1 Data Integrity: Backups and RAID Track SA-E AfCHIX workshop Blantyre, Malawi (Original slides by Phil Regnauld)
2 Introduction Keeping your data safe and reliable TM Backups Types of backups Strategy Tools RAID (Redundant Array of Independent Disks) Types of RAID What type to Use Disk Issues Hardware vs. Software RAID
3 Backup What is backup? backup is part of a larger domain called data security: integrity, protection: cryptography availability, redundancy: mirroring / RAID Why Backup? Software and Hardware failures are a common thing in the computer world. Any number of occurrences can cause loss of valuable data.
4 Backup Types of failures Power failures (software/hardware failure) Natural disasters (fire, flood) Security incidents (theft) Hardware Failures (disk crash) User error (rm -rf) Social issues (stolen data)
5 A common backup strategy Do nothing Not a computer program, but it is the most widely used backup strategy. There are no initial costs. There is no backup schedule to follow. Just say no. If something happens to your data, grin and bear it! If your time and your data is worth little to nothing, then Do nothing ' is the most suitable backup program for your computer. But beware, UNIX is a useful tool, you may find that within six months you have a collection of files that are valuable to you. Do nothing is the correct backup method for /usr/obj, /usr/src and other directory trees that can be exactly recreated by your computer but if in doubt, BACK IT UP!
6 Creating a backup strategy This is driven by many variables. Such as: How long can you be offline before your org disappears? Do you have legal responsibilities. Levels of backup planned: Daily Weekly Monthly Quarterly Semi-annually Annually How long must you keep the data? How do you restore the data? Does your restore need to be bare metal or just data? Bare metal, fast restore, long-term storage = more $$
7 UNIX Backup Tools Open Source options dd dump tar rsync Amanda Bacula (Apple s Time Machine uses this) (heavily used, very popular)
8 dd The lowest level type of backup Bit-for-bit copy For example: dd if=/dev/ad0s1a of=/backup/root Exact copy, but not efficient if you only use 100 MB on a 1 GB partition, you still end up with a backup of 1 GB compression helps, but you still spend time copying unused space Best for doing system recovery, or Copying media (CD-ROMs, DVDs, etc.)
9 Dump The traditional UNIX backup programs dump and restore. Works at inode level Takes backups of entire file systems, but only the used space It is unable to backup only part of a file system It does not backup across mount points (directory tree that spans more than one file system) Note: If you use dump on your / partition, you would not back up /home, /usr or or any other mounted FS. You must explicitly run dump for each FS.
10 Dump Dump can backup to several media local file remote file tape Dump can take incremental dumps only files that have changed are backup up
11 Remote dump It is possible to run dump over ssh for a secure transport: # /sbin/dump -0uan -f - /usr gzip -2 \ ssh \ dd of=/backups/dump-usr.gz Anyone asking, Where s the if parameter for dd?
12 Tar tar(1) (Tape Archive) dates back to Version 6 of AT&T UNIX (circa 1975). tar operates in cooperation with the file system; tar writes files and directories to tape or to a file. Just like with dump, one can use ssh to backup across the network: # tar -cfz - / (ssh remote; cat >/backups/backup-0425.tgz)
13 Examples using tar Let's take a backup of /etc where most configuration files reside, and place it in /home/ backups: # mkdir /home/backups # tar -cvf /home/backups/etc.tar /etc Note: The -c option to tar tells it to create an archive, -v specifies verbose output and -f specifies the file to be either written to or read from You'll see quite a lot of output as tar creates the archive at this point.
14 Examples using tar Now we check whether our archive has actually been created # cd /home/backups # ls This now show us a new file in this directory etc.tar If we now wanted to view the contents of this backup we can run # tar -tvf etc.tar
15 Examples using tar This will show you the contents of the etc directory as you backed it up. To actually restore and and unpack the contents that were backup up previously: # cd /home/backups # tar -xvf etc.tar
16 Examples using tar Notice that the restore actually creates a new directory etc where you are located not in /etc! This is because tar by default removes the leading '/' from the directories it has backed up in order not to overwrite the original files on your system when you choose to do a restore (a security consideration)
17 Rsync Another very powerful tool is rsync Rsync is very efficient: it only transfers files that have changed, and for those files, only the parts of the files that have changed This is very efficient for large trees with many files, some of them large Great for replicating a server off-site, or for doing quick backups for a migration.
