Tivoli Storage Manager Explained

Size: px
Start display at page:

Download "Tivoli Storage Manager Explained"

Transcription

1 IBM Software Group Dave Cannon IBM Tivoli Storage Management Development Oxford University TSM Symposium 2003 Presentation Objectives Explain TSM behavior for selected operations Describe design goals and rationale Point out tradeoffs Provide guidance for administrators 2 1

2 Topics Basics Policy management Storage of objects Storage pools Database and recovery log 3 Basics TSM highlights Architecture Progressive backup 4 2

3 TSM Highlights Automated, policy-driven storage management Distributed, heterogeneous clients Centralized storage-management servers Support for numerous storage devices Comprehensive storage-management function B Backup/recovery B Archive/retrieve B Space management (HSM) B Data protection for specific applications B Application Programming Interface (API) B Content management 5 Architecture The server database holds information on users, administrators, policy, and the location of objects in the storage hierarchy Database TSM Client TSM Server Recovery Log Backup/archive clients HSM clients API applications Administrative clients The server recovery log maintains information about database transactions so can be committed or rolled back atomically, maintaining referential integrity in the database The storage hierarchy is a collection of devices in which the TSM server stores client objects Storage Hierarchy 6 3

4 Progressive Backup Initial backup Each object backed up only once B Reduces network traffic B Avoids unnecessary copies of same data B Reduces impact to client application Consolidates client data on few tapes B Reduce storage requirements B Improve restore performance Incremental backups File expiration Automated space reclamation Incremental backups 7 Policy Management Object-level policy management Constructs for policy management Inventory management Versioning and retention 8 4

5 Object-level Policy Management Not all data is the same B Some client nodes may be more critical or have different storage requirements than other nodes B Data types (backup, archive, space-managed) may need to be managed differently B Even for the same node and data type, some objects may have different requirements than others Manual management of stored data is expensive and error-prone TSM provides granular, automated mechanism for administering policy B Node specificity is achieved by assigning node to a policy domain B Data-type specificity is achieved through use of backup/archive copy groups and HSM policy B Object specificity is achieved by binding each object to a management class when that object is first stored on TSM Policy attributes for assigned management class can later be changed Backup objects can be rebound to a different management class 9 Constructs for Policy Management Application server nodes Workstation nodes Domain Management class Backup copy group Management class HSM Archive copy group policy Backup copy group Management class HSM Archive copy group policy Backup copy group HSM Archive copy group policy Domain Management class Backup copy group Management class HSM Archive copy group policy Backup copy group Management class HSM Archive copy group policy Backup copy group HSM Archive copy group policy Backup copy group Destination storage pool What if file in use? Enforce frequency? Back up only if modified? How many versions? How long to retain? Archive copy group Destination storage pool What if file in use? How long to retain? HSM policy Destination storage pool Backup required before migration? Days before migration? Migration technique? 10 5

6 Inventory Management TSM database contains an inventory (catalog) of "end-user-visible" attributes (node, file space, name, policy) for managed client objects Objects tracked in the inventory include Directories Files File system images Delta objects (subfiles) Each distinct object is assigned a unique 64-bit object identifier that is used for operations on that object Via expiration, TSM server administers policy rules for retention and versioning of client objects 11 Versioning of Backup Objects During backup B If no corresponding object on the server, new object becomes the active version B If corresponding object already exists on the server, new object becomes active version and the existing active version is deactivated B Extraneous versions are marked for expiration (base date set to 0) The number of allowed versions of a backup object is determined by the object's management class and copy group 12 6

7 Expiration of Objects Based on Versioning or Retention During backup, extraneous versions are marked for subsequent expiration based on B VEREXISTS (backup object that exists on client system) B VERDELETED (backup object deleted from client system) Once object has been marked for expiration, it cannot be queried from the client or restored, but database entries are not removed until expiration During expiration, object is deleted if previously marked for expiration or if retention period of the object has been exceeded B RETEXTRA (inactive backup object with other versions) B RETONLY (inactive backup object with no other versions) B RETVER (archive object) When do objects "disappear" from client's view? B During backup (extraneous versions) B During expiration (objects whose retention time has elapsed) 13 Example of Versioning and Retention VEREXISTS: 2 RETEXTRA: 30 Insertion Date Object Id State Expiration Base Date 12:00:00 01/01/ Inactive 0 14:00:00 01/01/ Inactive 08:00:00 01/02/ :00:00 01/02/ Active None Object 10 is an extraneous version and would be expired during the next expiration operation Object 20 would be eligible for expiration on 08:00:00 02/01/2002 (30 days after the base date) if it is not versioned before then 14 7

8 Delta-Base Versioning and Expiration 1. Backup of entire file 2. Backup of delta file F V1 (active) B D V1 (inactive) V2 (active) 3. Backup of delta file B D D V1 (marked for expiration) V2 (inactive) V3 (active) 4. Backup of delta file 5. Backup of entire file 6. Backup of delta file B D D V1 (marked for expiration) V2 (marked and expired) V3 (inactive) B D D V1 (marked for expiration) V3 (marked and expired) V4 (inactive) B D B V1 (marked and expired) V4 (marked and expired) V5 (inactive) D V4 (active) B V5 (active) D V6 (active) Example assumes VEREXISTS=2 Once base file is marked for expiration, it cannot be restored by itself Expiration does not delete base file with dependent deltas (deletion of base may not occur until next expiration process after deletion of last delta) 15 Storage of Objects File aggregation Movement of active files only? Data validation for stored objects Database regression and references to stored objects 16 8

