Solved

Push and pull, how does it work

Posted on 2002-04-26
4
123 Views
Last Modified: 2010-04-13
Hi all,

Hope you could help me with the following question. An Application is installed on 2 Win2000 Server (Active directory). In case one of the Servers is down the second one shall supply the same services with that application.

Now the problem is when commiting changes one the application on one of the servers, how can that be replicated automaticly with the application on the other server?
I know about Pull-push when it comes to the SAM but what about normal applications.

thanks

Nexpert
0
Comment
Question by:nexpert
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 63

Expert Comment

by:SysExpert
ID: 6971368
You need special software/hardware for this.

Look into Cluster services on the MS site.

I hope this helps !

0
 
LVL 63

Expert Comment

by:SysExpert
ID: 6971373
0
 
LVL 63

Accepted Solution

by:
SysExpert earned 200 total points
ID: 6971378
0
 

Author Comment

by:nexpert
ID: 6998221
thanks, SysExpert
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Adults who share images on social media aren’t the only ones who need to worry about their privacy. Our culture’s tendency to share every move and celebration affects the privacy of our children, too.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question