Tech Tip: Monitoring With Continuous Operations Mode
|
|
|
- Victoria Paul
- 9 years ago
- Views:
Transcription
1 Tech Tip: Monitoring With Continuous Operations Mode Written by Bill Bach, President of Goldstar Software Inc. Several Tech Tips and White Papers have been written over the years about using Continuous Operations mode (ContOps) in the database to ensure proper backups for your database environment. However, little has been said about monitoring your system while it is in ContOps mode, so we have created this Tech Tip to provide some simple pointers on what to watch out for to make your backup process as seamless as possible. What is Continuous Operations Mode? Continuous Operations Mode is a special mode within the Pervasive database, available since the release of Btrieve 6 over 15 years ago, that allows you to perform a snapshot backup of your environment at any time of the day or night, without getting all users out of the database. Briefly, ContOps mode queues up disk writes to a separate physical file with a ^^^ extension, called a "delta file", while you take a backup of your files. By segregating the writes for a period of time, you can obtain a backup that includes the state of the database from a single moment in time. If you have never tried an online backup, or are otherwise are unfamiliar with ContOps mode, then you may wish to check out some of these links before continuing with this Tech Tip: html What Must I Worry About With Continuous Operations Mode? As a special database mode that "queues up" the disk writes to the database while it is active, you should be aware that ContOps does add a certain amount of overhead to your environment for every record insert, update, or delete. As such, you need to be careful of the following situations: Running Out of Disk Space Mass Updates or Purges Server Crashes While In Continuous Operations Mode Failing to Exit Continuous Operations Mode Let's look at each of these issues separately. How Do I Avoid Running Out Of Disk Space? Each database write (an insert, update, or delete) will generate one or more disk writes to the database files, which will be sent to the separate Delta File. This means that even updates and deletes can start to rapidly use up your free disk space. Running out of free space while in Continuous Mode can cause a fair number of problems, so it should be avoided at all costs. You should always monitor the disk space on the database volume. From experience, we know that database volumes tend to collect "gunk" in the form of backup files, old converted data, and so on.
2 Sometimes, you need to sit down with the application developer and the various system administrators to determine which files are really needed and which can be deleted. Keeping the system clean is the first part of the puzzle. The second part is making sure that the data volume doesn't get used for storing downloads from users or huge log files from applications. Your Pervasive database server, if running as a dedicated box, should be ONLY used for database files. Keep the other files (such as application installation files, music video downloads, and other sundry things that tend to collect on a server) segregated onto file servers. This not only keeps the system clean, but it allows the server to tune its memory usage for the database and not try to swap out the database for file system cache. You should be checking your disk free space at least weekly, and daily (or more frequently) for any mission critical system. While you are at it, you should also monitor the disk free space on the boot volume, as running a Windows server out of space on the C: drive is a big problem, too. How Do I Avoid Mass Updates or Purges? As mentioned above, each database write translates to multiple page writes at the data file level. While a database is in Continuous Operations mode, you want to avoid massive numbers of record updates or deletes. Usually, this is not something that is planned. Instead, a company will schedule backups for off hours, and then decide that the same time frame would be an ideal time to archive and purge old data. The resulting collision caused the delta files to grow very rapidly, raising the possibility of running out of disk space. However, the problem is worse than a pure disk space issue. Because the way the database engine handles the delta files is far less efficient than the way it handles production PSQL files, doing a lot of changes (or deltas) in a database can have a severe impact on the performance of the server overall. In extreme cases, this can cause the entire server to become so bottlenecked at the disk subsystem that the console becomes unresponsive. Ugh! There's no easy way to always avoid this issue. Good communications between the database or server administrator (who schedules the backups) and the application key users (who are likely to schedule such archive jobs) is one real key to success. Another is ensuring that the amount of time that you spend in ContOps mode is always minimized, as we'll explain in the next section. How Do I Avoid Server Crashes While In Continuous Operations Mode? If the server crashes while in ContOps, you may need to take some manual steps to properly recover the environment and get it ready for the next backup. These steps are spelled out in the Goldstar Software white paper on proper backups, via the link provided above. Pervasive's Backup Agent can help with this recovery process by keeping track of which files were in ContOps mode at the time of the failure, and then opening these files long enough to allow the roll in to complete. Unfortunately, there is no way to tell when a power failure, OS crash, or even user induced failure will occur, so you cannot completely avoid this issue. However, you can take some special steps to minimize the likelihood of this situation arising in the first place. The most important thing to do is to minimize
