Data protection for virtual data centers

Essential information on how to protect data in virtual environments! Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This unique book, written by an industry expert with over eighteen years of data storage/backup experience, s...

Descripción completa

Detalles Bibliográficos
Autor principal: Buffington, Jason, 1970- (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, N.J. : Wiley Technology Pub c2010.
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628176506719
Tabla de Contenidos:
  • Data Protection for Virtual Data Centers; Acknowledgments; About the Author; Contents; Introduction; Chapter 1: What Kind of Protection Do You Need?; In the Beginning, There Were Disk and Tape; Overview of Availability Mechanisms; Overview of Protection Mechanisms; Summary; Chapter 2: Data Protection by the Numbers; The Technical Metrics: RPO and RTO; Business Metrics: RA and BIA; Risk Mitigation: Fixing It in Advance; Total Cost of Ownership; Return on Investment; Turning IT Needs into Corporate Initiatives; Summary; Chapter 3: The Layers of Data Protection
  • What Data Looks Like from the Server's PerspectiveHardware-centric Protection; File-centric Protection; Application-centric Protection; Where to Store Your Protected Data; Summary; Chapter 4: Better Backups; Solving the Problem from the Inside Out; Volume Shadow Copy Service (VSS); The Windows Server Backup Utility; System Center Data Protection Manager; Summary; Chapter 5: File Services; File System Availability and Protection in Windows Server; What Is the Distributed File System?; Enabling DFS on Your Windows File Servers; Getting Started with DFS-N; Getting Started with DFS-R
  • Mixing DFS-R and DFS-N for Real-World SolutionsDFS Enhancements in Windows Server 2008 R2; Summary; Chapter 6: Windows Clustering; Overview of Clustering in Windows Server 2008 and 2008 R2; Building Your First Cluster; How Failover Clustering Works; Quorum Models; Windows Server 2008 R2 Failover Clustering; Summary; Chapter 7: Microsoft Exchange; Exchange within Microsoft Cluster Services; Exchange 2007 Continuous Replication; Exchange 2010 Database Availability; Summary; Chapter 8: Microsoft SQL Server; SQL Server Built-in Resiliency; SQL Failover Clustering; SQL Database Mirroring
  • SQL Database FailoverSQL Log Shipping and Replication; Which SQL Server HA Solution Should You Choose?; Backing Up SQL Server; Summary; Chapter 9: Virtualization; Virtualization Changes Everything; Protecting Virtual Machines; Availability of Virtual Machines; How Virtualization Makes Data Protection and Availability Better; Disaster Recovery Staging; Bare Metal Recovery; Server Rollback; Summary; Chapter 10: Management and Deployment; Well-Managed Systems for Higher Uptime; Large Enterprise Deployment and Manageability; Virtualization Management; Midsized Management: Physical and Virtual
  • SummaryChapter 11: Monitoring Systems; The Need for Monitoring; Challenges in Monitoring; Enterprise End-to-End Monitoring; Monitoring the Health and Performance of Key Workloads; Monitoring in Midsized Organizations Using System Center Essentials; Summary; Chapter 12: Business Continuity and Disaster Recovery; What Makes BC and DR So Special?; Get Your Data Out of the Building; BC = DR + HA; BC/DR Solution Alternatives; Using Virtualization to Achieve Business Continuity; Planning for BC/DR to Get Better Backups and Availability; Summary; Appendix: Links and Resources; Microsoft Software
  • Topical Resources