Solved

Disaster recovery or High Availability

Posted on 2013-05-18
5
316 Views
Last Modified: 2013-05-25
I need to do a powerpoint that includes oursourcing our DR or insourcing by investing in POD for high availability.

I know the cost difference between both are dramatic and wide which is the driving force that will eventually lead down to POD's.

I need a resource to help me put this powerpoint together.

Virtualisation is one technology we are also looking to include in this decision.
0
Comment
Question by:YRMC_Infrastructure
  • 2
  • 2
5 Comments
 
LVL 30

Expert Comment

by:pgm554
ID: 39179373
I have done DR planning for major insurance companies and there is no one size fits all plan.

You might want need to check this out:

http://www.computerweekly.com/feature/How-to-write-a-disaster-recovery-plan-and-define-disaster-recovery-strategies
0
 

Author Comment

by:YRMC_Infrastructure
ID: 39179413
Thanks but I am interested in comparison between DR & HA, pros and cons
0
 
LVL 30

Accepted Solution

by:
pgm554 earned 500 total points
ID: 39179466
They are two different concepts that overlap not unlike a Venn diagram.

I mean it's basically redundancy(the five 9's) vs  the mean time to recover.

Here's an Oracle article on it that might be of some use,it's their propaganda,but it does a good job of contrasting the two.

http://www.dba-oracle.com/art_dbazine_high_avail.htm
0
 
LVL 9

Expert Comment

by:cooledit
ID: 39181477
hi there

I think when you say DR normally that is a cheaper solution as there is no plan for future growth.

HA always needs to plan for future growth and share the load of the running business.

I think in your case we need some more information like
is the a business critical issue if some servers/roles does not work.
Is it a billing company "SQL" Oracle etc. DB warehouse.

or you could split some of the server/roles. Some into HA = Business critical 24/7
some on DR less critical = HR or file servers. Backups.

Cooledit
0
 

Author Closing Comment

by:YRMC_Infrastructure
ID: 39196239
Average
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

From Coral's  "So You Want To Play With Computers" Series Preface: What follows is a tweaked reprint from 2005/06. This is a True Story. The names have been changed to protect the guilty. While this deals with a fairly simple, text file recovery…
VM backups can be lost due to a number of reasons: accidental backup deletion, backup file corruption, disk failure, lost or stolen hardware, malicious attack, or due to some other undesired and unpredicted event. Thus, having more than one copy of …
In this Micro Tutorial viewers will learn how to use Windows Server Backup to create full image of their system. Tutorial shows how to install Windows Server Backup Feature on Windows 2012R2 and how to configure scheduled Bare Metal Recovery backup.…
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now