US20110270949A1 - System and method for providing data and application continuity in a computer system - Google Patents
System and method for providing data and application continuity in a computer system Download PDFInfo
- Publication number
- US20110270949A1 US20110270949A1 US12/991,326 US99132609A US2011270949A1 US 20110270949 A1 US20110270949 A1 US 20110270949A1 US 99132609 A US99132609 A US 99132609A US 2011270949 A1 US2011270949 A1 US 2011270949A1
- Authority
- US
- United States
- Prior art keywords
- client
- data
- client systems
- module
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/23—Reliability checks, e.g. acknowledgments or fault reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/40—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
Definitions
- the present application relates to computer systems, and more particularly to a system and methods for maintaining data and/or application continuity in a computer system for a business or enterprise.
- the uptime of the computer systems and data infrastructure for a business is critical to the operation of the enterprise. Equally or even more important is the recovery from a crash or system interruption. It has been estimated that at least 50% of a company's intellectual property resides in it email system.
- the present invention is directed to a method and/or system for maintaining data and/or application continuity in a computer system for a business or enterprise.
- a system for providing data continuity for one or more client systems comprises: a communication interface configured to receive data from the one or more client systems; a security infrastructure configured to authorize communication with the one or more the client systems; a hardware infrastructure comprising a replication engine configured to create one or more virtual servers, and the one or more virtual servers being configured for storing at least some of the data received from the one or more client systems; and an applications module configured to run one or more application programs on some of the data received from one of the client systems, and the one or more application programs corresponding to application programs on the client system.
- a system for providing data continuity for a plurality of client systems comprises: a communication interface configured to receive data from the client systems; a security infrastructure configured to authorize communication with the client systems; a hardware infrastructure comprising a replication engine configured to create one or more virtual servers, and the one or more virtual servers being configured for storing at least some of the data received from the client systems; and a portal configured for providing an entity access to the virtual servers associated with one or more of the client systems, and the access being based on credentials associated with said entity.
- a method for providing data continuity for one or more client systems comprises: receiving data from the one or more client systems; providing a replication engine configured to create one or more virtual servers, and the one or more virtual servers being configured for storing at least some of the data received from the one or more client systems; and running one or more application programs on some of the data received from one of the client systems, and the one or more application programs corresponding to application programs running on the client system.
- FIG. 1 shows in schematic form a system for maintaining business data continuity according to an embodiment of the present invention and in the context of an exemplary operating environment;
- FIG. 2 shows in block diagram form an exemplary client system for the data continuity system of FIG. 1 ;
- FIG. 3 shows in block diagram form an Internet interface for the data continuity system of FIG. 1 according to an embodiment of the invention
- FIG. 4 shows in block diagram form a security infrastructure for the data continuity system of FIG. 1 according to an embodiment of the invention
- FIG. 5 shows in block diagram form an internal network structure for the data continuity system of FIG. 1 according to an embodiment of the invention
- FIG. 6 shows in block diagram form a hardware virtualization structure for the data continuity system of FIG. 1 according to an embodiment of the invention
- FIG. 7 shows in block diagram form a control platform for the data continuity system of FIG. 1 according to an embodiment of the invention
- FIG. 8 shows in diagrammatic form a system for maintaining business data continuity and a control system and management portal according to an embodiment of the present invention and in the context of an exemplary operating environment;
- FIG. 9 is a screen shot of a portal log-in window or screen for the control system and management portal of FIG. 8 according to an embodiment of the present invention.
- FIG. 10 is a screen shot of a search and management window or screen for the control system and management portal of FIG. 8 according to an embodiment of the invention.
- FIG. 11 is a screen shot of a screen configured for managing/controlling a customer or client associated with an entity configured in the control system and management portal of FIG. 8 according to an embodiment of the present invention
- FIG. 12 is a screen shot of a screen configured for managing/searching and accessing customer data for the control system and management portal of FIG. 8 according to an embodiment of the invention
- FIG. 13 is a screen shot of a screen configured for accessing and controlling clients or customers associated with an exemplary entity configured in the control system and management portal of FIG. 8 according to an embodiment of the invention.
- FIG. 14 is a screen shot of a screen configured for accessing and controlling the Readiness Assessment tool for the control system and management portal of FIG. 8 according to an embodiment of the invention
- FIG. 1 shows a system 100 according to an embodiment to the present invention and in the context of an exemplary operating environment comprising a plurality of client systems, with one client system being depicted in FIG. 1 and indicated generally by reference 10 .
- the system 100 comprises a system for configuring, storing and delivering data (e.g. business data), and a control platform for maintaining and managing the data and/or applications for providing business data continuity, as will be described in more detail below.
- data e.g. business data
- the system 100 is referred to as a business data and application continuity system (and method), or in the alternative, a data continuity system 100 .
- the data continuity system 100 comprises a networking layer or infrastructure 120 , a hardware layer or infrastructure 140 , a software layer or infrastructure 160 , an application module or components 180 , and an archive components or module 190 .
- the exemplary client system 10 comprises client workstations 12 , one or more servers 14 , and a network structure 16 . The functionality and operation of the data continuity system 100 is described in more detail below.
- the networking layer 120 includes a network communication interface indicated generally by reference 130 .
- the network communication interface 130 is configured to provide communication with the client system 10 via the Internet 20 and/or via a virtual private network (VPN) or wide area network (WAN) communication pathway or structure 30 .
- VPN virtual private network
- WAN wide area network
- the data continuity system 100 includes a portal indicated by reference 170 .
- the portal 170 provides an interface to the Internet 20 and provides users, i.e. subscribers or clients, access to certain applications and tools in the software layer 160 .
- the data continuity system 100 also includes an internal network indicated by reference 150 , which is described in more detail below with reference to FIG. 5 .
- the internal network 150 comprises an infrastructure for providing/defining a plurality of private client or production networks.
- the internal network infrastructure 150 is used to configure a client private (“production”) network for each client of the system 100 .
- the client system 10 comprises one or more client workstations 210 , client servers 220 , and a client network 230 .
- the client workstations comprise desktop computer systems, e.g. Windows XP workstations, which are resident on the client network 230 .
- the client server 220 comprises one or more servers, including, for example, a Mail server such as Microsoft ExchangeTM system, Database servers, such as MS SQLTM servers, an Active Directory server(s), an Application server(s) such as MS GreatPlainsTM server(s), and/or a File server(s), such as a MS Server 2003TM server(s).
- the client network 230 is configured to provide a network configuration for the client workstations 210 and the client servers 220 via an Internet connection (i.e. a standard offering Internet Service Provider or ISP) and/or router device connecting the Internet 20 to a local area network (LAN).
- an Internet connection i.e. a standard offering Internet Service Provider or ISP
- router device connecting the Internet 20 to a local area network (LAN).
- each of the client servers 220 includes a replication agent or engine according to an embodiment of the invention and indicated generally by reference 222 .
- the replication engine 222 runs as a service under the operating system for the server 220 and is configured to capture stored data and transfer the captured data to replication servers running in the business data continuity system 100 as described in more detail below with reference to FIG. 8 .
- the replication engine 222 is interchangeable with multiple forms of software replication engines.
- the replication engine 222 is configured to work with multiple application formats such as Mail, Database, Application and File systems from various vendors such as Microsoft and Oracle. Commonly referenced as “Client servers”, these systems can be either physical or virtualized systems on the network.
- the client workstations 210 are configured for information (data) creation and retrieval. According to another aspect, the client workstations 210 are configured to access the portal 170 ( FIG. 1 ) for the data continuity system 100 . In known manner, the client workstations 210 may be configured with Microsoft Windows XPTM, LinuxTM, MacintoshTM and other operating systems.
- the client network 230 comprises a combination of networking devices that are configured to provide an infrastructure layer to the client network 230 and also an interface or gateway to the networking layer 120 ( FIG. 1 ) of the data continuity system 100 .
- the networking devices comprise “routers, modems or access devices” and are configured/connected in known manner to provide the Internet connectivity and network communication capability between the client workstations 210 and the client server 230 devices and the data continuity system 100 .
- direct connectivity between the client system 10 ( FIG. 1 ) and the data continuity system 100 is provided by a standard WAN VPN capable router as indicated by reference 32 in FIG. 1 .
- the Internet in known manner comprises interconnected networks which span the globe and provide access to the users connected to them with services and information available both on public servers as well as private servers.
- the Internet configured communication interface 130 FIG. 1
- the client system 10 FIG. 1
- other remote clients and/or servers to access and transfer data directly into the data continuity system 100 , as will be described in more detail below.
- the client workstations 12 are configured to connect remotely to the business continuity data system 100 through the Internet 20 , as opposed through the client network 16 , i.e. the WAN 30 and the VPN router 32 .
- the Internet 20 provides access to an Internet user 40 ( FIG. 1 ), i.e. a remote user, or a user without a directly connected system to the client network 16 , who wishes to view or access the information hosted on the client server(s) 14 .
- the Internet 20 provides access to public servers, i.e. servers on the Internet which are trying to exchange information with the client servers 14 ( FIG. 1 ) in some specified format.
- This typically takes the form of email, database queries or website searches.
- An email server comprises a typical example of such a server.
- the communication interface 130 ( FIG. 1 ) is configured to send and receive information in multiple formats with external and publicly hosted systems such as email servers, websites and database systems, as indicated by reference 50 in FIG. 1 and the reference 310 in FIG. 3 .
- such systems typically comprise desktop machines, notebook computers and/or mobile wireless communication devices or PDA's, that are configured to access data on the client servers 14 through the Internet 20 .
- servers coupled to the Internet are capable of sending and receiving communications in a wide variety of formats to the hosted servers and systems associated with the data continuity system 100 , as represented by reference 320 in FIG. 3 .
- the data continuity system 100 includes a portal indicated by reference 170 in FIG. 1 .
- the portal 170 is configured as a public portal or interface to provide publicly available access, i.e. via the Internet 20 , to certain private control and/or setup functions in the data continuity system 100 , as will be described in more detail below.
- the portal 170 comprises a secured website, having a secured website page available on the Internet, for example, with URL www.geminare.com.
- the portal 170 and secured webpage mechanism provides access to authorized users and the ability to manage and control all their systems from any publicly available system 40 ( FIG. 1 ), as will be described in more detail below with reference to FIG. 7 .
- FIG. 4 shows an embodiment of a security infrastructure 400 .
- the security infrastructure 400 is configured in the networking layer 120 ( FIG. 1 ) and provides security functions including, inbound Internet access, firewalling, security, remote access, spam prevention and virus filtering control systems for the business data continuity system 100 ( FIG. 1 ).
- the security infrastructure 400 comprises a public network layer 410 , a security layer infrastructure 420 , and an authentication infrastructure 430 .
- the public network layer 410 is implemented or configured using CiscoTM brand or equivalent hardware based router devices.
- the security layer infrastructure 420 is implemented or configured using a CiscoTM brand or equivalent hardware based Intrusion Detection, Spam Filtering and Virus Control devices.
- the authentication infrastructure 430 is implemented or configured using a CiscoTM or equivalent hardware and software based authentication server which is able to communicate with a Microsoft Active Directory RADIUSTM server or equivalent.
- the security infrastructure 400 provides multiple levels of hardware-based security, and comprises a rules-based hardware configuration for filtering and authenticating all inbound traffic into the data continuity system 100 .
- all inbound and outbound traffic that comes via the Internet 20 or from an internal network 500 ( FIG. 5 ) pass through the security hardware and the rules are applied to pass or block the traffic.
- the public network infrastructure layer 410 is intended for inbound and outbound traffic over the Internet 20 .
- the public network infrastructure layer 410 is configured to accept all inbound packets into the data continuity system 100 and to transmit all packets out of the data continuity system 100 .
- the public network infrastructure layer 410 is implemented in the form of a router system comprising routing tables for the Internet domains and is configured to define where traffic should be transmitted.
- the public network infrastructure layer 410 is implemented in a fault tolerant configuration and provides a failover to a second device without any interruption of service and controls a secondary backup Internet connection for handling the traffic.
- traffic from the public network infrastructure layer 410 is passed or handled by the security layer infrastructure 420 .
- the security layer infrastructure 420 is configured to provide border control and security filtering.
- the security layer infrastructure 420 determines traffic to be allowed to pass through into the data continuity system 100 and traffic to be blocked or discarded from passing through to the data continuity system 100 , based on one or more rule settings.
- the security layer infrastructure 420 is implemented in the form of a “Router” or “Firewall” device and is configured to provide intrusion detection controls, spam management and filtering, and virus containment and elimination functions.
- the security layer infrastructure 420 is implemented in a redundant configuration to provide failover to a secondary standby system with no interruption. Once the traffic has been reviewed and allowed to pass by the security layer infrastructure 420 , it is passed to the authentication infrastructure layer 430 .
- the authentication infrastructure layer 430 is configured to pass or route the traffic from the security layer infrastructure 420 based on a set of rules to a resource or module in the data continuity system 100 via the internal network 150 ( FIG. 1 ).
- the internal network 150 according to an embodiment is described in more detail below with reference to FIG. 5 .
- the authentication infrastructure layer 430 may be implemented in both software and hardware.
- the authentication infrastructure layer 430 is configured to function in conjunction with the security layer infrastructure 420 to control a network within the internal network 150 for the traffic through a virtual network configuration table, i.e. VLAN's.
- the authentication infrastructure layer 430 is configured to function as an “authentication server” for remote access to the virtual machine (VM) servers 620 , which are described in more detail below with reference to FIG. 6 .
- VM virtual machine
- the authentication infrastructure layer 430 functions as a gateway between the security layer infrastructure 420 and the network definition 750 ( FIG. 7 ) which runs on the control platform 700 ( FIG. 7 ) as described in more detail below.
