Blueprints for High Availability, Second Edition
With your company's reputation and profits at stake, downtime on your 24/7 web site is not an option, nor is poor application performance. Now in its second edition, this authoritative book provides you with the design blueprints to maximize your system availability.
Striking a balance between costs and benefits, the authors show you all of the elements of your computer system that can fail-as well as ways to assess their reliability and attain resiliency and high availability for each one. A unique feature is "Tales from the Field," a collection of true-to-life experiences that will help you avoid mistakes and deploy your system with confidence.
Learn how to design your system to limit the impact of such problems as computer viruses, natural disasters, or the corruption of critical files and discover how to:
* Implement effective backup-and-restore and tape management strategies
* Arrange disks and disk arrays to avoid downtime caused by inevitable failures
* Utilize technologies such as Storage Area Networks (SANs), Network Attached Storage (NAS), Virtualization, and clustering
* Achieve effective application recovery after any part of the system has failed
* Replicate critical data to remote systems across a network
HAL STERN is Vice President and Chief Technology Officer for the Services business unit of Sun Microsystems. He has worked on reliability and availability issues for some of the largest online trading and sports information sites as well as several network service providers.
Table of Contents
About the Authors.
Chapter 1: Introduction.
Chapter 2: What to Measure.
Chapter 3: The Value of Availability.
Chapter 4: The Politics of Availability.
Chapter 5: 20 Key High Availability Design Principles.
Chapter 6: Backups and Restores.
Chapter 7: Highly Available Data Management.
Chapter 8: SAN, NAS, and Virtualization.
Chapter 9: Networking.
Chapter 10: Data Centers and the Local Environment.
Chapter 11: People and Processes.
Chapter 12: Clients and Consumers.
Chapter 13: Application Design.
Chapter 14: Data and Web Services.
Chapter 15: Local Clustering and Failover.
Chapter 16: Failover Management and Issues.
Chapter 17: Failover Configurations.
Chapter 18: Data Replication.
Chapter 19: Virtual Machines and Resource Management.
Chapter 20: The Disaster Recovery Plan.
Chapter 21: A Resilient Enterprise*.
Chapter 22: A Brief Look Ahead.
Chapter 23: Parting Shots.
Sign up now »
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTOS Web Applications DeveloperNSW
- FTSenior Python DeveloperNSW
- FTLead Software EngineerSA
- FTQuality ManagerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTR&D EngineerSA
- FTTechnical Business AnalystNSW
Governance for all is more than an IT initiative or a goal written in a plan document; it’s a strategy that unites IT and business content owners to achieve their ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- Malware roundup: Tiffany's, Tibetans, iOs are targeted
- Schnucks wants federal court to handle data breach lawsuit
- Layered defenses largely fail to block exploits, says NSS
- Researchers warn of increased Zeus malware activity this year
- AusCERT 2013: Four dissenters to spur next year's security debates
- CITRIX SYNERGY ’13: Qureshi addresses the trend of ‘mojility’
- CITRIX SYNERGY ’13: IT needs to be empowered, says Sallam
- CITRIX SYNERGY ’13: Look beyond Cloud infrastructure, says Liang
- CITRIX SYNERGY ’13: Christiancen highlights the need for collaboration
- CITRIX SYNERGY ’13: Devices will change how people work, says Duursma
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia