Tata Power Company. Ltd.
|
|
- Edwin Robinson
- 6 years ago
- Views:
Transcription
1 System Backup Policy and Procedures Guidelines Tata Power Company. Ltd. October 2005 Corporate Information Technology 1
2 2
3 Approval History Rev. 0 October, Signature Created By SHA/FKT/CPS October, 2005 Checked By E. R. Batliwala October, 2005 Approved By VP 3
4 4
5 SAP System Database Backup Policy and Procedures Guidelines 1 Systems Requiring backup Production Landscape consists of Production Server, Quality Assurance Server and Development server. At Present, size of Production Server Database is about 150 GB, Quality Assurance is about 146 GB, and Development around 100 GB. 2 Backup Equipment and Facilities The following backup facilities are available for SAP Systems: At Dharavi, for Production and Quality Servers: The MSL 6000 Tape Library. At Carnac, for Development Server: The local SDLT tape drive (110/220 GB capacity) 3 Backup Schedule Backup of Production Server shall consist of following levels: 1. Production and Quality Assurance Server are in cluster. If Production instance fails, Quality takes over as the primary instance. 2. Dev/DR Server at Carnac is to be kept in sync with Production Server and thus serves as the DR server. 3. Database and Redo Log backups of Production System are to be taken daily. Details are as below: Database Backup cycle of Production Server shall be of 3 weeks. Online Database backup with redo logs is to be taken at 1 AM at night from Tuesday to Saturday. Also a second copy of Offline Redo Logs is to be taken every day in the morning. Offline Database backup with verification is to be taken at 1 am every Monday. Backup Cartridges are required to be sent to remote site storage at Carnac for storage in fire Proof safe twice every week. 4. Backup of Quality and Development Servers: Online Database Backup of Quality Server and Development Servers are to be taken once every week 5
6 Exchange System Backup Policy and Procedures Guidelines 1. Systems Requiring backup Exchange- Exchange 2000 database consisting of totally 10 data base files. (Carnac-bh.edb, Carnac-bh.stm, Hydro.edb, Hydro.stm, priv1.edb, priv1.stm, t&d.edb, t&d.stm, vsat.edb, esat.stm, gold.edb, gold.stm, infotech.edb, infotec.stm, others.edb, others.stm, public-folders.edb, public-folders.stm, trombay.edb, trombay.stm) of the size 33 GB all put together. Backup of the following server are taken in backup folder of Anant server Proxy-Configuration of ISA Server Proxy-Configuration of ISA Server Firewall- fwrules. Incoming mails- aliases Cisco and network device configuration. Domain controller Netscreen VPN 2. Backup Equipment and Facilities The following backup facilities are available for Exchange and backup folder in Anant Server which will have the backup of above mentioned servers. 3. Backup Schedule The MSL 6000 Tape Library (Data Protector). HP Ultrium 200GB Data Cartridge Exchange: Data Protector Auto Tape Library (MSL 6000) dual backup scheduled from Mon- Sat at 11:00 PM in the night. Register entry to be made in the backup log register entering the tape number, date, and operators name into the register, The success or failure of the backup should be recorded and ensure that the tapes are in good condition. The tapes are kept in the fire proof safe. After the backup is over the date of the last backup should be entered on the cover of the tape. If the write cycles have exceeded the limit of the maximum permissible limit, the tape is to be replaced with a new tape. If a change in tapes is to be done, use a fresh tape from Facility Management storage area in Ground Floor. New tape entry to be made in the register and the new tape to be used for backup. The old tapes are required to be marked for end of life and to be preserved for at least 60 days in the FM group safe keeping office at the designated location for old tapes. The work tapes are now to be loaded into the tape library holder. Total two backup copies are to be taken one to be kept in the safe and one in the remote site. 6
7 The DR site Second copy tape is put in Server room in a lockable briefcase to be kept at the DR site twice a week under lock and key. The files pertaining to Proxy and firewall are also stored in the Anant server and the above process will also back up the data for the other systems mentioned above. In case a tape encounters an error, the tape shall be marked with the type of error encountered, date and the operator s name. In such a condition, a new tape shall be used to replace the defective tape, and the original backup process resumed after the procedure for deploying new tapes into backup sequence. The verify switch should be set ON to ensure the integrity of backups taken. 4 Exchange database restoration test The exchange database that is backed up on the tape will be recovered at least once in three months to verify that the exchange backup procedure is working. For this two PC based servers will be used with all the required exchange software and recovery will be tested in a lab setup with no interconnection to the production environment and a record made after restoration. The restore operation will be done for the last backup taken. 7