- the authentication infrastructure layer 430 is configured to process remote users based on their current and active credentials which are stored on the control platform 700 ( FIG. 7 ), the network definitions module 750 ( FIG. 7 ), and the software application components 180 ( FIG. 1 ).
- the authentication infrastructure layer 430 is configured to manage communication between the above components and authenticates the communication to ensure that it is valid and appropriate, and then authorizes the security layer infrastructure 420 to provide access to the appropriate client private network in the internal network 150 in the data continuity system 100 .
- FIG. 5 shows the internal network or infrastructure 150 according to an embodiment of the invention.
- the internal network is indicated by reference 500 in FIG. 5 and according to an embodiment comprises a shared network infrastructure 510 and a private network infrastructure 520 .
- the shared network infrastructure 510 is implemented using a network layer 2 switch configuration.
- the private network infrastructure 520 is implemented using a network VLAN capable switch.
- the private network infrastructure 520 comprises a plurality of VLAN's and according to an embodiment, a private VLAN is configured for each client.
- the internal network 500 , and the private VLAN's provide the capability for a multitude of clients to run on the shared hardware infrastructure 140 ( FIG. 1 ) and the networking infrastructure 120 ( FIG. 1 ), while maintaining complete security and separation between each client.
- the internal network 150 includes a management network.
- the management network runs on the same infrastructure and is configured to provide the data continuity system 100 with access and the capability to interact with each of the client networks and servers directly from a centralized location.
- the management network is configured as a VLAN and provides communication with each of the client VLAN's 520 . However, to ensure security, each of the VLAN's cannot communicate directly with the management VLAN.
- FIG. 6 shows a hardware virtualization layer 600 according to an embodiment of the invention.
- the hardware virtualization layer 600 resides within the hardware infrastructure 140 ( FIG. 1 ) of the system 100 and is configured according to an embodiment to provide the functionality to run a very large number of client environments and servers within virtualized instances.
- the hardware virtualization layer 600 is configured to provide multiple levels of redundancy and flexibility when deploying or modifying client servers or networks.
- the hardware virtualization layer 600 comprises a hardware virtualization control 610 and a hardware virtualization platform 620 .
- the hardware virtualization control 610 is configured to manage the client environments within a virtualized structure.
- the hardware virtualization layer 600 is configured to perform disk assignment and usage, networking assignment and management, and resource allocation, such as memory, CPU and other allocations.
- the hardware virtualization control 610 is configured to manage allocation of resources in the hardware virtualization platform 620 .
- the resources for allocation include disk storage, memory and CPU and has a direct relation to the control of the virtualized environment instances.
- the hardware virtualization platform 620 is configured to have direct control over the hardware resources such as disk, memory and CPU (without much regard for the configuration of them), i.e. the hardware virtualization platform 620 comprises the responsible mechanism in the data continuity system 100 for communicating with the hardware layer.
- the hardware virtualization control 610 is implemented with IBM xSeries Servers and a VMWare Virtual Center, or any hardware platform capable of natively supporting virtualized instances and corresponding software or platform designed to run a mass number of virtual machines (VM's) on a single device (i.e. “one physical box”).
- the hardware virtualization platform 620 is implemented using IBM xSeries Servers and VMWare ESX Server Software.
- the hardware virtualization layer 600 is configured to support approximately 4000 clients configured with hardware resources. The particular implementation details will be within the understanding of one skilled in the art.
- FIG. 7 shows a control platform according to an embodiment of the invention and indicated generally by reference 700 .
- the control platform 700 is configured according to an embodiment to provide the following functions for the data continuity system 100 : an interface function, a definition function, a control function, a reporting function, a logging function and an alerting function.
- the control platform 700 provides an interface for clients and the capability to directly call hardware and software components within the data continuity system 100 based on user requests.
- the control platform 700 includes a rules-based mechanism, which allows a user to configure a data continuity process by performing a “Readiness Assessment” survey or audit.
- control platform 700 The functionality and features associated with the control platform 700 are summarized in Table I as shown below:
- the control platform 700 comprises the following modules; a client readiness assessment audit module 710 , a data reporting module 720 , a logging and audit module 730 , a contact definition module 740 , a network definition module 750 , a server definition module 760 , an archive definition module 770 , and a support enablement module 780 .
- aspects of the control platform 700 are implemented and configured in the form of a user interface which is accessed via the portal 170 ( FIG. 1 ).
- a user interface and configuration according to an embodiment is described in more detail below with reference to FIGS. 9 to 14 .
- the client audit and readiness assessment module 710 is configured as an online tool that collects client server and network information using, for example, an interactive survey form or questionnaire which is presented to the user via the portal 170 .
- the control platform 700 includes one or more processes that process the collected data and generate a server and network configuration for the user.
- the client audit and readiness assessment is accessed through a web browser (e.g. MS Internet Explorer) online at the portal 170 .
- the data reporting module 720 is configured for data collection and client reporting. According to an embodiment, the data reporting module 720 comprises a storing and searching engine 722 , an interpretation and analysis engine 724 , a recording and archiving engine 726 , and a display and report engine 728 .
- the storing and searching engine 722 is configured to provide live or instantaneous feedback on the status of the replication data for a client within the data continuity system 100 , for example, via the interface in the portal 170 ( FIG. 1 ). According to another aspect, the storing and searching engine 722 is configured to allow a user to search both current and historical data, i.e. data that has been processed over time, for example, replicated data for MS Exchange server over the past 12 hours is 12345 GB.
- the interpretation and analysis engine 724 is configured with a set of intelligent business rules that are designed to interpret the replication data that has been stored, i.e. archived, and report back the status of the data to the end user client. According to an embodiment, the interpretation and analysis engine 724 is configured to interpret the business rules through calculations that are designed to compare the data that is on the primary client server(s) 14 ( FIG. 1 ) with the replication servers running on the hardware virtualization layer 140 ( FIG. 1 ). An exemplary report may comprise: “MS Exchange server is OK and 100% in sync with the primary server”.
- the recording and archiving engine 726 is configured to record the results generated by the interpretation and analysis engine 724 , which can be very important for clients and companies that require documented validations that the services were functioning properly at specific periods of time. According to an embodiment, the recording and archiving engine 726 is responsive to a request through the storing and searching engine 722 .
- An exemplary data output from recording and archiving engine 726 may comprise: “MS Exchange server is OK and 100% in sync on Dec. 31, 2007 with the primary server”.
- the display and report engine 728 is configured to provide an immediate visual representation to the client about the status of their replication servers.
- the display engine 728 is responsive to the interpretation engine 724 and displays a green, yellow or red indicator for each replica server.
- a green indicator e.g. a “green light” indicates that the replica server for the MS Exchange server is in sync with the client production server 14 ( FIG. 1 ).
- the logging and audit module 730 is configured for audit data collection and monitoring. According to an embodiment, the logging and audit module 730 comprises an audit logging engine 732 and an action monitoring engine 734 .
- the audit logging engine 732 is configured to log and record all actions with the portal 170 for the data continuity system 100 . It will be appreciated that this provides a SaaS (Software as a Service) compliant system process. According to an aspect, the logged data/actions include changes to contact data, server data, control systems and audits. Exemplary data generated by the audit logging engine 732 may take the following form: “Administrator Geminare Admin, logged into this account on Jan. 15, 2008 at 3:33 pm and updated the address information”.
- the action monitoring engine 734 is configured to provide a SaaS (“Software as a Service”) compliant system and documentation concerning the state of the server systems in the hardware virtualization platform 620 ( FIG. 6 ) at specific times. According to an embodiment, all changes of server states are monitored and recorded in an action log. According to another aspect, the action monitoring engine 734 is configured to provide intelligent processing of the server state information in order to inform the users of the server and any corrective action which should be taken. Exemplary data generated by the action monitoring engine 734 may take the following form: “MS Exchange server state was changed from Paused to Replicating at 3:34 pm on Jan. 13, 2008 by Geminare Admin user”.
- the contact definition module 740 is configured to provide notification to the responsible parties. According to an embodiment, the contact definition module 740 comprises an authorization control engine 742 and an alert control engine 744 .
- the authorization control engine 742 is configured to capture data for users that have access and/or authorization to control and/or manage the replication servers 620 ( FIG. 6 ). This provides a mechanism to ensure that only authorized users have the ability to manipulate the control states of the server systems. Exemplary data generated by the authorization control engine 742 may take the following form: “Administrator #1 has access to MS Exchange server start and stop status”.
- the alert control engine 744 is configured to work in conjunction with the authorization control engine 742 to provide the data continuity system 100 with the capability to alert and notify the appropriate users of system state changes.
- Exemplary data generated by the alert control engine 744 may take the following form: “Administrator #1 is accessible at geminareadmin@geminare.org and via SMS at 416-555-1212”.
- the network definition module 750 is configured to provide network setup and remote access functions. According to an embodiment, the network definition module 750 comprises a remote access engine 752 and a server control engine 754 .
- the remote access engine 752 is configured to connect the client network 16 ( FIG. 1 ) to the data continuity system 100 in order to provide remote access.
- the required controls, access information, authentication and setup are defined according to the client readiness assessment audit 710 (as described above) and utilized by the remote access engine 752 to configure the connection.
- Exemplary connection data includes IPSec IP, Encryption Key and Layer information.
- the replication engine 754 is configured to replicate active data from the connected client network 16 ( FIG. 1 ) to the replication server(s) in the hardware layer 140 ( FIG. 1 ), for example, in real-time utilizing block level replication techniques.
- the replication parameters are defined in the network definitions module 750 and comprise compression types, timing and locations, for example, “2:1 Compression”, “Transfer data only after 9 pm” and “Transfer to location c:/spool”.
- the server definition module 760 is configured to define, i.e. create, replication servers on the hardware virtualization platform 620 ( FIG. 6 ) in the hardware infrastructure 140 ( FIG. 1 ) according to a server definition.
- the replication server(s) are configured to replicate or mirror corresponding servers 14 on the client system 10 ( FIG. 1 ).
- the server definition module 760 comprises a server creation engine 762 , a server validation engine 764 , and a server control engine 766 .
- the server creation engine 762 is configured to create replication server(s) on the hardware virtualization platform 620 , based on a server definition that is created or generated by the client readiness assessment audit 710 ( FIG. 7 ) as described above.
- An exemplary server definition generated by the client readiness assessment audit 710 may take the following form: “MS Exchange running 2003, on a Windows 2003 Server with 5 GB of RAM, 2 ⁇ 50 GB hard drives”.
- the server validation engine 764 is configured to take the information that was entered in the server definition module 760 (server creation engine 762 ) and process the information through one or more defined setup rules. The operation of the server validation engine 764 serves to ensure that a valid and appropriate server creation is performed for the hardware virtualization platform 620 . According to an embodiment, the server validation engine 764 looks for matching server configuration, version and setup information with predefined configuration data to ensure a match is made within reasonable variations.
- the server control engine 766 sets up a control system for each of the replication servers after the server creation ( 762 ) and server validation ( 764 ) operations are performed.
- the control system is configured to allow the replication process to be paused, started, stopped, imaged, rebuilt, run in a failover state, failed back, etc. It will be appreciated that the control system provides a mechanism for a client to control their system after creation.
- An exemplary control system configuration comprises: MS Exchange server is setup to Pause, Replication or Failover state.
- the archive definition module 770 is configured to provide a mechanism for defining archive control systems. According to an embodiment, the archive definition module 770 comprises an archive creation engine 772 and an archive storage engine 774 .
- the archive creation engine 772 is configured to generate an archive process to automatically archive data out of the active system (i.e. replication servers) to an archive system.
- the archive process is based on the archive definition, which according to an embodiment is based on data entered and/or generated by the client readiness assessment audit module 710 (described above).
- the archive process defines an information level and time-line at which data should be archived which is balanced or factored against the data management capability of the system.
- An exemplary archive process comprises all data on MS Exchange server 001 to be archived to database backup if older than 30 days.
- the archive storage engine 774 is configured to define a retention and control policy or process for the archived data.
- the retention and control policy is based on information from the client readiness assessment audit module 710 and defines how long the archived data should be kept and how much data should be kept.
- the portal 170 FIG. 1 ) includes a component configured to allow a user to directly retrieve data from archive storage.
- the support enablement module 780 is configured to provide a self support system for a client. According to an embodiment, once the server data and preferences have been entered through the client readiness assessment audit module 710 , the support enablement module 780 is configured to provide a support platform for client users to test and troubleshoot their configured system on the data continuity system 100 . According to an embodiment, the support enablement module 780 comprises a capability enablement engine 782 and a capability control engine 784 .
- the capability enablement engine 782 is configured to allow an administrator to define the level of and access to built-in tools for each user account.
- An exemplary definition for user self-support comprises: user is able to test and see if the VPN network is connected by sending ICMP packets through a VPN tunnel to the replication servers on the data continuity system 100 as defined in the readiness assessment network definition.
- the capability control engine 784 is configured to allow a user to perform their own tests unassisted through the portal interface 170 ( FIG. 1 ).
- the tests as defined by the capability enablement engine 782 can range from VPN based tests, to services tests and network responses. According to an aspect, the tests can be anything from VPN, services or network responses and are executed in real-time based on the definition in the capability enablement engine 782 .
- the system is configured with a Virtual NOC tab 905 ( FIG. 9 ) to provide an interface for the capability enablement engine 782 .
- the software application components module or layer is indicated by reference 180 in FIG. 1 and according to an embodiment of the invention comprises the applications that run directly on the virtualized server instances in the hardware virtualization platform 620 ( FIG. 6 ).
- the application components typically comprise mail server applications, database server applications, file server applications and/or directory servers.
- Exemplary application components include Microsoft Exchange server, Microsoft SQL server and Microsoft IIS server.
