Backup and Restore Strategies for SQL Server Database. Nexio Motion. 10-February Revsion: DRAFT
|
|
- Amelia Adams
- 8 years ago
- Views:
Transcription
1 Backup and Restore Strategies for SQL Server Database Nexio Motion v4 10-February-2015 Revsion: DRAFT
2 v4 Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document and its contents to be proprietary and confidential. Except for making a reasonable number of copies for your own internal use, you may not reproduce this publication, or any part thereof, in any form, by any method, for any purpose, or in any language other than English without the written consent of Imagine Communications. All others uses are illegal. This publication is designed to assist in the use of the product as it exists on the date of publication of this manual, and may not reflect the product at the current time or an unknown time in the future. This publication does not in any way warrant description accuracy or guarantee the use for the product to which it refers. Imagine Communications reserves the right, without notice to make such changes in equipment, design, specifications, components, or documentation as progress may warrant to improve the performance of the product. Trademarks Product names and other appropriate trademarks, e.g. D-Series, Invenio, PowerSmart, Versio are trademarks or trade names of Imagine Communications or its subsidiaries. Microsoft and Windows are registered trademarks of Microsoft Corporation. All other trademarks and trade names are the property of their respective companies. Contact Information Imagine Communications has office locations around the world. For domestic and international location and contact information, visit our Contact page ( Support Contact Information For domestic and international support contact information see: Support Contacts ( ecustomer Portal ( Academy Training ( Imagine Communications Corp. Proprietary and Confidential. 10-February-2015 Page 2
3 Contents Contents Backup and Restore strategies for SQL Server Database... 4 Introduction... 4 Impact of the Recovery Model on Backup and Restore... 5 Example Customer case Full backups... 7 Differential Backups... 9 Transaction Log Backups Backup Strategy Planning Backup Integrity Customer Case Imagine Communications Corp. Proprietary and Confidential. 10-February-2015 Page 3
4 Backup and Rest Backup and Restore strategies for SQL Server Database Introduction The SQL Server backup and restore component provides an essential safeguard for protecting critical data stored in SQL Server databases. To minimize the risk of catastrophic data loss, database needs to be backed up to preserve modifications to data on a regular basis. A well-planned backup and restore strategy helps protect databases against data loss caused by a variety of failures. Test strategy by restoring a set of backups and then recovering database to prepare to respond effectively to a disaster. Backup is the only reliable way to protect SQL Server data from many failures, such as: Media failure. User errors. For example, dropping a table by mistake. Hardware failures. For example, a damaged disk drive or permanent loss of a server. Natural disasters. Additionally, backups of a database are useful for routine administrative purposes, such as copying a database from one server to another, setting up AlwaysOn Availability Groups or database mirroring, and archiving. Backing up and restoring data must be customized to a particular environment and must work with the available resources. Therefore, a reliable use of backup and restore for recovery requires a backup and restore strategy. A well-designed backup and restore strategy maximizes data availability and minimizes data loss, while considering particular business requirements. Place the database and backups on separate devices. Otherwise, if the device containing the database fails, your backups will be unavailable. Placing the data and backups on separate devices also enhances the I/O performance for both writing backups and the production use of the database. Designing an effective backup and restore strategy requires careful planning, implementation, and testing. Testing is required! You do not have a backup strategy until you have successfully restored backups in all the combinations that are included in restore strategy. A variety of factors must be considered. These include the following: The production goals of organization for the databases, especially the requirements for availability and protection of data from loss. The nature of each of databases: its size, its usage patterns, the nature of its content, the requirements for its data, and so on. Constraints on resources, such as: hardware, personnel, space for storing backup media, the physical security of the stored media, and so on Imagine Communications Corp. Proprietary and Confidential. 10-February-2015 Page 4
5 Backup and Rest Impact of the Recovery Model on Backup and Restore Backup and restore operations occur within the context of a recovery model. A recovery model is a database property that controls how the transaction log is managed. Also, the recovery model of a database determines what types of backups and what restore scenarios are supported for the database. Typically a database uses either the simple recovery model or the full recovery model. The full recovery model can be supplemented by switching to the bulk-logged recovery model before bulk operations. For an introduction to these recovery models and how they affect transaction log management, see Transaction Logs (SQL Server). (see The best choice of recovery model for the database depends on business requirements. To avoid transaction log management and simplify backup and restore, use the simple recovery model. To minimize work-loss exposure, at the cost of administrative overhead, use the full recovery model. The following table summarizes the three recovery models. Recovery Model Description Work loss exposure Recovery to point in time Simple Full Bulk logged No log backups. Automatically reclaims log space to keep space requirements small, essentially eliminating the need to manage the transaction log space. Requires log backups. No work is lost due to a lost or damaged data file. Can recover to an arbitrary point in time (for example, prior to application or user error). Requires log backups. An adjunct of the full Changes since the most recent backup are unprotected. In the event of a disaster, those changes must be redone. Normally none. If the tail of the log is damaged, changes since the most recent log backup must be redone. If the log is damaged or bulk logged operations Can recover only to the end of a backup. Can recover to a specific point in time, assuming that backups are complete up to that point in time. Note: If there are two or more full recovery model databases that must be logically consistent, there may have to be implemented special procedures to make sure the recoverability of these databases. Can recover to the end of any backup. Point-in-time 2015 Imagine Communications Corp. Proprietary and Confidential. 10-February-2015 Page 5