3 the time spent in ContOps mode in the first place. If you can get into ContOps, make your backup copies, and get out in 10 minutes instead of 60 minutes, then the odds of crashing while in this state are reduced by a factor of 6. How do you minimize the backup time? There are several ways. First, don't back up to tape, which is usually notoriously slow. Instead, consider backing up to a second hard drive on the same server FIRST, and then copying the backup to tape after you have exited ContOps mode. Second, don't use a RAID5 volume as a target for the copy, which is notoriously slow for disk writes. If you have a RAID controller and can set up a separate striped (i.e. RAID0) volume, then you can get a LOT better throughput on the disk writes. If you don't have a RAID controller, then even a separate single drive directly attached to the server can be quite helpful in reducing backup times. Again, once the data is in the staging location, then you have until your next backup to copy the data to a different server, to tape, or even to an offsite location. With today's terabyte sized drives, you may even have room for multiple backup copies on a single drive, providing tiered backups for very little cost. How Do I Avoid Failing to Exit Continuous Operation Mode? Whether you use the BUTIL STARTBU and ENDBU commands or the Pervasive Backup Agent to handle your move into and out of Continuous Operations mode, it is imperative to make sure that the script runs to completion and brings the database out of ContOps mode when it is finished. Why is this critical? Imagine if the script failed, and the database were left in ContOps all day long. First, your risk of crashing the server while in ContOps just skyrocketed. Second, the chance of running out of disk space also just skyrocketed. Finally, the lower efficiency of the delta files means that disk utilization will continue to increase and increase until the entire server gets bogged down with Disk I/O that it cannot handle many other chores and your 24x7 environment will come to its knees. In fact, if you don't address this before the NEXT backup, then your problems will compound and your backup will now be two days old. Ugh! Let's review a simple scripts that would commonly be used for ContOps backups: BUTIL XCOPY D:\APPLICATION\DATA\*.DAT F:\BACKUP1 BUTIL -ENDBU /A This script has three simple lines one that puts the database from the list of files (FILES.LST) into ContOps mode, one that copies the data (*.DAT) over to the backup location, and one that takes the database out of ContOps at the end. For most purposes, this will suffice perfectly. However, what happens: if the application removes a file that is in the list, and the STARTBU fails? if there is a new file that is in use and cannot be copied? if the ENDBU never runs? if any files get "stuck" in continuous operations mode? Let's see how to handle these issues one at a time.
4 Step 1: Getting Into Continuous Operations Mode Properly The first problem is all about ensuring that the "right" set of files gets into ContOps mode for the backup. If you are using a file list like in this script, then you should review the list periodically, especially after any application updates are provided, to make sure that the file list is still accurate. You can detect the problem (after the fact) by checking the status code coming back from BUTIL STARTBU, using an additional line like this: BUTIL IF ERRORLEVEL 1 ECHO Error: The STARTBU Failed! Obviously, having a simple message print on an unattended process doesn't buy you a whole lot, but you could change the ECHO to a GOTO statement and perform some sort of notification. Another solution is to dynamically create your FILES.LST file on the fly, using a command like this: DIR *.DAT /S /B >C:\BACKUP\FILES.LST BUTIL IF ERRORLEVEL 1 ECHO Error: The STARTBU Failed! However, this solution has its difficulties, too. What if someone creates a backup of a corrupted file and calls it BADDATA.DAT? Now this file is going into ContOps every backup, and because it gets a new date stamp, you'll think it is in use by the application. The easiest way to handle this problem is to leverage Pervasive's Backup Agent to put the files into and out of ContOps mode, as this ensures that only files are open and present get put into ContOps mode: PVBACKUP -ON Of course, you may wish to check the ERRORLEVEL and handle any Backup Agent failures, too. Step 2: Copying All Files The second problem is all about copying the data. If a file is in use or is otherwise inaccessible, then the XCOPY line will fail, and it will never terminate. This halts the script and causes problems in the environment. You can avoid some of this by adding a few simple command line switches to the XCOPY line, including /C (continue on error), /R (overwrite read only files), /Y (Suppress prompting), like this: XCOPY /C /R /Y D:\APPLICATION\DATA\*.DAT F:\BACKUP1 Be sure to check ERRORLEVEL on this process, too! While XCOPY is built into the operating system, it isn't the most robust application that you can use for copying files. Other ones to check out include XXCOPY ( ROBOCOPY (built into Windows Vista, 7, and 2008), Beyond Compare ( and many others. Many of these other tools are either free or very low cost and well worth the investment. In any event, you'll want to spend some time with the documentation, as options and switches abound. (In fact, XXCOPY has over 230 command line options!)
5 Step 3: Making Sure the ENDBU Runs When the copy is done (and you have checked for the ERRORLEVEL accordingly), the last step is to take the database out of ContOps mode. This is quite simple, being done with either a BUTIL ENDBU command, or a PVBACKUP OFF command, depending on your tool of choice. Seems simple, right? Well, what about a check to make sure that THIS step works correctly, too? Again, it is imperative to check the ERRORLEVEL coming from the command to see if it succeeded or not. Even better, though, is to provide some sort of positive verification that the entire backup process really finished. Instead of reporting errors here, you may wish to ALSO report success as well. Reporting success from a script can be done in a few different ways. You can do something simple like write a "Backup Completed" entry to a log file somewhere, then check that log file every morning and make sure that it was updated on the last backup. If you see that the log file date is not changing, then your script isn't running. Another solution is BMail, a freeware program that can send right from your batch file, like this: BUTIL -ENDBU /A BMAIL -s smtpsrv -t [email protected] -f [email protected] -h -a "Backup Status %ERRORLEVEL%" This command sends an message after the process finishes with the status of the BUTIL. Of course, a more robust solution will have error checking each step of the way and report the exact problems encountered in the , and perhaps include the backup log for additional information. With a script like this, if a backup goes by without sending you an , then you'll know that a fatal scripting problem has occurred. However, the termination of the command doesn't always mean that the files have all come out of continuous mode. Step 4: Making Sure No Files Are Stuck In Continuous Operations Mode We should note that successful completion of the backup script does NOT guarantee that all files have been removed from ContOps mode successfully. Since this process can take from just a few seconds to several hours to complete (depending on the number of database writes that were queued up), it is often very difficult to even script this task. Luckily, there are some ways that you can find out if any files are in ContOps mode or not. One such solution simply checks for the existence of the delta files. You can run this script about an hour after your backup is supposed to finish and it will send you an if there are any delta files left: BUTIL -ENDBU /A D:\APPLICATION\DATA\*.^^^^^^ IF ERRORLEVEL 1 GOTO :END BMAIL -s smtpsrv -t [email protected] -f [email protected] -h -a "Backup Incomplete!" :END Let's review this short script. The first line seems out of place why do we do this? Simple if you know that your backup was supposed to finish an hour earlier, then this BUTIL command will return an
6 error, which we safely ignore. However, if the backup script did get stuck for any reason, this should serve to start removing files from ContOps right now. The second line checks the directory for any delta files. Note that the caret (^) is an escape character in Windows, so you have to double it to get it to work in the batch file. The third line checks the return from the DIR command. If the DIR returned "File Not Found", then ERRORLEVEL will be 1, which means that there are NO delta files, so we cleanly exit. If the ERRORLEVEL is 0, then files were found, and we want to send ourselves an with this notification, so that we have time to resolve it before the next backup. Another thing that you can do is to ask the database engine if any files are still in ContOps mode. Although the Pervasive Monitor tool and the Java based BMON tool don't report this attribute when you look at the Open Files information, the DTI interface DOES make this flag available, so developers can write their own applications that expose it, such as Goldstar Software's PSConfig tool: D:\APPLICATION\DATA>psconfig /mf PSConfig Version 3.31: 06/26 (C)2008 Goldstar Software Inc. Number of Open Files: 1 Mode LkTrRoCoRI Handles Open Time FileName Norm N N N Y N :17 D:\APPLICATION\DATA\MYFILE.MKD Note the column "Co" with the "Y" in it, indicating that the file is currently Continuous Operations mode. It would also be possible to parse this output and detect ContOps files from a script. Summary As we've seen, the process of getting snapshot backups on your Pervasive PSQL database can be easily scripted with just a few lines. Adding a few lines more, though, can help ensure that your backups continue to work properly, that your server doesn't get bogged down, and that you have some clear visibility into your script, to help keep your data safe. Author Information: Bill Bach is the Founder and President of Goldstar Software Inc., a Pervasive reseller in the Chicago area that specializes in providing Pervasive products, services, and training to its customers in North America and abroad. Bill has written numerous tools and utilities to help system administrators and database developers work with their Pervasive database environments, and his training classes for Pervasive PSQL and DataExchange are the most comprehensive classes available. Get more information from
Using Continuous Operations Mode for Proper Backups
Using Continuous Operations Mode for Proper Backups A White Paper From Goldstar Software Inc. For more information, see our web site at Using Continuous Operations Mode for Proper Backups Last Updated:
Tech Tip: Understanding Server Memory Counters
Tech Tip: Understanding Server Memory Counters Written by Bill Bach, President of Goldstar Software Inc. This tech tip is the second in a series of tips designed to help you understand the way that your
Backup Tab. User Guide
Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...
Backup Tab. User Guide
Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...
How To Make Your Database More Efficient By Virtualizing It On A Server
Virtualizing Pervasive Database Servers A White Paper From For more information, see our web site at Virtualizing Pervasive Database Servers Last Updated: 03/06/2014 As servers continue to advance in power,
BackupAssist Common Usage Scenarios
WHITEPAPER BackupAssist Version 5 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Table of Contents Introduction... 3 Disaster recovery for 2008, SBS2008 & EBS 2008... 4 Scenario 1: Daily backups with
Understanding Backup and Recovery Methods
Lesson 8 Understanding Backup and Recovery Methods Learning Objectives Students will learn to: Understand Local, Online, and Automated Backup Methods Understand Backup Options Understand System Restore
Using Process Monitor
Using Process Monitor Process Monitor Tutorial This information was adapted from the help file for the program. Process Monitor is an advanced monitoring tool for Windows that shows real time file system,
ICS Technology. PADS Viewer Manual. ICS Technology Inc PO Box 4063 Middletown, NJ 077748 732-671-5400 www.icstec.com
ICS Technology PADS Viewer Manual ICS Technology Inc PO Box 4063 Middletown, NJ 077748 732-671-5400 www.icstec.com Welcome to PADS Viewer Page 1 of 1 Welcome to PADS Viewer Welcome to PADS (Public Area
CS10110 Introduction to personal computer equipment
CS10110 Introduction to personal computer equipment PRACTICAL 4 : Process, Task and Application Management In this practical you will: Use Unix shell commands to find out about the processes the operating
Backing up Data. You have lots of different options for backing up data, different methods offer different protection.
Backing up Data Why Should I Backup My Data? In these modern days more and more is saved on to your computer. Sometimes its important work you can't afford to lose, it could also be music, photos, videos
Exchange Server 2010 backup and recovery tips and tricks
Exchange Server backup and recovery tips and tricks Exchange Server backup and recovery Exchange Server A big part of your job as an Exchange Server administrator involves preparing for and recovering
ACS Backup and Restore
Table of Contents Implementing a Backup Plan 3 What Should I Back Up? 4 Storing Data Backups 5 Backup Media 5 Off-Site Storage 5 Strategies for Successful Backups 7 Daily Backup Set A and Daily Backup
Frequently Asked Questions: Cisco Jabber 9.x for Android
Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail
My Secure Backup: How to reduce your backup size
My Secure Backup: How to reduce your backup size As time passes, we find our backups getting bigger and bigger, causing increased space charges. This paper takes a few Newsletter and other articles I've
Handling Hyper-V. In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2
White Paper Handling Hyper-V In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2 White Paper How to Make Hyper-V Virtual Machines
SCRIPT: Security Training
SCRIPT: Security Training Slide Name Introduction Overview 1 Overview 2 Overview 3 Text Welcome to the MN WIC Program Security Training Module for all MN WIC Program staff provided by the MN Department
DO NOT ASSUME THAT THE BACKUP IS CORRECT. MAKE SURE IT IS.
BACKING UP DATABASES & ASSOCIATED FILES It is not the responsibility of Incisive Software Limited, or any agent appointed by us, to configure or ensure the reliability and validity of the backing up of
Attix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
Frequently Asked Questions
BACKUPS FAQ Why Backup? Backup Location Net Connections Programs Schedule Procedures Frequently Asked Questions I do a backup once a week and sometimes longer, is this sufficient? In most cases, I would
Dr.Backup Release Notes - Version 11.2.4
Dr.Backup Release Notes - Version 11.2.4 This version introduces several new capabilities into the Dr.Backup remote backup client software (rbclient). The notes below provide the details about the new
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
BackupEnabler: Virtually effortless backups for VMware Environments
White Paper BackupEnabler: Virtually effortless backups for VMware Environments Contents Abstract... 3 Why Standard Backup Processes Don t Work with Virtual Servers... 3 Agent-Based File-Level and Image-Level
Live Agent for Support Agents
Live Agent for Support Agents Salesforce, Spring 16 @salesforcedocs Last updated: February 18, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
REPRINT. Release 1.22. Reference Manual. IBM iseries (AS/400) Developed and Distributed by
REPRINT Release 1.22 Reference Manual IBM iseries (AS/400) Developed and Distributed by WorksRight Software, Inc. P. O. Box 1156 Madison, Mississippi 39130 (601) 856-8337 FAX (601) 856-9432 Copyright WorksRight
Automatic notices process running too long, system config error corrected.
(Update notes are in italics) Ongoing Sierra issues On Monday, January 7, 2013 we had a phone call with the Customer Services supervisor at Innovative Interfaces. We communicated very directly that many
RAID installation guide for Silicon Image SiI3114
RAID installation guide for Silicon Image SiI3114 Contents Contents 2 1 Introduction 4 1.1 About this Guide 4 1.2 The Basics 4 1.2.1 What is RAID? 4 1.2.2 Advantages of RAID 4 1.2.3 Disadvantages of RAID
Rsync: The Best Backup System Ever
LinuxFocus article number 326 http://linuxfocus.org Rsync: The Best Backup System Ever by Brian Hone About the author: Brian Hone is a system administrator and software developer at
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do
Tk20 Backup Procedure
Tk20 Backup Procedure 1 TK20 BACKUP PROCEDURE OVERVIEW 3 FEATURES AND ADVANTAGES: 3 TK20 BACKUP PROCEDURE 4 DAILY BACKUP CREATION 4 TRANSFER OF BACKUPS 5 AUDITING PROCESS 5 BACKUP REPOSITORY 5 WRITE TO
Jenesis Software - Podcast Episode 3
Jenesis Software - Podcast Episode 3 Welcome to Episode 3. This is Benny speaking, and I'm with- Eddie. Chuck. Today we'll be addressing system requirements. We will also be talking about some monitor
ATTO ThunderLink Thunderbolt to SAS/SATA Troubleshooting Guide
ATTO ThunderLink Thunderbolt to SAS/SATA Troubleshooting Guide 1 5 5 C r o s s P o i n t P a r k w a y A m h e r s t, N Y 1 4 0 6 8 P. 7 1 6. 6 9 1. 1 9 9 9 F. 7 1 6. 6 9 1. 9 3 5 3 w w w. a t t o t e
CPS122 - OBJECT-ORIENTED SOFTWARE DEVELOPMENT. Team Project
CPS122 - OBJECT-ORIENTED SOFTWARE DEVELOPMENT Team Project Due Dates: See syllabus for due dates for each milestone This project spans much of the semester, to be completed as a series of milestones, each
Attix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks
NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.
NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result
Virtual server management: Top tips on managing storage in virtual server environments
Tutorial Virtual server management: Top tips on managing storage in virtual server environments Sponsored By: Top five tips for managing storage in a virtual server environment By Eric Siebert, Contributor
Backing Up TestTrack Native Project Databases
Backing Up TestTrack Native Project Databases TestTrack projects should be backed up regularly. You can use the TestTrack Native Database Backup Command Line Utility to back up TestTrack 2012 and later
USER MANUAL SlimComputer
USER MANUAL SlimComputer 1 Contents Contents...2 What is SlimComputer?...2 Introduction...3 The Rating System...3 Buttons on the Main Interface...5 Running the Main Scan...8 Restore...11 Optimizer...14
Module 6.3 Client Catcher The Sequence (Already Buying Leads)
Module 6.3 Client Catcher The Sequence (Already Buying Leads) Welcome to Module 6.3 of the Client Catcher entitled The Sequence. I recently pulled over 300 of the local lead generation explosion members
Website Maintenance Information For My Clients Bob Spies, Flying Seal Systems, LLC Updated: 08- Nov- 2015
Website Maintenance Information For My Clients Bob Spies, Flying Seal Systems, LLC Updated: 08- Nov- 2015 This document has several purposes: To explain what website maintenance is and why it's critical
REPRINT. Release 1.20 1.22. User s Guide. iseries (AS/400) Developed and Distributed by
REPRINT Release 1.20 1.22 User s Guide IBM IBM iseries iseries (AS/400) (AS/400) Developed and Distributed by WorksRight Software, Inc. P. O. Box 1156 Madison, Mississippi 39130 Phone (601) 856-8337 Fax
Hyper-V Protection. User guide
Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom
Getting Started with Turbo Your PC
Getting Started with Turbo Your PC Over time your computer becomes slow simply through every day use, installing and uninstalling software leaves debris that make everything run a bit slower. Files can
ATTO ExpressSAS Troubleshooting Guide for Windows
ATTO ExpressSAS Troubleshooting Guide for Windows This document describes troubleshooting techniques that can be used to identify and resolve issues associated with the ATTO ExpressSAS Raid Controller.
