Video Screencast Help
Storage & Clustering Community Blog
Showing posts tagged with ApplicationHA
Showing posts in English
Pooja Sarda | 02 Nov 2012 | 0 comments

Would you like to simplify management and high availability of LPARs (AIX logical partitions) and application running inside it? Are you moving to the private cloud?

Try our ApplicationHA for LPARs and make your application in the LPAR and the LPAR itself highly available. You can achieve this with Veritas Cluster Server in just one LPAR per physical server and light weight ApplicationHA in rest of the LPARs.

The ApplicationHA LPARs will auto-register, auto-restart and auto-failover! And that‘s not all. We support across platforms - VMWare, Solaris LDOMs and Linux KVM. More information can be found at https://www.symantec.com/application-ha.

deepak rawal | 26 Oct 2012 | 0 comments

Configuration wizard for creating a cluster provides option to setup LLT with Ethernet or UDP/IP protocol. This post provides some details on which option to choose. 

Cluster configuration wizard (VCW) detects NIC cards available for configuring LLT network links on each windows server.  Selecting NIC(s) for each server configures LLT to use Ethernet protocol.  If is important to make sure that each NIC is connected (either directly OR via a layer 2 switch) via separate network hardware for increased fault tolerance.  This is relatively easy to ascertain for Ethernet, since connection traverses a few network components. All windows servers connected to same Ethernet  are able to discover each other (ARP) dynamically.  This makes changing network configuration for cluster relatively simple. LLT traffic network overhead is low.  For large number of virtual machines hosted on a hypervisor in a datacenter, this type of...

anishv | 25 Oct 2012 | 0 comments

Symantec ApplicationHA on IBM LPAR (PowerVM) is now offered with IBM PureFlex System, a new class of expert integrated systems, delivering simplicity of deployment and operation to the customers. Pre-packaged in a Virtual Appliance form factor, the customer receives ApplicationHA together with AIX 7.1 in one image. The image is available on trialware at https://www4.symantec.com/Vrt/offer?a_id=151397

ApplicationHA can be configured to control and provide visibility to the application of your choice, including Oracle, DB2, Apache, WebSphere etc.

This is a good endorsement from IBM of Symantec's ApplicationHA product. We are looking into expanding this activity to include more products from Symantec.

With this activity, Symantec has joined an elite group of third party vendors including VMWare & Juniper who bundle their offerings as part of IBM PureFlex systems.

Doreet | 23 Oct 2012 | 0 comments

Taneja says "Symantec Veritas Cluster Server Takes Vrtual Server HA to the Next Level"

This is an awesome testimonial from Jeff Byrnes, an analyst from Taneja Group, who provides expert analysis and consulting services for the computer storage and server industries.

“All in all, we think the latest Veritas Cluster Server for VMware release adds significant value to customers running business-critical applications in virtualized environments.”

Doreet | 22 Oct 2012 | 1 comment

ESG Labs just published a blog on the ESG website discussing Storage Foundation performance and capabilities on Linux as contrasted to the native tools.

This is AWESOME!!! Check it out!

http://www.esg-global.com/blogs/come-one-come-all-to-the-greatest-show-on-earth/

bpascua | 15 Oct 2012 | 0 comments

This week Telefonica the owner of O2 have controversially announced they will start selling their O2 mobile customer data to third parties. Through Telefonica's Dynamic Insights business unit they are looking to drive revenue out of mining data to sell to third parties. They will take their phone network data and anonymise  and aggregate it. The product will be called Smart Steps and will be sold to public sector companies to enable them to measure compare and understand what factors influence the number of people visiting a location. The aim is so that retailers can then make informed decisions on things like locations and opening times for shops. The big question is around privacy in the use of their customer data. People reacted very strongly when Google started using customer data for their targeted advertising and this seems to be in the same vein. As a mobile phone user I am not sure how happy I am effectively having my movements traced even though I understand this...

dennis_wenk | 05 Oct 2012 | 0 comments

Basel II Accord for International Banking Operational Risk is defined as, “Risk of loss from inadequate or failed internal; processes, people, and systems or external events “.   When Processes, People or Systems fail, whether it be from internal or external events, the losses can be substantial.  As an example, the Ponemon Institute estimates that worldwide organizational are losing over $35 Billion monthly from data center downtime.  Nicholas G. Carr point out in his seminal Harvard Business Review article IT Doesn’t Matter, “today, an IT disruption can paralyze a company’s ability to make products, deliver its services, and connect with its customers, not to mention foul its reputation … even a brief disruption in availability of technology can be devastating.”

There are two primary ways for an organization to increase value.  The first way is to...

dennis_wenk | 05 Oct 2012 | 0 comments

The Effectiveness of internal control systems is now an issue for public policy and formal law. Section 404 of the Sarbanes-Oxley law is aimed at helping companies prevent financial reporting mistakes and fraud. The rule requires companies to include in their annual reports:

  • A statement of management's responsibility for establishing and maintaining "adequate" controls over financial reporting
  • Management's assessment of the effectiveness of the company's internal controls
  • A statement identifying the framework used by management to evaluate the effectiveness
  • An auditor's report on management's evaluation of internal controls
  • Any material weaknesses identified in the internal controls review

While the rule only requires companies to disclose material weaknesses in their annual reports, many companies have begun alerting investors about deficiencies and potential problems. The rule is intended...

dennis_wenk | 04 Oct 2012 | 1 comment

“Best Practices” is a popular expression of the intent to manage business continuity prudently.  Best Practices are seen as a way to sidestep both the quantification of operational-risks, as well as, the objective evaluation of the cost-benefit for any proposed mitigation actions.  There are several reasons why Best Practices “Are not.” best for Business Continuity purposes.

  • It is unreasonable to assume that a best practice could optimally answer the business continuity questions for multiple organizations.  Organizations differ widely in terms of their maturity level, their technologies deployed, and their vulnerabilities. 
  • Given the wide assortment of published ‘best practices’, which of the best practices really are the ‘best’ for any particular circumstance? 
  • No organization could hope to implement all of the thousands of best practices to get it perfectly-right, and there is...
dennis_wenk | 04 Oct 2012 | 1 comment

Professor John Graham of Indiana University points out that “large amounts of resources are devoted to slight or speculative dangers while substantial and well-documented dangers remain unaddressed”.  It has been well established that people often too much weight is placed on risks of low probability.  Such is the dilemma of complexity within IT infrastructure.  We often talk about hackers, malware, floods, fires, earthquakes, and tornados; while the real crisis is happening right under our nose and it has well over 5,000 risk signatures.  This crisis is the complexity in the IT infrastructure and it is causing considerable losses for companies.

The likelihood that an organization will experience a catastrophic loss from an IT failure is far greater than any catastrophic disaster or "black swan" event.   IT failures are costing companies trillions of dollars every year; worldwide downtime is estimated at over $35 Billion...