Highest Level of Protection based on a simple Principle
Step 1: Initial Copy
During initial setup, all data from the production system is copied to a secondary system (mirror system) in a LAN or WAN setting. This system can be located in another building, another city, another country or on another continent. Proprietary data transmission techniques based on standard network protocols optimize the data transfer.
Step 2: Updating Changes
All changes in the production system are being identified and transferred directly into the time-funnel of the mirror system. With the optimized data transmission techniques, even limited WAN links will be used to maximum efficiently.
Step 3: Time-Funnel
Transactions on the production system reside in the time-funnel on the mirror system for a certain amount of time, which can be set to any value desired. The time-funnel value can be adjusted during production– just as needed. Only after the end of the defined period, the transactions in the time funnel are applied to the mirror system.
Step 4: Fail-Over
In the case of an error on the production system, time can literally be turned back to any time-stamp prior to the occurrence of the error. Within a few minutes, in which the time-funnel is “emptied” to the desired point-in-time, the last consistent set of data is used for running production on the mirror system. The host name and IP-address are automatically failing over to the mirror system, so that application server and users are able to reconnect to the mirror system without any changes.
Step 5: Fail-Back to Production System
The crashed production system is rebuilt while production is running on the former mirror system (which is now acting as the current production). Normal operation is reestablished by changing roles at the push of a button.