18 Rsync Combined with the --link-dest option, it allows to do snapshot-like backups. --link-dest takes the newest backup, and makes links (which take 0 space) to the files that have not changed, and replicates those that have changed Allows for backup.0, backup.1, backup.2, backup.3, where backup.x is a COMPLETE copy of the replicated source, but the disk space used is ONLY the difference.
19 Rsync example script On remote backup host: # rm -rf /backups/etc.2 # mv /backups/etc.1 /backups/etc.2 # mv /backups/etc.0 /backups/etc.1 # mv /backups/etc /backups/etc.0 On machine to be backed up: # rsync -avhs \ --link-dest=etc.0 \ /etc/ host:/backups/etc/ This will backup only changed files from /etc/ to host:/etc/. Unchanged files are linked from etc.0
20 Other tools Rdiff-backup Unison Rnapshot
21 Other possible Backup methods Disk duplication Using the dd command mentioned earlier, it is possible to duplicate your entire disk block by block on another disk. However the source and destination disk should be identical in size or the destination must be bigger than the source. Another way of doing this is using RAID1 mirroring and hot swappable disks: make sure the RAID volume is rebuilt (OK) remove one of the two disks (call it backup ) replace backup with a fresh disk, let the RAID rebuild take backup home Remember: RAID or mirroring is not backup. An rm -rf / on your RAID set works very well!
22 Other possible Backup methods Disk duplication (2) instead of mirroring the two disks, make two filesystems, and use rsync to copy every night from disk 1 to disk 2 in case of user error (rm -rf), you can recover from disk 2, without having to pull the backup tapes out of the safe NOTE: IT DOES NOT HELP IF THE SERVER IS STOLEN OR THERE IS A FIRE, IF BOTH DISKS ARE IN THE MACHINE!
23 Networked backup systems There are a number of networked backup systems out there for backing up many servers to one or more backup servers, using tape drives or disk storage. In the Open Source world, two backup systems stand out: AMANDA - BACULA -
24 Amanda Advanced Maryland Automatic Network Disk Archiver Has been around for many years Networked backup Support incremental backups to disk, tape Can backup to a holding disk, flush to tape later Encrypted data flows and backup data Tape library / loader control and labeling Windows backup using a windows client All source code for Amanda is open source
25 Bacula Written by the people who invented AutoCAD Extremely popular and well-tested. Claims to be the most popular Open Source, Enterprise-level backup package around. Impressive documentation (400- pages!), including a developer's guide and tutorial Support incremental backups to disk, tape Complete SQL backend (MySQL, PgSQL, SQLite) Encrypted data flows using TLS (standard!) Tape library / loader control and labelling Native Windows client Good documented scenarios for specific backup cases, including complete bare metal restore
26 Bacula: Supported OS s The big three 1. Windows 2. Mac OS X 3. UNIX/Linux Are fully supported in Bacula. Additional, typical enterprise OS versions are supported as well (HP/UX, AIX, Solaris, etc.)
27 Reminder: Backup security 1. Take the disks / tapes / CDs off site! -> it does not help if there is a fire or if tapes are stolen 2. Consider encrypting the data on the disks / tapes / CDs -> what happens if the tapes are stolen? what happens when you throw them out?
28 RAID Redundant Array of Independent Disks Redundant Array of Inexpensive Disks RAID 0 RAID 1 RAID 3 RAID 5 RAID 6 RAID 1+0 or 10
29 Types of redundancy There are different levels of redundancy: none if a disk crashes, data is lost disk DATA RAID1 2 disks are mirrored, data is written to both disks at any time. One disk can be lost without losing data. DATA disk DATA disk
30 Types of redundancy RAID3, RAID5 data is distributed across several disks, data parity, used to rebuild a defective drive, is either placed on a dedicated drive (RAID3) or across all drives (RAID5): DATA disk DATA disk PARITY disk DATA DATA PARITY DATA PARITY PARITY DATA DATA DATA disk disk disk RAID3 RAID5
31 RAID 0 Striping Not technically RAID, but a RAID card is used to implement. Data is striped between disks. Improves I/O in most cases.
