technical deep dive workshop
Emc data domain  technical deep dive workshopEmc data domain  technical deep dive workshop
Emc data domain technical deep dive workshop
 
Emc vplex deep dive
Emc vplex deep diveEmc vplex deep dive
Emc vplex deep dive
 
Srm suite technical presentation nrm - tim piqueur
Srm suite technical presentation   nrm - tim piqueurSrm suite technical presentation   nrm - tim piqueur
Srm suite technical presentation nrm - tim piqueur
 
Commercial track 1_The Power of UDP
Commercial track 1_The Power of UDPCommercial track 1_The Power of UDP
Commercial track 1_The Power of UDP
 
Business Track Session 1: The Power of udp
Business Track Session 1: The Power of udpBusiness Track Session 1: The Power of udp
Business Track Session 1: The Power of udp
 
Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400
 
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
 
Emc vspex customer_presentation_private_cloud_virtualized_share_point
Emc vspex customer_presentation_private_cloud_virtualized_share_pointEmc vspex customer_presentation_private_cloud_virtualized_share_point
Emc vspex customer_presentation_private_cloud_virtualized_share_point
 
Presentation integration vmware with emc storage
Presentation   integration vmware with emc storagePresentation   integration vmware with emc storage
Presentation integration vmware with emc storage
 
Emc vi pr controller
Emc vi pr controllerEmc vi pr controller
Emc vi pr controller
 
Avamar-7_2010.ppt
Avamar-7_2010.pptAvamar-7_2010.ppt
Avamar-7_2010.ppt
 
Presentation cloud services
Presentation   cloud servicesPresentation   cloud services
Presentation cloud services
 
AWS Partner Presentation - Accenture Digital Supply Chain In The Cloud
AWS Partner Presentation - Accenture Digital Supply Chain In The CloudAWS Partner Presentation - Accenture Digital Supply Chain In The Cloud
AWS Partner Presentation - Accenture Digital Supply Chain In The Cloud
 
Emc vi pr software defined storage
Emc vi pr software defined storageEmc vi pr software defined storage
Emc vi pr software defined storage
 
Emc vi pr software defined storage
Emc vi pr software defined storageEmc vi pr software defined storage
Emc vi pr software defined storage
 

Más de Omega Peripherals

Novedades vSphere5 - La tecnología de Nueva Generación
Novedades vSphere5 - La tecnología de Nueva GeneraciónNovedades vSphere5 - La tecnología de Nueva Generación
Novedades vSphere5 - La tecnología de Nueva GeneraciónOmega Peripherals
 
Nuevas tecnologías de backup y recuperación de datos
Nuevas tecnologías de backup y recuperación de datosNuevas tecnologías de backup y recuperación de datos
Nuevas tecnologías de backup y recuperación de datosOmega Peripherals
 
Nuevas Tecnologías de Almacenamiento con 3 par
Nuevas Tecnologías de Almacenamiento con 3 parNuevas Tecnologías de Almacenamiento con 3 par
Nuevas Tecnologías de Almacenamiento con 3 parOmega Peripherals
 
Gestión unificada de datos y su protección
Gestión unificada de datos y su protecciónGestión unificada de datos y su protección
Gestión unificada de datos y su protecciónOmega Peripherals
 
Gestión unificada del almacenamiento de datos y su protección
Gestión unificada del almacenamiento de datos y su protecciónGestión unificada del almacenamiento de datos y su protección
Gestión unificada del almacenamiento de datos y su protecciónOmega Peripherals
 
5 tecnologías de protección de datos contra desastres
5 tecnologías de protección de datos contra desastres5 tecnologías de protección de datos contra desastres
5 tecnologías de protección de datos contra desastresOmega Peripherals
 
2 presentación i-scsi nov 2006
2 presentación i-scsi nov 20062 presentación i-scsi nov 2006
2 presentación i-scsi nov 2006Omega Peripherals
 
Caso de éxito igc [data ti]
Caso de éxito   igc [data ti]Caso de éxito   igc [data ti]
Caso de éxito igc [data ti]Omega Peripherals
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructureOmega Peripherals
 
Soluciones de backup y dr de entornos virtuales
Soluciones de backup y dr de entornos virtualesSoluciones de backup y dr de entornos virtuales
Soluciones de backup y dr de entornos virtualesOmega Peripherals
 
