Tip

Use virtual tape servers for disaster recovery

Virtual Tape, which puts a large intelligent buffer between tape systems and the large computers they serve, is usually thought of as a way to decrease the cost of tape storage. However, virtual tape can also offer important advantages in disaster recovery.

Virtual tape systems use the buffer to reorganize the data being sent to tape to make better use of the available space on modern, high-capacity tape systems. The result is a savings in media costs and -- generally -- a much larger savings in personnel costs because fewer manual tape mounts and dismounts are required.

The same intelligent buffering can be used to sort out critical data that is to be duplicated off-site at the same time the data is written to tape at the data center. Companies such as

    Requires Free Membership to View

E-Mag and OpenTech Systems offer virtual data recovery with their virtual-tape software. In the right context these VDR systems can offer significant advantages in reducing costs and adding security to vaulting disaster recovery solutions.

The main advantage of VDR over dual-copy solutions is that it cuts down the amount of data being copied to the vault. Rather than sending over everything, VDR systems can be instructed to make vault copies of only specific files or data sets. Since critical data is usually a small subset of all enterprise data, this can greatly reduce the hardware and communications costs for vaulting.

E-Mag describes its VDR system at its Web site and OpenTech Systems has a white paper on its VDR feature.


Rick Cook has been writing about mass storage since the days when the term meant an 80K floppy disk. The computers he learned on used ferrite cores and magnetic drums. For the last twenty years he has been a freelance writer specializing in storage and other computer issues.

Editor's note: Mention of specific products or services in this tip is for illustrative purposes only, and is not meant to imply endorsement of such items. Moreover, any products or services so mentioned have not been reviewed by SearchStorage or TechTarget, and thus such mention in no way implies recommendation for those products or services.


This was first published in August 2002

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.