Tag Archive

Below you'll find a list of all posts that have been tagged as "storage replication"
blogImage

How to protect your data with Data Replication

Data Protection is one of the most integral parts of the Enterprise Storage Industry. Replication plays an important role in Business Continuity.In this article we will discuss how replication technology helps in achieving data protection and disaster recovery.SolutionReplication is defined as replication of data from source to destination. Replication helps us to achieve business continuity.There are two important terms which are associated with Disaster RecoveryRPO ( Recovery Point Objective): RPO refers to the point in time to which services are restored and recovered. So if RPO is zero it corresponds to no data loss.RTO ( Recovery Time Objective): RTO refers to how long it takes to get an application or service up in running state. If RTO is zero there is no downtime.Whenever Service Level agreements are signed between storage vendors and customers it mentions RPO and RTO for the storage appliance.There are two types of Replications, Synchronous Replication and Asynchronous Replication. In Synchronous Replication, production site and disaster recovery site (target) are always in sync. RPO for Synchronous Replication is zero. Synchronous Replication works best where both source and target are in the same data center. In an Asynchronous Replication Solution, RPO is 15 minutes to a few hours. There is no specific distance limitation. Asynchronous Replication solution is less expensive than a synchronous solution.There are three topologies associated with Replication1. Three-Site Cascade: Arrays at source and target do not communicate directly. If there is a large scale disaster you lose both source and bunker site.2. Three Site Multi-target: Here source arrays simultaneously replicate to two target arrays. Source array has visibility to both the arrays and replicate to both the target arrays without relying on bunker site. In case the source site is lost both surviving targets cannot communicate with each other.3. Three-Site Triangle: There is an existence of additional replication link between the two target arrays in sites B and site C. This additional link helps to replicate between surviving targets in case source target is lost. Three-Site triangle overcomes disadvantages of Three Site Multitarget.There are several advantages of Disaster Recovery. In the case of disasters which could be either man-made or natural disasters, data would be still accessible with the help of Disaster Recovery. .So there would be no data loss and hence no financial losses to organizations. Your data is replicated to some other geographical location and it is still accessible to you.Quality Assurance for Storage Appliance supporting replication technology is an important aspect. Various use cases which could be covered while doing QA for replication are integrity for source and target array. Ability of replication policy and schedules to cope up with failures could be tested . Application awareness in replication could be covered for vendors. RPO and RTO could be calculated which could be shared with customers as disaster recovery report.At Aziro (formerly MSys Technologies) we have expertise for Disaster Recovery Solutions. Aziro (formerly MSys Technologies) could add value to your business by helping you to build disaster recovery solutions and performing quality assurance for your Disaster Recovery Solution.

Aziro Marketing

EXPLORE ALL TAGS
2019 dockercon
Advanced analytics
Agentic AI
agile
AI
AI ML
AIOps
Amazon Aws
Amazon EC2
Analytics
Analytics tools
AndroidThings
Anomaly Detection
Anomaly monitor
Ansible Test Automation
apache
apache8
Apache Spark RDD
app containerization
application containerization
applications
Application Security
application testing
artificial intelligence
asynchronous replication
automate
automation
automation testing
Autonomous Storage
AWS Lambda
Aziro
Aziro Technologies
big data
Big Data Analytics
big data pipeline
Big Data QA
Big Data Tester
Big Data Testing
bitcoin
blockchain
blog
bluetooth
buildroot
business intelligence
busybox
chef
ci/cd
CI/CD security
cloud
Cloud Analytics
cloud computing
Cloud Cost Optimization
cloud devops
Cloud Infrastructure
Cloud Interoperability
Cloud Native Solution
Cloud Security
cloudstack
cloud storage
Cloud Storage Data
Cloud Storage Security
Codeless Automation
Cognitive analytics
Configuration Management
connected homes
container
Containers
container world 2019
container world conference
continuous-delivery
continuous deployment
continuous integration
Coronavirus
Covid-19
cryptocurrency
cyber security
data-analytics
data backup and recovery
datacenter
data protection
data replication
data-security
data-storage
deep learning
demo
Descriptive analytics
Descriptive analytics tools
development
devops
devops agile
devops automation
DEVOPS CERTIFICATION
devops monitoring
DevOps QA
DevOps Security
DevOps testing
DevSecOps
Digital Transformation
disaster recovery
DMA
docker
dockercon
dockercon 2019
dockercon 2019 san francisco
dockercon usa 2019
docker swarm
DRaaS
edge computing
Embedded AI
embedded-systems
end-to-end-test-automation
FaaS
finance
fintech
FIrebase
flash memory
flash memory summit
FMS2017
GDPR faqs
Glass-Box AI
golang
GraphQL
graphql vs rest
gui testing
habitat
hadoop
hardware-providers
healthcare
Heartfullness
High Performance Computing
Holistic Life
HPC
Hybrid-Cloud
hyper-converged
hyper-v
IaaS
IaaS Security
icinga
icinga for monitoring
Image Recognition 2024
infographic
InSpec
internet-of-things
investing
iot
iot application
iot testing
java 8 streams
javascript
jenkins
KubeCon
kubernetes
kubernetesday
kubernetesday bangalore
libstorage
linux
litecoin
log analytics
Log mining
Low-Code
Low-Code No-Code Platforms
Loyalty
machine-learning
Meditation
Microservices
migration
Mindfulness
ML
mobile-application-testing
mobile-automation-testing
monitoring tools
Mutli-Cloud
network
network file storage
new features
NFS
NVMe
NVMEof
NVMes
Online Education
opensource
openstack
opscode-2
OSS
others
Paas
PDLC
Positivty
predictive analytics
Predictive analytics tools
prescriptive analysis
private-cloud
product sustenance
programming language
public cloud
qa
qa automation
quality-assurance
Rapid Application Development
raspberry pi
RDMA
real time analytics
realtime analytics platforms
Real-time data analytics
Recovery
Recovery as a service
recovery as service
rsa
rsa 2019
rsa 2019 san francisco
rsac 2018
rsa conference
rsa conference 2019
rsa usa 2019
SaaS Security
san francisco
SDC India 2019
SDDC
security
Security Monitoring
Selenium Test Automation
selenium testng
serverless
Serverless Computing
Site Reliability Engineering
smart homes
smart mirror
SNIA
snia india 2019
SNIA SDC 2019
SNIA SDC INDIA
SNIA SDC USA
software
software defined storage
software-testing
software testing trends
software testing trends 2019
SRE
STaaS
storage
storage events
storage replication
Storage Trends 2018
storage virtualization
support
Synchronous Replication
technology
tech support
test-automation
Testing
testing automation tools
thought leadership articles
trends
tutorials
ui automation testing
ui testing
ui testing automation
vCenter Operations Manager
vCOPS
virtualization
VMware
vmworld
VMworld 2019
vmworld 2019 san francisco
VMworld 2019 US
vROM
Web Automation Testing
web test automation
WFH

LET'S ENGINEER

Your Next Product Breakthrough

Book a Free 30-minute Meeting with our technology experts.

Aziro has been a true engineering partner in our digital transformation journey. Their AI-native approach and deep technical expertise helped us modernize our infrastructure and accelerate product delivery without compromising quality. The collaboration has been seamless, efficient, and outcome-driven.

Customer Placeholder
CTO

Fortune 500 company