6 Backup and Rest Recovery Model Description Work loss exposure Recovery to point in time recovery model that permits high performance bulk copy operations. Reduces log space usage by using minimal logging for most bulk operations. occurred since the most recent log backup, changes since that last backup must be redone. Otherwise, no work is lost. recovery is not supported. Example Customer case Simple recovery model is not recommended for any production use because only full database backups are possible and full backups are the most expensive operations on SQL Server. A Customer uses Invenio and Motion4, both databases are highly transactional (but not OLTP) and they are not using batched operations, therefore recommended recovery model is Full. Invenio and Motion4 databases are logically connected because of shared user management and authorization, possible inconsistencies are: User account is lost from backup set of Invenio database Lost (non-existent) user is registered in Motion4 as: Creator/Modifier of workflow Executor of workflow Initiator of Human Task Assignee of human task User information is used mostly for statistical purposes in Motion4, lost/non-existent user information in Motion4 will not lead to system malfunctions in Motion4. If this logical connection needs to be addressed at Customer site, that will require another study and will be presented in another document Imagine Communications Corp. Proprietary and Confidential. 10-February-2015 Page 6
7 There are several different types of backups. Effective backup strategy is the combination of different types of backups. Full backups The simplest kind of backup is a full database backup. It's also possible to do a full backup of a single data file or filegroup. However, these are not commonly used and as all the principles discussed apply to them, too, we are going to focus on database-level backups. But as of SQL Server 2005, each of the more granular backup types work exactly the same (this was not true in SQL Server 2000). The same applies to differential backups they can be performed at the file, filegroup, or database level but these all work in the same way, as well, regardless of the component being backed up. A full database backup provides a complete copy of the database and provides a single point-in-time to which the database can be restored. Even though it may take many hours for the backup process to run, you can still only restore the backup to a single point (effectively at the end of the backup, but we'll discuss exactly what that point is later in this article). A full backup does not allow recovery to any point in time while the backup was running. This is also the same for differential backups. There is a misconception about this, however, fuelled by the fact that you can use the WITH STOPAT=<a time or log sequence number> option on a restore of full and differential backups. Although the syntax allows it, the option has no effect and is just there for convenience. Another misconception about full backups is that they only contain data. Both full backups and differential backups also contain some transaction log records so that the restored component (database, file, or filegroup) can be made transactionally consistent. Consider an example transaction that inserts a record into a table with a single nonclustered index. The pages of the table and index are spread through the data file. The transaction is split into two parts internally: a record insertion into a data page in the table and then the insertion of the required record in an index page in the nonclustered index. If the backup process just happens to read the nonclustered index page before the record insertion, but reads the table data page after the record insertion, then the database represented by just the data in the backup is transactionally inconsistent. This is where the transaction log comes into play. By also including some transaction log records in the backup, recovery can be run on the restored copy of the database, making it transactionally consistent. For this example transaction, depending on when it commits, the recovery part of restore may roll it forward (meaning it will appear as committed in the restored copy of the database) or roll it back (meaning it will not appear at all in the restored copy of the database). In either case, transactional consistency is maintained, which is crucial. A full backup does the following: 1. Force a database checkpoint and make a note of the log sequence number at this point. This flushes all updated-in-memory pages to disk before anything is read by the backup to help minimize the amount of work the recovery part of restore has to do Imagine Communications Corp. Proprietary and Confidential. 10-February-2015 Page 7
8 2. Start reading from the data files in the database. 3. Stop reading from the data files and make a note of the log sequence number of the start of the oldest active transaction at that point. 4. Read as much transaction log as is necessary. Explaining how much transaction log is necessary is best done with the visual aid in Figure 1. The red numbers on the timeline are explained in this list: 1. Checkpoint and begin reading from the database. 2. The read operation reads page X. 3. Transaction A starts. 4. Transaction A makes a change to page X. The copy in the backup is now out of date. Note that the backup will not read page X again it's already passed that point in the database. 5. Transaction B starts. It does not complete before the data read operation completes. 6. Transaction A commits. This commits the changes to page X. 7. The backup data read operation completes and transaction log reading starts. Figure 1: Example Timeline of Changes during a Full Backup Backing up enough of the transaction log is required so that recovery can successfully run during the restore and so that all pages in the database are at the same point in time the time at which the data reading portion of the backup operation completed (Point 7). The transaction log from the beginning of the oldest active (or uncommitted) transaction (Point 5, Transaction B) to the end of the backup (Point 7), is required to allow recovery to run. The transaction log back from the backup checkpoint (Point 1) to the end of the backup (Point 7) is required to allow all pages to be brought to the same point in time. If the transaction log was only included from the beginning of the oldest active transaction (Point 5), then the copy of page X that was restored from the backup read at Point 2 would not be updated with the changes from transaction A, which occurred at Point 4. This means that it would not be transactionally consistent with the rest of the database as of the time the read data operation completed (Point 7) Imagine Communications Corp. Proprietary and Confidential. 10-February-2015 Page 8