9 What is File Aggregation? TSM server groups client objects into aggregates during backup or archive Information about individual client objects is maintained and used for certain operations (e.g., deletion, retrieval) For many operations, especially internal data transfer, entire aggregate can be processed as a single entity Aggregate size and number of client objects per aggregate can be controlled a Physical file (non-aggregate) with logical file a b c d e f Physical file (aggregate) with logical files b - f 17 Why Aggregate Files? Performance! Aggregates can be transferred without examining constituent files? Reduced overhead for database updates during transfer operations because storage information not updated for each logical file (also reduced database size) a d c Database b e abcde Database Without aggregation With aggregation Improved storage device performance because data transferred in larger units e d c b a abcde Without aggregation With aggregation 18 9

10 Logical File Storage and Retrieval 1. Send logical files l k j i h g f e d c b a Server 3. Store metadata Database Client Storage 2. Aggregate and store objects a b c d e f g h i j k l m Server 1. Request file h h 4. Send file h Client Retrieval 2. Get metadata Database 3. Perform partial-object retrieve a b c d e f g h i j k l m Offset of h 19 Reclaiming Space via Aggregate Reconstruction a b c d e f g h i j k l m Over time, logical files within an aggregate may be deleted, leaving wasted space a b c d e f g h i j k l m a b c g h l m a b c g h l m Remaining logical files are moved in "regions" Reconstructed aggregate contains all remaining logical files, without empty space 20 10

11 Problem: Invalidation of Copies Aggr X (Primary) a b c d Reconstruction Duplication Aggr X (Backup) a b c d X is available and recoverable from copy pool Aggr Y (Primary) a c d Copy does not match Y is not available and recoverable from copy pool Problem occurs because aggregates in different storage pools are not reconstructed at the same time Since Y not found in the copy pool, should it be backed up? 21 Solution: Aggregate Aliases Aggr X (Primary) a b c d Duplication Aggr X (Backup) a b c d X is available and recoverable from copy pool Reconstruction Aggr Y (Primary) a c d X and Y are aliases Y is available and recoverable from copy pool Aliases are aggregates that contain exactly the same files, but at different offsets New backup of Y not required because its alias X already exists in copy pool Files in X can be accessed if Y is unavailable Y can be restored from X 22 11

12 Benefits of Aggregate Aliases Copy Storage Pools Aggregation Availability/Recovery Aliases Performance Reconstruction Space Reclamation 23 Movement of Active Files Only? Movement of only active files during internal data-transfer operations (storage pool backup, migration) would eliminate many of the benefits of file aggregation B Server would need to examine contents of each aggregate to determine if it contains any active files B Aggregate could no longer be treated as a single entity during transfer operations B Some aggregates contain a mixture of active and inactive files Could transfer aggregates that contain at least one active file This could result in the transfer of many inactive files What about reorganizing aggregates to segregate the active and inactive files? B Ongoing file deactivation would leave inactive files in the "active" aggregates B Aggregate aliases would not work because there would be no correspondence between the aggregates in different storage pools If TSM were to provide an option to disable aggregation and allow movement of active files only, performance impact would be significant 24 12

13 Consistency of Database and Stored Objects TSM uses its database to locate objects in storage Data integrity requires that database information be consistent with data stored on storage pool volumes Inconsistency can occur for reasons such as B Hardware errors B Media damage or degradation B Storage pool volumes have been overwritten B Database has been regressed to an earlier version If inconsistencies are detected or suspected, consider B Are the errors permanent (errors written to media) or temporary (data written correctly, but errors during read)? B Are there duplicate copies of the data? Audit Volume can be used to check for consistency 25 Data Validation for Stored Objects TSM server embeds control information in stored data for integrity checking during client restore/retrieve, aggregate reconstruction, and Audit Volume Optionally, CRC checking can be enabled by storage pool B CRC is generated and stored with data as it is initially written to storage pool volume B During Audit Volume, CRC is generated and compared with stored CRC value Example: B Objects a, b, c, d, and e stored in aggregate X B Object f and g stored in aggregate Y B Non-aggregated object h Object header prepended before each object Frame headers and trailer for each physical file a b c c d e e f f g g h h Frame headers/trailer for aggregate X Frame headers/trailer for aggregate Y Frame headers/trailer for object h 26 13

14 Database Regression and References to Stored Objects 1. Database backup 2. Movement of files 3. Overwriting of storage DB Backup DB DB DB Backup DB Backup DB Backup a b c Storage pool volume Reclamation Storage pool volumes a b c d e f Storage pool volumes a b c 4. Database restore DB d e f Restore DB Backup Storage pool volumes a b c Regressing database to earlier point in time can lead to incorrect references for overwritten files Reuse delay ensures that empty sequential-access volumes are not overwritten for specified time (should match retention time of database backups) Use Audit Volume to detect inconsistencies B All random-access volumes B All reused/deleted volumes per volume history file 27 Storage Pools Why storage pools? Storage virtualization Random-access and sequential-access storage Copy storage pools Reclamation of offsite volumes 28 14

15 Why Storage Pools? Storage hierarchy exploits attributes of different device types B Performance B Concurrent access B Cost B Ability to remove media for remote storage Organization of storage into storage pools supports automatic, policybased management of stored objects Migration Backup Migration Copy Pool Reclamation Storage Pool Hierarchy 29 Storage Virtualization Object Name Object Attributes Object ID Object ID Offset/ Length Aggr ID ID Storage Pool Volume Location Inventory Aggregation Each object is assigned a surrogate key, a unique 64-bit object ID If file is aggregated, the object ID is mapped to one or more aggregates, each with a unique aggregate ID ID of aggregate or non-aggregated object is mapped to storage locations, each consisting of storage pool, volume, and position Name-location independence allows movement and duplication of objects in storage, transparent to user or application to which data belongs Storage 30 15

