Many companies now realize that logical and local protection is no longer enough to guarantee that the organization will continue to be accessible. Just as the levels of protection for logical and component failures have grown, so has the reliance on the information systems being protected. While most devices have begun to build in redundancy there are other technologies such as application clustering technologies that can protect against a failure of a component while continuing to enable applications to be available. Another threat that may result in unavailable may be contributed to component failure. Performing regularly scheduled backups of the organizations data typically protects against logical types of data loss.
#Veritas volume manager administrator guide software#
Logical corruption, or loss of data due to threats such as virus and software bugs, can be protected by ensuring there is a viable copy of data available at all times. There are many threats that organizations face today when it comes to the reliability and viability of their data. As companies become more reliant on critical information systems, the potential disruption to the business due to a loss of data becomes even greater. Information systems, which once aided a company in doing business, have now become the business itself. In today’s business environment, reliance on information processing systems continues to grow on an almost daily basis.
![veritas volume manager administrator guide veritas volume manager administrator guide](https://docs.oracle.com/cd/E19680-01/html/821-1557/figures/SCSIJbodDisNfromSExtraHBA.png)
![veritas volume manager administrator guide veritas volume manager administrator guide](https://flylib.com/books/4/313/1/html/2/files/03fig27.jpg)
INTRODUCTION: REPLICATION AND DISASTER RECOVERY PLANNING This document is aimed at providing a solid architectural and technical overview of VERITAS Volume Manager’s IP option, VERITAS Volume Replicator.