9 So, the minimum log sequence number (LSN) of the transaction log that is included in the full backup is MIN (LSN of backup checkpoint, LSN of oldest active transaction) and it could be for a transaction that began even before the backup began. This ensures that the restored copy of the database (or whatever you restored page, file, filegroup, database) is completely consistent. This mechanism means that transactions are not paused in any way by backup operations, although the extra I/O workload on the database may slow them down somewhat. The downside of this mechanism is that the transaction log cannot be cleared for the duration of the full backup because it is required. If there's a lot of update activity and the full backup takes a long time to complete, this could lead to transaction log growth. The data contained in a full backup is not necessarily all of the contents of all data files. The backup will only contain the allocated pages from the data files. For example, a single-file database may be 100GB but only contain 15GB of allocated data. In that case, the full backup will only contain the 15GB of allocated data plus the necessary transaction log. (However, the restored database will always be the same size as the original in this case, 100GB.) Another misconception is that the backup process examines or changes the data it is backing up. This is untrue, except for in a single case when backup checksums are enabled. Differential Backups The other type of data backup is a differential backup. A differential backup performs the same operations as a full backup, but only contains all the data that has changed or been added since the previous full backup. A common misconception here is that differential backups are incremental. They are actually cumulative and successive differential backups after a full backup and will increase in size as more data is changed or added. In every 4GB section (called a GAM interval) of every data file there is a special database page called a differential bitmap that tracks which portions (called extents) of that 4GB section have changed since the last full backup, indicating data that has changed or been added to the database. (There are several other allocation bitmaps, too, and you can find more information about these in article "Inside The Storage Engine: GAM, SGAM, PFS and other allocation maps (see A differential backup scans through these bitmaps and only backs up the data file extents that are marked as changed. The bitmaps are reset by the next full backup, so you can see that as more and more of the database changes, more of it will be marked in the differential bitmaps and successive differential backups will be larger and larger. Eventually, if most of the database has changed, a differential backup may become as large as the full backup. You can find out how large your next differential backup will be using a script that is available from article "New script: How much of the database has changed since the last full backup? (see Imagine Communications Corp. Proprietary and Confidential. 10-February-2015 Page 9
10 As a side note, if you want to take an ad-hoc full backup and not have it reset the differential bitmaps, you should use the WITH COPY_ONLY option on the BACKUP statement. This is very useful, as otherwise the next differential backups would be based on the ad-hoc full backup you took, instead of on the regular (probably scheduled) full backup. This could lead to big problems when you try to restore in a disaster situation. So why are differential backups useful? As discussed in the backup strategy section, differential backups can really speed up restore operations by allowing many transaction log backups to be skipped in the restore process. It's much faster to essentially jump forward in time using a differential backup than to have to replay a lot of transaction log records to get to the same point in time. Transaction Log Backups Transaction log backups are only possible in the FULL or BULK_LOGGED recovery models, whereas full and differential backups are also possible in the SIMPLE recovery model. A transaction log backup contains all the transaction log records generated since the last log backup (or full backup that starts a log backup chain) and is used to allow the database to be recovered to a specific point in time (usually the time right before a disaster strikes). This means they are incremental, unlike differential backups, which are cumulative. Since these are incremental, if you want to restore the database to a particular point in time, you need to have all the transaction log records necessary to replay database changes up to that point in time. These are contained in the log backup chain. A log backup chain is an unbroken series of log backups that contain all the transaction log records necessary to recover a database to a point in time. A chain starts with a full database backup, and continues until something breaks the chain, thus preventing more log backups being taken until another full (or differential) backup is taken. Operations that break the log backup chain include switching to the SIMPLE recovery model, reverting from a database snapshot, and forcibly clearing the log using the WITH NO_LOG or TRUNCATE_ONLY options (which are not available in SQL Server 2008). It is inadvisable to break the log backup chain, as it forces another (potentially large) full backup to be taken. Although a log backup chain stretches back to a full backup, you don't necessarily need to restore all those log backups during recovery. If you took a full backup, say, on Sunday night and on Wednesday night, with log backups every half hour since Sunday night, then restoring the database after a disaster on Friday could use Wednesday's full backup plus all the log backups since Wednesday night instead of having to go all the way back to Sunday night's full backup. Log backups are also required to help manage the size of the transaction log. In the FULL or BULK_LOGGED recovery models, the log will not clear until a log backup has been, so regular log backups must be performed to prevent the log file from growing out of control. If the log cannot clear, the log will grow until it runs out of space. As such, if you don't want to do point-in-time recovery using log backups, the easiest option is to switch to the SIMPLE recovery model and not use the FULL or BULK_LOGGED recovery models. There is a special case in logging that improves performance by allowing some operations to run as minimally-logged operations, where only the page allocations are logged, not the actual insertion of 2015 Imagine Communications Corp. Proprietary and Confidential. 10-February-2015 Page 10
11 data. This can improve the performance of operations such as bulk loads and index rebuilds. In these cases, not everything about the operation is logged, so the backed up log records don't contain enough information to completely replay the operation. In that case, how can restore and recovery possibly work if there isn't enough information? The answer is that the first log backup following a minimally-logged operation will also contain some data. Just like the differential bitmaps mentioned earlier, there is another bitmap called the minimallylogged bitmap (sometimes called the bulk-changed map). This bitmap tracks which extents of a data file have been changed because of a minimally-logged operation. The log backup following a minimally-logged operation will scan through these bitmaps and also back up those data extents that are marked as having changed. The bitmaps are cleared after being scanned. This means that the log backup has enough information to completely replay the effects of the minimally-logged operation in the database, when the log backup is restored. There's a twist though: There's nothing in that log backup that says when any particular data extent was changed. So a log backup that also contains data from a minimally logged operation cannot be restored to any point in time except the end of the time period covered (or beyond, if the log backup is part of a log backup chain that you're restoring from). So, while you can get performance improvements when switching to the BULK_LOGGED recovery model, you must consider changing to it as a temporary operation just to improve your batch process and once the batch process is complete, you should switch back to FULL and perform a log backup as soon as possible. There is also a special case log backup to allow the log to be backed up after a disaster that damages the data files. This is called a tail-of-the-log (or tail-log) backup, where the data files can be damaged or destroyed, but all the transaction log leading up to the disaster point can be backed up. This allows minimal work loss (called up-to-the-minute recovery) when the database is subsequently restored; however, it is supported only when the database is running in the FULL recovery model. More information on these and restrictions with minimally logged operations can be found in the Books Online topic "Tail-Log Backups (see In versions of SQL Server prior to SQL Server 2005, transaction log backups could not be performed concurrently with full database or differential database backups they would block until the databaselevel backup completed. File and filegroup-based backups did not cause log backups to block. While this complicated the recovery process for file and filegroup backups, it gave them an advantage by not blocking log backups. In SQL Server 2005, all full and differential backups (regardless of component) work in the same way. The behavior now is that the concurrent transaction log backup completes, but the transaction log is not cleared until the full or differential backup (that requires the log) also completes. Backup Strategy Planning An effective backup strategy should be designed to meet organization s Recovery Time Objective (RTO) and Recovery Point Objective (RPO). More information about RTO (see and RPO (see 2015 Imagine Communications Corp. Proprietary and Confidential. 10-February-2015 Page 11
12 - can be found online. There are several commonly used backup strategies. With a strategy that only includes full backups you're somewhat limited in what you can do with restores. Basically, you can only restore to the time of each full backup, as in Figure 2. If disaster strikes at 23:59 on Saturday, just before the next full backup is scheduled, then all the work since the last full backup might be lost. For this reason, if data-loss needs to be avoided and the data cannot be recreated, log backups are also included, as shown in Figure 3. Figure 2: Backup Strategy with only Full Backups Figure 3: Backup Strategy with Full and Log Backups Imagine that the log backups are being taken every 30 minutes. As long as all the backups are available, this means that the database can be restored to any point in time. However, this still may not be the best strategy. What if disaster strikes at 23:59 on Saturday with this strategy in place? First thing would be to take a tail-of-the-log backup and then start restoring Imagine Communications Corp. Proprietary and Confidential. 10-February-2015 Page 12
13 To restore the database up to the point of the disaster would mean restoring last Sunday's full backup and then 336 log backups (that's six days of 48 log backups per day, plus 47 on Saturday plus the tail-ofthe-log backup). Depending on how much churn there was in the database over the week that could be a huge amount of transaction log that will take a very long time to replay. That's clearly not an optimal restore strategy but it's a common strategy. With a strategy like this, make sure that you've practiced doing a restore so you know whether you can meet your RTO in the event of a disaster. To mitigate this problem, some strategies use more frequent full backups but these might be prohibitively large to take every day, for instance. The alternative is to use differential backups, which only contain the data that has changed since the previous full backup. Continuing our example, that strategy is illustrated in Figure 4. Figure 4: Backup Strategy with Full, Log, and Differential Backups With this strategy, recovering from a disaster at 23:59 on Saturday is a lot faster. Remember that a differential backup is cumulative so the restore strategy is the Sunday full backup, the 00:00 Saturday differential backup, plus all the log backups from Saturday. Having the differential backup from 00:00 Saturday means that all the log backups before that can be skipped, as the differential backup contains the same as the net-result of restoring all those log backups. This was a pretty simple and contrived example, but it clearly shows the benefits of each backup type. Once a backup strategy is designed, make sure you test it to ensure that it allows you to perform your desired restores. Backup Integrity There's no point in having backups if you find that they're corrupt when you try to restore from them. Of course, the best way to check the validity of your backups is to restore them on another server, but in SQL Server 2005 a new feature was introduced that allowed some backup integrity checks to be performed without having to actually restore them. You can use the WITH CHECKSUM option when taking a backup (of any variety) Imagine Communications Corp. Proprietary and Confidential. 10-February-2015 Page 13
14 This creates a checksum over the entire backup stream, which is stored in the backup itself. If the backup is a full or differential, and the database has page checksums enabled, then this option will also cause all existing page checksums to be tested as the backup process reads the pages. If a bad page checksum is found, the backup operation will fail. This offers great protection against accidentally backing up a database that's already corrupt in some way. Once the backup has completed, it can be verified using a command like the following: RESTORE VERIFYONLY FROM <backup device(s)> WITH CHECKSUM This will recalculate the checksum over the entire backup stream and compare it against the one stored in the backup. For full and differential backups, it will also test any page checksums on pages in the backup. If any problems are found, then you know that backup has been corrupted in some way. Naturally, there are the exceptions to the rule, where you may want to back up a corrupt database (if it's the only copy of the database you have and you're going to have to run repair, for instance). In that case, you can force the backup to complete using the WITH CONTINUE_AFTER_ERROR option. Customer Case As it was explained at the beginning of this chapter, a backup strategy should meet an organization s RTO and RPO. Without specific information on a Customer, RTO and RPO are based on following assumptions: Invenio and Motion4 databases needs to be backed up Both databases are highly transactional but not OLTP Data stored in both databases is mission critical and can t be reproduced if lost Downtime in case of disaster should be minimal We propose following backup strategy: Strategy with full, log and differential backups Each backup set cycle is 1 week long, starting every Sunday 00:00 local time Create Full database backup on Sunday at 00:00 Create Differential database backup on Monday-Saturday at 00:00 Create transaction log backup every 30 minutes (48/day, yes even at 00:00 when either differential or full backup is created!!!) For backup operations large, redundant disk array with high sequential write figure is a requirement. Backup sets should be created on this location, this is called primary backup location. Second redundant storage location should be provided this is secondary backup location. This location can be anything from low-iops disc array to tape library. It is advised that secondary backup location is on different physical hardware than primary and also if possible hardware should be in two different server rooms. From Sunday-Saturday at 00:00 copy of all files from primary to secondary backup location should be performed. Weekly backup set from previous week should be backed up and sent to external protected data storage off site. Full backup sets needs to be preserved for current week + 3 previous weeks Imagine Communications Corp. Proprietary and Confidential. 10-February-2015 Page 14