- the software application components module 180 is configured to process incoming data once it has passed through all the security and operational layers in the data continuity system 100 , i.e. data that has been replicated through the data continuity system 100 , as described above.
- the application components represent the actual server applications that are processing the data for the users and are typically responsible for distributing the data as well.
- the hardware virtualization platform 620 ( FIG. 6 ) is configured to run multiple instances of the application component(s).
- the data continuity system 100 does not replicate the application layer within the server environment only the data that this layer uses and as such the software application components layer 180 is utilized in the delivery of the information from the client servers 14 ( FIG. 1 ) and the replication servers 620 ( FIG. 6 ) in the hardware infrastructure layer 140 ( FIG. 1 ).
- the application components module 180 includes a data replication engine 182 or an application failover control engine 184 in order to provide the capability to “swap out” a replication engine.
- the archive components module is indicated by reference 190 in FIG. 1 and according to an embodiment is configured to archive data from the data continuity system 100 to a separate system (not shown). For example, once data has been collected, processed (e.g. replicated) and utilized within the data continuity system 100 , it may need to be archived out into a separate system, for example, based on criteria that are defined according to the client readiness assessment audit module 710 ( FIG. 7 ) as described above.
- the archive components module 190 comprises a hardware and software platform that is responsible for directly archiving data out of the live system into a separate hardware, software or Cloud storage platform for long term storage.
- the archive component module 190 is implemented with a hardware component utilizing a SANTM storage device, or other type of shared storage environment hardware device or platform, and a software component comprising ArcServeTM archiving software or other type of backup/archiving software solution.
- the archive module 190 is enabled for duplication and backup of the entire existing environment configured for the user, or enabled for duplication or copying of just the data within the environment for archival purposes.
- the archive module 190 is configured to copy data in a live and “hot” state from one physical system to the next for an “internal” high availability capability.
- the data continuity system 100 is able to create exact archival and compliant duplicates of client environments in a secure and auditable environment.
- the archive process can be audited and/or managed via the portal interface 170 ( FIG. 1 ).
- the archive process can be audited and/or managed via the portal interface 170 ( FIG. 1 ).
- FIGS. 8 to 14 show a system according to an embodiment of the present invention configured for a multi-tenant, multi-instant management platform.
- the system is indicated generally by reference 810 in FIG. 8 .
- the system 810 comprises a control system and management portal 812 , and a networking layer 820 , a hardware layer 830 , and a software layer 840 implemented for example as described above.
- the system 810 interfaces to one or more client networks 802 , indicated individually by references 802 a , 802 b , 802 c . . . 802 x , through the networking layer 820 .
- the client networks 802 may comprise individual clients or subscribers of the services of the system 810 and/or clients or customers of an entity or partner that provides/administers the services of the system 810 .
- the client network 802 a may comprise an individual client or customer
- the client networks 802 b and 802 c comprise the customers of a partner associated with the system 810 .
- the control system and management portal 812 is configured to allow unlimited number of partners to manage an unlimited number of client networks 802 (e.g. customers) at the same time without having any impact on each other.
- a corresponding client network 852 (e.g. “hosted version”), indicated individually by references 852 a, 852 b, 852 c . . .
- the configuration allows partners or entities to view/manage their respective client/customer installations privately at the same time (for example, based on the security layers and mechanisms described above), for example, from a single screen, as will be described in more detail below.
- FIG. 9 is a screen shot of a login administrator screen indicated generally by reference 900 .
- the login screen 900 is accessed from a Control Panel tab or link 901 .
- the login screen 900 is configured to recognize user access and configure the access controls according to the privileges, credentials, security and/or actions assigned or authorized for the particular user.
- the login screen 900 is configured to recognize “Administrators” 902 , “Lead Partners” 904 , “Partners” 906 and “Customers” 908 .
- the login screen 900 is configured for an administrator login, and the administrator is identified by a User Name field 910 , an E-Mail Address field 912 and a Company Name field 914 , and a Logout button 920 .
- the user interface for the login 900 and other screens include other common or configurable menu items, such as a Main screen link 930 , a Servers screen link 932 , a Readiness Assessments screen link 934 , an Accounting and Billing screen link 936 and a Contact screen link 938 .
- the user interface also includes a Partner Portal tab 903 and a Virtual NOC tab 905 as shown in FIG. 9 .
- FIG. 10 is a screen shot of a Partner Search screen indicated generally by reference 1000 .
- the Partner Search screen 1000 is configured for searching partners (e.g. active partners or other similar entities) on the system 800 .
- the search controls/parameters include “From” and “To” fields 1010 , a “Company Name” field 1012 , a “Last Name” field 1014 , a “First Name” field 1016 and an “Email” field 1018 .
- the search results are displayed in a “Search Results” window indicated generally by reference 1020 .
- each of the search partners is displayed with an active “Manage” button or control 1030 .
- the Manage button 1030 is configured to allow an entity, for example, an administrator with the required privileges, to impersonate the selected partner.
- FIG. 11 is a screen shot of an exemplary Manage Partner screen indicated generally by reference 1100 .
- the administrator is logged-in (as indicated by reference 1102 ) and is configured to impersonate a Partner, e.g. “Geminare Incorporated”, (as indicated by reference 1104 ).
- the Manage Partner screen 1100 is configured with an “Open Readiness Assessments” field 1110 and a “View” button 1112 for viewing the open readiness assessments.
- the Manage Partner screen 1100 includes a “News & Events” window 1120 which is configured to display events associated with the partner.
- the control system 810 is configured to display/provide access to data associated with the selected partner (e.g. the partner being impersonated in this example).
- active fields or buttons indicated generally by reference 1122 are provided and configured to display additional information or details associated with an event.
- FIG. 12 is a screen shot of an exemplary Partner Search screen and is indicated generally by reference 1200 .
- the Partner Search screen 1200 includes a search results window 1220 (for example, corresponding to 1020 in FIG. 10 as described above).
- the Partner Search screen 1200 is configured to allow a partner to search and access its entire client or customer base.
- the search results window 1220 is configured with a display showing a listing of the clients or customers (e.g. client networks) associated with the Partner.
- each of the listings includes an active “Manage” button 1222 . This allows the partner to control the configuration and/or settings for each of the clients.
- FIG. 12 is a screen shot of an exemplary Partner Search screen and is indicated generally by reference 1200 .
- the Partner Search screen 1200 includes a search results window 1220 (for example, corresponding to 1020 in FIG. 10 as described above).
- the Partner Search screen 1200 is configured to allow a partner to search and access its entire client or customer base.
- the search results window 1220 is configured with
- the Main menu button 930 has been activated and is configured with a Home button 930 a, a Change Details button 930 b and a Change Password button 930 c.
- the state of the partner (e.g. Geminare Incorporated) being impersonated by the administrator is indicated by the display boxes or fields 1102 and 1104 .
- FIG. 13 is a screen shot of a Server control screen indicated generally by reference 1300 .
- the Server control screen 1300 is displayed in response to the Servers button 932 being clicked and provides a listing 1310 of the control systems (e.g. servers) for the customers associated with the partner.
- the Server control screen 1300 is configured with control buttons 1312 , 1314 for accessing and/or controlling features and/or functions associated with the hardware/software (e.g. server) for a client or customer.
- the Server control screen 1300 provides the capability for a partner (or an entity legitimately impersonating the partner) to access the control systems and functions across the entire customer base associated with the partner.
- FIG. 14 is a screen shot of a Readiness Assessments control screen indicated generally by reference 1400 .
- the Readiness Assessments control screen 1400 is displayed in response to the Readiness Assessments button 932 being clicked and provides a listing 1410 of the readiness assessment for each of the customers associated with the partner.
- the Readiness Assessments control screen 1400 is configured with a respective Edit control button 1412 and a Review control button 1414 . Using the Edit 1412 and Review 1414 control buttons, the partner (or other authorized user) can access/control the functions associated with the readiness assessment tool for example as described above.
- control system and management portal 810 FIG. 8
- user interface screens or windows FIGS. 9 to 14
- control system and management portal 810 may be implemented in the form of one or more software objects, components, or computer programs or program modules in the server and/or the client machines.
- at least some or all of the software objects, components or modules can be hard-coded into processing units and/or read only memories or other non-volatile storage media in the mobile communication device, server and/or other components or modules depicted in the drawings.
- the specific implementation details of the software objects and/or program modules will be within the knowledge and understanding of one skilled in the art.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A system and method for providing or maintaining data and application continuity in a computer system. According to an embodiment, the system comprises a communication interface for a client system, a network layer for receiving data from the client system, a hardware infrastructure for creating instances of the client system for replicating data, and an applications module for executing one or more applications on the replicated data. According to a further aspect, the system includes a portal and user interface configured for providing a remote user with control, audit and other functions associated with the user's system configuration. According to another aspect, the portal and user interface provides access and control based on user privileges for a multi-tenant, multi-instant architecture or configuration.
Description
- The present application relates to computer systems, and more particularly to a system and methods for maintaining data and/or application continuity in a computer system for a business or enterprise.
- The uptime of the computer systems and data infrastructure for a business is critical to the operation of the enterprise. Equally or even more important is the recovery from a crash or system interruption. It has been estimated that at least 50% of a company's intellectual property resides in it email system.
- Accordingly, there remains a need for improvements in the art for maintaining business data continuity.
- The present invention is directed to a method and/or system for maintaining data and/or application continuity in a computer system for a business or enterprise.
- According to an aspect, there is provided a system for providing data continuity for one or more client systems, the system comprises: a communication interface configured to receive data from the one or more client systems; a security infrastructure configured to authorize communication with the one or more the client systems; a hardware infrastructure comprising a replication engine configured to create one or more virtual servers, and the one or more virtual servers being configured for storing at least some of the data received from the one or more client systems; and an applications module configured to run one or more application programs on some of the data received from one of the client systems, and the one or more application programs corresponding to application programs on the client system.
- According to another aspect, there is provided a system for providing data continuity for a plurality of client systems, the system comprises: a communication interface configured to receive data from the client systems; a security infrastructure configured to authorize communication with the client systems; a hardware infrastructure comprising a replication engine configured to create one or more virtual servers, and the one or more virtual servers being configured for storing at least some of the data received from the client systems; and a portal configured for providing an entity access to the virtual servers associated with one or more of the client systems, and the access being based on credentials associated with said entity.
- According to another aspect, there is provided a method for providing data continuity for one or more client systems, the method comprises: receiving data from the one or more client systems; providing a replication engine configured to create one or more virtual servers, and the one or more virtual servers being configured for storing at least some of the data received from the one or more client systems; and running one or more application programs on some of the data received from one of the client systems, and the one or more application programs corresponding to application programs running on the client system.
- Other aspects and features of the present invention will become apparent to those ordinarily skilled in the art upon review of the following description of embodiments of the invention in conjunction with the accompanying figures.
- Reference will now be made to the accompanying drawings which show, by way of example, embodiments of the apparatus and methods described herein, and how they may be carried into effect, and in which:
-
FIG. 1 shows in schematic form a system for maintaining business data continuity according to an embodiment of the present invention and in the context of an exemplary operating environment; -
FIG. 2 shows in block diagram form an exemplary client system for the data continuity system ofFIG. 1 ; -
FIG. 3 shows in block diagram form an Internet interface for the data continuity system ofFIG. 1 according to an embodiment of the invention; -
FIG. 4 shows in block diagram form a security infrastructure for the data continuity system ofFIG. 1 according to an embodiment of the invention; -
FIG. 5 shows in block diagram form an internal network structure for the data continuity system ofFIG. 1 according to an embodiment of the invention; -
FIG. 6 shows in block diagram form a hardware virtualization structure for the data continuity system ofFIG. 1 according to an embodiment of the invention; -
FIG. 7 shows in block diagram form a control platform for the data continuity system ofFIG. 1 according to an embodiment of the invention; -
FIG. 8 shows in diagrammatic form a system for maintaining business data continuity and a control system and management portal according to an embodiment of the present invention and in the context of an exemplary operating environment; -
FIG. 9 is a screen shot of a portal log-in window or screen for the control system and management portal ofFIG. 8 according to an embodiment of the present invention; -
FIG. 10 is a screen shot of a search and management window or screen for the control system and management portal ofFIG. 8 according to an embodiment of the invention; -
FIG. 11 is a screen shot of a screen configured for managing/controlling a customer or client associated with an entity configured in the control system and management portal ofFIG. 8 according to an embodiment of the present invention; -
FIG. 12 is a screen shot of a screen configured for managing/searching and accessing customer data for the control system and management portal ofFIG. 8 according to an embodiment of the invention; -
FIG. 13 is a screen shot of a screen configured for accessing and controlling clients or customers associated with an exemplary entity configured in the control system and management portal ofFIG. 8 according to an embodiment of the invention; and -
FIG. 14 is a screen shot of a screen configured for accessing and controlling the Readiness Assessment tool for the control system and management portal ofFIG. 8 according to an embodiment of the invention; - Like reference numerals indicate like or corresponding elements in the drawings.