8 Web based Systems Backup Policy and Procedures Guidelines 1. Systems Requiring backup Web based applications database consisting of totally 60 data base files covering 26 applications and 57 users (database users). The list of applications and users is as below. Backup of Production server and Development server is required to be done for Windows server and Linux server. 2. Backup Equipment and Facilities The following backup facilities are available for Web based applications at Dharavi: 3. Backup Schedule ANANT (NAS) for disk based backup The MSL 6000 Tape Library. HP Ultrium 200GB Data Cartridge Backup of Database and source code is taken at a predefined frequency. It is done in two phases. Phase I Disk based backup from Web application servers (namely Webappln, Webdb, Linuxdev and Windev) to NAS (ANANT). All the disk based backups are done through scripts which are executed through scheduler in server. Database : Following types of backup are taken Archive Log Database is configured in archive mode. This generates archive logs when redo logs are full. These archive logs are transferred to ANANT and stored in respective day s directory. The cycle of storing archive files are 7 days on ANANT and 12 days on Cartridges. Export dump : Export dump at user level is taken for all the users defined in Production database and transferred to local directory. Copy of the same is transferred to ANANT for disk based backup. The dump files are stored in application owner wise directory in local drive. Access to these directories has been provided to each application owner for downloading / uploading export 8
9 dump. Export backups are taken twice a day scheduled at 0430 hrs and 1900 hrs. The morning export dumps are transferred to ANANT and stored day wise. The cycle of storing these export dumps in local server is 1 day, in NAS is for 7 days and in cartridges is for 12 days. Hot Physical Backup Hot Physical backup of database is taken daily through script at 0530 hrs into the ANANT. The cycle of storing these hot physical backup is 6 days (excl Saturday because of cold backup) in ANANT and 12 days in cartridges. Cold Physical Backup Cold Physical backup of database is taken once a week on Saturday through script at 0700 hrs into the ANANT. The cycle of storing these cold physical backup is 1 day per week in ANANT and 6 days (1.5 month cycle) in cartridges. Source Code (Production) Backup of source code is taken once a week on Saturday through script at 0700 hrs into the ANANT. The cycle of storing these Source code backup is 1 day per week in ANANT and 6 days (1.5 month cycle) in cartridges. WEbdb (Linux) Backup of source code and data is taken everyday on Webdev server under individual week days and FTPed to Anant in respective day s folder. The cycle of storing these source and file backup is 6 days in ANANT and 12 days in cartridges Weekly cycle of data backup one day per week (Saturday) on ANANT and 6 days in cartridges. Development Servers Development servers follow sequence same as production and sends data on ANANT. 9
10 Phase II Backup of data transferred on ANANT remains in directories created day wise. The entire backup namely Archive, export, hot, physical and source code are stored in respective day s directory. Based on the schedule prepared these daily files are transferred into cartridges. As the total size of these files is much less compared to size of the cartridges, all these are stored in single cartridge only. With the help of Data Protector, data is saved onto cartridges. 10
11 General Media Handling, Storage and Security Guidelines 1. Backup Media Safe Keeping and Storage The backup safe keeping designated areas are the Administrator s seating place in Dharavi which is a lockable safe. The keys of this locker are to be kept with FM project manager. 2. Backup Security The security of the tapes is to be ensured by means of transporting the tapes in lockable briefcase to the remote site. The storage security of the tapes shall be ensured by means of lockable steel/fireproof cupboards at the designated storage location areas. 3. Purchase of Media- Quality Assurance, Testing, and Certification All media shall be purchased through reliable suppliers and made by reputed brands such as Fujitsu, Sony, HP, etc. The media shall be checked for any apparent physical damages. A test backup will be taken with verify switch on to check the integrity of the media before first use. A serial number will be assigned to the media which pass the media verification test. This number shall be entered into the register and clearly marked on the tape with date of first usage. New Tapes shall be ordered as soon as the number of spare tapes falls below the reorder level i.e. 2~4. 4. Discarding the Media All media at the end-of-life will be subject to discarding after a cycle of 30 usages (30 weeks) or with an upper limit as specified by the particular vendor. However the media on end of life shall be preserved for a period of at least 60 days before it is sent for erasure and destruction facility. The System Administrator shall ensure that the tapes are fully erased either by overwriting the tapes with blank data, before the tapes are sent for the destruction if the tape is still writeable. If a tape is known to be faulty, no attempt should be made to erase it by putting into the tape library in order to avoid possible damage to the tape mechanism. An entry in the log book shall be made recording the tape serial number, number of write cycles, and the reason for discarding the tape (physical damage, errors, or end of life) 5. Backup Responsibilities- Operation The FM group shall perform the backup on a day to day basis. After the backup has been taken automatically by the data protector at previous night, the FM engineer shall check the log for success of the backup. If there is any backup 11
12 failure, then the reason shall be investigated and resolved. The successful backup shall be kept at appropriate designated storage area after removing the tapes from the backup device. However in the event of any emergency situation wherein the regular FM engineer is not available, the System Administrator shall follow the above backup procedure. 6. Records, Logs Maintenance A register shall be maintained at Dharavi for recording the backup logs. The register will have the details of the tapes being used for the backup and the tape number to be used for the day. It will record the success and failure of the tape number for the tapes used the previous night. It will record which tape is present at the remote site. If there was any failure of the backup during the last backup operation, the type of error and action taken shall be clearly be mentioned. 7. Transport procedure A register shall be maintained at Dharavi for keeping the records of Offsite movement of Backup Tapes. The register will have the details of the Tapes which are sent offsite (Carnac) and received from offsite. While the tapes are sent to offsite two copies of forms shall also be sent which will have the information about the tapes which are going to Carnac and coming from Carnac. Verification of the form is to be done by the offsite backup supervisor, after examining the tapes the supervisor shall give one form back along with the tapes which is mentioned in the form. For sending Tapes to Offsite storage facility, a proper gate pass shall be prepared duly signed and authorized by FM Engineer, FM Manager & TPC IT Manager respectively. 8. Disposal of Media The table below describes the disposal method for various media types having high sensitivity: S.N. Media Treatment Comment 1. Tapes (Faulty or Working) Open case and cut the reel, or Direct Degauss 2. Floppies (Faulty or Working) Cut or Direct Degauss Safety to be exercise with cutting tools Safety to be exercised with cutting tools 3. Hard Disks (working) Full Format Do not Degauss 4. Hard Disks (Faulty) Direct Degauss, Crush 5. R/W CDROM (working) Full Erase 12
13 6. R/W, R CDROM Cut Safety to be exercised with cutting tools. 7. Pen Drives, Flash, SDRAM Crush etc After the data sanitization exercise is complete, a record will be made in the media register maintained by the data/media owners and certified by the owner and at least one witness. 13
DATA BACKUP AND RECOVERY POLICY
DATA BACKUP AND RECOVERY POLICY 4ITP04 Revision 01 TABLE OF CONTENTS 1. REVISION RECORD... 3 2. PURPOSE... 4 3. SCOPE AND APPLICABILITY... 4 4. DEFINITIONS AND ABBREVIATIONS... 4 5. POLICY STATEMENTS...
More informationBackup Exec Supplement
Vision 3 Backup Exec Supplement INPS INPS The Bread Factory, 1A Broughton Street, Battersea, London, SW8 3QJ T: +44 (0) 207 501700 F:+44 (0) 207 5017100 W: www.inps.co.uk Table of Editions and Contents
More informationBackup and Restore SOP FOR CONGO CLUSTER
Backup and Restore SOP FOR CONGO CLUSTER IT Department, Congo Cluster Version 1.0 January 2008 1. Contents 1. CONTENTS... 2 2. INTRODUCTION TO BACKUPS... 3 2.1. Objectives... 3 2.2. Scope of the document...
More informationIT CONTINUITY, BACKUP AND RECOVERY POLICY
IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption
More informationBack up and Restoration Policy. of VIJETA BROKING INDIA PRIVATE LIMITED
Back up and Restoration Policy of VIJETA BROKING INDIA PRIVATE LIMITED Table of Content 1 Overview... 3 2 Purpose... 3 3 Scope... 3 4 Definitions... 3 5 Timing... 4 6 Policy... 4 7 Backup of Older Versions...
More informationData Storage, Recovery and Backup Checklists for Public Health Laboratories
Data Storage, Recovery and Backup Checklists for Public Health Laboratories DECEMBER 2018 Introduction Data play a critical role in the operation of a laboratory information management system (LIMS) and
More informationUniversity Information Systems. Administrative Computing Services. Contingency Plan. Overview
University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview
More informationUniversity Information Technology Data Backup and Recovery Policy
University Information Technology Data Backup and Recovery Policy I. Purpose and Scope A. The purpose of this policy is to document the University of Utah Information Technology (UIT) data backup and recovery
More informationChapter 17: Recovery System
Chapter 17: Recovery System Database System Concepts See www.db-book.com for conditions on re-use Chapter 17: Recovery System Failure Classification Storage Structure Recovery and Atomicity Log-Based Recovery
More informationWhen Will Client Computer Backups Be Backed-up Online?
Using KeepVault to Backup your WD Sentinel KeepVault Online Backup provides offsite disaster- proof protection for all your important data. KeepVault lets you backup regular directories and folder shares,
More informationHP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :
HP HP0-771 Designing and Implementing HP Enterprise Backup Solutions Download Full Version : http://killexams.com/pass4sure/exam-detail/hp0-771 A. copy backup B. normal backup C. differential backup D.
More informationMinimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise SQL 2008 R2 Enterprise Restrictions 8 CPU 2 TB Ram Use Limit 524 PB Database Size High Availability Options Database Mirroring,
More informationDBDS Backup and Restore Procedures For SR 2.2 and SR 3.2, SR 2.4 and SR 3.4, SR 2.5 and SR 3.5, and SR 3.3
DBDS Backup and Restore Procedures For SR 2.2 and SR 3.2, SR 2.4 and SR 3.4, SR 2.5 and SR 3.5, and SR 3.3 Please Read Important Please read this entire guide. If this guide provides installation or operation
More informationZYNSTRA TECHNICAL BRIEFING NOTE
ZYNSTRA TECHNICAL BRIEFING NOTE Backup What is Backup? Backup is a service that forms an integral part of each Cloud Managed Server. Its purpose is to regularly store an additional copy of your data and
More informationEMC VNXe3200 Unified Snapshots
White Paper Abstract This white paper reviews and explains the various operations, limitations, and best practices supported by the Unified Snapshots feature on the VNXe3200 system. July 2015 Copyright
More informationPractice Test. Microsoft Microsoft PRO: Deploying Messaging Solutions with Microsoft Exchange Server Version 2.
Microsoft 70-238 Microsoft 70-238 PRO: Deploying Messaging Solutions with Microsoft Exchange Server 2007 Practice Test Version 2.1 QUESTION NO: 1 Microsoft 70-238: Practice Exam You are a messaging professional.
More informationDisaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2)
Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2) Published: April 2, 2010 This guide provides an overview of the Disaster Recovery System, describes
More informationFEATURES OUR PROMISE U.S U.K. +44 (0)
DATAGONE LG A high speed Automatic Hard Drive & Backup Tape Degausser with Data Destruction Auditor Report Writer - Now with optional self adhesive Degauss Details Label FEATURES Single Pass fully automatic
More informationOhio Supercomputer Center
Ohio Supercomputer Center Data Lifecycle Management No: Effective: OSC-1 May 1, 2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
More informationIntegrating RDX QuikStor into NetJapan ActiveImage Protector
Integrating RDX QuikStor into NetJapan ActiveImage Protector INTEGRATION BRIEF Backup is the life insurance of a company as it protects its crown jewels. Backup ensures data availability and business continuity
More informationNortel Quality Monitoring. Maintenance Guide NN
NN44480-504 Document status: Standard Document version: 0102 Document date: 6 November 2009 All Rights Reserved While the information in this document is believed to be accurate and reliable, except as
More informationExecutive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration
Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules
More informationRetrospect 8 for Windows Reviewer s Guide
Retrospect 8 for Windows Reviewer s Guide 2012 Retrospect, Inc. About this Reviewer s Guide This document provides a concise guide to understanding Retrospect 8 for Windows. While it is not designed to
More informationDepartment of Chemistry
Department of Chemistry Guidelines for the Confocal Laser Scanning Microscopes The Department of Chemistry (CHEM) has two confocal laser scanning microscopes (confocal microscope) for imaging uses: 1.