32 RAID 1 Mirroring Disks are mirrored, data is written to both disks at any time. One disk can be lost without losing data.
33 RAID 3 Striping +Dedicated Parity Data is written across multiple disks (striping). A dedicated disk is used for parity. Recovering from remaining disks plus parity disk. Lost parity disk = lost RAID array. Fast I/O.
34 RAID 5 Striping +Distributed Parity Data is written across multiple disks (striping). Parity is written across all disks. Most popular type of RAID after RAID 1. Can lose any 1 disk (set of 3) Has serious subtle issues!
35 RAID 6 Striping+Double Distributed Parity Data is written across multiple disks (striping). Parity is written across all disks multiple times. Fixes issues with RAID 5. Can lose any 2 disk (set of 4). Fixes issue with 1TB+ drives.
36 RAID 1+0 or 10 Mirrored Sets in a Striped Set Data is mirrored in multiple sets and sets are striped. Provides performance and fault tolerance. Can lose multiple disks as long as no one mirror loses all disks. Requires more disks for same storage space. Referred to as nested or hybrid RAID.
37 RAID Controller Failure What do you do? Use a hot spare RAID Card. Card must be identical. Cards must support hot -spare in BIOS. Generally connected by onboard data path, or via cable between both cards. Otherwise, at a minimum, buy 2xRAID card when building your array. If many arrays buy extra cards.
38 Fun Facts Due to quantum physics - Error rate = 100% for 1TB+ drive writes - RAID 6+ required to deal with this issue Enterprise Class Drives - Built to reduce vibration - Reduced vibration = More reliable - Cost a bit more, but essential in critical environments - May TB, 3Gb/s, 7200RPM, 32 MB Cache, 1.2 million hours MTBF SATA drives around USD $150/each. - 2TB, 6Gb/s, 7200RPM, 64 MB Cache, 1.2 million hours MTBF SATA drives around USD $250/each. Dedicated to save us from RAID 5
39 Hardware or software? In general, hardware RAID is more transparent to the user, and disk replacement is straightforward: remove defective disk install new disk RAID controller detects this and starts rebuilding on new disk (Note: real hardware RAID controllers, NOT BIOS RAID such as Promise)
40 Hardware or software? RAID3 and 5 can be complex to implement in software (in the OS), so hardware might be a better choice But what happens if the RAID controller dies? How does one recover if one does not have a spare controller? Consider having a spare controller for RAID3/RAID5/RAID6/RAID1+0 (Note: we mean real hardware RAID controllers, not BIOS software RAID such as Promise)
41 Hardware or software? RAID1 is easy to recover from and easier to implement in software (within the OS) worst case, all one needs is to skip a header at the beginning of each disk. FreeBSD and Linux have very good software RAID implementations nowadays In FreeBSD, at least 3 implementations: gmirror ccd gvinum (also RAID5, but not recommended) But you want to use ZFS
42 ZFS Incredibly flexible, incredibly powerful file system available natively in FreeBSD. For all practical purposes has no file system or file size limits. Implements functionality of RAID6 with RAID-Z2 option of double-parity striping in the ZFS volume manage. ZFS creates FS over Volume over Hardware. ZFS knows about the hardware layer. Volume recovery is fast! Only recover data, not empty areas of disk (RAID recovers all bits in an array.
43 References RAID Overview ZFS ZFS on FreeBSD ZFS on Linux (not completed)
Data Integrity: Backups and RAID Introduction Keeping your data safe and reliable TM Backups Types of backups Strategy Tools RAID (Redundant Array of Independent Disks) Types of RAID What type to Use Disk
System Administration Backups Why Backup? Problems will occur Hardware failure Accidental deletion Unwanted changes Backup Philosophies At mimimum back up what you can not replicate Your documents, important
Zmanda: Open Source Backup Chander Kant (firstname.lastname@example.org) CEO Zmanda, Inc. www.zmanda.com Zmanda: Open Source Backup 1 Agenda A Case for Open Source Backup Introduction to Amanda Amanda Enterprise Edition
System Backup Strategies Objective At the conclusion of this module, the student will be able to: describe the necessity for creating a backup regimen describe the advantages and disadvantages of the most
ZFS Backup Platform Senior Systems Analyst TalkTalk Group http://milek.blogspot.com The Problem Needed to add 100's new clients to backup But already run out of client licenses No spare capacity left (tapes,
Backup & Disaster Recovery Options Since businesses have become more dependent on their internal computing capability, they are increasingly concerned about recovering from equipment failure, human error,
Amanda The Open Source Backup & Archiving Software Ian Turner email@example.com 11 April 2006 Copyright 2006 Zmanda, Inc. All rights reserved. 1 Agenda What is Amanda? Amanda features Configuration Administration
REMOTE OFFICE BACKUP Remote offices present IT managers with a number of technical challenges. Often businesses use remote offices to expand into either new markets, or into new geographical areas. Many
Protecting your SQL database with Hybrid Cloud Backup and Recovery Session Code CL02 ARCserve True Hybrid Data Protection ARCserve Backup Data protection for complex environments Disk to Disk to-tape Disk
SOLUTIONS INC. Online Backup Solution Data loss is a nightmare Your data is growing exponentially 1MB of data is worth US$10,000 If you find yourself now in a situation where you have to deal with an explosion
Bacula The Network Backup Solution Presented by Kern Sibbald at FOSDEM 25 February 2007 in Brussels Bacula the Network Backup Tool for Linux, Mac, Unix and Windows Introduction Do you do backups? No Yes,
Bacula The leading Opensource Backup Solution OpenSource Project Bacula is a network backup solution, designed for *BSD, Linux, Mac OS X, Unix and Windows systems. Original project goals were to: backup
the Availability Digest Unix Backup and Recovery February 2007 Backing up is a pain. But it is the restore that counts. This is the message that Curtis Preston delivers in his book, Unix Backup and Recovery.
A review of BackupAssist within a Hyper-V Environment By Brien Posey Contents Introduction... 2 An Introduction to BackupAssist... 3 Testing Methodologies... 4 Test 1: Restore a Virtual Machine s Configuration...
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Preface Part I. Introduction 1. The Philosophy of Backup Champagne Backup on a Beer Budget Why Should I Read This Book? Why Back Up? Wax On, Wax Off: Finding a Balance 2. Backing It All Up Don't Skip This
Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer
CSE-E5430 Scalable Cloud Computing P Lecture 5 Keijo Heljanko Department of Computer Science School of Science Aalto University firstname.lastname@example.org 12.10-2015 1/34 Fault Tolerance Strategies for Storage
W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication
CS341: Operating System Lect 36: 1 st Nov 2014 Dr. A. Sahu Dept of Comp. Sc. & Engg. Indian Institute of Technology Guwahati File System & Device Drive Mass Storage Disk Structure Disk Arm Scheduling RAID
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Brian LaGoe, Systems Administrator Benjamin Jellema, Systems Administrator Eastern Michigan University 1 Backup & Recovery Goals and Challenges Traditional/EMU s Old Environment Avamar Key Features EMU
One Solution for Real-Time Data protection, Disaster Recovery & Migration Built-in standby virtualisation server Backs up every 15 minutes up to 12 servers On and Off-site Backup User initialed file, folder
Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery Objectives Develop a Backup Strategy Create Backup Files with tar Work with Magnetic Tapes Copy Data
NSA Cloud Suite Powered by BUSINESSES NEED TO MAXIMIZE PRODUCTIVITY, LOWER COSTS AND DECREASE RISKS EVERY DAY. In this age of information, this means you need your servers, desktops and applications up
Bacula The Network Backup Solution Presented by Kern Sibbald at BSDCan 17 May 2008 in Ottawa Bacula the Network Backup Tool for *BSD, Linux, Mac, Unix and Windows Open Source Project Bacula is a network
Disk drives are an integral part of any computing system. Disk drives are usually where the operating system and all of an enterprise or individual s data are stored. They are also one of the weakest links
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
CHAPTER 4 Introduction This chapter describes in general terms backing up a Cisco Unity system. When you back up a Cisco Unity server (and one or more Exchange servers) you need to consider the same issues
The Remote Data Backup & Restore Service from How does Work? is an agentless method of backup this means that you can backup as many PCs, servers, and applications as you wish, just by installing the TP-Client
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
Technical White Paper Disaster Recovery for Small Businesses A disaster recovery plan helps you understand what data is critical to your business operations and how to best protect it from unexpected failures.
Linux Software Raid Aug 2010 Mark A. Davis a What is RAID? Redundant Array of Inexpensive/Independent Drives It is a method of combining more than one hard drive into a logic unit for the purpose of: Increasing
Bacula The Network Backup Tool for *BSD, Linux, Mac, Unix and Windows It comes by night and sucks the vital essence from your computers. Spark support Open Source Project Bacula is a network backup solution,
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 13 Business Continuity Objectives Define environmental controls Describe the components of redundancy planning List disaster recovery
Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and
Quick Start Guide Copyright Statement Copyright Lone Star Software Corp. 1983-2013 ALL RIGHTS RESERVED. All content viewable or accessible from this guide is the sole property of Lone Star Software Corp.
RAID HARDWARE On board SATA RAID controller SATA RAID controller card RAID drive caddy (hot swappable) Anne Watson 1 RAID The word redundant means an unnecessary repetition. The word array means a lineup.
COMPARISON www.backupassist.com 2 What s new in BackupAssist version 6? There are three main reasons why you should upgrade to BackupAssist v6: 1. To keep up with the latest best practice backup standards
Protect your data, against any disaster, in a safe place. backupremotebackupremotebackupremoteb What makes FORTIKUP the ultimate backup solution 1. Components with robust features The core server Offsite
DataSet Online Backup Service Fully Automatic 100% Reliable Best Value For Your Money Data Loss is a Nightmare Your data is worth US $10,000.00 per MB! You have invested a lot of TIME, MONEY and ENERGY
Embedded MegaRAID SATA User's Guide Areas Covered Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview This chapter introduces
Xserve G5 Using the Hardware RAID PCI Card Instructions for using the software provided with the Hardware RAID PCI Card 2 Using the Hardware RAID PCI Card You use command-line tools to configure and manage
IBM ^ xseries ServeRAID Technology Reliability through RAID technology Executive Summary: t long ago, business-critical computing on industry-standard platforms was unheard of. Proprietary systems were
Usage of the mass storage system K. Rosbach PPS 19-Feb-2008 Disclaimer This is just a summary based on the information available online at http://dv-zeuthen.desy.de/services/dcache_osm/e717/index_eng.html
RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card. 1 Contents 3 RAID Utility User s Guide 3 Installing the RAID Software 4 Running
One Solution for Real-Time Data protection, Disaster Recovery & Migration Built-in standby virtualisation server Backs up every 15 minutes up to 12 servers On and Oﬀ-site Backup Exchange Mailbox & Message
Linux Filesystem Comparisons Jerry Feldman Boston Linux and Unix Presentation prepared in LibreOffice Impress Boston Linux and Unix 12/17/2014 Background My Background. I've worked as a computer programmer/software
Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:
November 2013 Webinar Backup & Replication! Agenda Company Profile TeraStation Model Overview Backup Options in TeraStation NovaStor Backup Software Simple NAS Backup Disaster Recovery Schemes with TeraStation
Bacula The Network Backup Solution Presented by Kern Sibbald at UKUUG 20 February 2008 in London Bacula the Network Backup Tool for *BSD, Linux, Mac, Unix and Windows Open Source Project Bacula is a network
RAID Utility User Guide Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card Contents 3 RAID Utility User Guide 3 The RAID Utility Window 4 Running RAID Utility
The George E. Brown, Jr. Network for Earthquake Engineering Simulation NEES Experimental Site Backup Plan at NEES@Lehigh Last Modified November 12, 2012 Acknowledgement: This work was supported primarily
A review of BackupAssist within a Hyper-V Environment By Brien Posey 2 Contents Introduction... 3 An Introduction to BackupAssist... 4 Testing Methodologies... 5 Test 1: Restore a Virtual Machine s Configuration...
Chapter 1 Storage Devices Summary Dependability is vital Suitable measures Latency how long to the first bit arrives Bandwidth/throughput how fast does stuff come through after the latency period Obvious
Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and
RAID Technology Overview HP Smart Array RAID Controllers HP Part Number: J6369-90050 Published: September 2007 Edition: 1 Copyright 2007 Hewlett-Packard Development Company L.P. Legal Notices Copyright
CHAPTER 9 System Backup and Restoration, Disk Cloning Learning Objectives After completing this lesson, you should be able to: i. Explain the method of doing data backup and restoration. ii. Describe the
SURVEY ON RAID Aishwarya Airen 1, Aarsh Pandit 2, Anshul Sogani 3 1,2,3 A.I.T.R, Indore. Abstract RAID stands for Redundant Array of Independent Disk that is a concept which provides an efficient way for
5-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual www.vipower.com Table of Contents 1. How the SteelVine (VPMP-75511R/VPMA-75511R) Operates... 1 1-1 SteelVine
For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.
MegaRAID SAS User's Guide Areas Covered Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview This chapter explains an overview
1. Context 1.111.5 2 Outline Contents 1.111.5 Maintain an effective data backup strategy Weight 3 Grant Parnell Linux Professional Institute Certification 102 Geoffrey Robertson email@example.com Nick Urbanik
data back strategy Linux Professional Institute Certification 102 Geoffrey Robertson firstname.lastname@example.org Nick Urbanik email@example.com This Licensed under GPL see section 14 2005 July Outline Databases Log files
9916 Brooklet Drive Houston, Texas 77099 Phone 832-327-0316 www.safinatechnolgies.com RAID Made Easy By Jon L. Jacobi, PCWorld What is RAID, why do you need it, and what are all those mode numbers that
DELL RAID PRIMER DELL PERC RAID CONTROLLERS Joe H. Trickey III Dell Storage RAID Product Marketing John Seward Dell Storage RAID Engineering http://www.dell.com/content/topics/topic.aspx/global/products/pvaul/top
Deploying a File Server Lesson 2 Skills Matrix Technology Skill Objective Domain Objective # Adding a New Disk Configure storage 1.5 File Server The most basic and the most universal type of application
Enterprise Edition Hardware Requirements For Blackbaud FundWare 6 to 100+ user environments Revised August 6 th, 2008 Table of Contents Supported Platforms... 3 6 to 25 User Environment... 4 26 to 35 User
The ultimate backup solution for your company Data loss is a nightmare (1) Your data are growing exponentially If you find yourself now in a situation where you have to deal with an explosion in the volume
Get Success in Passing Your Certification Exam at first attempt! Exam : E22-290 Title : EMC Data Domain Deduplication, Backup and Recovery Exam Version : DEMO 1.A customer has a Data Domain system with
An Affordable Commodity Network Attached Storage Solution for Biological Research Environments. Ari E. Berman, Ph.D. Senior Systems Engineer Buck Institute for Research on Aging firstname.lastname@example.org
Disks Outline Interfaces Geometry Add new disks Installation procedure Filesystem check Add a disk using sysinstall RAID GEOM Appendix SCSI & SAS 2 3 Disk Interfaces SCSI Small Computer Systems Interface
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
Backing up Data Why Should I Backup My Data? In these modern days more and more is saved on to your computer. Sometimes its important work you can't afford to lose, it could also be music, photos, videos
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
The Trouble with Backups Backups are central to any data protection strategy, but by some estimates more than half of all backups fail either in whole or in part. When you look at the reasons for why they
General Notes on Backups This document describes the procedures to backup the minimum set of files required to recover application and/or data files in the event of a hardware failure or data loss. These