- Reference is first made to
FIG. 1 , which shows asystem 100 according to an embodiment to the present invention and in the context of an exemplary operating environment comprising a plurality of client systems, with one client system being depicted inFIG. 1 and indicated generally byreference 10. In the context of the present description, thesystem 100 comprises a system for configuring, storing and delivering data (e.g. business data), and a control platform for maintaining and managing the data and/or applications for providing business data continuity, as will be described in more detail below. In the present description, thesystem 100 is referred to as a business data and application continuity system (and method), or in the alternative, adata continuity system 100. - The
data continuity system 100 comprises a networking layer orinfrastructure 120, a hardware layer orinfrastructure 140, a software layer or infrastructure 160, an application module orcomponents 180, and an archive components ormodule 190. Theexemplary client system 10 comprises client workstations 12, one ormore servers 14, and anetwork structure 16. The functionality and operation of thedata continuity system 100 is described in more detail below. - The
networking layer 120 includes a network communication interface indicated generally byreference 130. Thenetwork communication interface 130 is configured to provide communication with theclient system 10 via the Internet 20 and/or via a virtual private network (VPN) or wide area network (WAN) communication pathway orstructure 30. Thenetworking layer 120 andnetwork communication interface 130 are described in more detail more. - As shown in
FIG. 1 , thedata continuity system 100 includes a portal indicated byreference 170. Theportal 170 provides an interface to the Internet 20 and provides users, i.e. subscribers or clients, access to certain applications and tools in the software layer 160. Thedata continuity system 100 also includes an internal network indicated byreference 150, which is described in more detail below with reference toFIG. 5 . According to an embodiment, theinternal network 150 comprises an infrastructure for providing/defining a plurality of private client or production networks. As will be described in more detail below, theinternal network infrastructure 150 is used to configure a client private (“production”) network for each client of thesystem 100. - Reference is next made to
FIG. 2 , which shows theclient system 10 in further detail. As described above, theclient system 10 comprises one ormore client workstations 210,client servers 220, and aclient network 230. The client workstations comprise desktop computer systems, e.g. Windows XP workstations, which are resident on theclient network 230. Theclient server 220 comprises one or more servers, including, for example, a Mail server such as Microsoft Exchange™ system, Database servers, such as MS SQL™ servers, an Active Directory server(s), an Application server(s) such as MS GreatPlains™ server(s), and/or a File server(s), such as a MS Server 2003™ server(s). Theclient network 230 is configured to provide a network configuration for theclient workstations 210 and theclient servers 220 via an Internet connection (i.e. a standard offering Internet Service Provider or ISP) and/or router device connecting the Internet 20 to a local area network (LAN). - As shown in
FIG. 2 , each of theclient servers 220 includes a replication agent or engine according to an embodiment of the invention and indicated generally byreference 222. According to an embodiment, thereplication engine 222 runs as a service under the operating system for theserver 220 and is configured to capture stored data and transfer the captured data to replication servers running in the businessdata continuity system 100 as described in more detail below with reference toFIG. 8 . According to an embodiment, thereplication engine 222 is interchangeable with multiple forms of software replication engines. According to an embodiment, thereplication engine 222 is configured to work with multiple application formats such as Mail, Database, Application and File systems from various vendors such as Microsoft and Oracle. Commonly referenced as “Client servers”, these systems can be either physical or virtualized systems on the network. - In the context of the present description, the
client workstations 210 are configured for information (data) creation and retrieval. According to another aspect, theclient workstations 210 are configured to access the portal 170 (FIG. 1 ) for thedata continuity system 100. In known manner, theclient workstations 210 may be configured with Microsoft Windows XP™, Linux™, Macintosh™ and other operating systems. - According to an embodiment, the
client network 230 comprises a combination of networking devices that are configured to provide an infrastructure layer to theclient network 230 and also an interface or gateway to the networking layer 120 (FIG. 1 ) of thedata continuity system 100. The networking devices comprise “routers, modems or access devices” and are configured/connected in known manner to provide the Internet connectivity and network communication capability between theclient workstations 210 and theclient server 230 devices and thedata continuity system 100. According to an embodiment, direct connectivity between the client system 10 (FIG. 1 ) and thedata continuity system 100 is provided by a standard WAN VPN capable router as indicated byreference 32 inFIG. 1 . - Reference is next made to
FIG. 3 . The Internet in known manner comprises interconnected networks which span the globe and provide access to the users connected to them with services and information available both on public servers as well as private servers. In the context of the present description, the Internet configured communication interface 130 (FIG. 1 ) provides the capability for the client system 10 (FIG. 1 ) and other remote clients and/or servers to access and transfer data directly into thedata continuity system 100, as will be described in more detail below. - According to an embodiment and as shown in
FIG. 1 , the client workstations 12 are configured to connect remotely to the businesscontinuity data system 100 through the Internet 20, as opposed through theclient network 16, i.e. the WAN 30 and theVPN router 32. According to another aspect, theInternet 20 provides access to an Internet user 40 (FIG. 1 ), i.e. a remote user, or a user without a directly connected system to theclient network 16, who wishes to view or access the information hosted on the client server(s) 14. - Reference is made back to
FIG. 3 . According to another aspect, theInternet 20 provides access to public servers, i.e. servers on the Internet which are trying to exchange information with the client servers 14 (FIG. 1 ) in some specified format. This typically takes the form of email, database queries or website searches. An email server comprises a typical example of such a server. According to another embodiment, the communication interface 130 (FIG. 1 ) is configured to send and receive information in multiple formats with external and publicly hosted systems such as email servers, websites and database systems, as indicated byreference 50 inFIG. 1 and thereference 310 inFIG. 3 . For example, such systems typically comprise desktop machines, notebook computers and/or mobile wireless communication devices or PDA's, that are configured to access data on theclient servers 14 through theInternet 20. According to this aspect, servers coupled to the Internet are capable of sending and receiving communications in a wide variety of formats to the hosted servers and systems associated with thedata continuity system 100, as represented byreference 320 inFIG. 3 . - According to another aspect, the
data continuity system 100 includes a portal indicated byreference 170 inFIG. 1 . The portal 170 is configured as a public portal or interface to provide publicly available access, i.e. via theInternet 20, to certain private control and/or setup functions in thedata continuity system 100, as will be described in more detail below. According to an embodiment, the portal 170 comprises a secured website, having a secured website page available on the Internet, for example, with URL www.geminare.com. As will be described in more detail below, the portal 170 and secured webpage mechanism provides access to authorized users and the ability to manage and control all their systems from any publicly available system 40 (FIG. 1 ), as will be described in more detail below with reference toFIG. 7 . - Reference is next made to
FIG. 4 , which shows an embodiment of asecurity infrastructure 400. Thesecurity infrastructure 400 is configured in the networking layer 120 (FIG. 1 ) and provides security functions including, inbound Internet access, firewalling, security, remote access, spam prevention and virus filtering control systems for the business data continuity system 100 (FIG. 1 ). According to an embodiment, thesecurity infrastructure 400 comprises apublic network layer 410, asecurity layer infrastructure 420, and anauthentication infrastructure 430. According to an embodiment, thepublic network layer 410 is implemented or configured using Cisco™ brand or equivalent hardware based router devices. Thesecurity layer infrastructure 420 is implemented or configured using a Cisco™ brand or equivalent hardware based Intrusion Detection, Spam Filtering and Virus Control devices. According to an embodiment, theauthentication infrastructure 430 is implemented or configured using a Cisco™ or equivalent hardware and software based authentication server which is able to communicate with a Microsoft Active Directory RADIUS™ server or equivalent. - In operation, the
security infrastructure 400 provides multiple levels of hardware-based security, and comprises a rules-based hardware configuration for filtering and authenticating all inbound traffic into thedata continuity system 100. According to an embodiment, all inbound and outbound traffic that comes via theInternet 20 or from an internal network 500 (FIG. 5 ) pass through the security hardware and the rules are applied to pass or block the traffic. - Referring again to
FIG. 4 , the publicnetwork infrastructure layer 410 is intended for inbound and outbound traffic over theInternet 20. The publicnetwork infrastructure layer 410 is configured to accept all inbound packets into thedata continuity system 100 and to transmit all packets out of thedata continuity system 100. According to an embodiment, the publicnetwork infrastructure layer 410 is implemented in the form of a router system comprising routing tables for the Internet domains and is configured to define where traffic should be transmitted. According to a further aspect, the publicnetwork infrastructure layer 410 is implemented in a fault tolerant configuration and provides a failover to a second device without any interruption of service and controls a secondary backup Internet connection for handling the traffic. - As depicted in
FIG. 4 , traffic from the publicnetwork infrastructure layer 410 is passed or handled by thesecurity layer infrastructure 420. Thesecurity layer infrastructure 420 is configured to provide border control and security filtering. According to an embodiment, thesecurity layer infrastructure 420 determines traffic to be allowed to pass through into thedata continuity system 100 and traffic to be blocked or discarded from passing through to thedata continuity system 100, based on one or more rule settings. According to an embodiment, thesecurity layer infrastructure 420 is implemented in the form of a “Router” or “Firewall” device and is configured to provide intrusion detection controls, spam management and filtering, and virus containment and elimination functions. According to another aspect, thesecurity layer infrastructure 420 is implemented in a redundant configuration to provide failover to a secondary standby system with no interruption. Once the traffic has been reviewed and allowed to pass by thesecurity layer infrastructure 420, it is passed to theauthentication infrastructure layer 430. - The
authentication infrastructure layer 430 is configured to pass or route the traffic from thesecurity layer infrastructure 420 based on a set of rules to a resource or module in thedata continuity system 100 via the internal network 150 (FIG. 1 ). (Theinternal network 150 according to an embodiment is described in more detail below with reference toFIG. 5 .) Theauthentication infrastructure layer 430 may be implemented in both software and hardware. According to an embodiment, theauthentication infrastructure layer 430 is configured to function in conjunction with thesecurity layer infrastructure 420 to control a network within theinternal network 150 for the traffic through a virtual network configuration table, i.e. VLAN's. According to another aspect, theauthentication infrastructure layer 430 is configured to function as an “authentication server” for remote access to the virtual machine (VM)servers 620, which are described in more detail below with reference toFIG. 6 . - According to another aspect, the
authentication infrastructure layer 430 functions as a gateway between thesecurity layer infrastructure 420 and the network definition 750 (FIG. 7 ) which runs on the control platform 700 (FIG. 7 ) as described in more detail below. According to an embodiment, theauthentication infrastructure layer 430 is configured to process remote users based on their current and active credentials which are stored on the control platform 700 (FIG. 7 ), the network definitions module 750 (FIG. 7 ), and the software application components 180 (FIG. 1 ). Theauthentication infrastructure layer 430 is configured to manage communication between the above components and authenticates the communication to ensure that it is valid and appropriate, and then authorizes thesecurity layer infrastructure 420 to provide access to the appropriate client private network in theinternal network 150 in thedata continuity system 100. - Reference is next made to
FIG. 5 , which shows the internal network orinfrastructure 150 according to an embodiment of the invention. The internal network is indicated byreference 500 inFIG. 5 and according to an embodiment comprises a sharednetwork infrastructure 510 and aprivate network infrastructure 520. According to an embodiment, the sharednetwork infrastructure 510 is implemented using anetwork layer 2 switch configuration. Theprivate network infrastructure 520 is implemented using a network VLAN capable switch. Theprivate network infrastructure 520 comprises a plurality of VLAN's and according to an embodiment, a private VLAN is configured for each client. In operation, theinternal network 500, and the private VLAN's provide the capability for a multitude of clients to run on the shared hardware infrastructure 140 (FIG. 1 ) and the networking infrastructure 120 (FIG. 1 ), while maintaining complete security and separation between each client. - According to another aspect, the
internal network 150 includes a management network. The management network runs on the same infrastructure and is configured to provide thedata continuity system 100 with access and the capability to interact with each of the client networks and servers directly from a centralized location. According to an embodiment, the management network is configured as a VLAN and provides communication with each of the client VLAN's 520. However, to ensure security, each of the VLAN's cannot communicate directly with the management VLAN. - Reference is next made to
FIG. 6 , which shows ahardware virtualization layer 600 according to an embodiment of the invention. Thehardware virtualization layer 600 resides within the hardware infrastructure 140 (FIG. 1 ) of thesystem 100 and is configured according to an embodiment to provide the functionality to run a very large number of client environments and servers within virtualized instances. According to an embodiment, thehardware virtualization layer 600 is configured to provide multiple levels of redundancy and flexibility when deploying or modifying client servers or networks. - According to an embodiment and as depicted in