16 Random-access and Sequential-access Storage Storage pools are classified as random-access or sequential-access Separate code paths for managing pools, volumes, and stored objects Some operations are supported for only one access type B Fundamental differences (e.g., caching supported for random-access only) B To reduce development/maintenance effort (e.g., copy pools are sequentialaccess only) Some processes have very different algorithms depending on access type (e.g., to optimize mounting/positioning of sequential-access volumes) Random-access b a c a c b c a b b c Primary pools only Block allocation Policies B Migration parameters B Cache? B Simultaneous write to copy pool? B Maximum physical file size B CRC data? Sequential-access a b c Primary or copy pools Volume selection Policies B Migration/reclamation parameters B Collocation? B Simultaneous write to copy pool? B Maximum physical file size B CRC data? B Maximum scratch volumes B Reuse delay 31 File-level Duplication Using Copy Pools Supports incremental backup of storage pool data Existing copies still valid even if primary volume is reclaimed or data moved to another level in the hierarchy Primary and duplicate data can have different media/device types or capacities (short tapes) Device and platform independence (no reliance on system copy utilities) Copies can be made synchronously (during creation) or asynchronously (after creation) Performance of file-level duplication improved through file aggregation Availability/recoverability at various levels B Damaged physical file B Primary volume Migration Backup B Storage pool Migration Copy Pool Reclamation Storage Pool Hierarchy 32 16

17 Reclamation of Offsite Volumes Server location DB 1. Use database to identify remaining files on reclaimable volumes 3. Update database to reference new location of files Offsite location Reclaimable off-site volumes 5. Transport onsite 4. Transport offsite 2. Copy files from on-site location to new copy pool volumes Database backup Automated data transfer per policy (steps 1-3 above) Allows space reclamation of volumes at offsite locations without library Avoids risking data loss, which could occur if volume were brought onsite for traditional reclamation Can be coupled with reuse delay for protection if database is regressed 33 Database and Recovery Log Database objects and structure Database buffer pool Recovery log structure Recovery log utilization 34 17

18 Database Table Objects From the perspective of a TSM component that uses the database, table schema describes key and data columns for table Key columns Data columns Record Within the database, table structure is a balanced tree (B + -tree), whose nodes are stored as database pages Root Internal (non-leaf) node Leaf node 35 Database Bit-vector Objects From the perspective of a TSM component that uses the database, a bit-vector is a linear array of bits representing allocation of blocks on a disk storage pool volume Within the database, a bit-vector is stored as linked pages 36 18

19 Database Structure smp ic dir root page Bit-vector Table Object directory Image copy header (persistent information for DB backup) Space map page every 4MB (tracks allocated pages) 37 Database Buffer Pool empty empty empty Checkpoint Memory cache for DB Defers database updates Bufferwriter writes out DB pages making them again Checkpointer occasionally records all pages in the recovery log Latch Buffer writer Database Recovery Log 38 19

20 Recovery Log Structure Logical Segment 25 Segment 22 Segment 23 Segment 24 1 MB 1 MB 1 MB 1 MB Physical Segment 1 Segment 2 Segment 3 Segment 4 Segments: Log is composed of segments, each containing 256 4KB pages Logical segment numbers always increase Log will wrap Log Sequence Number (LSN): Log Sequence Number 64 Bits Logical segment number : 44 bits Logical segment number Page : 8 bits Offset: 12 bits Displayed as 3 dotted numbers: Page Offset 39 Log Modes and Location of Log Tail Active Records For normal mode, log tail is oldest of these Log Tail Log Head Oldest active transaction LSN for oldest page in buffer pool Last checkpoint record (there MUST be a checkpoint in the active record area) Start of currently running DB backup (log tail is pinned during backup) OR Oldest transaction since last DB backup if the log is in rollforward mode 40 20

21 Recovery Log Utilization empty empty DB Buffer Pool Log Tail empty Buffer writer Checkpoint DB Log Head Recovery Log Active Log Records Tortoise and hare problem: If the log head (hare) overtakes the tail (tortoise), the circular recovery log is full 41 Product Changes to Avoid Full Recovery Log Increased maximum recovery log size Cancellation of stalled sessions (Throughputdatathreshold / Throughputtimethreshold options) Enhanced database trigger Show Logpinned command to determine what is pinning the log Show Logstats and Show Logreset commands to determine log space consumed by checkpoint records Autonomic transaction throttling if recovery log approaches full condition 42 21

22 Conclusion TSM provides a comprehensive storage-management solution We've discussed some of the features that make this possible B Progressive backup B Object-level policy management B Aggregation of stored files for improved performance B Storage pools for hierarchical, policy-driven storage B Storage virtualization B Automated duplication of data and management of offsite volumes B Sophisticated database and recovery log 43 22

Understanding Disk Storage in Tivoli Storage Manager

Understanding Disk Storage in Tivoli Storage Manager Understanding Disk Storage in Tivoli Storage Manager Dave Cannon Tivoli Storage Manager Architect Oxford University TSM Symposium September 2005 Disclaimer Unless otherwise noted, functions and behavior

More information

IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM

IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM Note: Before you use this

More information

Tivoli Storage Manager Scalability Enhancements

Tivoli Storage Manager Scalability Enhancements Tivoli Storage Manager Scalability Enhancements Dave Cannon Tivoli Storage Management Development Oxford University TSM Symposium September 2001 Agenda Recent enhancements Planned enhancements Potential

More information

Data Deduplication and Tivoli Storage Manager

Data Deduplication and Tivoli Storage Manager Data Deduplication and Tivoli Storage Manager Dave Cannon Tivoli Storage Manager rchitect Oxford University TSM Symposium September 2007 Disclaimer This presentation describes potential future enhancements

More information

Tivoli Storage Manager Scalability: Past and Present. Dave Cannon IBM Storage Systems Division Tucson, Arizona

Tivoli Storage Manager Scalability: Past and Present. Dave Cannon IBM Storage Systems Division Tucson, Arizona Tivoli Storage Manager Scalability: Past and Present Dave Cannon IBM Storage Systems Division Tucson, Arizona 1 Scalability Contributors Servers Clients Performance Network DB Storage pools Hardware resources

More information

IBM Tivoli Storage Manager for Databases Version 7.1.4. Data Protection for Microsoft SQL Server Installation and User's Guide IBM

IBM Tivoli Storage Manager for Databases Version 7.1.4. Data Protection for Microsoft SQL Server Installation and User's Guide IBM IBM Tivoli Storage Manager for Databases Version 7.1.4 Data Protection for Microsoft SQL Server Installation and User's Guide IBM IBM Tivoli Storage Manager for Databases Version 7.1.4 Data Protection

More information

Tivoli Data Protection for NDMP

Tivoli Data Protection for NDMP Tivoli Data Protection for NDMP Dave Cannon Tivoli Storage Management Development Agenda and NDMP Overview of Tivoli Data Protection (TDP) for NDMP Planning the server configuration Server setup Performing

More information

IBM Tivoli Storage Manager for Databases Version 7.1.3. Data Protection for Microsoft SQL Server Installation and User's Guide IBM

IBM Tivoli Storage Manager for Databases Version 7.1.3. Data Protection for Microsoft SQL Server Installation and User's Guide IBM IBM Tivoli Storage Manager for Databases Version 7.1.3 Data Protection for Microsoft SQL Server Installation and User's Guide IBM IBM Tivoli Storage Manager for Databases Version 7.1.3 Data Protection

More information

IBM Tivoli Storage Manager

IBM Tivoli Storage Manager Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing

More information

Effective Planning and Use of TSM V6 Deduplication

Effective Planning and Use of TSM V6 Deduplication Effective Planning and Use of IBM Tivoli Storage Manager V6 Deduplication 08/17/12 1.0 Authors: Jason Basler Dan Wolfe Page 1 of 42 Document Location This is a snapshot of an on-line document. Paper copies

More information

Data Deduplication in Tivoli Storage Manager. Andrzej Bugowski 19-05-2011 Spała

Data Deduplication in Tivoli Storage Manager. Andrzej Bugowski 19-05-2011 Spała Data Deduplication in Tivoli Storage Manager Andrzej Bugowski 19-05-2011 Spała Agenda Tivoli Storage, IBM Software Group Deduplication concepts Data deduplication in TSM 6.1 Planning for data deduplication

More information

6. Backup and Recovery 6-1. DBA Certification Course. (Summer 2008) Recovery. Log Files. Backup. Recovery

6. Backup and Recovery 6-1. DBA Certification Course. (Summer 2008) Recovery. Log Files. Backup. Recovery 6. Backup and Recovery 6-1 DBA Certification Course (Summer 2008) Chapter 6: Backup and Recovery Log Files Backup Recovery 6. Backup and Recovery 6-2 Objectives After completing this chapter, you should

More information

EMC Backup Storage Solutions: The Value of EMC Disk Library with TSM

EMC Backup Storage Solutions: The Value of EMC Disk Library with TSM A Detailed Review Abstract The white paper describes how the EMC Disk Library can enhance an IBM Tivoli Storage Manager (TSM) environment. It describes TSM features, the demands these features place on

More information

IBM Tivoli Storage Manager 6

IBM Tivoli Storage Manager 6 Leverage next-generation data storage and recovery management capabilities IBM Tivoli Storage Manager 6 IBM Tivoli Storage Manager is the core component of an enterprise-wide data protection and recovery

More information

IBM Tivoli Storage Manager

IBM Tivoli Storage Manager IBM Storage Manager Leverage next-generation data storage and unified recovery management capabilities Highlights Help simplify the protection and management of your data, even as it continues to grow

More information

A Practical Guide to Backup and Recovery of IBM DB2 for Linux, UNIX and Windows in SAP Environments Part 1 Backup and Recovery Overview

A Practical Guide to Backup and Recovery of IBM DB2 for Linux, UNIX and Windows in SAP Environments Part 1 Backup and Recovery Overview A Practical Guide to Backup and Recovery of IBM DB2 for Linux, UNIX and Windows in SAP Environments Part 1 Backup and Recovery Overview Version 1.4 IBM SAP DB2 Center of Excellence Revision date: 20.08.2009

More information

Chapter 13 File and Database Systems

Chapter 13 File and Database Systems Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation

More information

Chapter 13 File and Database Systems

Chapter 13 File and Database Systems Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation

More information

ADSMConnect Agent for Oracle Backup on Sun Solaris Installation and User's Guide

ADSMConnect Agent for Oracle Backup on Sun Solaris Installation and User's Guide ADSTAR Distributed Storage Manager ADSMConnect Agent for Oracle Backup on Sun Solaris Installation and User's Guide IBM Version 2 SH26-4063-00 IBM ADSTAR Distributed Storage Manager ADSMConnect Agent

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

<Insert Picture Here> Oracle Secure Backup 10.3 Secure Your Data, Protect Your Budget

<Insert Picture Here> Oracle Secure Backup 10.3 Secure Your Data, Protect Your Budget Oracle Secure Backup 10.3 Secure Your Data, Protect Your Budget Program Agenda Oracle Secure Backup Overview What s New in Oracle Secure Backup 10.3 Ease of Management Data Protection:

More information

GNR TSM documentation Page 1of 10. TSM Documentation. Finn Henningsen - Sagitta Performance Systems Version 1.0 23 th April 2002

GNR TSM documentation Page 1of 10. TSM Documentation. Finn Henningsen - Sagitta Performance Systems Version 1.0 23 th April 2002 GNR TSM documentation Page 1of 10 Global.Name Registry TSM Documentation Finn Henningsen - Sagitta Performance Systems Version 1.0 23 th April 2002 GNR TSM documentation Page 2of 10 Review History Version

More information

Agenda. Overview Configuring the database for basic Backup and Recovery Backing up your database Restore and Recovery Operations Managing your backups

Agenda. Overview Configuring the database for basic Backup and Recovery Backing up your database Restore and Recovery Operations Managing your backups Agenda Overview Configuring the database for basic Backup and Recovery Backing up your database Restore and Recovery Operations Managing your backups Overview Backup and Recovery generally focuses on the

More information

Physical Data Organization

Physical Data Organization Physical Data Organization Database design using logical model of the database - appropriate level for users to focus on - user independence from implementation details Performance - other major factor

More information

Best Practices for Using BMC Recovery Manager to Meet Data Retention Regulations

Best Practices for Using BMC Recovery Manager to Meet Data Retention Regulations best practices WHITE PAPER Best Practices for Using BMC Recovery Manager to Meet Data Retention Regulations Table of Contents Introduction...1 Challenges in Retaining Data...1 Addressing the Challenges...1

More information

Data Protection for Exchange: A Look Under the Hood

Data Protection for Exchange: A Look Under the Hood Tivoli Storage Manager for Mail -- Data Protection for Exchange: A Look Under the Hood Del Hoobler Oxford University TSM Symposium 2007 September 2007 Disclaimer This presentation describes potential future

More information

Together with SAP MaxDB database tools, you can use third-party backup tools to backup and restore data. You can use third-party backup tools for the

Together with SAP MaxDB database tools, you can use third-party backup tools to backup and restore data. You can use third-party backup tools for the Together with SAP MaxDB database tools, you can use third-party backup tools to backup and restore data. You can use third-party backup tools for the following actions: Backing up to data carriers Complete

More information

How To Manage A Data Warehouse On A Database 2 For Linux And Unix

How To Manage A Data Warehouse On A Database 2 For Linux And Unix IBM Smart Analytics System IBMr Best Practices Building a Recovery Strategy for an IBM Smart Analytics System Data Warehouse Dale McInnis IBM DB2 Availability Architect Garrett Fitzsimons IBM Smart Analytics

More information

IBM Tivoli Storage Manager for Mail Version 7.1.4. Data Protection for Microsoft Exchange Server Installation and User's Guide IBM

IBM Tivoli Storage Manager for Mail Version 7.1.4. Data Protection for Microsoft Exchange Server Installation and User's Guide IBM IBM Tivoli Storage Manager for Mail Version 7.1.4 Data Protection for Microsoft Exchange Server Installation and User's Guide IBM IBM Tivoli Storage Manager for Mail Version 7.1.4 Data Protection for

More information

Effective Planning and Use of IBM Tivoli Storage Manager V6 and V7 Deduplication

Effective Planning and Use of IBM Tivoli Storage Manager V6 and V7 Deduplication Effective Planning and Use of IBM Tivoli Storage Manager V6 and V7 Deduplication 02/17/2015 2.1 Authors: Jason Basler Dan Wolfe Page 1 of 52 Document Location This is a snapshot of an on-line document.

More information

Data Deduplication and Tivoli Storage Manager

Data Deduplication and Tivoli Storage Manager Data Deduplication and Tivoli Storage Manager Dave annon Tivoli Storage Manager rchitect March 2009 Topics Tivoli Storage, IM Software Group Deduplication technology Data reduction and deduplication in

More information

IBM Tivoli Storage Manager for Linux Version 7.1.5. Installation Guide IBM

IBM Tivoli Storage Manager for Linux Version 7.1.5. Installation Guide IBM IBM Tivoli Storage Manager for Linux Version 7.1.5 Installation Guide IBM IBM Tivoli Storage Manager for Linux Version 7.1.5 Installation Guide IBM Note: Before you use this information and the product

More information

San Francisco Chapter. Information Systems Operations

San Francisco Chapter. Information Systems Operations Information Systems Operations Overview Operations as a part of General Computer Controls Key Areas of focus within Information Systems Operations Key operational risks Controls generally associated with

More information

IBM Tivoli Storage Manager

IBM Tivoli Storage Manager IBM Storage Manager Leverage next-generation data storage and unified recovery management capabilities Highlights Help simplify the protection and management of your data, even as it continues to grow

More information

Oracle 11g Database Administration

Oracle 11g Database Administration Oracle 11g Database Administration Part 1: Oracle 11g Administration Workshop I A. Exploring the Oracle Database Architecture 1. Oracle Database Architecture Overview 2. Interacting with an Oracle Database

More information

Beyond backup toward storage management

Beyond backup toward storage management Beyond backup toward storage management by M. Kaczmarski T. Jiang D. A. Pease The IBM Tivoli Storage Manager, a client/server product providing backup, archive, and space management functions in heterogeneous

More information

Enterprise Backup and Restore technology and solutions

Enterprise Backup and Restore technology and solutions Enterprise Backup and Restore technology and solutions LESSON VII Veselin Petrunov Backup and Restore team / Deep Technical Support HP Bulgaria Global Delivery Hub Global Operations Center November, 2013

More information

Database Administration

Database Administration Unified CCE, page 1 Historical Data, page 2 Tool, page 3 Database Sizing Estimator Tool, page 11 Administration & Data Server with Historical Data Server Setup, page 14 Database Size Monitoring, page 15

More information

Have a Plan of ATTACK. Not a panic attack. 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement

Have a Plan of ATTACK. Not a panic attack. 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement IBM Software Group Have a Plan of ATTACK Not a panic attack 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement Abstract This session will show the difference between Business