Course Syllabus. Microsoft Dynamics GP Installation & Configuration. Key Data. Introduction. Audience. At Course Completion
Course Syllabus Microsoft Dynamics GP Installation & Configuration Key Data Course Number: 8814B Number of Days: 3 Available: August, 2007 Languages: U.S. English Format: Instructor-Led Training (lecture
Database Backup, Restore, and Archive Guide For Journyx Timesheet version 5.0 and higher Document version 2.0 January 2006
Database Backup, Restore, and Archive Guide For Journyx Timesheet version 5.0 and higher Document version 2.0 January 2006 Introduction and Summary...1 Purpose...1 Backup and Restore Summary...1 Warning!...2
This feature is available on select devices featuring VUDU. In order to use this feature, your VUDU device must be connected to the Internet.
Movie Download This feature is available on select devices featuring VUDU. In order to use this feature, your VUDU device must be connected to the Internet. Summary The Movie Download feature allows you
Hyper-V Protection. User guide
Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 / 2012 R2 Hyper-V support...
Managing your Domino Clusters
Managing your Domino Clusters Kathleen McGivney President and chief technologist, Sakura Consulting www.sakuraconsulting.com Paul Mooney Senior Technical Architect, Bluewave Technology www.bluewave.ie
Table of contents. Software Installation 2. User Software..2. 1 )AMV Convert Tool. 2. 2 ) AMV Player 12
Table of contents Instructions of Software Software Installation 2 User Software..2 1 )AMV Convert Tool. 2 2 ) AMV Player 12 3 ) MP3 Player Disk Tool( Inner Scenes function ) 13 4 ) MP3 Player Upgrade
Registry Tuner. Software Manual
Registry Tuner Software Manual Table of Contents Introduction 1 System Requirements 2 Frequently Asked Questions 3 Using the Lavasoft Registry Tuner 5 Scan and Fix Registry Errors 7 Optimize Registry
E-Series. NetApp E-Series Storage Systems Mirroring Feature Guide. NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.
E-Series NetApp E-Series Storage Systems Mirroring Feature Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888)
STIDistrict SQL 2000 Database Management Plans
STIDistrict SQL 2000 Database Management Plans Overview STI recommends that users create SQL database maintenance plans to maintain the integrity of the STIDistrict database. Database maintenance plans
Forensic Analysis of Internet Explorer Activity Files
Forensic Analysis of Internet Explorer Activity Files by Keith J. Jones [email protected] 3/19/03 Table of Contents 1. Introduction 4 2. The Index.dat File Header 6 3. The HASH Table 10 4. The
Acronis Backup & Recovery 10 Server for Linux. Installation Guide
Acronis Backup & Recovery 10 Server for Linux Installation Guide Table of contents 1 Before installation...3 1.1 Acronis Backup & Recovery 10 components... 3 1.1.1 Agent for Linux... 3 1.1.2 Management
Hyper-V recovery. User Guide
User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Requirements... 2 2. Recovery Solutions... 3 Full VM Recovery... 3 Rapid VM Recovery... 3 When to use Rapid VM Recovery... 3 3.
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1
EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction
Create your own brick-level backup script for Exchange Server 5.5
Create your own brick-level backup script for Exchange Server 5.5 By Dominic Bosco Every Exchange Organization has its Very Important Mailboxes (VIMs). If you re like most Exchange Administrators, you
How To Backup Your Computer With A File Copy Engine
Secondary Backup Entire System Including Windows Installation Data Files, Emails, Databases, Documents Not Important Important Critical Ultra Critical Secondary Backup Data Archival Backup Secondary Backup
Computer Backup Strategies
Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and
Query OLAP Cache Optimization in SAP BW
Query OLAP Cache Optimization in SAP BW Applies to: SAP NetWeaver 2004s BW 7.0 Summary This article explains how to improve performance of long running queries using OLAP Cache. Author: Sheetal Maharshi
Performance Navigator Installation
Midrange Performance Group / Performance Navigator Business Partner Installation / SOS / Capacity Planning Guide Aug 1, 2011 Overview Performance Navigator provides three main functions for the IBM i platform:
Licensing for BarTender s Automation Editions. Understanding Printer-Based Licensing WHITE PAPER
Licensing for BarTender s Automation Editions Understanding Printer-Based Licensing and How to Configure Seagull License Server WHITE PAPER Contents Introduction to Printer-Based Licensing 3 Available
Preparing a Windows 7 Gold Image for Unidesk
Preparing a Windows 7 Gold Image for Unidesk What is a Unidesk gold image? In Unidesk, a gold image is, essentially, a virtual machine that contains the base operating system and usually, not much more
Ingres Backup and Recovery. Bruno Bompar Senior Manager Customer Support
Ingres Backup and Recovery Bruno Bompar Senior Manager Customer Support 1 Abstract Proper backup is crucial in any production DBMS installation, and Ingres is no exception. And backups are useless unless
4 Backing Up and Restoring System Software
4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring
Availability Digest. www.availabilitydigest.com. Data Deduplication February 2011
the Availability Digest Data Deduplication February 2011 What is Data Deduplication? Data deduplication is a technology that can reduce disk storage-capacity requirements and replication bandwidth requirements
Version: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
Instructions for the ACER Laptops
20 Manor Road Ruislip Middlesex HA4 7LB Telephone: +44(0)1895 624 774 E-Mail: [email protected] Website: www.llmedia.com Instructions for the ACER Laptops Always, after connecting to a projector, switch
ASUS WebStorage Client-based for Windows [Advanced] User Manual
ASUS WebStorage Client-based for Windows [Advanced] User Manual 1 Welcome to ASUS WebStorage, your personal cloud space Our function panel will help you better understand ASUS WebStorage services. The
Gentran Integration Suite. Archiving and Purging. Version 4.2
Gentran Integration Suite Archiving and Purging Version 4.2 Copyright 2007 Sterling Commerce, Inc. All rights reserved. Additional copyright information is located on the Gentran Integration Suite Documentation
CloudVPS Backup Manual. CloudVPS Backup Manual
1 Index Cover Index Preface Software requirements Installation of the backupscript (easy) Installation of the backupscript (advanced) Configuration editor Uninstall the backupscript Show quota usage Quota
Microsoft SQL Server Guide. Best Practices and Backup Procedures
Microsoft SQL Server Guide Best Practices and Backup Procedures Constellation HomeBuilder Systems Inc. This document is copyrighted and all rights are reserved. This document may not, in whole or in part,
Jive Connects for Openfire
Jive Connects for Openfire Contents Jive Connects for Openfire...2 System Requirements... 2 Setting Up Openfire Integration... 2 Configuring Openfire Integration...2 Viewing the Openfire Admin Console...3
Recommended Backup Strategy for FileMaker Server 10 and 11 for Macintosh & Windows Updated September 2010
Recommended Backup Strategy for FileMaker Server 10 and 11 for Macintosh & Windows Updated September 2010 This document provides a single cohesive resource for managing and understanding the backup strategy
RAID Basics Training Guide
RAID Basics Training Guide Discover a Higher Level of Performance RAID matters. Rely on Intel RAID. Table of Contents 1. What is RAID? 2. RAID Levels RAID 0 RAID 1 RAID 5 RAID 6 RAID 10 RAID 0+1 RAID 1E
Amazon Cloud Storage Options
Amazon Cloud Storage Options Table of Contents 1. Overview of AWS Storage Options 02 2. Why you should use the AWS Storage 02 3. How to get Data into the AWS.03 4. Types of AWS Storage Options.03 5. Object
IMF Tune v7.0 Backup, Restore, Replication
IMF Tune v7.0 Backup, Restore, Replication Contents WinDeveloper IMF Tune v7.0 Backup, Restore, Replication... 3 1. IMFTBak Requirements... 3 2. Using IMFTBak... 3 3. Backing-Up Configuration Settings...
Toad for Oracle 8.6 SQL Tuning
Quick User Guide for Toad for Oracle 8.6 SQL Tuning SQL Tuning Version 6.1.1 SQL Tuning definitively solves SQL bottlenecks through a unique methodology that scans code, without executing programs, to
Auslogics BoostSpeed 5 Manual
Page 1 Auslogics BoostSpeed 5 Manual [ Installing and using Auslogics BoostSpeed 5 ] Page 2 Table of Contents What Is Auslogics BoostSpeed?... 3 Features... 3 Compare Editions... 4 Installing the Program...
How to Backtest Expert Advisors in MT4 Strategy Tester to Reach Every Tick Modelling Quality of 99% and Have Real Variable Spread Incorporated
How to Backtest Expert Advisors in MT4 Strategy Tester to Reach Every Tick Modelling Quality of 99% and Have Real Variable Spread Incorporated MetaTrader 4 can reach 90% modelling quality at its best by
Microsoft s SBS 2003 Best Practice Guide
Microsoft s SBS 2003 Best Practice Guide For use with StorageCraft ShadowProtect Disclaimer This guide is for End Users and Resellers to provide some guidance when building an SBS 2003 Server for best
Exchange Brick-level Backup and Restore
WHITEPAPER BackupAssist Version 4 Exchange Mailbox Add-on www.backupassist.com 2 Contents 1. Introduction and Overview... 3 1.1 What does the Exchange Mailbox Add-on do?... 3 1.2 Who needs the Exchange
The Case for Continuous Data Protection
The Case for Continuous Data Protection This paper will discuss the benefits of using CDP-based solutions, particularly in place of traditional, tape-based backup products that currently dominate the SMB
Buyer Lead Conversion Plan
Buyer Lead Conversion Plan Respond effectively to your new buyer leads whether they are from Trulia, or other internet sources. This plan is based on best practices, tips and email scripts shared by top
Perform-Tools. Powering your performance
Perform-Tools Powering your performance Perform-Tools With Perform-Tools, optimizing Microsoft Dynamics products on a SQL Server platform never was this easy. They are a fully tested and supported set
User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved.
Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Table of Contents Getting Started... 4 New Features... 4 System Requirements... 4 Configuring Microsoft Internet Explorer... 4 Configuring
Measuring Firebird Disc I/O
Measuring Firebird Disc I/O Paul Reeves IBPhoenix Introduction Disc I/O is one of the main bottlenecks in Firebird. A good disc array can give a massive increase in available IOPS. The question is how
NovaBACKUP. User Manual. NovaStor / November 2011
NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without
Acronis Backup & Recovery 10 Server for Linux. Update 5. Installation Guide
Acronis Backup & Recovery 10 Server for Linux Update 5 Installation Guide Table of contents 1 Before installation...3 1.1 Acronis Backup & Recovery 10 components... 3 1.1.1 Agent for Linux... 3 1.1.2 Management
Event Center (rev b) EVENT CENTER. VPI 160 Camino Ruiz, Camarillo, CA 93012-6700 (Voice) 800-200-5430 805-389-5200 (Fax) 805-389-5202 www.vpi-corp.
EVENT CENTER 1 VPI 160 Camino Ruiz, Camarillo, CA 93012-6700 (Voice) 800-200-5430 805-389-5200 (Fax) 805-389-5202 www.vpi-corp.com All information in this manual is Copyright protected material by Voice
Secure online file storage ITD CLIO Server Filestore
Secure online file storage ITD CLIO Server Filestore What is online file storage? ITD s server CLIO provides the University with a large, managed central online file storage. This is a service which allows
Backups. Backup Plan. How to use the Backup utility to back up files and folders in Windows XP Home Edition
Backups Backups are your insurance against data loss. Most organizations have an Information Technology Department (IT) which may be responsible for backing up organizational data and that is handled well
Sendspace Wizard Desktop Tool Step-By-Step Guide
Sendspace Wizard Desktop Tool Step-By-Step Guide Copyright 2007 by sendspace.com This publication is designed to provide accurate and authoritative information for users of sendspace, the easy big file
IDERA WHITEPAPER. The paper will cover the following ten areas: Monitoring Management. WRITTEN BY Greg Robidoux
WRITTEN BY Greg Robidoux Top SQL Server Backup Mistakes and How to Avoid Them INTRODUCTION Backing up SQL Server databases is one of the most important tasks DBAs perform in their SQL Server environments