FIG. 6 , thehardware virtualization layer 600 comprises ahardware virtualization control 610 and ahardware virtualization platform 620. Thehardware virtualization control 610 is configured to manage the client environments within a virtualized structure. According to an embodiment, thehardware virtualization layer 600 is configured to perform disk assignment and usage, networking assignment and management, and resource allocation, such as memory, CPU and other allocations. - According to an embodiment, the
hardware virtualization control 610 is configured to manage allocation of resources in thehardware virtualization platform 620. The resources for allocation include disk storage, memory and CPU and has a direct relation to the control of the virtualized environment instances. According to an embodiment, thehardware virtualization platform 620 is configured to have direct control over the hardware resources such as disk, memory and CPU (without much regard for the configuration of them), i.e. thehardware virtualization platform 620 comprises the responsible mechanism in thedata continuity system 100 for communicating with the hardware layer. - According to an embodiment, the
hardware virtualization control 610 is implemented with IBM xSeries Servers and a VMWare Virtual Center, or any hardware platform capable of natively supporting virtualized instances and corresponding software or platform designed to run a mass number of virtual machines (VM's) on a single device (i.e. “one physical box”). According to an embodiment, thehardware virtualization platform 620 is implemented using IBM xSeries Servers and VMWare ESX Server Software. According to an embodiment, thehardware virtualization layer 600 is configured to support approximately 4000 clients configured with hardware resources. The particular implementation details will be within the understanding of one skilled in the art. - Reference is next made to
FIG. 7 , which shows a control platform according to an embodiment of the invention and indicated generally byreference 700. As will be described in more detail below, thecontrol platform 700 is configured according to an embodiment to provide the following functions for the data continuity system 100: an interface function, a definition function, a control function, a reporting function, a logging function and an alerting function. According to an embodiment, thecontrol platform 700 provides an interface for clients and the capability to directly call hardware and software components within thedata continuity system 100 based on user requests. According to another embodiment, thecontrol platform 700 includes a rules-based mechanism, which allows a user to configure a data continuity process by performing a “Readiness Assessment” survey or audit. - The functionality and features associated with the
control platform 700 are summarized in Table I as shown below: -
TABLE I Control Platform Portal Server Website Entrance Data Collection Client Audit/Readiness Assessment (710) Point Primary Reporting Logging Contact Network Server Archive Support Management (720) (730) Definition Definition Definition Definition Enablement Sections (740) (750) (760) (77) (780) Section Capability Storing/Seaching Audit Authentication Remote Server Archive Capability #1 (722) Logging Control (742) Access Creation Creation Enablement (732) (752) (762) (772) (782) Section Capability Interpretation Action Alert Control Replication Server Archive Capability #2 (724) Monitor (744) (754) Validation Storage Control (734) (764) (774) (784) Section Capability Recording Server #3 (726) Control (766) Section Capability Display #4 (728)
References in Table I correspond to references or like elements inFIG. 7 . - As shown in
FIG. 7 , thecontrol platform 700 comprises the following modules; a client readinessassessment audit module 710, adata reporting module 720, a logging andaudit module 730, acontact definition module 740, anetwork definition module 750, aserver definition module 760, anarchive definition module 770, and asupport enablement module 780. According to an embodiment, aspects of thecontrol platform 700 are implemented and configured in the form of a user interface which is accessed via the portal 170 (FIG. 1 ). A user interface and configuration according to an embodiment is described in more detail below with reference toFIGS. 9 to 14 . - According to an embodiment, the client audit and
readiness assessment module 710 is configured as an online tool that collects client server and network information using, for example, an interactive survey form or questionnaire which is presented to the user via theportal 170. Thecontrol platform 700 includes one or more processes that process the collected data and generate a server and network configuration for the user. According to an embodiment, the client audit and readiness assessment is accessed through a web browser (e.g. MS Internet Explorer) online at the portal 170. - The
data reporting module 720 is configured for data collection and client reporting. According to an embodiment, thedata reporting module 720 comprises a storing and searchingengine 722, an interpretation andanalysis engine 724, a recording andarchiving engine 726, and a display andreport engine 728. - The storing and searching
engine 722 is configured to provide live or instantaneous feedback on the status of the replication data for a client within thedata continuity system 100, for example, via the interface in the portal 170 (FIG. 1 ). According to another aspect, the storing and searchingengine 722 is configured to allow a user to search both current and historical data, i.e. data that has been processed over time, for example, replicated data for MS Exchange server over the past 12 hours is 12345 GB. - The interpretation and
analysis engine 724 is configured with a set of intelligent business rules that are designed to interpret the replication data that has been stored, i.e. archived, and report back the status of the data to the end user client. According to an embodiment, the interpretation andanalysis engine 724 is configured to interpret the business rules through calculations that are designed to compare the data that is on the primary client server(s) 14 (FIG. 1 ) with the replication servers running on the hardware virtualization layer 140 (FIG. 1 ). An exemplary report may comprise: “MS Exchange server is OK and 100% in sync with the primary server”. - The recording and
archiving engine 726 is configured to record the results generated by the interpretation andanalysis engine 724, which can be very important for clients and companies that require documented validations that the services were functioning properly at specific periods of time. According to an embodiment, the recording andarchiving engine 726 is responsive to a request through the storing and searchingengine 722. An exemplary data output from recording andarchiving engine 726 may comprise: “MS Exchange server is OK and 100% in sync on Dec. 31, 2007 with the primary server”. - The display and
report engine 728 is configured to provide an immediate visual representation to the client about the status of their replication servers. According to an embodiment, thedisplay engine 728 is responsive to theinterpretation engine 724 and displays a green, yellow or red indicator for each replica server. For example, a green indicator, e.g. a “green light” indicates that the replica server for the MS Exchange server is in sync with the client production server 14 (FIG. 1 ). - The logging and
audit module 730 is configured for audit data collection and monitoring. According to an embodiment, the logging andaudit module 730 comprises anaudit logging engine 732 and anaction monitoring engine 734. - The
audit logging engine 732 is configured to log and record all actions with the portal 170 for thedata continuity system 100. It will be appreciated that this provides a SaaS (Software as a Service) compliant system process. According to an aspect, the logged data/actions include changes to contact data, server data, control systems and audits. Exemplary data generated by theaudit logging engine 732 may take the following form: “Administrator Geminare Admin, logged into this account on Jan. 15, 2008 at 3:33 pm and updated the address information”. - The
action monitoring engine 734 is configured to provide a SaaS (“Software as a Service”) compliant system and documentation concerning the state of the server systems in the hardware virtualization platform 620 (FIG. 6 ) at specific times. According to an embodiment, all changes of server states are monitored and recorded in an action log. According to another aspect, theaction monitoring engine 734 is configured to provide intelligent processing of the server state information in order to inform the users of the server and any corrective action which should be taken. Exemplary data generated by theaction monitoring engine 734 may take the following form: “MS Exchange server state was changed from Paused to Replicating at 3:34 pm on Jan. 13, 2008 by Geminare Admin user”. - The
contact definition module 740 is configured to provide notification to the responsible parties. According to an embodiment, thecontact definition module 740 comprises anauthorization control engine 742 and analert control engine 744. - According to an embodiment, the
authorization control engine 742 is configured to capture data for users that have access and/or authorization to control and/or manage the replication servers 620 (FIG. 6 ). This provides a mechanism to ensure that only authorized users have the ability to manipulate the control states of the server systems. Exemplary data generated by theauthorization control engine 742 may take the following form: “Administrator # 1 has access to MS Exchange server start and stop status”. - According to an embodiment, the
alert control engine 744 is configured to work in conjunction with theauthorization control engine 742 to provide thedata continuity system 100 with the capability to alert and notify the appropriate users of system state changes. Exemplary data generated by thealert control engine 744 may take the following form: “Administrator # 1 is accessible at geminareadmin@geminare.org and via SMS at 416-555-1212”. - The
network definition module 750 is configured to provide network setup and remote access functions. According to an embodiment, thenetwork definition module 750 comprises aremote access engine 752 and aserver control engine 754. - According to an embodiment, the
remote access engine 752 is configured to connect the client network 16 (FIG. 1 ) to thedata continuity system 100 in order to provide remote access. The required controls, access information, authentication and setup are defined according to the client readiness assessment audit 710 (as described above) and utilized by theremote access engine 752 to configure the connection. Exemplary connection data includes IPSec IP, Encryption Key and Layer information. - According to an embodiment, the
replication engine 754 is configured to replicate active data from the connected client network 16 (FIG. 1 ) to the replication server(s) in the hardware layer 140 (FIG. 1 ), for example, in real-time utilizing block level replication techniques. According to an embodiment, the replication parameters are defined in thenetwork definitions module 750 and comprise compression types, timing and locations, for example, “2:1 Compression”, “Transfer data only after 9 pm” and “Transfer to location c:/spool”. - The
server definition module 760 is configured to define, i.e. create, replication servers on the hardware virtualization platform 620 (FIG. 6 ) in the hardware infrastructure 140 (FIG. 1 ) according to a server definition. The replication server(s) are configured to replicate ormirror corresponding servers 14 on the client system 10 (FIG. 1 ). According to an embodiment, theserver definition module 760 comprises aserver creation engine 762, aserver validation engine 764, and aserver control engine 766. - According to an embodiment, the
server creation engine 762 is configured to create replication server(s) on thehardware virtualization platform 620, based on a server definition that is created or generated by the client readiness assessment audit 710 (FIG. 7 ) as described above. An exemplary server definition generated by the clientreadiness assessment audit 710 may take the following form: “MS Exchange running 2003, on a Windows 2003 Server with 5 GB of RAM, 2× 50 GB hard drives”. - According to an embodiment, the
server validation engine 764 is configured to take the information that was entered in the server definition module 760 (server creation engine 762) and process the information through one or more defined setup rules. The operation of theserver validation engine 764 serves to ensure that a valid and appropriate server creation is performed for thehardware virtualization platform 620. According to an embodiment, theserver validation engine 764 looks for matching server configuration, version and setup information with predefined configuration data to ensure a match is made within reasonable variations. - According to an embodiment, the
server control engine 766 sets up a control system for each of the replication servers after the server creation (762) and server validation (764) operations are performed. According to an embodiment, the control system is configured to allow the replication process to be paused, started, stopped, imaged, rebuilt, run in a failover state, failed back, etc. It will be appreciated that the control system provides a mechanism for a client to control their system after creation. An exemplary control system configuration comprises: MS Exchange server is setup to Pause, Replication or Failover state. - The
archive definition module 770 is configured to provide a mechanism for defining archive control systems. According to an embodiment, thearchive definition module 770 comprises anarchive creation engine 772 and anarchive storage engine 774. - According to an embodiment, the
archive creation engine 772 is configured to generate an archive process to automatically archive data out of the active system (i.e. replication servers) to an archive system. The archive process is based on the archive definition, which according to an embodiment is based on data entered and/or generated by the client readiness assessment audit module 710 (described above). According to an embodiment, the archive process defines an information level and time-line at which data should be archived which is balanced or factored against the data management capability of the system. An exemplary archive process comprises all data on MS Exchange server 001 to be archived to database backup if older than 30 days. - According to an embodiment, the
archive storage engine 774 is configured to define a retention and control policy or process for the archived data. According to an embodiment, the retention and control policy is based on information from the client readinessassessment audit module 710 and defines how long the archived data should be kept and how much data should be kept. According to an embodiment, the portal 170 (FIG. 1 ) includes a component configured to allow a user to directly retrieve data from archive storage. - The
support enablement module 780 is configured to provide a self support system for a client. According to an embodiment, once the server data and preferences have been entered through the client readinessassessment audit module 710, thesupport enablement module 780 is configured to provide a support platform for client users to test and troubleshoot their configured system on thedata continuity system 100. According to an embodiment, thesupport enablement module 780 comprises acapability enablement engine 782 and acapability control engine 784. - According to an embodiment, the
capability enablement engine 782 is configured to allow an administrator to define the level of and access to built-in tools for each user account. An exemplary definition for user self-support comprises: user is able to test and see if the VPN network is connected by sending ICMP packets through a VPN tunnel to the replication servers on thedata continuity system 100 as defined in the readiness assessment network definition. - According to an embodiment, the