15 DBA team should have test SQL Server system that is similar to production (storage capacity and same number of volumes for data storage, CPU and RAM does not have to meet the same level as production SQL Server) DBA team should have a document with step-by-step description of how to perform recovery from disaster. Monthly DBA team needs to perform disaster recovery practice, recovering database from backup sets from productions system. 3 different exercises can be performed: Restore to the latest point-in-time from production (using log tail backups) Restore one of previous week s state Restore to arbitrary point-in-time Based on results from these exercises backup/restore strategy should be updated/refined. When a new disc volume is added to SQL Server or a new file group is introduced to either Invenio or Motion4 database, these changes need to be aligned with current backup/restore strategy. IMPORTANT: A Backup strategy can be accepted only when there is a successful recovery test performed and it meets the requirements set in RTO and RPO and produces a transactionally consistent database with no data loss (except data loss planned in backup strategy)!!!!! DBA s wisdom: The goal of backup strategy is not to create a bunch of huge files but to be able to recover from disasters! 2015 Imagine Communications Corp. Proprietary and Confidential. 10-February-2015 Page 15
Nexio Motion 4 Database Backup and Restore
Nexio Motion 4 Database Backup and Restore 26-March-2014 Revision: A Publication Information 2014 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document
More informationBackup and Restore Back to Basics with SQL LiteSpeed
Backup and Restore Back to Basics with SQL December 10, 2002 Written by: Greg Robidoux Edgewood Solutions www.edgewoodsolutions.com 888.788.2444 2 Introduction One of the most important aspects for a database
More informationRestore Scenarios What to keep in mind. Pedro A. Lopes PFE
Restore Scenarios What to keep in mind Pedro A. Lopes PFE Backup types Full Backup Differential Backup (Database or FG) Transaction Log Backup (Tail of the Log) Partial Backup (Piecemeal - Filegroup) Mirrored
More informationBackup and Recovery in MS SQL Server. Andrea Imrichová
Backup and Recovery in MS SQL Server Andrea Imrichová Types of Backups copy-only backup database backup differential backup full backup log backup file backup partial backup Copy-Only Backups without affecting
More informationBackups and Maintenance
Backups and Maintenance Backups and Maintenance Objectives Learn how to create a backup strategy to suit your needs. Learn how to back up a database. Learn how to restore from a backup. Use the Database
More informationWIM Image Upgrade Instructions
v2.1 v2.1 Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document and its contents to be proprietary and confidential. Except
More informationProtecting Microsoft SQL Server with Asigra Cloud Backup
Technical Note Protecting Microsoft SQL Server with Asigra Cloud Backup Table of Contents Introduction 3 Overview - Asigra Cloud Backup Software Platform 3 Microsoft SQL Server Backup Set in Asigra DS-Client
More informationNexio Backup and Recovery
Nexio Backup and Recovery 11/2/2015 175-100271-00 RevE Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document and its contents
More informationEnterprise PDM - Backup and Restore
DS SOLIDWORKS CORPORATION Enterprise PDM - Backup and Restore Field Services - Best Practices [Enterprise PDM 2010] [September 2010] [Revision 2] September 2010 Page 1 Contents Brief Overview:... 4 Notes
More informationDestiny system backups white paper
Destiny system backups white paper Establishing a backup and restore plan for Destiny Overview It is important to establish a backup and restore plan for your Destiny installation. The plan must be validated
More informationBacking Up and Restoring the SQL Server 2005 Environment
23_0672329565_ch17.qxd 9/7/07 8:37 AM Page 597 CHAPTER 17 Backing Up and Restoring the SQL Server 2005 Environment Although the key to implementing database technologies is installing the software in a
More informationNEXIO Insight Client v15.1
NEXIO Insight Client v15.1 15-May-2015 Revision: Release Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document and its contents
More informationWHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers. by Dan Sullivan. Think Faster. Visit us at Condusiv.
WHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers by Dan Sullivan 01_20131025 Think Faster. Visit us at Condusiv.com WITH A RECYCLE BIN FOR FILE SERVERS 2 Article 1:
More informationProtecting Microsoft SQL Server with an Integrated Dell / CommVault Solution. Database Solutions Engineering
Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution Database Solutions Engineering By Subhashini Prem and Leena Kushwaha Dell Product Group March 2009 THIS WHITE PAPER IS FOR INFORMATIONAL
More informationMicrosoft SQL Replication
Microsoft SQL Replication v1 28-January-2016 Revision: Release Publication Information 2016 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document and
More informationSQL Server 2005 Backing Up & Restoring Databases
Institute of Informatics, Silesian University of Technology, Gliwice, Poland SQL Server 2005 Backing Up & Restoring Databases Dariusz Mrozek, PhD Course name: SQL Server DBMS Part 1: Backing Up Overview
More informationMySQL Enterprise Backup
MySQL Enterprise Backup Fast, Consistent, Online Backups A MySQL White Paper February, 2011 2011, Oracle Corporation and/or its affiliates Table of Contents Introduction... 3! Database Backup Terms...
More informationPerforce Backup Strategy & Disaster Recovery at National Instruments
Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir National Instruments Perforce User Conference April 2005-1 - Contents 1. Introduction 2. Development Environment 3. Architecture
More informationSQL Server Database Administrator s Guide
SQL Server Database Administrator s Guide Copyright 2011 Sophos Limited. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted, in any form or by
More informationBackup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
More informationRedundancy Options. Presented By: Chris Williams
Redundancy Options Presented By: Chris Williams Table of Contents Redundancy Overview... 3 Redundancy Benefits... 3 Introduction to Backup and Restore Strategies... 3 Recovery Models... 4 Cold Backup...
More informationBEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA
BEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA Bill Webster September 25, 2003 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Introduction... 3 Exchange Data Protection Best Practices... 3 Application
More informationNimble Storage Best Practices for Microsoft SQL Server
BEST PRACTICES GUIDE: Nimble Storage Best Practices for Microsoft SQL Server Summary Microsoft SQL Server databases provide the data storage back end for mission-critical applications. Therefore, it s
More informationHigh Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach
High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many
More informationThe Microsoft Large Mailbox Vision
WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more e mail has many advantages. Large mailboxes
More informationIDERA WHITEPAPER. The paper will cover the following ten areas: Monitoring Management. WRITTEN BY Greg Robidoux
WRITTEN BY Greg Robidoux Top SQL Server Backup Mistakes and How to Avoid Them INTRODUCTION Backing up SQL Server databases is one of the most important tasks DBAs perform in their SQL Server environments
More informationDell NetVault Backup Plug-in for SQL Server 6.1. User s Guide
Dell NetVault Backup Plug-in for SQL Server 6.1 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationNexio Insight LDAP Synchronization Service
Nexio Insight LDAP Synchronization Service 15-May-2015 Revision: Release Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document
More informationEMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
More informationMOC 20462C: Administering Microsoft SQL Server Databases
MOC 20462C: Administering Microsoft SQL Server Databases Course Overview This course provides students with the knowledge and skills to administer Microsoft SQL Server databases. Course Introduction Course
More informationHow To Fix A Powerline From Disaster To Powerline
Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir 1 Why This Topic? Case study on large Perforce installation Something for smaller sites to ponder as they grow Stress
More informationNexio Insight EP Logger Application
Nexio Insight EP Logger Application v15.4 5/25/2016 Revision: Release v15.4 Publication Information 2016 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this
More informationSQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery
SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery by Diane Beeler, Consulting Product Marketing Manager, BMC Software and Mati Pitkanen, SQL-BackTrack for Oracle Product Manager, BMC Software
More informationIngres Backup and Recovery. Bruno Bompar Senior Manager Customer Support
Ingres Backup and Recovery Bruno Bompar Senior Manager Customer Support 1 Abstract Proper backup is crucial in any production DBMS installation, and Ingres is no exception. And backups are useless unless
More informationBackup, Restore and Options for SQL Server
Backup, Restore and Options for SQL Server Housekeeping Please be sure to answer survey (above video window) Ask questions at any time Viewing Tip Enlarge Slides Now You can enlarge the window with the
More informationSQL Server 2008 - Express Edition 8-April-2014
SQL Server 2008 - Express Edition 8-April-2014 SQL Server 2008 - Express Edition Publication Information 2014 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers
More informationSecuring Your Microsoft SQL Server Databases in an Enterprise Environment
Securing Your Microsoft SQL Server Databases in an Enterprise Environment Contents Introduction...1 Taking Steps Now to Secure Your Data...2 Step 1: Back Up Everything...2 Step 2: Simplify as Much as
More informationNEXIO 7.0 Software Release
Installation Guide NEXIO 7.0 Software Release September 2013 175-100474-00 Delivering the Moment Publication Information 2014 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications
More informationHow To Backup A Database In Navision
Making Database Backups in Microsoft Business Solutions Navision MAKING DATABASE BACKUPS IN MICROSOFT BUSINESS SOLUTIONS NAVISION DISCLAIMER This material is for informational purposes only. Microsoft
More informationBackup Assistant. User Guide. NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6
Backup Assistant User Guide NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6 Liability Disclaimer NEC Unified Solutions, Inc. reserves the right to change the specifications, functions,
More informationSOLUTION GUIDE AND BEST PRACTICES
SOLUTION GUIDE AND BEST PRACTICES Last Updated December 2012 Solution Overview Combine the best in bare-metal backup with the best in remote backup to offer your customers a complete disaster recovery
More informationDatabase Backup and Recovery Guide
Scout Diagnostics Database Backup and Recovery Guide P H 803. 358. 3600 F A X 803. 358. 3636 WWW.AVTECINC.COM 100 I N N O VAT I O N P L ACE, L E X I N G T O N SC 29072 Copyright 2013 by Avtec, Inc. All
More informationContinuous Data Protection
Continuous Data Protection CDP: A State Analysis A Tutorial created and presented by: David Hill & Dan Tanner Mesabi Group LLC (Hill) ProgresSmart (Tanner) Storage World Conference 2005, Mesabi Group LLC.,
More informationBrightStor ARCserve Backup for Windows
BrightStor ARCserve Backup for Windows Agent for Microsoft SQL Server r11.5 D01173-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the
More informationLeveraging Virtualization for Disaster Recovery in Your Growing Business
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
More informationSQL Server 2012 - Express Edition
SQL Server 2012 - Express Edition 20-August-2015 Revision: Release Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document
More informationWHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server
WHITE PAPER PPAPER Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions for Microsoft Exchange Server 2003 & Microsoft SQL Server
More informationProtecting Virtual Servers with Acronis True Image
Protecting Virtual Servers with Acronis True Image Protecting Virtual Servers with Acronis True Image In This Paper Protecting Virtual Servers with Acronis True Image...3 Virtual Machines: The Data Protection
More informationIntroduction to Enterprise Data Recovery. Rick Weaver Product Manager Recovery & Storage Management BMC Software
Introduction to Enterprise Data Recovery Rick Weaver Product Manager Recovery & Storage Management BMC Software Contents Introduction...1 The Value of Data...2 Risks to Data Assets...2 Physical Loss...2
More informationRestore and Recovery Tasks. Copyright 2009, Oracle. All rights reserved.
Restore and Recovery Tasks Objectives After completing this lesson, you should be able to: Describe the causes of file loss and determine the appropriate action Describe major recovery operations Back
More informationEonStor DS remote replication feature guide
EonStor DS remote replication feature guide White paper Version: 1.0 Updated: Abstract: Remote replication on select EonStor DS storage systems offers strong defense against major disruption to IT continuity,
More informationADC Installation Reference. SQL Server 2012. 17-November-2014. Revision: Release
ADC Installation Reference SQL Server 2012 17-November-2014 Revision: Release ADC Installation Reference Publication Information 2014 Imagine Communications Corp. Proprietary and Confidential. Imagine
More informationBest Practices Every SQL Server DBA Must Know
The World s Largest Community of SQL Server Professionals Best Practices Every SQL Server DBA Must Know Brad M McGehee SQL Server MVP Director of DBA Education Red Gate Software www.bradmcgehee.com My
More informationComplete Online Microsoft SQL Server Data Protection
WHITE PAPER Complete Online Microsoft SQL Server Data Protection VERITAS BACKUP EXEC TM 10 FOR WINDOWS SERVERS Agent for Microsoft SQL Server SQL Server 7.0 SQL Server 2000 1/17/2005 1 TABLE OF CONTENTS
More informationDell NetVault Backup Plug-in for SharePoint 1.3. User s Guide
Dell NetVault Backup Plug-in for 1.3 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More informationCyber Security: Guidelines for Backing Up Information. A Non-Technical Guide
Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:
More informationNSI Solutions with Microsoft VSS
Published: March 2004 Abstract With the introduction of Volume Shadow Copy Service (VSS) in Microsoft Windows Server 2003 and Windows Storage Server 2003 and the strength of NSI Software Double-Take you
More informationAVLOR SERVER CLOUD RECOVERY
AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties
More informationRPO represents the data differential between the source cluster and the replicas.
Technical brief Introduction Disaster recovery (DR) is the science of returning a system to operating status after a site-wide disaster. DR enables business continuity for significant data center failures
More informationMaximum Availability Architecture. Oracle Best Practices For High Availability
Preventing, Detecting, and Repairing Block Corruption: Oracle Database 11g Oracle Maximum Availability Architecture White Paper May 2012 Maximum Availability Architecture Oracle Best Practices For High
More informationOnline Transaction Processing in SQL Server 2008
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
More informationBackupAssist Common Usage Scenarios
WHITEPAPER BackupAssist Version 5 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Table of Contents Introduction... 3 Disaster recovery for 2008, SBS2008 & EBS 2008... 4 Scenario 1: Daily backups with
More informationPRODUCT SCENARIOS BEST-IN-CLASS DISASTER RECOVERY FOR WINDOWS SERVERS
PRODUCT SCENARIOS BEST-IN-CLASS DISASTER RECOVERY FOR WINDOWS SERVERS StorageCraft ShadowProtect Server and ShadowProtect Small Business Server provide fast and reliable disaster recovery, data protection
More informationBlock-Level Incremental Backup
A STORAGE MANAGEMENT SOLUTION from VERITAS Software Corporation Advanced techniques for consistent database s with minimal operational impact. Contents BACKUP: BECAUSE STUFF HAPPENS... 5 ADVANCED BACKUP
More informationVIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE
VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE Solution Overview Thank you for choosing the ViperVault cloud replication, backup and disaster recovery service. Using this service you can replicate your
More informationData Compression in Blackbaud CRM Databases
Data Compression in Blackbaud CRM Databases Len Wyatt Enterprise Performance Team Executive Summary... 1 Compression in SQL Server... 2 Perform Compression in Blackbaud CRM Databases... 3 Initial Compression...
More informationAbout Backing Up a Cisco Unity System
CHAPTER 4 Introduction This chapter describes in general terms backing up a Cisco Unity system. When you back up a Cisco Unity server (and one or more Exchange servers) you need to consider the same issues
More informationContingency Planning and Disaster Recovery
Contingency Planning and Disaster Recovery Best Practices Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge Date: October 2014 2014 Perceptive Software. All rights reserved Perceptive
More informationLearn About SQL Server Disaster Recovery from Vas Srinivasan of Sonasoft.com
Learn About SQL Server Disaster Recovery from Vas Srinivasan of Sonasoft.com by Brad M. McGehee Disaster recovery is an important topic to DBAs. In this interview with Dr. Vas Srinivasan, Vice President
More informationTANDBERG DATA >> Customer Services >> White Paper Page 1 of 6
TANDBERG DATA >> Customer Services >> White Paper Page 1 of 6 WHITE PAPER BACKUP STRATEGIES AND TAPE ROTATION By: Morten Ween Corporate Product Manager, Travan Tandberg Data ASA June 1999 Why backup? Everybody
More informationBusiness continuity management for Microsoft SharePoint Server 2010
Business continuity management for Microsoft SharePoint Server 2010 Microsoft Corporation Published: March 2011 Author: Microsoft Office System and Servers Team (itspdocs@microsoft.com) Abstract This book
More informationMosaic Technology s IT Director s Series: Exchange Data Management: Why Tape, Disk, and Archiving Fall Short
Mosaic Technology s IT Director s Series: : Why Tape, Disk, and Archiving Fall Short Mosaic Technology Corporation * Salem, NH (603) 898-5966 * Bellevue, WA (425)462-5004 : Why Tape, Disk, and Archiving
More informationContents. SnapComms Data Protection Recommendations
Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery
More informationChapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
More informationChapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
More informationBackup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases
Backup and Recovery What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases CONTENTS Introduction 3 Terminology and concepts 3 Database files that make up a database 3 Client-side
More informationMaximizing Business Continuity and Minimizing Recovery Time Objectives in Windows Server Environments
Maximizing Business Continuity and Minimizing Recovery Time Objectives in Windows Server Environments StorageCraft Technology Corporation Backup Fast, Recover Faster 2010 StorageCraft Technology Corporation.