More information

DB2 backup and recovery

DB2 backup and recovery DB2 backup and recovery IBM Information Management Cloud Computing Center of Competence IBM Canada Lab 1 2011 IBM Corporation Agenda Backup and recovery overview Database logging Backup Recovery 2 2011

More information

Best Practices. Using IBM InfoSphere Optim High Performance Unload as part of a Recovery Strategy. IBM Smart Analytics System

Best Practices. Using IBM InfoSphere Optim High Performance Unload as part of a Recovery Strategy. IBM Smart Analytics System IBM Smart Analytics System Best Practices Using IBM InfoSphere Optim High Performance Unload as part of a Recovery Strategy Garrett Fitzsimons IBM Data Warehouse Best Practices Specialist Konrad Emanowicz

More information

Backup and Recovery 1

Backup and Recovery 1 Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup

More information

VERITAS Business Solutions. for DB2

VERITAS Business Solutions. for DB2 VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................

More information

IBM Tivoli Storage Manager for Virtual Environments Version 7.1.6. Data Protection for VMware User's Guide IBM

IBM Tivoli Storage Manager for Virtual Environments Version 7.1.6. Data Protection for VMware User's Guide IBM IBM Tivoli Storage Manager for Virtual Environments Version 7.1.6 Data Protection for VMware User's Guide IBM IBM Tivoli Storage Manager for Virtual Environments Version 7.1.6 Data Protection for VMware

More information

Database System Architecture & System Catalog Instructor: Mourad Benchikh Text Books: Elmasri & Navathe Chap. 17 Silberschatz & Korth Chap.

Database System Architecture & System Catalog Instructor: Mourad Benchikh Text Books: Elmasri & Navathe Chap. 17 Silberschatz & Korth Chap. Database System Architecture & System Catalog Instructor: Mourad Benchikh Text Books: Elmasri & Navathe Chap. 17 Silberschatz & Korth Chap. 1 Oracle9i Documentation First-Semester 1427-1428 Definitions

More information

IBM Tivoli Storage Manager for Enterprise Resource Planning Version 6.4.1. Data Protection for SAP HANA Installation and User's Guide

IBM Tivoli Storage Manager for Enterprise Resource Planning Version 6.4.1. Data Protection for SAP HANA Installation and User's Guide IBM Tivoli Storage Manager for Enterprise Resource Planning Version 6.4.1 Data Protection for SAP HANA Installation and User's Guide IBM Tivoli Storage Manager for Enterprise Resource Planning Version

More information

Backup with synchronization/ replication

Backup with synchronization/ replication Backup with synchronization/ replication Peer-to-peer synchronization and replication software can augment and simplify existing data backup and retrieval systems. BY PAUL MARSALA May, 2001 According to

More information

Information Systems. Computer Science Department ETH Zurich Spring 2012

Information Systems. Computer Science Department ETH Zurich Spring 2012 Information Systems Computer Science Department ETH Zurich Spring 2012 Lecture VI: Transaction Management (Recovery Manager) Recovery Manager ETH Zurich, Spring 2012 Information Systems 3 Failure Recovery

More information

Adaptive Server Enterprise

Adaptive Server Enterprise Using Backup Server with IBM Tivoli Storage Manager Adaptive Server Enterprise 15.7 DOCUMENT ID: DC01176-01-1570-01 LAST REVISED: September 2011 Copyright 2011 by Sybase, Inc. All rights reserved. This

More information

EMC Disk Library with EMC Data Domain Deployment Scenario

EMC Disk Library with EMC Data Domain Deployment Scenario EMC Disk Library with EMC Data Domain Deployment Scenario Best Practices Planning Abstract This white paper is an overview of the EMC Disk Library with EMC Data Domain deduplication storage system deployment

More information

IBM Tivoli Storage Manager for Microsoft SharePoint

IBM Tivoli Storage Manager for Microsoft SharePoint IBM Tivoli Storage Manager for Microsoft SharePoint 2007 IBM Corporation What is SharePoint? 2007 IBM Corporation What is SharePoint? What is SharePoint? Web-based workplace for online collaboration MS

More information

Versity 2013. All rights reserved.

Versity 2013. All rights reserved. From the only independent developer of large scale archival storage systems, the Versity Storage Manager brings enterpriseclass storage virtualization to the Linux platform. Based on Open Source technology,

More information

Oracle. Brief Course Content This course can be done in modular form as per the detail below. ORA-1 Oracle Database 10g: SQL 4 Weeks 4000/-

Oracle. Brief Course Content This course can be done in modular form as per the detail below. ORA-1 Oracle Database 10g: SQL 4 Weeks 4000/- Oracle Objective: Oracle has many advantages and features that makes it popular and thereby makes it as the world's largest enterprise software company. Oracle is used for almost all large application

More information

Database Management. Chapter Objectives

Database Management. Chapter Objectives 3 Database Management Chapter Objectives When actually using a database, administrative processes maintaining data integrity and security, recovery from failures, etc. are required. A database management

More information

Planning for a Disaster Using Tivoli Storage Manager. Laura G. Buckley Storage Solutions Specialists, Inc.

Planning for a Disaster Using Tivoli Storage Manager. Laura G. Buckley Storage Solutions Specialists, Inc. Planning for a Disaster Using Tivoli Storage Manager Laura G. Buckley Storage Solutions Specialists, Inc. Objective Discuss how DRM assists in the recovery of the ADSM server and clients in a disaster

More information

The Classical Architecture. Storage 1 / 36

The Classical Architecture. Storage 1 / 36 1 / 36 The Problem Application Data? Filesystem Logical Drive Physical Drive 2 / 36 Requirements There are different classes of requirements: Data Independence application is shielded from physical storage

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

XenData Archive Series Software Technical Overview

XenData Archive Series Software Technical Overview XenData White Paper XenData Archive Series Software Technical Overview Advanced and Video Editions, Version 4.0 December 2006 XenData Archive Series software manages digital assets on data tape and magnetic

More information

SAP HANA Backup and Recovery (Overview, SPS08)

SAP HANA Backup and Recovery (Overview, SPS08) SAP HANA Backup and Recovery (Overview, SPS08) Andrea Kristen, SAP HANA Product Management October 2014 Disclaimer This presentation outlines our general product direction and should not be relied on in

More information

Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer

Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer ESG Lab Review Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer Abstract: This ESG Lab review documents hands-on testing of consolidated management and automated data

More information

Patterns of Information Management

Patterns of Information Management PATTERNS OF MANAGEMENT Patterns of Information Management Making the right choices for your organization s information Summary of Patterns Mandy Chessell and Harald Smith Copyright 2011, 2012 by Mandy

More information

Data Recovery and High Availability Guide and Reference

Data Recovery and High Availability Guide and Reference IBM DB2 Universal Database Data Recovery and High Availability Guide and Reference Version 8 SC09-4831-00 IBM DB2 Universal Database Data Recovery and High Availability Guide and Reference Version 8 SC09-4831-00

More information

IBM Tivoli Storage Manager Version 7.1. Client Messages and Application Programming Interface Return Codes

IBM Tivoli Storage Manager Version 7.1. Client Messages and Application Programming Interface Return Codes IBM Tivoli Storage Manager Version 7.1 Client Messages and Application Programming Interface Return Codes IBM Tivoli Storage Manager Version 7.1 Client Messages and Application Programming Interface Return

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Keys to Optimizing Your Backup Environment: Tivoli Storage Manager

Keys to Optimizing Your Backup Environment: Tivoli Storage Manager Keys to Optimizing Your Backup Environment: Tivoli Storage Manager John Merryman GlassHouse Technologies, Inc. Introduction Audience Profile Storage Management Interdependence Backup Pain Points Architecture

More information

EMC CLARiiON Backup Storage Solutions: Backup-to-Disk Guide with IBM Tivoli Storage Manager

EMC CLARiiON Backup Storage Solutions: Backup-to-Disk Guide with IBM Tivoli Storage Manager EMC CLARiiON Backup Storage Solutions: Backup-to-Disk Guide with Best Practices Planning Abstract This white paper describes how to configure EMC CLARiiON CX Series storage systems with IBM Tivoli Storage

More information

EMC: The Virtual Data Center

EMC: The Virtual Data Center EMC: The Virtual Data Center Dejan Živanovi EMC Technology Solution Group Sr. Technology Consultant High-End platforms & Business Continuity 1 Business Challenges Data growing at 70% annually 80% are files

More information

Distributed Data Management

Distributed Data Management Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that

More information

How To Backup At Qmul

How To Backup At Qmul TSM Backup and Restore Strategy and Overview (Draft) Prepared by: Trevor Leigh Version: 1.1 Page 1 of 13 Document Owner: Name/Position Steve Wicks, Servers & Storage Manager Revision History Version Description

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance 7.0 Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Loss Business Impact... 6 2.2 Recovery Tools... 8 3 Manual Recovery Method...

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery

More information

Tivoli Continuous Data Protection for Files

Tivoli Continuous Data Protection for Files TotalStorage Tivoli Continuous Data Protection Files Technical overview 2005 IBM Corporation IBM Tivoli Continuous Data Protection Files IBM TotalStorage Open Software Family Taking steps toward an On

More information

3 Setting up Databases on a Microsoft SQL 7.0 Server

3 Setting up Databases on a Microsoft SQL 7.0 Server 3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other

More information

Recovery Principles in MySQL Cluster 5.1

Recovery Principles in MySQL Cluster 5.1 Recovery Principles in MySQL Cluster 5.1 Mikael Ronström Senior Software Architect MySQL AB 1 Outline of Talk Introduction of MySQL Cluster in version 4.1 and 5.0 Discussion of requirements for MySQL Cluster

More information

Avid. Avid Interplay Web Services. Version 2.0

Avid. Avid Interplay Web Services. Version 2.0 Avid Avid Interplay Web Services Version 2.0 Table of Contents Overview... 1 Interplay Web Services Functionality... 2 Asset Management... 2 Workflow Enhancement... 3 Infrastructure... 3 Folder Listing...

More information

Outline. Failure Types

Outline. Failure Types Outline Database Management and Tuning Johann Gamper Free University of Bozen-Bolzano Faculty of Computer Science IDSE Unit 11 1 2 Conclusion Acknowledgements: The slides are provided by Nikolaus Augsten

More information

TSM for Advanced Copy Services: Today and Tomorrow

TSM for Advanced Copy Services: Today and Tomorrow TSM for Copy Services and TSM for Advanced Copy Services: Today and Tomorrow Del Hoobler Oxford University TSM Symposium 2007 September 2007 Disclaimer This presentation describes potential future enhancements

More information

SAP HANA - Main Memory Technology: A Challenge for Development of Business Applications. Jürgen Primsch, SAP AG July 2011

SAP HANA - Main Memory Technology: A Challenge for Development of Business Applications. Jürgen Primsch, SAP AG July 2011 SAP HANA - Main Memory Technology: A Challenge for Development of Business Applications Jürgen Primsch, SAP AG July 2011 Why In-Memory? Information at the Speed of Thought Imagine access to business data,

More information

LBNC and IBM Corporation 2009. Document: LBNC-Install.doc Date: 06.03.2009 Path: D:\Doc\EPFL\LNBC\LBNC-Install.doc Version: V1.0

LBNC and IBM Corporation 2009. Document: LBNC-Install.doc Date: 06.03.2009 Path: D:\Doc\EPFL\LNBC\LBNC-Install.doc Version: V1.0 LBNC Compute Cluster Installation and Configuration Author: Markus Baertschi Owner: Markus Baertschi Customer: LBNC Subject: LBNC Compute Cluster Installation and Configuration Page 1 of 14 Contents 1.

More information

Oracle Database 10g: Backup and Recovery 1-2

Oracle Database 10g: Backup and Recovery 1-2 Oracle Database 10g: Backup and Recovery 1-2 Oracle Database 10g: Backup and Recovery 1-3 What Is Backup and Recovery? The phrase backup and recovery refers to the strategies and techniques that are employed

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

Exam Number/Code : 070-450. Exam Name: Name: PRO:MS SQL Serv. 08,Design,Optimize, and Maintain DB Admin Solu. Version : Demo. http://cert24.

Exam Number/Code : 070-450. Exam Name: Name: PRO:MS SQL Serv. 08,Design,Optimize, and Maintain DB Admin Solu. Version : Demo. http://cert24. Exam Number/Code : 070-450 Exam Name: Name: PRO:MS SQL Serv 08,Design,Optimize, and Maintain DB Admin Solu Version : Demo http://cert24.com/ QUESTION 1 A database is included by the instance, and a table

More information

Performance Counters. Microsoft SQL. Technical Data Sheet. Overview:

Performance Counters. Microsoft SQL. Technical Data Sheet. Overview: Performance Counters Technical Data Sheet Microsoft SQL Overview: Key Features and Benefits: Key Definitions: Performance counters are used by the Operations Management Architecture (OMA) to collect data

More information

IBM Tivoli Storage Manager Suite for Unified Recovery

IBM Tivoli Storage Manager Suite for Unified Recovery IBM Storage Manager Suite for Unified Recovery A bundled offering delivering comprehensive data protection with simplified licensing and management Highlights Simplify procurement and deployment with per-terabyte

More information

SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery

SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery by Diane Beeler, Consulting Product Marketing Manager, BMC Software and Mati Pitkanen, SQL-BackTrack for Oracle Product Manager, BMC Software

More information

QStar White Paper. Tiered Storage

QStar White Paper. Tiered Storage QStar White Paper Tiered Storage QStar White Paper Tiered Storage Table of Contents Introduction 1 The Solution 1 QStar Solution 3 Conclusion 4 Copyright 2007 QStar Technologies, Inc. QStar White Paper

More information

File-System Implementation

File-System Implementation File-System Implementation 11 CHAPTER In this chapter we discuss various methods for storing information on secondary storage. The basic issues are device directory, free space management, and space allocation

More information

DB2 Backup and Recovery

DB2 Backup and Recovery Information Management Technology Ecosystem DB2 Backup and Recovery Information Management Agenda Why back up data Basic backup and recovery concept Logging Log file states Logging types Infinite logging

More information

DB2 9 DBA exam 731 prep, Part 6: High availability: Backup and recovery

DB2 9 DBA exam 731 prep, Part 6: High availability: Backup and recovery DB2 9 DBA exam 731 prep, Part 6: High availability: Backup and recovery Skill Level: Intermediate Sylvia Qi (sylviaq@ca.ibm.com) WebSphere Application Server Function Verification Tester IBM Toronto Lab

More information

EnterpriseBACKUP OpenVMS centric cross platform backup and media management

EnterpriseBACKUP OpenVMS centric cross platform backup and media management EnterpriseBACKUP OpenVMS centric cross platform backup and media management ISE Product Overview With so much crucial data generated and stored electronically in today s IT environment, complete data protection

More information

Understanding Connected DataProtector

Understanding Connected DataProtector Understanding Connected DataProtector Version 7.1 Includes Data Center Information 2003 Connected Corporation. All Rights Reserved. Connected, Connected DataProtector, Connected EmailOptimizer, iroam,

More information

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange CA RECOVERY MANAGEMENT R12.5 BEST PRACTICES CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering

More information

Recovery and the ACID properties CMPUT 391: Implementing Durability Recovery Manager Atomicity Durability

Recovery and the ACID properties CMPUT 391: Implementing Durability Recovery Manager Atomicity Durability Database Management Systems Winter 2004 CMPUT 391: Implementing Durability Dr. Osmar R. Zaïane University of Alberta Lecture 9 Chapter 25 of Textbook Based on slides by Lewis, Bernstein and Kifer. University

More information

REMOTE BACKUP-WHY SO VITAL?

REMOTE BACKUP-WHY SO VITAL? REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote

More information

Chapter 11 I/O Management and Disk Scheduling

Chapter 11 I/O Management and Disk Scheduling Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization

More information

Compliance Procedure

Compliance Procedure Old Dominion University Compliance Procedure Title: Reference Number: System Backups and Restoration (Non- Db) Procedure 3.4.2.2 Purpose The purpose of this compliance procedure is to define the methods

More information

Oracle Backup and Recover 101. Osborne Press ISBN 0-07-219461-8

Oracle Backup and Recover 101. Osborne Press ISBN 0-07-219461-8 Oracle Backup and Recover 101 Osborne Press ISBN 0-07-219461-8 First Printing Personal Note from the Authors Thanks for your purchase of our book Oracle Backup & Recovery 101. In our attempt to provide

More information

Trends in Enterprise Backup Deduplication

Trends in Enterprise Backup Deduplication Trends in Enterprise Backup Deduplication Shankar Balasubramanian Architect, EMC 1 Outline Protection Storage Deduplication Basics CPU-centric Deduplication: SISL (Stream-Informed Segment Layout) Data

More information

Directory Backup and Restore

Directory Backup and Restore Directory Backup and Restore Overview Active Directory is backed up as part of system state, a collection of system components that depend on each other. You must backup and restore system state components

More information