capability control engine 784 is configured to allow a user to perform their own tests unassisted through the portal interface 170 (FIG. 1 ). The tests as defined by thecapability enablement engine 782 can range from VPN based tests, to services tests and network responses. According to an aspect, the tests can be anything from VPN, services or network responses and are executed in real-time based on the definition in thecapability enablement engine 782. According to an embodiment, the system is configured with a Virtual NOC tab 905 (FIG. 9 ) to provide an interface for thecapability enablement engine 782. - The software application components module or layer is indicated by
reference 180 inFIG. 1 and according to an embodiment of the invention comprises the applications that run directly on the virtualized server instances in the hardware virtualization platform 620 (FIG. 6 ). The application components typically comprise mail server applications, database server applications, file server applications and/or directory servers. Exemplary application components include Microsoft Exchange server, Microsoft SQL server and Microsoft IIS server. According to another aspect, the softwareapplication components module 180 is configured to process incoming data once it has passed through all the security and operational layers in thedata continuity system 100, i.e. data that has been replicated through thedata continuity system 100, as described above. According to another aspect, the application components represent the actual server applications that are processing the data for the users and are typically responsible for distributing the data as well. According to another aspect, the hardware virtualization platform 620 (FIG. 6 ) is configured to run multiple instances of the application component(s). According to an embodiment, thedata continuity system 100 does not replicate the application layer within the server environment only the data that this layer uses and as such the softwareapplication components layer 180 is utilized in the delivery of the information from the client servers 14 (FIG. 1 ) and the replication servers 620 (FIG. 6 ) in the hardware infrastructure layer 140 (FIG. 1 ). According to another embodiment, theapplication components module 180 includes adata replication engine 182 or an application failover control engine 184 in order to provide the capability to “swap out” a replication engine. - The archive components module is indicated by
reference 190 inFIG. 1 and according to an embodiment is configured to archive data from thedata continuity system 100 to a separate system (not shown). For example, once data has been collected, processed (e.g. replicated) and utilized within thedata continuity system 100, it may need to be archived out into a separate system, for example, based on criteria that are defined according to the client readiness assessment audit module 710 (FIG. 7 ) as described above. According to an embodiment, thearchive components module 190 comprises a hardware and software platform that is responsible for directly archiving data out of the live system into a separate hardware, software or Cloud storage platform for long term storage. According to an embodiment, thearchive component module 190 is implemented with a hardware component utilizing a SAN™ storage device, or other type of shared storage environment hardware device or platform, and a software component comprising ArcServe™ archiving software or other type of backup/archiving software solution. According to an embodiment, thearchive module 190 is enabled for duplication and backup of the entire existing environment configured for the user, or enabled for duplication or copying of just the data within the environment for archival purposes. According to another aspect, thearchive module 190 is configured to copy data in a live and “hot” state from one physical system to the next for an “internal” high availability capability. It will be appreciated that by providing the capability to image an entire environment configured for a user (and duplicate it in real-time), thedata continuity system 100 is able to create exact archival and compliant duplicates of client environments in a secure and auditable environment. According to another aspect, the archive process can be audited and/or managed via the portal interface 170 (FIG. 1 ). According to another embodiment, the archive process can be audited and/or managed via the portal interface 170 (FIG. 1 ). - Reference is next made to
FIGS. 8 to 14 , which show a system according to an embodiment of the present invention configured for a multi-tenant, multi-instant management platform. The system is indicated generally byreference 810 inFIG. 8 . Thesystem 810 comprises a control system andmanagement portal 812, and anetworking layer 820, ahardware layer 830, and asoftware layer 840 implemented for example as described above. Thesystem 810 interfaces to one ormore client networks 802, indicated individually byreferences networking layer 820. The client networks 802 may comprise individual clients or subscribers of the services of thesystem 810 and/or clients or customers of an entity or partner that provides/administers the services of thesystem 810. For example, theclient network 802 a may comprise an individual client or customer, whereas theclient networks 802 b and 802 c comprise the customers of a partner associated with thesystem 810. According to an embodiment, the control system andmanagement portal 812 is configured to allow unlimited number of partners to manage an unlimited number of client networks 802 (e.g. customers) at the same time without having any impact on each other. According to one aspect, a corresponding client network 852 (e.g. “hosted version”), indicated individually byreferences management portal 810. The configuration allows partners or entities to view/manage their respective client/customer installations privately at the same time (for example, based on the security layers and mechanisms described above), for example, from a single screen, as will be described in more detail below. - Reference is next made to
FIG. 9 , which is a screen shot of a login administrator screen indicated generally byreference 900. Thelogin screen 900 is accessed from a Control Panel tab or link 901. According to an embodiment, thelogin screen 900 is configured to recognize user access and configure the access controls according to the privileges, credentials, security and/or actions assigned or authorized for the particular user. For example, thelogin screen 900 is configured to recognize “Administrators” 902, “Lead Partners” 904, “Partners” 906 and “Customers” 908. For the exemplary login depicted inFIG. 9 , thelogin screen 900 is configured for an administrator login, and the administrator is identified by aUser Name field 910, an E-Mail Address field 912 and aCompany Name field 914, and aLogout button 920. - As shown in
FIG. 9 , the user interface for thelogin 900 and other screens include other common or configurable menu items, such as aMain screen link 930, aServers screen link 932, a ReadinessAssessments screen link 934, an Accounting andBilling screen link 936 and aContact screen link 938. The user interface also includes aPartner Portal tab 903 and aVirtual NOC tab 905 as shown inFIG. 9 . - Reference is next made to
FIG. 10 , which is a screen shot of a Partner Search screen indicated generally byreference 1000. ThePartner Search screen 1000 is configured for searching partners (e.g. active partners or other similar entities) on thesystem 800. The search controls/parameters include “From” and “To”fields 1010, a “Company Name”field 1012, a “Last Name”field 1014, a “First Name”field 1016 and an “Email”field 1018. According to an embodiment, the search results are displayed in a “Search Results” window indicated generally byreference 1020. According to another aspect, each of the search partners is displayed with an active “Manage” button orcontrol 1030. According to an embodiment, the Managebutton 1030 is configured to allow an entity, for example, an administrator with the required privileges, to impersonate the selected partner. - Reference is next made to
FIG. 11 , which is a screen shot of an exemplary Manage Partner screen indicated generally byreference 1100. In accordance with this example, the administrator is logged-in (as indicated by reference 1102) and is configured to impersonate a Partner, e.g. “Geminare Incorporated”, (as indicated by reference 1104). According to an embodiment, the ManagePartner screen 1100 is configured with an “Open Readiness Assessments”field 1110 and a “View”button 1112 for viewing the open readiness assessments. According to an embodiment, the ManagePartner screen 1100 includes a “News & Events”window 1120 which is configured to display events associated with the partner. Thecontrol system 810 is configured to display/provide access to data associated with the selected partner (e.g. the partner being impersonated in this example). According to another aspect, active fields or buttons indicated generally byreference 1122 are provided and configured to display additional information or details associated with an event. - Reference is next made to
FIG. 12 , which is a screen shot of an exemplary Partner Search screen and is indicated generally by reference 1200. The Partner Search screen 1200 includes a search results window 1220 (for example, corresponding to 1020 inFIG. 10 as described above). The Partner Search screen 1200 is configured to allow a partner to search and access its entire client or customer base. As shown, the search resultswindow 1220 is configured with a display showing a listing of the clients or customers (e.g. client networks) associated with the Partner. As shown inFIG. 12 , each of the listings includes an active “Manage”button 1222. This allows the partner to control the configuration and/or settings for each of the clients. As also depicted inFIG. 12 , theMain menu button 930 has been activated and is configured with aHome button 930 a, aChange Details button 930 b and aChange Password button 930 c. The state of the partner (e.g. Geminare Incorporated) being impersonated by the administrator is indicated by the display boxes orfields - Reference is next made to
FIG. 13 , which is a screen shot of a Server control screen indicated generally byreference 1300. TheServer control screen 1300 is displayed in response to theServers button 932 being clicked and provides alisting 1310 of the control systems (e.g. servers) for the customers associated with the partner. According to an embodiment, theServer control screen 1300 is configured withcontrol buttons Server control screen 1300 provides the capability for a partner (or an entity legitimately impersonating the partner) to access the control systems and functions across the entire customer base associated with the partner. - Reference is next made to
FIG. 14 , which is a screen shot of a Readiness Assessments control screen indicated generally byreference 1400. The ReadinessAssessments control screen 1400 is displayed in response to theReadiness Assessments button 932 being clicked and provides alisting 1410 of the readiness assessment for each of the customers associated with the partner. According to an embodiment, the ReadinessAssessments control screen 1400 is configured with a respectiveEdit control button 1412 and aReview control button 1414. Using theEdit 1412 andReview 1414 control buttons, the partner (or other authorized user) can access/control the functions associated with the readiness assessment tool for example as described above. - The functionality and features associated with the control system and management portal 810 (
FIG. 8 ) and/or the user interface screens or windows (FIGS. 9 to 14 ) for the control system andmanagement portal 810 as described above and in accordance with the embodiments may be implemented in the form of one or more software objects, components, or computer programs or program modules in the server and/or the client machines. Further, at least some or all of the software objects, components or modules can be hard-coded into processing units and/or read only memories or other non-volatile storage media in the mobile communication device, server and/or other components or modules depicted in the drawings. The specific implementation details of the software objects and/or program modules will be within the knowledge and understanding of one skilled in the art. - The present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. Certain adaptations and modifications of the invention will be obvious to those skilled in the art. Therefore, the presently discussed embodiments are considered to be illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Claims (13)
1. A system for providing data continuity for one or more client systems, said system comprising:
a communication interface configured to receive data from the one or more client systems;
a security infrastructure configured to authorize communication with the one or more the client systems;
a hardware infrastructure comprising a replication engine configured to create one or more virtual servers, and said one or more virtual servers being configured for storing at least some of the data received from the one or more client systems; and
an applications module, said applications module being configured to run one or more application programs on some of the data received from one of the client systems, and said one or more application programs corresponding to application programs running on the client system.
2. The system as claimed in claim 1 , further including a portal configured for providing access to one or more users associated with the one or more client systems.
3. The system as claimed in claim 2 , further including a mechanism configured to receive inputs entered by the one or more users at said portal and to generate a replication configuration for said hardware infrastructure or said applications module corresponding to the associated client system.
4. The system as claimed in claim 1 , further including a network infrastructure comprising one or more client networks, each of said one or more client networks comprising a private network configured for access by one of the one or more client systems.
5. The system as claimed in claim 1 , further including a control platform comprising one or more of a configuration module, a reporting module, a logging module, a network definition module, a server definition module and an archive definition module.
6. The system as claimed in claim 5 , wherein said configuration module includes a rules-based mechanism for generating a configuration definition associated with one of the one or more client systems, and rules-based mechanism being configured to be responsive to one or more inputs from the user associated with the client system.
7. The system as claimed in claim 6 , further including a portal configured for providing receiving said one or more inputs from the user and providing said one or more inputs to said configuration module.
8. A system for providing data continuity for a plurality of client systems, said system comprising:
a communication interface configured to receive data from the client systems;
a security infrastructure configured to authorize communication with the client systems;
a hardware infrastructure comprising a replication engine configured to create one or more virtual servers, and said one or more virtual servers being configured for storing at least some of the data received from the client systems; and
a portal configured for providing an entity access to the virtual servers associated with one or more of the client systems, and said access being based on credentials associated with said entity.
9. The system as claimed in claim 8 , wherein said entity comprises a partner and one or more of the client systems comprise customers of said partner, and said portal is configured to allow said partner to control the configuration of the virtual servers associated with said customers.
