Premium Content

Access "Disaster Recovery Extra: Distance your data from disaster"

Published: 20 Oct 2012

Three data replication choices have emerged: array-based, host-based and network-based, with each having its distinct pros and cons. What method is best for your environment? When it comes to preparing for an eventual disaster, it's better to scatter your eggs rather than fortify your basket. That risk-mitigation philosophy is at the heart of an important storage trend: replicating data to remote locations. And, increasingly, it's not enough for those copies to be offline on tape. Replicated data needs to be readily accessible—online—so that operations can resume as quickly as possible in the event of an outage at the primary site. "We still do tape backup at night, but we wouldn't want to lose an entire day's worth of data," says Don Moran, database administrator at Hanson Brick & Tile, a brick manufacturer headquartered in Charlotte, NC. The company began replicating the Oracle database that runs its enterprise resource planning system in North Carolina to a Hanson office in Texas approximately two years ago. Disaster recovery (DR) tests have shown Moran ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
  • Columns
    • Disaster Recovery Extra: Editorial

    • ILM isn't just tiered storage by James Damoulakis

      Storage tiers are the first step toward true information lifecycle management. But they're only a small step—the key to ILM success is aligning your data with its business value.

    • Vendors need to create products specifically for SMBs

      Storage Bin: All too often, storage vendors treat small- to medium-sized businesses as second-class citizens. SMBs have the same needs as enterprises, so rather than giving them hand-me-downs, vendors need to create products specifically for this group. Vendors just might find that those products have the features that enterprises want, too.

    • Storage tears

      Storage tears

    • Data storage security trends by Jon Oltsik

      2005 was a big year for storage security, with major vendors doing more than just paying lip service. Vendors are beginning to integrate security into new products or add encryption capabilities. But there's a lot more to do in 2006 to build a secure storage infrastructure.

More Premium Content Accessible For Free