La tercera generación de la virtualización
La tercera generación de la virtualizaciónLa tercera generación de la virtualización
La tercera generación de la virtualizaciónOmega Peripherals
 
Infraestructura para máquinas virtuales
Infraestructura para máquinas virtualesInfraestructura para máquinas virtuales
Infraestructura para máquinas virtualesOmega Peripherals
 
Dimensionado y gestión del entorno virtual
Dimensionado y gestión del entorno virtualDimensionado y gestión del entorno virtual
Dimensionado y gestión del entorno virtualOmega Peripherals
 
Connection broker thinclient-seguridad (ii)
Connection broker thinclient-seguridad (ii)Connection broker thinclient-seguridad (ii)
Connection broker thinclient-seguridad (ii)Omega Peripherals
 
Connection broker thinclient-seguridad (i)
Connection broker thinclient-seguridad (i)Connection broker thinclient-seguridad (i)
Connection broker thinclient-seguridad (i)Omega Peripherals
 

Más de Omega Peripherals (20)

Novedades vSphere5 - La tecnología de Nueva Generación
Novedades vSphere5 - La tecnología de Nueva GeneraciónNovedades vSphere5 - La tecnología de Nueva Generación
Novedades vSphere5 - La tecnología de Nueva Generación
 
Nuevas tecnologías de backup y recuperación de datos
Nuevas tecnologías de backup y recuperación de datosNuevas tecnologías de backup y recuperación de datos
Nuevas tecnologías de backup y recuperación de datos
 
Nuevas Tecnologías de Almacenamiento con 3 par
Nuevas Tecnologías de Almacenamiento con 3 parNuevas Tecnologías de Almacenamiento con 3 par
Nuevas Tecnologías de Almacenamiento con 3 par
 
Gestión unificada de datos y su protección
Gestión unificada de datos y su protecciónGestión unificada de datos y su protección
Gestión unificada de datos y su protección
 
Gestión unificada del almacenamiento de datos y su protección
Gestión unificada del almacenamiento de datos y su protecciónGestión unificada del almacenamiento de datos y su protección
Gestión unificada del almacenamiento de datos y su protección
 
5 tecnologías de protección de datos contra desastres
5 tecnologías de protección de datos contra desastres5 tecnologías de protección de datos contra desastres
5 tecnologías de protección de datos contra desastres
 
4 tecnologias backup
4 tecnologias backup4 tecnologias backup
4 tecnologias backup
 
2 presentación i-scsi nov 2006
2 presentación i-scsi nov 20062 presentación i-scsi nov 2006
2 presentación i-scsi nov 2006
 
1 auditoria de datos
1 auditoria de datos1 auditoria de datos
1 auditoria de datos
 
Anuncio storage works
Anuncio storage worksAnuncio storage works
Anuncio storage works
 
Virtual infrastructure 3.5
Virtual infrastructure 3.5Virtual infrastructure 3.5
Virtual infrastructure 3.5
 
Caso de éxito igc [data ti]
Caso de éxito   igc [data ti]Caso de éxito   igc [data ti]
Caso de éxito igc [data ti]
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
Soluciones de backup y dr de entornos virtuales
Soluciones de backup y dr de entornos virtualesSoluciones de backup y dr de entornos virtuales
Soluciones de backup y dr de entornos virtuales
 
La tercera generación de la virtualización
La tercera generación de la virtualizaciónLa tercera generación de la virtualización
La tercera generación de la virtualización
 
Infraestructura para máquinas virtuales
Infraestructura para máquinas virtualesInfraestructura para máquinas virtuales
Infraestructura para máquinas virtuales
 
Dimensionado y gestión del entorno virtual
Dimensionado y gestión del entorno virtualDimensionado y gestión del entorno virtual
Dimensionado y gestión del entorno virtual
 
La solución vdi
La solución   vdiLa solución   vdi
La solución vdi
 
Connection broker thinclient-seguridad (ii)
Connection broker thinclient-seguridad (ii)Connection broker thinclient-seguridad (ii)
Connection broker thinclient-seguridad (ii)
 
Connection broker thinclient-seguridad (i)
Connection broker thinclient-seguridad (i)Connection broker thinclient-seguridad (i)
Connection broker thinclient-seguridad (i)
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

3 oficinas remotas - repli stor oncourse

  • 1. 1© Copyright 2006 EMC Corporation. All rights reserved. CENTRALIZACIÓN DE COPIAS DE LAS OFICINAS EMC Replistor - EMC OnCourse Alberto Tapias (Tapias_Alberto@emc.com)
  • 3. 3© Copyright 2006 EMC Corporation. All rights reserved. Information Infrastructure Model – EMC View (Enterprise) Networked Storage DMX-2 DMX800 CX700 CX500 CENTERA Disk Backup Connectrix Celerra Control Centre Lifecycle Management PowerPath V4 Oncourse Replistor Storagescope SanCopy ARM SRDF Timefinder Mirrorview Snapview SANMgr LAN LAN WAN Networker Xtender Family AutostartVMWare Product Family Documentum /Captiva / Authentica Content Management Family TAPE SMARTS Management INVISTA SMARTS InCharge AX Remote Data RainStorage RainWall DMX-3 NeoScale RSA Secure Access
  • 4. 4© Copyright 2006 EMC Corporation. All rights reserved. ILM Virtual Infrastructure Model – Next Generation Central Mgt L1=MC L4=Archive L2=BC L3=DEPT Central Mgt Networked Storage Virtual Storage VLUN’s Remove the Badges Virtual Servers – The Servers Becomes Data L5=B-Up Services Oriented Architecture Universal, Description, Discovery and Integration (UDDI) Object Storage ServiceBasedManagement Correlation/Analytics
  • 5. 5© Copyright 2006 EMC Corporation. All rights reserved. EMC RepliStor
  • 6. 6© Copyright 2006 EMC Corporation. All rights reserved. Exchange Recoverability Ensure the recoverability of your Exchange database Data Recoverability Secondary copy of production data located on any server; provides quick recoverability; and, for SQL Server 2005, ensured recoverability with VSS Data Distribution A solution that propagates identical datasets for sharing information Branch-Office Data Protection Ensure data at remote offices is protected and backed up Solutions for Data Recoverability—Use Cases Compliance All data is backed up properly End User Access to e-mail online/offline, personal archiving E-mail Administrator Mailbox management, risk/policy enforcement, storage-cost management Storage Administrator Data protection, availability, performance, and scalability Records Manager Corporate file-plan creation; broad books and records-policy enforcement
  • 7. 7© Copyright 2006 EMC Corporation. All rights reserved. Solution Benefits to RepliStor Exchange Recoverability Benefits Description Ensured recoverability Recover from a VSS snapshot, if replica is not recoverable Minimal impact Minimal operation/overhead on Exchange production system No impact on the network Does not increase network load Flexible server configuration Supports one-to-one, many-to- one, and MSCS-to-MSCS Flexible storage configuration Provides storage-agnostic solutions Scalability Scales from small to large deployments of Exchange; efficient use of network bandwidth © Copyright 2006 EMC Corporation. All rights reserved.
  • 8. 8© Copyright 2006 EMC Corporation. All rights reserved. Challenges to Data Recoverability  Secondary copy of data needed to meet disaster-recovery requirements – Current RPO with traditional tape backup has high risk of data loss  Restoring from tape can take weeks – Long outages mean lost productivity and revenue  Logical threats, such as operator error, account for 80% of outages  Users need continuous access to the data Event Recovery-Point Objective (Data loss) Recovery-Time Objective (Time to recover) Sec.DaysWeeks Hrs. Days WeeksSec. Min.Min.Hrs. Replication Replication Tape backup Restore from tape
  • 9. 9© Copyright 2006 EMC Corporation. All rights reserved. RepliStor Protects the Business  Replicate data continuously to one or more servers, regardless of distance  Ensure data can be available immediately after a fault  Replicate open and closed files  Replicate data from a Microsoft Cluster  Ensure SQL Server 2005 data recoverability with application- consistent VSS snapshot IP network Site A or Server A Site B or Server B Asynchronous Unlimited distance On a Server Fault…  RepliStor restarts the application, reconnects the data, and reconnects the users at the secondary location RepliStorRepliStor
  • 10. 10© Copyright 2006 EMC Corporation. All rights reserved. What About Monitoring Application Faults?  In the event of a site disaster, AutoStart would relocate application resources from Site A to Site B: – Ensure read-write access to remote replica – Start application resources – Start RepliStor replication from Site B to Site A  EMC AutoStart manages automated application and data restart on an alternate server, either local or remote  AutoStart seamlessly transfers control of application and storage resources to a local or remote facility in the event of an outage  AutoStart provides functionality to assist in automating failback of services, applications, and data  AutoStart manages RepliStor remote replication as a data source Site A Site B Unlimited distance RepliStor AutoStart AutoStart RepliStor
  • 11. 11© Copyright 2006 EMC Corporation. All rights reserved. RepliStor Ensures Remote-Office Data is Protected Satellite office RepliStor Satellite office RepliStor Satellite office Satellite office RepliStor Server A Server B Storage (data resides) Primary site RepliStor RepliStor 1111010100110100 1111010100110100 1111010100110100 11110101001 1111010100110100101010 RepliStor
  • 12. 12© Copyright 2006 EMC Corporation. All rights reserved. Pause Updates Throttling RepliStor Provides Flexible Scheduling Options Synchronization You Determine When and How Replication Will Occur
  • 13. 13© Copyright 2006 EMC Corporation. All rights reserved. RepliStor Provides Flexible Security Options Protect Users’ Data During the Replication Process Connection Digital Signature Encryption
  • 14. 14© Copyright 2006 EMC Corporation. All rights reserved. RepliStor for Data Distribution  Provides a secure and reliable solution for distributing data across a variety of Windows server platforms – Replicate data in one-to-one, one-to-many, many-to-one, or many- to-many configurations  Offers easy-to-configure performance settings to maximize network efficiencies – Bandwidth throttling – Data compression 14© Copyright 2006 EMC Corporation. All rights reserved.
  • 15. 15© Copyright 2006 EMC Corporation. All rights reserved. Summary of RepliStor Features and Functionality Features Benefits Ensured recoverability Recover from snapshot if replica is not recoverable Continuous, asynchronous, byte-level replication Captures and replicates changes in real time over unlimited distances with a negligible effect on application performance Consumes minimal server and network resources after initial synchronization Hardware- independent Does not require proprietary or specialized hardware Data integrity Maintains write-order consistency to ensure data integrity for all applications Security Provides three levels of security—Connection, Digital Signature, and Encryption—to meet the most stringent security requirements Network- bandwidth throttling Allows users to limit the amount of network bandwidth used for RepliStor replication Scalability Scales from small to large deployments of Exchange; efficient use of network bandwidth Integration with AutoStart Provides full application and data restart for disaster recovery© Copyright 2006 EMC Corporation. All rights reserved.
  • 16. 16© Copyright 2006 EMC Corporation. All rights reserved. EMC OnCourse Secure, Automated File Transfer Among Heterogeneous Systems
  • 17. 17© Copyright 2006 EMC Corporation. All rights reserved. What Does OnCourse Do?  Policy-based software that provides the most comprehensive, scaleable, and secure solution for automating file movement  Automates the consolidation and distribution of files among distributed heterogeneous systems  Centrally managed and scalable solution with intelligent process automation Edge to core, core to edge, edge to edge Internet Agent 10010110Agent 10010110 Corporate Intranet Agent 10010110 Agent 10010110 Agent 10010110 Heterogeneous Transfer Agents Transfer Manager
  • 18. 18© Copyright 2006 EMC Corporation. All rights reserved. Usage Models Secure, Automated Data Transfer Among Heterogeneous Systems A A Data Consolidation Example: Centralized backups, centralized reporting File Synchronization Example: periodic replication for third site, collaborative development, application integration (data level) A A A A A A A A A AA A A A A A A A Content and Data Distribution Example: Retail price lists to branches, B2B distribution, regulatory for airlines, etc.
  • 19. 19© Copyright 2006 EMC Corporation. All rights reserved. OnCourse Graphical User Interface  Modeling business rules  Scheduling  Monitoring  Reporting