10. The system as claimed in claim 9 , further including an applications module, said applications module being configured to run one or more application programs on some of the data received from one of the client systems, and said one or more application programs corresponding to application programs running on the client system.
11. The system as claimed in claim 10 , wherein said portal is configured to allow said partner to define a replication configuration for said hardware infrastructure or said applications module corresponding to the associated client system.
12. A method for providing data continuity for one or more client systems, said method comprising:
receiving data from the one or more client systems;
providing a replication engine configured to create one or more virtual servers, and said one or more virtual servers being configured for storing at least some of the data received from the one or more client systems; and
running one or more application programs on some of the data received from one of the client systems, and said one or more application programs corresponding to application programs running on the client system.
13. The method as claimed in claim 12 , further including the step of storing the data processed by said one or more application programs.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/991,326 US20110270949A1 (en) | 2008-04-08 | 2009-04-08 | System and method for providing data and application continuity in a computer system |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/099,367 US8135838B2 (en) | 2008-04-08 | 2008-04-08 | System and method for providing data and application continuity in a computer system |
PCT/CA2009/000454 WO2009124390A1 (en) | 2008-04-08 | 2009-04-08 | System and method for providing data and application continuity in a computer system |
US12/991,326 US20110270949A1 (en) | 2008-04-08 | 2009-04-08 | System and method for providing data and application continuity in a computer system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/099,367 Continuation US8135838B2 (en) | 2008-04-08 | 2008-04-08 | System and method for providing data and application continuity in a computer system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20110270949A1 true US20110270949A1 (en) | 2011-11-03 |
Family
ID=41134268
Family Applications (8)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/099,367 Active US8135838B2 (en) | 2008-04-08 | 2008-04-08 | System and method for providing data and application continuity in a computer system |
US12/991,326 Abandoned US20110270949A1 (en) | 2008-04-08 | 2009-04-08 | System and method for providing data and application continuity in a computer system |
US12/940,600 Active US9002786B2 (en) | 2008-04-08 | 2010-11-05 | System and method for providing data and application continuity in a computer system |
US13/364,394 Active US9674268B2 (en) | 2008-04-08 | 2012-02-02 | System and method for providing data and application continuity in a computer system |
US14/639,352 Active 2029-01-02 US9860310B2 (en) | 2008-04-08 | 2015-03-05 | System and method for providing data and application continuity in a computer system |
US15/614,494 Active US10110667B2 (en) | 2008-04-08 | 2017-06-05 | System and method for providing data and application continuity in a computer system |
US16/145,516 Active 2028-10-05 US11070612B2 (en) | 2008-04-08 | 2018-09-28 | System and method for providing data and application continuity in a computer system |
US17/381,153 Active 2028-04-23 US11575736B2 (en) | 2008-04-08 | 2021-07-20 | System and method for providing data and application continuity in a computer system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/099,367 Active US8135838B2 (en) | 2008-04-08 | 2008-04-08 | System and method for providing data and application continuity in a computer system |
Family Applications After (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/940,600 Active US9002786B2 (en) | 2008-04-08 | 2010-11-05 | System and method for providing data and application continuity in a computer system |
US13/364,394 Active US9674268B2 (en) | 2008-04-08 | 2012-02-02 | System and method for providing data and application continuity in a computer system |
US14/639,352 Active 2029-01-02 US9860310B2 (en) | 2008-04-08 | 2015-03-05 | System and method for providing data and application continuity in a computer system |
US15/614,494 Active US10110667B2 (en) | 2008-04-08 | 2017-06-05 | System and method for providing data and application continuity in a computer system |
US16/145,516 Active 2028-10-05 US11070612B2 (en) | 2008-04-08 | 2018-09-28 | System and method for providing data and application continuity in a computer system |
US17/381,153 Active 2028-04-23 US11575736B2 (en) | 2008-04-08 | 2021-07-20 | System and method for providing data and application continuity in a computer system |
Country Status (5)
Country | Link |
---|---|
US (8) | US8135838B2 (en) |
EP (1) | EP2266253B1 (en) |
CA (1) | CA2720082C (en) |
ES (1) | ES2711348T3 (en) |
WO (1) | WO2009124390A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110106756A1 (en) * | 2008-04-08 | 2011-05-05 | Geist Joshua B | System and method for providing data and application continuity in a computer system |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101686251A (en) * | 2008-09-26 | 2010-03-31 | 中国银联股份有限公司 | Centralized standby system of remote isomorphism real-time system and standby method |
US8145945B2 (en) * | 2010-01-04 | 2012-03-27 | Avaya Inc. | Packet mirroring between primary and secondary virtualized software images for improved system failover performance |
US20120179779A1 (en) * | 2011-01-12 | 2012-07-12 | Dolphin Enterprise Solutions Corporation d/b/a Dolphin | System and method for data storage and retrieval |
CN102693169B (en) | 2011-03-25 | 2015-01-28 | 国际商业机器公司 | Method and device for recovering lessee data under multi-lessee environment, and database system |
JP5684103B2 (en) * | 2011-12-26 | 2015-03-11 | 株式会社東芝 | Plant security management apparatus, management method, and management program |
US8930747B2 (en) | 2012-03-30 | 2015-01-06 | Sungard Availability Services, Lp | Private cloud replication and recovery |
US9129124B2 (en) * | 2012-04-12 | 2015-09-08 | Hewlett-Packard Development Company, L.P. | Dynamic provisioning of virtual systems |
US20140026198A1 (en) * | 2012-07-23 | 2014-01-23 | Kabushiki Kaisha Toshiba | Information processing apparatus and control method |
WO2014046974A2 (en) | 2012-09-20 | 2014-03-27 | Case Paul Sr | Case secure computer architecture |
US9131015B2 (en) * | 2012-10-08 | 2015-09-08 | Google Technology Holdings LLC | High availability event log collection in a networked system |
US9754000B2 (en) * | 2012-12-21 | 2017-09-05 | Sap Se | Integration scenario for master data with software-as-a-service system |
GB2510426A (en) * | 2013-02-05 | 2014-08-06 | Ibm | Workload balancing in a distributed database |
US9392084B2 (en) | 2014-01-06 | 2016-07-12 | International Business Machines Corporation | Recovery of a network infrastructure to facilitate business continuity |
WO2017136183A1 (en) | 2016-02-04 | 2017-08-10 | Carrier Corporation | Fall-back in case of connection loss |
KR102567140B1 (en) * | 2017-11-24 | 2023-08-16 | 삼성전자주식회사 | Method of managing data and storage device performing the same |
US10630572B1 (en) * | 2018-01-05 | 2020-04-21 | iPayed, LLC | Open loop, closed loop, real and near real-time computer network system and method therefor |
US11025425B2 (en) | 2018-06-25 | 2021-06-01 | Elasticsearch B.V. | User security token invalidation |
US11223626B2 (en) | 2018-06-28 | 2022-01-11 | Elasticsearch B.V. | Service-to-service role mapping systems and methods |
US11196554B2 (en) * | 2018-07-27 | 2021-12-07 | Elasticsearch B.V. | Default password removal |
US11023598B2 (en) | 2018-12-06 | 2021-06-01 | Elasticsearch B.V. | Document-level attribute-based access control |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6079020A (en) * | 1998-01-27 | 2000-06-20 | Vpnet Technologies, Inc. | Method and apparatus for managing a virtual private network |
US6304973B1 (en) * | 1998-08-06 | 2001-10-16 | Cryptek Secure Communications, Llc | Multi-level security network system |
US20010047406A1 (en) * | 2000-04-13 | 2001-11-29 | Netilla Networks Inc. | Apparatus and accompanying methods for providing, through a centralized server site, an integrated virtual office environment, remotely accessible via a network-connected web browser, with remote network monitoring and management capabilities |
US20020156905A1 (en) * | 2001-02-21 | 2002-10-24 | Boris Weissman | System for logging on to servers through a portal computer |
US20030195950A1 (en) * | 1998-12-07 | 2003-10-16 | Magically, Inc., | Virtual desktop in a computer network |
US20060031365A1 (en) * | 2000-08-22 | 2006-02-09 | Timothy Kay | Method and system for using screen names to customize interactive agents |
US20070067435A1 (en) * | 2003-10-08 | 2007-03-22 | Landis John A | Virtual data center that allocates and manages system resources across multiple nodes |
US7225249B1 (en) * | 1997-09-26 | 2007-05-29 | Mci, Llc | Integrated systems for providing communications network management services and interactive generating invoice documents |
US20080034415A1 (en) * | 2006-08-03 | 2008-02-07 | Vinoo Chacko | Systems and methods for enabling assured records using fine grained auditing of virtual private network traffic |
Family Cites Families (126)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5187790A (en) * | 1989-06-29 | 1993-02-16 | Digital Equipment Corporation | Server impersonation of client processes in an object based computer operating system |
US5544347A (en) * | 1990-09-24 | 1996-08-06 | Emc Corporation | Data storage system controlled remote data mirroring with respectively maintained data indices |
US5812793A (en) * | 1996-06-26 | 1998-09-22 | Microsoft Corporation | System and method for asynchronous store and forward data replication |
US7529856B2 (en) * | 1997-03-05 | 2009-05-05 | At Home Corporation | Delivering multimedia services |
JPH11167510A (en) * | 1997-12-04 | 1999-06-22 | Hitachi Ltd | Replication method, replication tool, and replication server |
US6618806B1 (en) * | 1998-04-01 | 2003-09-09 | Saflink Corporation | System and method for authenticating users in a computer network |
US6108701A (en) * | 1998-07-20 | 2000-08-22 | Lucent Technologies, Inc. | Soft switch extension for internet protocol applications |
US6335937B1 (en) * | 1998-09-24 | 2002-01-01 | International Business Machines Corp. | Node failure recovery in a hub and spoke data replication mechanism |
US20030097361A1 (en) * | 1998-12-07 | 2003-05-22 | Dinh Truong T | Message center based desktop systems |
EP1143662B1 (en) * | 1999-06-10 | 2006-05-17 | Alcatel Internetworking, Inc. | Virtual private network having automatic updating of client reachability information |
US6678835B1 (en) * | 1999-06-10 | 2004-01-13 | Alcatel | State transition protocol for high availability units |
US6654771B1 (en) * | 1999-07-19 | 2003-11-25 | Microsoft Corporation | Method and system for network data replication |
US6453326B1 (en) * | 1999-07-19 | 2002-09-17 | Microsoft Corporation | Method and system for network data replication |
US6779016B1 (en) * | 1999-08-23 | 2004-08-17 | Terraspring, Inc. | Extensible computing system |
US6691244B1 (en) * | 2000-03-14 | 2004-02-10 | Sun Microsystems, Inc. | System and method for comprehensive availability management in a high-availability computer system |
US6658590B1 (en) * | 2000-03-30 | 2003-12-02 | Hewlett-Packard Development Company, L.P. | Controller-based transaction logging system for data recovery in a storage area network |
US6711575B1 (en) * | 2000-10-06 | 2004-03-23 | Samba Holdings, Inc. | Methods and systems for providing controllable access to information contained in repositories |
US20020087552A1 (en) * | 2000-04-12 | 2002-07-04 | Samba Holdings, Inc. | Methods and systems for providing access to information via query application and output interface application |
US6854069B2 (en) * | 2000-05-02 | 2005-02-08 | Sun Microsystems Inc. | Method and system for achieving high availability in a networked computer system |
US20020055972A1 (en) * | 2000-05-08 | 2002-05-09 | Weinman Joseph Bernard | Dynamic content distribution and data continuity architecture |
US20010047412A1 (en) * | 2000-05-08 | 2001-11-29 | Weinman Joseph B. | Method and apparatus for maximizing distance of data mirrors |
US6950871B1 (en) * | 2000-06-29 | 2005-09-27 | Hitachi, Ltd. | Computer system having a storage area network and method of handling data in the computer system |
US7849262B1 (en) * | 2000-06-30 | 2010-12-07 | Emc Corporation | System and method for virtualization of networked storage resources |
US6775230B1 (en) * | 2000-07-18 | 2004-08-10 | Hitachi, Ltd. | Apparatus and method for transmitting frames via a switch in a storage area network |
US7725602B2 (en) * | 2000-07-19 | 2010-05-25 | Akamai Technologies, Inc. | Domain name resolution using a distributed DNS network |
US6694447B1 (en) | 2000-09-29 | 2004-02-17 | Sun Microsystems, Inc. | Apparatus and method for increasing application availability during a disaster fail-back |
US8949471B2 (en) * | 2000-11-02 | 2015-02-03 | Oracle America, Inc. | TCP/UDP acceleration |
US7313614B2 (en) * | 2000-11-02 | 2007-12-25 | Sun Microsystems, Inc. | Switching system |
US6871296B2 (en) * | 2000-12-29 | 2005-03-22 | International Business Machines Corporation | Highly available TCP systems with fail over connections |
TW561358B (en) * | 2001-01-11 | 2003-11-11 | Force Corp Z | File switch and switched file system |
US6769071B1 (en) * | 2001-01-23 | 2004-07-27 | Adaptec, Inc. | Method and apparatus for intelligent failover in a multi-path system |
KR20020063342A (en) * | 2001-01-27 | 2002-08-03 | 김종열 | Method and Apparatus for Multi-Language Internet live broadcasting service |
US7231391B2 (en) * | 2001-02-06 | 2007-06-12 | Quest Software, Inc. | Loosely coupled database clusters with client connection fail-over |
AU2002306495A1 (en) * | 2001-02-13 | 2002-08-28 | Candera, Inc. | Storage virtualization and storage management to provide higher level storage services |
WO2002065329A1 (en) * | 2001-02-14 | 2002-08-22 | The Escher Group, Ltd. | Peer-to peer enterprise storage |
US7340505B2 (en) * | 2001-04-02 | 2008-03-04 | Akamai Technologies, Inc. | Content storage and replication in a managed internet content storage environment |
GB0112781D0 (en) * | 2001-05-25 | 2001-07-18 | Global Continuity Plc | Method for rapid recovery from a network file server failure |
US6772178B2 (en) * | 2001-07-27 | 2004-08-03 | Sun Microsystems, Inc. | Method and apparatus for managing remote data replication in a distributed computer system |
US9659292B1 (en) * | 2001-08-30 | 2017-05-23 | EMC IP Holding Company LLC | Storage-based replication of e-commerce transactions in real time |
US6880002B2 (en) * | 2001-09-05 | 2005-04-12 | Surgient, Inc. | Virtualized logical server cloud providing non-deterministic allocation of logical attributes of logical servers to physical resources |
US20030055697A1 (en) * | 2001-09-18 | 2003-03-20 | Macken Thomas E. | Systems and methods to facilitate migration of a process via a process migration template |
CA2411294C (en) * | 2001-11-06 | 2011-01-04 | Everyware Solutions Inc. | A method and system for access to automatically synchronized remote files |
US20170118214A1 (en) * | 2001-12-12 | 2017-04-27 | Pervasive Security Systems, Inc. | Method and architecture for providing access to secured data from non-secured clients |
US7478418B2 (en) * | 2001-12-12 | 2009-01-13 | Guardian Data Storage, Llc | Guaranteed delivery of changes to security policies in a distributed system |
KR100441712B1 (en) * | 2001-12-29 | 2004-07-27 | 엘지전자 주식회사 | Extensible Multi-processing System and Method of Replicating Memory thereof |
US7406473B1 (en) * | 2002-01-30 | 2008-07-29 | Red Hat, Inc. | Distributed file system using disk servers, lock servers and file servers |
US7213246B1 (en) * | 2002-03-28 | 2007-05-01 | Veritas Operating Corporation | Failing over a virtual machine |
