Feeds

Double-Take disaster recovery takes to the clouds

Up sh*t creek? Try our paddle

HP ProLiant Gen8: Integrated lifecycle automation

Server systems can now be protected against failure with Double-Take replication to servers in Amazon's cloud.

Double-Take provides replication software to copy a local physical or virtual server's disk writes to a remote server so that, should the local server fail, the remote one can be started up with up-to-date data.

Dean Goodermote, Double-Take's CEO, says the company has added an Amazon Elastic Compute Cloud (EC2) backend as a target server, with local server disk writes replicated to it. He said: "It's not just the data and the files; it's the whole system. If the protected server fails, then you spin up a virtual server in Amazon's cloud."

The new product is called the Double-Take Cloud and enables customers to recover their data, applications, and operating systems from a failed server, and resume a workload from bare metal. They can run their recovered workloads on the Amazon Web Services platform while restoring the original workload at their production site.

Goodermote said: "There are huge cost savings for customers. They don't have to do anything regarding a second site." Naturally he reckons it's affordable by lower-tier customers, and customers with existing disaster recovery (DR) sites can use Amazon-cloud-based DR too, and stop spending to much money on their own. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.