More informationBusiness Continuity: Choosing the Right Technology Solution
Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail
More informationDatabase as a Service (DaaS) Version 1.02
Database as a Service (DaaS) Version 1.02 Table of Contents Database as a Service (DaaS) Overview... 4 Database as a Service (DaaS) Benefit... 4 Feature Description... 4 Database Types / Supported Versions...
More informationNEW White Paper Expert Guide on Backing up Windows Server in Hyper-V
NEW White Paper Expert Guide on Backing up Windows Server in Hyper-V by John Savill, Microsoft MVP John Savill Microsoft MVP John Savill is a Windows technical specialist, an 11-time MVP, an MCITP: Enterprise
More informationVeritas Backup Exec 15: Protecting Microsoft SQL
Veritas Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed to introduce IT professionals to key technologies and technical concepts that are associated
More informationHow Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution sponsored by Introduction to
More informationHow To Backup A Database
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF PUBLIC WELFARE INFORMATION TECHNOLOGY STANDARD Name Of Standard: Database Backups Domain: Data Date Issued: 08/25/2009 Date Revised: New Number: STD-DMS006 Category:
More informationACS Backup and Restore
Table of Contents Implementing a Backup Plan 3 What Should I Back Up? 4 Storing Data Backups 5 Backup Media 5 Off-Site Storage 5 Strategies for Successful Backups 7 Daily Backup Set A and Daily Backup
More informationA review of BackupAssist within a Hyper-V Environment. By Brien Posey
A review of BackupAssist within a Hyper-V Environment By Brien Posey 2 Contents Introduction... 3 An Introduction to BackupAssist... 4 Testing Methodologies... 5 Test 1: Restore a Virtual Machine s Configuration...
More informationMICROSOFT EXCHANGE 2003. best practices BEST PRACTICES - DATA STORAGE SETUP
MICROSOFT EXCHANGE 2003 best practices BEST PRACTICES - DATA STORAGE SETUP TABLE OF CONTENTS E-mail has become a business critical communication tool 3 Build a disaster recovery solution with VSS and Data
More informationLocal Government Cyber Security:
Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and
More informationSTORAGECRAFT SHADOWPROTECT 5 SERVER/SMALL BUSINESS SERVER
STORAGECRAFT SHADOWPROTECT 5 SERVER/SMALL BUSINESS SERVER PRODUCT BRIEF 1 THE CHALLENGE OF BUSINESS CONTINUITY Maximizing business continuity while minimizing business disruption can be especially challenging
More informationComputer Backup Strategies
Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and
More informationProtecting Miscrosoft Hyper-V Environments
Protecting Miscrosoft Hyper-V Environments Who should read this paper Technical White Papers are designed to introduce Veritas partners and end users to key technologies and technical concepts that are
More informationRedefining Oracle Database Management
Redefining Oracle Database Management Actifio PAS Specification A Single Solution for Backup, Recovery, Disaster Recovery, Business Continuity and Rapid Application Development for Oracle. MAY, 2013 Contents
More informationYiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1
EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction
More informationNovar Database Mail Setup Guidelines
Database Mail Setup Guidelines August 2015 Delivering the Moment Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document and
More informationWHITE PAPER: DATA PROTECTION. Veritas NetBackup for Microsoft Exchange Server Solution Guide. Bill Roth January 2008
WHITE PAPER: DATA PROTECTION Veritas NetBackup for Microsoft Exchange Server Solution Guide Bill Roth January 2008 White Paper: Veritas NetBackup for Microsoft Exchange Server Solution Guide Content 1.
More informationConnectivity. Alliance Access 7.0. Database Recovery. Information Paper
Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery
More informationOutline. Failure Types
Outline Database Management and Tuning Johann Gamper Free University of Bozen-Bolzano Faculty of Computer Science IDSE Unit 11 1 2 Conclusion Acknowledgements: The slides are provided by Nikolaus Augsten
More informationBackup and Recovery With Isilon IQ Clustered Storage
Backup and Recovery With Isilon IQ Clustered Storage An Isilon Systems Best Practices Guide August 2007 ISILON SYSTEMS 1 Table of Contents 1. Assumptions... 4 2. Introduction... 4 3. Data Protection Strategies...
More informationHow To Use A Microsoft Microsoft Database Server 2012
OFFICIAL MICROSOFT LEARNING PRODUCT 10775A Lab Instructions and Lab Answer Key: Administering Microsoft SQL Server 2012 Database Information in this document, including URL and other Internet Web site
More informationLibrary Recovery Center
Library Recovery Center Ever since libraries began storing bibliographic information on magnetic disks back in the 70 s, the challenge of creating useful back-ups and preparing for a disaster recovery
More informationUsing Live Sync to Support Disaster Recovery
Using Live Sync to Support Disaster Recovery SIMPANA VIRTUAL SERVER AGENT FOR VMWARE Live Sync uses backup data to create and maintain a warm disaster recovery site. With backup and replication from a
More information