US7254640B2 (en) * | 2002-04-09 | 2007-08-07 | Vigilos, Inc. | System for providing fault tolerant data warehousing environment by temporary transmitting data to alternate data warehouse during an interval of primary data warehouse failure |
US8549114B2 (en) * | 2002-06-12 | 2013-10-01 | Bladelogic, Inc. | Method and system for model-based heterogeneous server configuration management |
WO2004004236A2 (en) * | 2002-06-27 | 2004-01-08 | Snap-On Incorporated | Portal for distributing business and product information |
US7496668B2 (en) * | 2002-06-28 | 2009-02-24 | Honeywell International Inc. | OPC server redirection manager |
US7370064B2 (en) * | 2002-08-06 | 2008-05-06 | Yousefi Zadeh Homayoun | Database remote replication for back-end tier of multi-tier computer systems |
US7305464B2 (en) * | 2002-09-03 | 2007-12-04 | End Ii End Communications, Inc. | Systems and methods for broadband network optimization |
DE60327329D1 (en) * | 2002-09-10 | 2009-06-04 | Exagrid Systems Inc | PRIMARY AND REMOTE DATA BACKUP WITH KNOT-FAILOVER |
US9372870B1 (en) * | 2003-01-21 | 2016-06-21 | Peer Fusion, Inc. | Peer to peer code generator and decoder for digital systems and cluster storage system |
US8010491B2 (en) * | 2003-02-28 | 2011-08-30 | Microsoft Corporation | Method for managing multiple file states for replicated files |
US7302609B2 (en) * | 2003-03-12 | 2007-11-27 | Vladimir Matena | Method and apparatus for executing applications on a distributed computer system |
US7831641B2 (en) * | 2003-04-24 | 2010-11-09 | Neopath Networks, Inc. | Large file support for a network file server |
US7801851B2 (en) * | 2003-06-30 | 2010-09-21 | Gravic, Inc. | Method for ensuring referential integrity in multi-threaded replication engines |
US7836029B2 (en) * | 2003-07-08 | 2010-11-16 | Pillar Data Systems, Inc. | Systems and methods of searching for and determining modified blocks in a file system |
WO2005009003A1 (en) * | 2003-07-11 | 2005-01-27 | Computer Associates Think, Inc. | Distributed policy enforcement using a distributed directory |
WO2005048124A2 (en) * | 2003-11-04 | 2005-05-26 | Constant Data, Inc. | Hybrid real-time data replication |
US7278065B2 (en) * | 2003-11-17 | 2007-10-02 | Electronic Data Systems Corporation | Enterprise directory service domain controller replication alert and repair |
US8190780B2 (en) * | 2003-12-30 | 2012-05-29 | Sap Ag | Cluster architecture having a star topology with centralized services |
US7383463B2 (en) | 2004-02-04 | 2008-06-03 | Emc Corporation | Internet protocol based disaster recovery of a server |
KR100435985B1 (en) * | 2004-02-25 | 2004-06-12 | 엔에이치엔(주) | Nonstop service system using voting and, information updating and providing method in the same |
US7395352B1 (en) * | 2004-03-12 | 2008-07-01 | Netapp, Inc. | Managing data replication relationships |
US7770059B1 (en) * | 2004-03-26 | 2010-08-03 | Emc Corporation | Failure protection in an environment including virtualization of networked storage resources |
US8627005B1 (en) * | 2004-03-26 | 2014-01-07 | Emc Corporation | System and method for virtualization of networked storage resources |
US7818517B1 (en) * | 2004-03-26 | 2010-10-19 | Emc Corporation | Architecture for virtualization of networked storage resources |
US20050240558A1 (en) * | 2004-04-13 | 2005-10-27 | Reynaldo Gil | Virtual server operating on one or more client devices |
US20050278383A1 (en) * | 2004-05-28 | 2005-12-15 | Network Appliance, Inc. | Method and apparatus for keeping a file system client in a read-only name space of the file system |
EP1601163A1 (en) * | 2004-05-28 | 2005-11-30 | moxite GmbH | System and method for replication, integration, consolidation and mobilisation of data |
US7363366B2 (en) * | 2004-07-13 | 2008-04-22 | Teneros Inc. | Network traffic routing |
US20060015584A1 (en) * | 2004-07-13 | 2006-01-19 | Teneros, Inc. | Autonomous service appliance |
ES2318300T3 (en) * | 2004-08-12 | 2009-05-01 | Telecom Italia S.P.A. | SYSTEM, PROCEDURE AND DEVICE FOR UPDATING A SET OF DATA THROUGH A COMMUNICATIONS NETWORK. |
US8819213B2 (en) * | 2004-08-20 | 2014-08-26 | Extreme Networks, Inc. | System, method and apparatus for traffic mirror setup, service and security in communication networks |
US10887212B2 (en) * | 2004-08-20 | 2021-01-05 | Extreme Networks, Inc. | System, method and apparatus for traffic mirror setup, service and security in communication networks |
US20060161810A1 (en) * | 2004-08-25 | 2006-07-20 | Bao Bill Q | Remote replication |
GB2419701A (en) | 2004-10-29 | 2006-05-03 | Hewlett Packard Development Co | Virtual overlay infrastructure with dynamic control of mapping |
US20060143161A1 (en) * | 2004-12-29 | 2006-06-29 | Munro Jillian P | System and method for maintaining continuity of operations |
US7844691B2 (en) * | 2004-12-30 | 2010-11-30 | Xstor Systems, Inc. | Scalable distributed storage and delivery |
US7672979B1 (en) * | 2005-04-22 | 2010-03-02 | Symantec Operating Corporation | Backup and restore techniques using inconsistent state indicators |
US7669020B1 (en) * | 2005-05-02 | 2010-02-23 | Symantec Operating Corporation | Host-based backup for virtual machines |
JP4735068B2 (en) * | 2005-06-15 | 2011-07-27 | 沖電気工業株式会社 | COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND COMMUNICATION DEVICE |
US7480823B2 (en) * | 2005-06-24 | 2009-01-20 | Sun Microsystems, Inc. | In-memory replication of timing logic for use in failover within application server node clusters |
WO2007024479A2 (en) * | 2005-08-23 | 2007-03-01 | Mimosa Systems, Inc. | Enterprise service availability through identity preservation |
US8886551B2 (en) * | 2005-09-13 | 2014-11-11 | Ca, Inc. | Centralized job scheduling maturity model |
US8316226B1 (en) * | 2005-09-14 | 2012-11-20 | Juniper Networks, Inc. | Adaptive transition between layer three and layer four network tunnels |
US8364638B2 (en) * | 2005-09-15 | 2013-01-29 | Ca, Inc. | Automated filer technique for use in virtualized appliances and applications |
US7933987B2 (en) * | 2005-09-30 | 2011-04-26 | Lockheed Martin Corporation | Application of virtual servers to high availability and disaster recovery solutions |
US7577868B2 (en) * | 2005-09-30 | 2009-08-18 | Lockheed Martin Corporation | No data loss IT disaster recovery over extended distances |
US7702947B2 (en) * | 2005-11-29 | 2010-04-20 | Bea Systems, Inc. | System and method for enabling site failover in an application server environment |
US20070174429A1 (en) * | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment |
US8166112B2 (en) * | 2006-02-02 | 2012-04-24 | Sap Ag | Virtual mail storage for mail distributed using corporate distribution lists |
US20070192157A1 (en) * | 2006-02-15 | 2007-08-16 | Elizabeth Ann Gooch | Interactive system for managing, tracking and reporting work and staff performance in a business environment |
US8719816B2 (en) * | 2006-03-14 | 2014-05-06 | University Of Utah Research Foundation | Extendable framework for distributed applications and data |
US7809892B1 (en) * | 2006-04-03 | 2010-10-05 | American Megatrends Inc. | Asynchronous data replication |
US7792792B2 (en) * | 2006-05-22 | 2010-09-07 | Microsoft Corporation | Synchronizing structured web site contents |
US20070294319A1 (en) * | 2006-06-08 | 2007-12-20 | Emc Corporation | Method and apparatus for processing a database replica |
US20070288526A1 (en) * | 2006-06-08 | 2007-12-13 | Emc Corporation | Method and apparatus for processing a database replica |
US7487383B2 (en) | 2006-06-29 | 2009-02-03 | Dssdr, Llc | Data transfer and recovery process |
US7783956B2 (en) * | 2006-07-12 | 2010-08-24 | Cronera Systems Incorporated | Data recorder |
US20080033966A1 (en) * | 2006-08-04 | 2008-02-07 | Mark Frederick Wahl | System and method for recovery detection in a distributed directory service |
AU2007295949B2 (en) * | 2006-09-12 | 2009-08-06 | Adams Consulting Group Pty. Ltd. | Method system and apparatus for handling information |
WO2008067075A2 (en) * | 2006-10-20 | 2008-06-05 | Citrix Systems, Inc. | Systems and methods for responding to the occurrence of an event |
US8406123B2 (en) * | 2006-12-11 | 2013-03-26 | International Business Machines Corporation | Sip presence server failover |
US20080201360A1 (en) * | 2007-02-15 | 2008-08-21 | Mirapoint, Inc. | Locating Persistent Objects In A Network Of Servers |
US20080209145A1 (en) * | 2007-02-27 | 2008-08-28 | Shyamsundar Ranganathan | Techniques for asynchronous data replication |
US20080222296A1 (en) * | 2007-03-07 | 2008-09-11 | Lisa Ellen Lippincott | Distributed server architecture |
JP2008276379A (en) * | 2007-04-26 | 2008-11-13 | Hitachi Ltd | Storage system and path changeover method |
US9304819B2 (en) * | 2007-05-29 | 2016-04-05 | Red Hat, Inc. | Virtual deployment |
US7861111B2 (en) * | 2007-06-15 | 2010-12-28 | Savvis, Inc. | Shared data center disaster recovery systems and methods |
US20090019137A1 (en) * | 2007-07-10 | 2009-01-15 | Ragingwire Enterprise Solutions, Inc. | Method and remote system for creating a customized server infrastructure in real time |
US20090063274A1 (en) * | 2007-08-01 | 2009-03-05 | Dublin Iii Wilbur Leslie | System and method for targeted advertising and promotions using tabletop display devices |
JP5046863B2 (en) * | 2007-11-01 | 2012-10-10 | 株式会社日立製作所 | Information processing system and data management method |
US8498417B1 (en) * | 2007-12-27 | 2013-07-30 | Emc Corporation | Automation of coordination of encryption keys in a SAN based environment where an encryption engine, device management, and key management are not co-located |
JP5091704B2 (en) * | 2008-02-06 | 2012-12-05 | 株式会社日立製作所 | Storage configuration recovery method and storage management system |
US8386540B1 (en) * | 2008-03-31 | 2013-02-26 | Amazon Technologies, Inc. | Scalable relational database service |
US8151145B2 (en) | 2008-04-03 | 2012-04-03 | Oracle America, Inc. | Flow control timeout mechanism to detect PCI-express forward progress blockage |
US8135838B2 (en) * | 2008-04-08 | 2012-03-13 | Geminare Incorporated | System and method for providing data and application continuity in a computer system |
US8341625B2 (en) * | 2008-05-29 | 2012-12-25 | Red Hat, Inc. | Systems and methods for identification and management of cloud-based virtual machines |
US8943497B2 (en) * | 2008-05-29 | 2015-01-27 | Red Hat, Inc. | Managing subscriptions for cloud-based virtual machines |
US8117317B2 (en) * | 2008-12-31 | 2012-02-14 | Sap Ag | Systems and methods for integrating local systems with cloud computing resources |
IL197961A0 (en) * | 2009-04-05 | 2009-12-24 | Guy Shaked | Methods for effective processing of time series |
US9848045B2 (en) * | 2014-05-27 | 2017-12-19 | Commvault Systems, Inc. | Offline messaging between a repository storage operation cell and remote storage operation cells via an intermediary media agent |
-
2008
- 2008-04-08 US US12/099,367 patent/US8135838B2/en active Active
-
2009
- 2009-04-08 ES ES09729259T patent/ES2711348T3/en active Active
- 2009-04-08 WO PCT/CA2009/000454 patent/WO2009124390A1/en active Application Filing
- 2009-04-08 US US12/991,326 patent/US20110270949A1/en not_active Abandoned
- 2009-04-08 EP EP09729259.3A patent/EP2266253B1/en active Active
- 2009-04-08 CA CA2720082A patent/CA2720082C/en active Active
-
2010
- 2010-11-05 US US12/940,600 patent/US9002786B2/en active Active
-
2012
- 2012-02-02 US US13/364,394 patent/US9674268B2/en active Active
-
2015
- 2015-03-05 US US14/639,352 patent/US9860310B2/en active Active
-
2017
- 2017-06-05 US US15/614,494 patent/US10110667B2/en active Active
-
2018
- 2018-09-28 US US16/145,516 patent/US11070612B2/en active Active
-
2021
- 2021-07-20 US US17/381,153 patent/US11575736B2/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7225249B1 (en) * | 1997-09-26 | 2007-05-29 | Mci, Llc | Integrated systems for providing communications network management services and interactive generating invoice documents |
US6079020A (en) * | 1998-01-27 | 2000-06-20 | Vpnet Technologies, Inc. | Method and apparatus for managing a virtual private network |
US6304973B1 (en) * | 1998-08-06 | 2001-10-16 | Cryptek Secure Communications, Llc | Multi-level security network system |
US20030195950A1 (en) * | 1998-12-07 | 2003-10-16 | Magically, Inc., | Virtual desktop in a computer network |
US20010047406A1 (en) * | 2000-04-13 | 2001-11-29 | Netilla Networks Inc. | Apparatus and accompanying methods for providing, through a centralized server site, an integrated virtual office environment, remotely accessible via a network-connected web browser, with remote network monitoring and management capabilities |
US20060031365A1 (en) * | 2000-08-22 | 2006-02-09 | Timothy Kay | Method and system for using screen names to customize interactive agents |
US20020156905A1 (en) * | 2001-02-21 | 2002-10-24 | Boris Weissman | System for logging on to servers through a portal computer |
US20070067435A1 (en) * | 2003-10-08 | 2007-03-22 | Landis John A | Virtual data center that allocates and manages system resources across multiple nodes |
US20080034415A1 (en) * | 2006-08-03 | 2008-02-07 | Vinoo Chacko | Systems and methods for enabling assured records using fine grained auditing of virtual private network traffic |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110106756A1 (en) * | 2008-04-08 | 2011-05-05 | Geist Joshua B | System and method for providing data and application continuity in a computer system |
US9002786B2 (en) * | 2008-04-08 | 2015-04-07 | Joshua B. Geist | System and method for providing data and application continuity in a computer system |
US9674268B2 (en) | 2008-04-08 | 2017-06-06 | Geminare Incorporated | System and method for providing data and application continuity in a computer system |
US9860310B2 (en) | 2008-04-08 | 2018-01-02 | Geminare Inc. | System and method for providing data and application continuity in a computer system |
US10110667B2 (en) | 2008-04-08 | 2018-10-23 | Geminare Inc. | System and method for providing data and application continuity in a computer system |
US11070612B2 (en) | 2008-04-08 | 2021-07-20 | Geminare Inc. | System and method for providing data and application continuity in a computer system |
US11575736B2 (en) | 2008-04-08 | 2023-02-07 | Rps Canada Inc. | System and method for providing data and application continuity in a computer system |
Also Published As
Publication number | Publication date |
---|---|
US11575736B2 (en) | 2023-02-07 |
WO2009124390A1 (en) | 2009-10-15 |
US20150180961A1 (en) | 2015-06-25 |
US8135838B2 (en) | 2012-03-13 |
US10110667B2 (en) | 2018-10-23 |
US20110106756A1 (en) | 2011-05-05 |
US9002786B2 (en) | 2015-04-07 |
US20170272510A1 (en) | 2017-09-21 |
US9674268B2 (en) | 2017-06-06 |
US20210352135A1 (en) | 2021-11-11 |
CA2720082C (en) | 2018-02-20 |
US9860310B2 (en) | 2018-01-02 |
EP2266253A4 (en) | 2015-01-21 |
EP2266253B1 (en) | 2018-11-14 |
ES2711348T3 (en) | 2019-05-03 |
US11070612B2 (en) | 2021-07-20 |
US20090254642A1 (en) | 2009-10-08 |
US20120198023A1 (en) | 2012-08-02 |
EP2266253A1 (en) | 2010-12-29 |
CA2720082A1 (en) | 2009-10-15 |
US20190037009A1 (en) | 2019-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11575736B2 (en) | System and method for providing data and application continuity in a computer system | |
US10362032B2 (en) | Providing devices as a service | |
US9246979B2 (en) | Method and system for providing secure remote access and control | |
EP2036305B1 (en) | Communication network application activity monitoring and control | |
US20090210427A1 (en) | Secure Business Continuity and Disaster Recovery Platform for Multiple Protected Systems | |
US20130117554A1 (en) | User key management for the Secure Shell (SSH) | |
US20100257596A1 (en) | Method and apparatus for securely providing access and elevated rights for remote support | |
US20220368726A1 (en) | Privilege assurance of computer network environments | |
CN110875943A (en) | Security service delivery method and related device | |
JP2019087176A (en) | Monitoring system, monitoring method, and monitoring system program | |
Slagell et al. | 2015 XSEDE Federation Risk Assessment Overview | |
CN114710335A (en) | User authentication method, firewall and AD (AD) domain control server | |
Kaplan et al. | DataPower SOA appliance administration, deployment, and best practices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |