Abstract:
A system for disaster recovery including a controller (i) for controlling bandwidth usage of a disaster recovery system in accordance with a plurality of recovery point objectives (RPOs), each RPO designating a maximal time loss constraint for data recovery for an enterprise production system, and a corresponding bandwidth allocation for the disaster recovery system to use in replicating data for the enterprise production system, wherein the RPOs are applied in accordance with a calendar-based schedule of dates and times, and (ii) for issuing an RPO alert when the RPO maximal time loss constraint for a current date and time is not satisfied.
Abstract:
A system for disaster recovery including a controller (i) for controlling bandwidth usage of a disaster recovery system in accordance with a plurality of recovery point objectives (RPOs), each RPO designating a maximal time loss constraint for data recovery for an enterprise production system, and a corresponding bandwidth allocation for the disaster recovery system to use in replicating data for the enterprise production system, wherein the RPOs are applied in accordance with a calendar-based schedule of dates and times, and (ii) for issuing an RPO alert when the RPO maximal time loss constraint for a current date and time is not satisfied.
Abstract:
An embodiment of a system and method of managing a configuration of a virtual machine. An embodiment may include analyzing a configuration of a first computing system to identify a native configuration related to a first virtual machine and analyzing a second computing system to determine whether or not the native configuration should be used to configure the second computing system. If the native configuration should be used to configure the second virtual machine then an embodiment may include using the native configuration information to establish a second virtual machine on the second computing system, and if the native configuration should not be used to configure the second virtual machine then using the native configuration information to create intermediate configuration information and using the intermediate configuration information to establish a second virtual machine on the second computing system.