  • 20. 20© Copyright 2006 EMC Corporation. All rights reserved. Business Rules Creation via GUI Package group Collects groups of other objects File transfer package Controls file transfer processes Remote command package Controls execution of remote commands Process target package Controls piping of output data between systems Business Rules Modeling Objects
  • 21. 21© Copyright 2006 EMC Corporation. All rights reserved. Why are EMC Customers Buying OnCourse? Data from over 200 closed and prospective customers Backup consolidation Long-distance disaster recovery Branch office data updates Shared information Development team synch Directory Synch 11% Other 6%Software Synch 6% Data Distribution 22% File Consolidation 55%
  • 22. 22© Copyright 2006 EMC Corporation. All rights reserved. Example: Inter-company Distribution  Opportunity: – Geo-imaging company distributes new images to its customers via CD  Problems: – High cost, manual intensive, slow, unreliable – Hard to verify delivery and trigger invoice  Solution: – Automate distribution to resellers and customers – Using certified delivery option to automatically trigger invoicing  Benefits: – Significantly reduced distribution cost – Immediate delivery, availability to users – Improved TTR Geo-imaging company Image delivered Delivery confirmed Invoice sent Customer A A Internet $
  • 23. 23© Copyright 2006 EMC Corporation. All rights reserved.  Opportunity: – Telecom company IT organization maintains software levels consistency on servers throughout the organization  Solution specifics: – Systems are remotely queried to determine current rev level – Appropriate updates and patches are distributed automatically – Update processes triggered automatically after hours or after prerequisite process complete – Cascade topology used to service large number of servers Example: Software and Patch Management Data Transfer Manager
  • 24. 24© Copyright 2006 EMC Corporation. All rights reserved. Security Architecture  Tightly integrated security architecture – Encryption and authentication fully integrated into framework  Multiple levels of security: – Source and target authentication  Authentication handled by digital certificates  Selectable encryption (none, XOR (64 bit), IDEA (128 bit), 3DES (168 bit), AES (256 bit)  Supports receipt confirmation (certified delivery) A A A A Agent 10010110 I am host2.emca.com (certificate) I am host1.acme.com (certificate) Agent 10010110
  • 25. 25© Copyright 2006 EMC Corporation. All rights reserved. OnCourse Unique Functionality  Bandwidth throttling—Allows you to limit the transmission bandwidth so you use only a fixed number of bytes per second in the transmission channel, optimizing the use of the network without causing a bottleneck  Incremental transfer—Users can choose to send only the changed bytes in a file to be transmitted, reducing network usage  Encryption—Users can choose difference encryption standards, up to 3DES encryption or external encryption (Verisign, DOD, etc.)  Synchronizing transfers—Users can make the directories on both sides exactly the same; files that are added at the source node are shipped over to the target node, while unchanged data is skipped; fields that are deleted in the source node will also be deleted in the target node  Certified delivery—Immutable receipt; the log file in the DTM host will contain proof of delivery  Notification—Users can enable e-mail notification of successful file transfers as well as failures; log files of the submitted jobs can be attached in the e-mail  Rollback—This function ensures that all the specified files arrive correctly in a group; otherwise, none of the files are applied  Move directories—This allows directories and their contents to be moved recursively so that the child directories and their contents are also copied  Core-to-edge, edge-to-core, peer-to-peer—The transfers can be in any direction, in both push and pull modes  Content distribution—Securely copies large files over the Internet  Content aggregation—Collects files from branch offices, back to the central office  Directory synchronization—Users can use the synchronization option to replicate one remote directory to a local directory, or vice versa
  • 26. 26© Copyright 2006 EMC Corporation. All rights reserved.

Notas del editor

  1. Note to Presenter: Present to customers and prospects to provide them with an overview of EMC RepliStor. This presentation covers the importance and relevance of how RepliStor provides greater levels of data protection, while also providing recoverability in the event of an outage. RepliStor ensures remote-office data-backup consolidation and business continuity by ensuring host-based replication for Microsoft Windows environments.
  2. EMC View of ILM Infrastructures for Enterprise Customers (Example only)
  3. The next generation Model will utilise Virtualisation technologies. Allows discussion on VMWare in the production environment and Storage Virtualisation solutions.
  4. Note to Presenter: Present to customers and prospects to provide them with an overview of EMC RepliStor. This presentation covers the importance and relevance of how RepliStor provides greater levels of data protection, while also providing recoverability in the event of an outage. RepliStor ensures remote-office data-backup consolidation and business continuity by ensuring host-based replication for Microsoft Windows environments.
  5. Note to Presenter: View in Slide Show mode for animation. Let’s start with use cases showing how RepliStor can provide tremendous value to your environment. For each use case into which we delve, we will start with its challenges, and how RepliStor resolves those challenges. The four different use cases we will discuss today are: Exchange recoverability Data recoverability Branch-office data protection Data distribution Each of these use cases concerns various people within the environment. The requirement for data recoverability for Exchange disaster recovery, for example, affects the E-mail Administrator. The ability to recover data from a hard crash is critical to executives who use e-mail as a document folder, as it is to all the other employees in the environment who rely on e-mail for communicating with customers and users. Data recoverability for Exchange disaster recovery—RepliStor integrates replication and application-consistent snapshots to ensure the recoverability of your Exchange database in the event of a site disaster. RepliStor is the only solution that provides this recoverability assurance without degrading production Exchange performance or exerting additional network load. Data disaster-recovery protection and data recoverability—Replication over any distance enables a secondary copy of production data to be created at any location. When one server becomes unavailable, RepliStor automatically switches file-system services and restarts application services on the second server, preserving end-user access to data and applications. Branch-office data consolidation—Remote offices can replicate their data to a central location for simplifying and consolidating backup operations. This can reduce costs by significantly reducing IT requirements at remote locations, while leveraging administration and hardware at the data center. With a current copy of data on a second system, backups can be run from the second set of data at any time without affecting production users. Data distribution—When maintaining multiple systems that require identical datasets for sharing information in Web farms, multiple file servers, or content-publication applications; or in any deployment in which data changes dynamically, RepliStor ensures these changes are propagated to the other servers quickly, efficiently, and with no need for manual steps in the process. Let’s first take a look at Exchange recoverability in more detail.
  6. Here is a summary of the solution benefits of RepliStor’s Exchange recoverability: It is vital to the protection of your Exchange data that you choose a replication technology that can integrate with VSS. RepliStor also ensures minimal impact on the Exchange production system, and no impact on the network, when it is replicating data from one server to one or more servers. To provide the greatest level of flexibility, you can configure your environment to have one-to-one, many-to-one, or, finally, MSCS-to-MSCS. RepliStor is easy to use and can work with any storage array. Scales from small to large deployments of Exchange Note to Presenter: Remember, this functionality is available with V6.1.1.
  7. Tape backup is necessary. But if your last tape backup was at midnight and your business experienced an outage at 11:00 a.m., you need to ask yourself, “Can I afford to lose 11 hours of data?” Additionally, recovering your data from tape is long and error-prone. To recover just catalogs can take 20 minutes per tape—if you have 100 catalogs, that could take up to 33 hours. Replication can further protect your data by replicating it in real time to another location. As RepliStor provides asynchronous replication, you may have a few seconds of data loss in the event of an outage. The advantage of asynchronous replication is that you don’t have to wait for the writes to commit to the secondary site before another write can take place at the primary. In that scenario, known as synchronous replication, performance would be unacceptable if your sites were far apart and connectivity between them were poor. RepliStor can provide the best of both worlds. It can replicate data over any distance using TCP/IP. Performance doesn’t take a hit because the replication is taking place in real time, but the writes do not need to be committed at the secondary site. It is essential to determine the ideal balance between your recovery-point objective (RPO)—that is, how much data loss you can endure—and your recovery-time objective (RTO)—that is, how long it takes you to recover. Logical threats, which include site maintenance and server and application upgrades, account for about 80% of downtime. In reality, you are protecting your environment from planned outages, but also against disasters.
