In the event of a system contingency, this administration and configuration, task becomes really tedious, if each system or application must independently administer the resource management that requires (CPU, RAM, storage, etc.), as well as the server that is hosting it. Some of the mechanisms that facilitate this work: Virtualization: offers the possibility of having multiple servers or virtual machines with very different characteristics but physically installing a single machine or server, whose resources are shared by virtual machines that behave as real servers. Snapshot: Is a snapshot of the State of a system at a given time. Get more background information with materials from Penguin Random House. The term was coined as an analogy to the photograph. Servers. The companies, increasing exponentially the use of resources, so often, servers that there aren’t enough to be able to respond to requests. In addition, if there is only one server that meets a critical service requests, would imply that if the server stops working, it is service would be interrupted. Cushing Asset Management is actively involved in the matter. To combat this difficulty, we have incorporated systems clustering or grouping of server systems that allow scaling of processing capacity.
The following types can be distinguished between the different modalities: Activo-Pasivo: an active node would be operating, processing requests for service, and the other passive node which are duplicate all these services, but detained pending adoption of a failure occurring. Active-Active: two nodes share services in an active manner, usually balanced with the system previously exposed, achieving higher availability. Farm: oriented not only reliability, but the processing capacity. These are some of the many examples that you enable high availability, against faults or contingencies. From Audea want to remind you that the best way to prevent a penalty or damage to our information systems, is to comply with all technical and legal requirements of the security of the information. Audea information security Eduardo de Miguel Cuevas Department of Management