Video Screencast Help
Scheduled Maintenance: Symantec Connect is scheduled to be down Saturday, April 19 from 10am to 2pm Pacific Standard Time (GMT: 5pm to 9pm) for server migration and upgrades.
Please accept our apologies in advance for any inconvenience this might cause.

Storage & Clustering Community Blog

Showing posts tagged with ApplicationHA
Showing posts in English
anishv | 25 Oct 2012 | 0 comments

Symantec ApplicationHA on IBM LPAR (PowerVM) is now offered with IBM PureFlex System, a new class of expert integrated systems, delivering simplicity of deployment and operation to the customers. Pre-packaged in a Virtual Appliance form factor, the customer receives ApplicationHA together with AIX 7.1 in one image. The image is available on trialware at https://www4.symantec.com/Vrt/offer?a_id=151397

ApplicationHA can be configured to control and provide visibility to the application of your choice, including Oracle, DB2, Apache, WebSphere etc.

This is a good endorsement from IBM of Symantec's ApplicationHA product. We are looking into expanding this activity to include more products from Symantec.

With this activity, Symantec has joined an elite group of third party vendors including VMWare & Juniper who bundle their offerings as part of IBM PureFlex systems.

Doreet | 23 Oct 2012 | 0 comments

Taneja says "Symantec Veritas Cluster Server Takes Vrtual Server HA to the Next Level"

This is an awesome testimonial from Jeff Byrnes, an analyst from Taneja Group, who provides expert analysis and consulting services for the computer storage and server industries.

“All in all, we think the latest Veritas Cluster Server for VMware release adds significant value to customers running business-critical applications in virtualized environments.”

Doreet | 22 Oct 2012 | 1 comment

ESG Labs just published a blog on the ESG website discussing Storage Foundation performance and capabilities on Linux as contrasted to the native tools.

This is AWESOME!!! Check it out!

http://www.esg-global.com/blogs/come-one-come-all-to-the-greatest-show-on-earth/

bpascua | 15 Oct 2012 | 0 comments

This week Telefonica the owner of O2 have controversially announced they will start selling their O2 mobile customer data to third parties. Through Telefonica's Dynamic Insights business unit they are looking to drive revenue out of mining data to sell to third parties. They will take their phone network data and anonymise  and aggregate it. The product will be called Smart Steps and will be sold to public sector companies to enable them to measure compare and understand what factors influence the number of people visiting a location. The aim is so that retailers can then make informed decisions on things like locations and opening times for shops. The big question is around privacy in the use of their customer data. People reacted very strongly when Google started using customer data for their targeted advertising and this seems to be in the same vein. As a mobile phone user I am not sure how happy I am effectively having my movements traced even though I understand this...

dennis_wenk | 05 Oct 2012 | 0 comments

Basel II Accord for International Banking Operational Risk is defined as, “Risk of loss from inadequate or failed internal; processes, people, and systems or external events “.   When Processes, People or Systems fail, whether it be from internal or external events, the losses can be substantial.  As an example, the Ponemon Institute estimates that worldwide organizational are losing over $35 Billion monthly from data center downtime.  Nicholas G. Carr point out in his seminal Harvard Business Review article IT Doesn’t Matter, “today, an IT disruption can paralyze a company’s ability to make products, deliver its services, and connect with its customers, not to mention foul its reputation … even a brief disruption in availability of technology can be devastating.”

There are two primary ways for an organization to increase value.  The first way is to...

dennis_wenk | 05 Oct 2012 | 0 comments

The Effectiveness of internal control systems is now an issue for public policy and formal law. Section 404 of the Sarbanes-Oxley law is aimed at helping companies prevent financial reporting mistakes and fraud. The rule requires companies to include in their annual reports:

  • A statement of management's responsibility for establishing and maintaining "adequate" controls over financial reporting
  • Management's assessment of the effectiveness of the company's internal controls
  • A statement identifying the framework used by management to evaluate the effectiveness
  • An auditor's report on management's evaluation of internal controls
  • Any material weaknesses identified in the internal controls review

While the rule only requires companies to disclose material weaknesses in their annual reports, many companies have begun alerting investors about deficiencies and potential problems. The rule is intended...

dennis_wenk | 04 Oct 2012 | 1 comment

“Best Practices” is a popular expression of the intent to manage business continuity prudently.  Best Practices are seen as a way to sidestep both the quantification of operational-risks, as well as, the objective evaluation of the cost-benefit for any proposed mitigation actions.  There are several reasons why Best Practices “Are not.” best for Business Continuity purposes.

  • It is unreasonable to assume that a best practice could optimally answer the business continuity questions for multiple organizations.  Organizations differ widely in terms of their maturity level, their technologies deployed, and their vulnerabilities. 
  • Given the wide assortment of published ‘best practices’, which of the best practices really are the ‘best’ for any particular circumstance? 
  • No organization could hope to implement all of the thousands of best practices to get it perfectly-right, and there is...
dennis_wenk | 04 Oct 2012 | 1 comment

Professor John Graham of Indiana University points out that “large amounts of resources are devoted to slight or speculative dangers while substantial and well-documented dangers remain unaddressed”.  It has been well established that people often too much weight is placed on risks of low probability.  Such is the dilemma of complexity within IT infrastructure.  We often talk about hackers, malware, floods, fires, earthquakes, and tornados; while the real crisis is happening right under our nose and it has well over 5,000 risk signatures.  This crisis is the complexity in the IT infrastructure and it is causing considerable losses for companies.

The likelihood that an organization will experience a catastrophic loss from an IT failure is far greater than any catastrophic disaster or "black swan" event.   IT failures are costing companies trillions of dollars every year; worldwide downtime is estimated at over $35 Billion...

Maria Bledsoe | 25 Sep 2012 | 0 comments

Virtualization has become THE buzzword within the IT community; in some circles it’s even bigger than Cloud. As with any new technology the buzz comes along with a considerable amount of hype and risk. Virtualization does have very tangible benefits to organizations, however wading through what’s real and what’s not can be a challenge.

Listen to this webcast to hear about:

  • The risk of moving business critical applications to virtual environments
  • How to avoid these risks and still reap the cost savings benefits of virtualization
  • How to take advantage of your physical infrastructure in tandem with your virtual environment

The on demand webcast is available at http://www.symantec.com/offer?a_id=147034

 

dennis_wenk | 24 Sep 2012 | 0 comments

Operational resilience is the economical balance between an organization’s requirements for service availability and the consequence of an interruption to that service.  The likelihood that your organization will experience a catastrophic loss from a material service interruption caused by an IT operational-problem is far greater than any service interruption being caused by some disaster or ‘black swan’ event.  So if the overarching objective is to protect our organizations from bad events that generate losses then it is time to focus our attention to creating resilient IT operations.   

We live in a technology driven world.  Every possible business processes has been automated; automated to the point where Information Technology is deeply embedded in the operating fabric of our business and the organization is now highly dependent on information technology.  IT has become a microcosm of the organization and it is used to...