  8. RepliStor can protect data, regardless of distance. It continuously replicates your changed files and registry and directory data to the secondary site, whether the files are open or closed. But RepliStor goes beyond just data replication and protection. Note to Presenter: Click now in Slide Show mode for animation. When a server fault occurs, RepliStor restarts the applications and reconnects data and users to the secondary location without the users knowing what took place. To protect yourself against data loss as well as server faults, RepliStor is an ideal choice. And with RepliStor’s integration with Microsoft’s Volume Shadow Copy Service, you can ensure application-consistent shadow copies are recoverable for SQL Server 2005 data. As RepliStor is not application-aware, it can integrate with other clustering solutions that have more sophisticated application monitoring to understand whether it is the application, the network, or the hardware that is faulting. Before investigating this in more detail, let’s jump to a screenshot of RepliStor and see its synchronization options…
  9. EMC AutoStart provides application-aware clustering technology to ensure that the health of your applications, networks, and hardware is properly monitored. In the event of an outage or fault, AutoStart seamlessly transfers control of the application and storage resources to another location, regardless of distance. Not only does AutoStart provide automation to shut down the applications and then restart them on another server, it also ensures they restart using the right storage resources. For the ultimate protection and flexibility in disaster-recovery testing, AutoStart provides failback capabilities, so that you can test migration of services from one site to another without worrying. EMC is all about recovery, and AutoStart’s unique failback capabilities are an important piece of the story. Just as AutoStart integrates with SRDF/A and SRDF/S, it also integrates with RepliStor. As RepliStor monitors server outages only, you may also need AutoStart technology to monitor your applications, too. Note to Presenter: Click now in Slide Show mode for animation. In the event of a disaster, AutoStart relocates the application resources from one site to another, ensures read-write access to the remote replica, and restarts the application resources on the secondary site. Note to Presenter: Be sure to note that today, EMC supports only two nodes with AutoStart and RepliStor. Emphasize again that this is a Windows-only environment. Customers with UNIX must use AutoStart with SRDF/A or SRDF/S.
  10. Note to Presenter: View in Slide Show mode for animation. Here is an example of branch-office consolidation. RepliStor first ensures data replication from the primary site to a secondary site, or to more than one secondary site. This is done continuously in real time to ensure that all satellite-office data is protected and centrally backed up, which reduces the risk to your business of not meeting compliance regulations. The cost savings of not needing media and backup servers at each site is extremely high.
  11. Note to Presenter: View in Slide Show mode for animation. RepliStor’s replication process is also extremely flexible, offering several unique options that allow you to determine when and how replication will occur. The Pause Updates option allows users to temporarily stop updating on the target system. When this option is enabled, the source system will still capture file updates and forward them to the target system, but instead of applying these updates to the corresponding files on the target system, RepliStor writes them to a log file in the RepliStor Data Directory on that system. Once Pause Updates is disabled, the updates that were written to the log file are then applied to the appropriate files. This option is most often used in conjunction with a backup utility on the target system, or to perform system maintenance on the target system. The Throttling option allows users to determine the rate at which RepliStor data moves across the network, in kilobytes per second. This option can also be scheduled to happen at a particular time, or at regular intervals of time. The Scheduling option allows users to schedule either a full syncrhronization (complete file copy) or an incremental synchronization (copy of file changes). The standard incremental synchronization is a binary-compare checksum operation that compares files between the source and target systems, and copies only the bytes in the file that have changed. The Attribute Only option skips the checksum and instead compares timestamps and file sizes. If they do not match for a file between the two systems, RepliStor recopies the entire file from the source to the target system. This option can speed up the incremental synch in situations where there are few updates. The synchronization can be scheduled to happen at a particular time or on a recurring basis. All of these options can be configured via the RepliStor GUI, as shown on this slide, or via the command-line interface (CLI).
  12. Note to Presenter: View in Slide Show mode for animation. RepliStor offers three levels of security for protecting users’ data during the replication process: Connection Digital Signature Encryption Security levels can be configured and viewed at any time via the RepliStor GUI. Connection is the minimum, as well as the default, security level. Connection security means that all server-to-server and client-to-server connections are authenticated, using a “challenge/response” type of algorithm that never passes the account, password, or domain information unencrypted between the servers. It also prevents third parties from recording the exchange and replaying it at a later time. The Digital Signature security level creates an additional element of security by “signing” all messages—in other words, adding a small signature (about 16 bytes in size) to each message. While a signature does not add privacy, it does guard against tampering and “man-in-the-middle” types of security attacks. It will detect: Message alteration Out-of-sequence messages Replayed messages Encryption is the highest security level. It performs all the functions of the “Connection” and “Digital” Signature” security levels, but also adds privacy—in addition to getting a digital signature, all messages are fully encrypted. This is appropriate when sensitive data needs to travel over a public network, such as the Internet.
  13. Note to Presenter: View in Slide Show mode for animation. RepliStor provides a secure and reliable solution for distributing data across a variety of Windows-server platforms. Rather than putting data on a disk or tape, then shipping it to remote facilities where security can be at risk, you can encrypt the data and send it directly to the satellite offices for use.
  14. Here is a summary of what RepliStor provides to your business: Increases high availability for data Decreases cost, complexity, total cost of ownership, and risk Improves time to recovery Provides data compression With data recoverability, disaster-recovery protection, branch-office data consolidation, and data distribution, RepliStor can provide tremendous value-add to your Windows environment. Note to Presenter: You can go through each line item as a recap to the benefits of RepliStor.
  15. Note to Presenter: Presenter to customers and prospects to provide them with an overview of OnCourse, which provides the ultimate in data mobility—secure, automated host-based file transfer across heterogeneous systems.
  16. The key value of OnCourse is to help protect your data at remote sites and perform secure and reliable data transfers. OnCourse will allow you to achieve easier compliance with data regulatory issues. OnCourse will speed the flow of information and allow greater efficiency of business workflow. One example of this is a customer who moved large data files to end users. Upon completion of transfer, OnCourse sent back a digital immutable receipt, which instantly activated a billing application that sent an invoice. This automation customization greatly sped time to revenue for the entire operation. OnCourse is comprised of a central Data Transfer Manager. The Data Transfer Manager links with lightweight agents at the edge to perform core-to-edge, edge-to-core, and edge-to-edge file transfers. These agents can sit at edge sites that will never be NAS- or SAN-attached, allowing the total storage solution and management to be extended out to edge sites that were previously not addressed. Note to Presenter: The target market for OnCourse is central headquarter sites with distributed branch offices.
  17. The most common use cases for OnCourse are: Data consolidation—moving data from edge to core for centralized backups—reduces the need for separate backup procedures in branch office while bringing data from the edge to be included in data center backup procedures. File synchronization—OnCourse can move data at pre-determined intervals or scheduled periods to assure that information and data stays up to date and accurate. Content distribution, push or pull data from edge to core, core to edge, or edge to edge to publish and aggregate business information.
  18. The OnCourse GUI allows authorized users to access the Data Transfer Manager and control the movement of data and execution of business rules. This GUI can be accessed from anywhere using a web browser, though access can be restricted easily by login. The GUI allows users to easily model the movement of files between two or more servers, and to specify programs, commands, or scripts to be executed as part of the data movement process. Scheduling of movement is flexible, allowing transfer of files to occur regularly. Success and failure notification can be sent by e-mail. The GUI allows users to see the status of each transfer job while in process, and to report on the results of each job when completed. Reports show how long a job took to complete, how much network resource was used, and other useful statistics.
  19. Business rules that govern the data flow are stored in the Business Rules database. Business Rules are expressed as linked automation packages… Each automation package is a discrete task in a data transfer process. Automation packages can be grouped to run in sequence or in parallel. Execution of packages can be triggered based on the results of other packages. Note to Presenter: Using the GUI icon-based setup method can allow fast modeling of complex file movements.
  20. This is a segmentation of use cases for OnCourse: 55% are using OnCourse for backup consolidation (many to one). 22% are using OnCourse for one-to-many, many-to-many data distribution. 17% are using OnCourse for directory and software synchronization. This can be used for applications like outsourced development, collaborative work groups, or software development synchronization.
  21. In this example, OnCourse was able to replace the manually intensive and costly old way of distributing data via CD, greatly reducing costs and speeding up information transfer. They significantly reduced costs and added integrity to the distribution process.
  22. Here is another common situation in which OnCourse can greatly reduce administration burden and cost. Many companies have to frequently update numerous distributed systems with either information or software updates, and these updates are applied individually by administrative personnel. Problem: Labor and travel costs are high. Since there are too many to perform simultaneously, systems are out of synch. It’s difficult to track version levels and know which systems have which updates. Solution: Use OnCourse to execute commands on each remote server that determine version levels and send that data back to the central node. Send the correct version levels required. Execute the software update on schedule. Update the central database. Benefits: Significantly reduced labor costs—many times you can essentially eliminate it, leading to as much as 75% or greater savings or people time. Greater manageability since updates are no longer huge efforts Predictability and consistency, since all systems are on the same revision or update level
  23. Strong security is an integral component of OnCourse. Security functions are natively built into the OnCourse code, unlike other software packages that require “bolt-on” or third-party security software. This integration makes administration and integrity much simpler and more effective. The OnCourse security architecture makes sure that data is directed to the correct hosts, with the correct permissions. OnCourse ensures data integrity through digital signatures and offers data confidentiality choices of four levels of in-stream encryption. Not only is the delivery of the file data guaranteed with OnCourse, but OnCourse can prove that files have been delivered to a particular server at a particular time with certified delivery. This strong security capability saves money for companies by allowing them to use inexpensive Internet network connections to transmit sensitive data instead of expensive private networks, both internally and to partners and customers.
  24. Here are highlights of some of the unique functionality found in OnCourse.
  25. Thank you.