More informationChapter 2 CommVault Data Management Concepts
Chapter 2 CommVault Data Management Concepts 10 - CommVault Data Management Concepts The Simpana product suite offers a wide range of features and options to provide great flexibility in configuring and
More informationVMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
More informationRECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES
RECORDS MANAGEMENT DEPARTMENT OF THE TREASURY, DIVISION OF REVENUE AND ENTERPRISE SERVICES, RECORDS MANAGEMENT SERVICES RECORDS MANAGEMENT SERVICES Records Management Services, Division of Revenue and
More informationCisco Unified CM Disaster Recovery System
Cisco Unified CM Disaster Recovery System Disaster Recovery System, page 1 Quick-reference tables for backup and restore procedures, page 3 Supported features and components, page 5 System requirements,
More informationHP Data Protector Media Operations 6.11
HP Data Protector Media Operations 6.11 Getting started This guide describes installing, starting and configuring Media Operations. Copyright 2009 Hewlett-Packard Development Company, L.P. Part number:
More informationTuskegee Backup and Offsite Policy and Procedures
TUSKEGEE UNVERSTY OCE O NORMATON TECHNOLOGY Tuskegee Backup and Offsite Policy and Procedures Purpose This policy defines how to safeguard the information assets of the University and how copies of stored
More information2. Scope: 2.1 This procedure encompasses all organisations within the Clement Clarke Holdings group.
Date: 01/06/2011 Reviewed: 08/12/2011 Issue: 2 SI No: P3010 Prepared by: J. Hopkins Approved by: G. Ostacchini Title: Backup & Retrieval Procedure 1 Introduction: 1.1 The purpose of this procedure is to
More informationIronSync File Synchronization Server. IronSync FILE SYNC SERVER. User Manual. Version 2.6. May Flexense Ltd.
IronSync FILE SYNC SERVER User Manual Version 2.6 May 2014 www.ironsync.com info@flexense.com 1 1 Product Overview...3 2 Product Installation Procedure...4 3 Using IronSync Client GUI Application...5 3.1
More informationRecords Information Management
Information Systems Sciences Records Information Management Region V Spring Conference March 26, 2015 Was I supposed to keep that 1 Where did we store that 2 Space Issues. Need storage space for a classroom
More informationBackup and Restore Introduction
The ability to recover from a disaster is an essential part of any system maintenance plan. As part of your disaster recovery plan, Cisco recommends that you back up the Firepower Management Center and
More informationRecommended Backup Strategy for FileMaker Pro Server 7/8/9 for Macintosh & Windows Updated February 2008
Recommended Backup Strategy for FileMaker Pro Server 7/8/9 for Macintosh & Windows Updated February 2008 This document provides a single cohesive document for managing and understanding data backups for
More informationGoogle Cloud Whitepaper September Data deletion on Google Cloud Platform
Google Cloud Whitepaper September 2018 Data deletion on Google Cloud Platform Table of contents Overview 3 CIO-level summary 3 Introduction 4 Data storage and replication 5 Secure and effective data deletion
More informationPowerLink Host Data Manager User Guide
PowerLink Host Data Manager User Guide Last Updated: July 2009 Version: 2.06014 Contents Contents... 2 Introduction... 4 Quick Start... 5 Enable File Monitoring... 7 Enabling Attaché 7 File Monitoring
More informationChapter 10 Protecting Virtual Environments
Chapter 10 Protecting Virtual Environments 164 - Protecting Virtual Environments As more datacenters move to virtualize their environments and the number of virtual machines and the physical hosts they
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationSolution Brief: Archiving Avid Interplay Projects using NLT and XenData
Solution Brief: Archiving Avid Interplay Projects using NLT and XenData Contents 1. Introduction to the Open Interplay Archive 2. Solution Benefits 3. System Architecture 4. How to Archive and Restore
More informationSOUTH AFRICAN LIBRARY FOR THE BLIND (SALB)
Name of Institution SOUTH AFRICAN LIBRARY FOR THE BLIND (SALB) Bid Number SALB 2019/01/01 A Description ICT Disaster Recovery and ICT Business Continuity Services to SALB Date Published 20/03/2019 Closing
More informationGeneral Data Protection Regulation policy (exams) 2017/18
General Data Protection Regulation policy () 2017/18 This policy is annually reviewed to ensure compliance with current regulations This policy can beviewed on the school website Approved/reviewed by Gail
More informationIntroduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault
Introduction What is Microsoft Data Protection Manager (DPM)? The Microsoft Data Protection Manager is a member of the Microsoft System Center family of management products. DPM provides continuous data
More informationINFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE
INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE Michael Poulson and Devin Jansen EMS Software Software Support Engineer October 16-18, 2017 Performance Improvements and Best Practices Medium-Volume Traffic
More informationAdministrative Procedures Manual. Office of Information Technology Services Cape Fear Community College October 23, 2015
Administrative Procedures Manual Office of Information Technology Services Cape Fear Community College October 23, 2015 1 Introduction Cape Fear Community College has adopted the IT Standards published
More informationFile Protection Whitepaper
File Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of File Protection over traditional file copy methods... 3
More informationNETVAULT BACKUP SYSTEM ADMINISTRATION COMPLETE - INSTRUCTOR LED TRAINING
NETVAULT BACKUP SYSTEM ADMINISTRATION COMPLETE - INSTRUCTOR LED TRAINING The NetVault Backup System Administration Complete Instructor-led training course is designed to instruct students on the essentials
More informationMag EraSURE TM Professional Value Product Manual
Mag EraSURE TM Professional Value Product Manual Yamagata Fujitsu Limited - 1 - Table of Contents 1.0 Mag EraSURE...- 3-2.0 Mag EraSURE Overview...- 4-3.0 Mag EraSURE Operation...- 6-3-1 Setting Up...-
More informationBack Up and Restore Cisco DNA Center
About Backup and Restore, page 1 Back Up the DNA Center, page 2 Restore DNA Center, page 3 About Backup and Restore The backup and restore procedure for DNA Center can be used for the following purposes:
More informationBackupAssist V4 vs V5
TECHNICAL COMPARISON BackupAssist Version 4 vs Version 5 www.backupassist.com 2 What s new in BackupAssist Version 5? After another 18 months of solid development, we have three new exciting backup engines,
More informationDOORKING SYSTEMS. PROGRAMMING OVERVIEW Programming from System Keypad Programming through Software Communication from PC to Controller
DOORKING SYSTEMS ACCESS CONTROL SOLUTIONS DKS SOFTWARE AND SYSTEM CONNECTIVITY WORKSHOP PROGRAMMING OVERVIEW Programming from System Keypad Programming through Software Communication from PC to Controller
More informationLiveVault. Agent Guide
LiveVault Software Version: 7.82 Agent Guide Note The guide primarily provides instruction on how to install the LiveVault agent on Windows and Linux servers. Additionally it provides information about
More informationProviding a first class, enterprise-level, backup and archive service for Oxford University
Providing a first class, enterprise-level, backup and archive service for Oxford University delivering responsive, innovative IT 11th June 2013 11 th June 2013 Contents Service description Service infrastructure
More informationBackup the System. Backup Overview. Backup Prerequisites
Backup Overview Backup Overview, on page 1 Backup Prerequisites, on page 1 Backup Task Flow, on page 2 Backup Interactions and Restrictions, on page 7 Cisco recommends performing regular backups. You can
More informationVMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
More informationGuideTorrent. The best excellent exam certification guide torrent and dumps torrent provider
GuideTorrent http://www.guidetorrent.com The best excellent exam certification guide torrent and dumps torrent provider Exam : E20-555 Title : Isilon Solutions and Design Specialist Exam for Technology
More information10 Reasons Why Your DR Plan Won t Work
10 Reasons Why Your DR Plan Won t Work Jim Damoulakis CTO, GlassHouse Technologies, Inc. Sept. 29, 2005 DR Vision Imagine Prepared to handle multiple categories of disaster Clearly documented policies
More informationPolicy & Procedure HIPAA / PRIVACY DESTRUCTION
PURPOSE To ensure that any medium containing Protected Health Information ( PHI ) is properly destroyed. POLICY PHI stored in paper, electronic or other format will be destroyed utilizing an acceptable
More informationGreat Western Painting Assured Equipment Grounding Conductor Program OR Ground Fault Circuit Interrupter (GFCI)
Assured Equipment Grounding Conductor Program OR Ground Fault Circuit Interrupter (GFCI) GROUND FAULT CIRCUIT INTERRUPTERS Wiring design and protection. - 1926.404 Our company uses ground fault circuit
More informationStoreVault and NetApp Snapshot Technology
StoreVault and NetApp Snapshot Technology Instant backup and instant restore The backup window eliminated Added data protection and ease of recovery Introduction 2 How NetApp Snapshot Technology Can Help
More informationFile Protection using rsync. User guide
File Protection using rsync User guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Rsync considerations... 3 3. Creating a File Protection backup using rsync... 4 4.
More informationAuthor: Janice M. Anderson Date: 5/1/2006
Subject: AHC-IS Desktop Policies, Proc and Standards Policy No. 3001 Applicable to: AHC-IS Pages: 6 Author: Janice M. Anderson Date: 5/1/2006 Replaces version Dated: 2005 POLICY: AHC-IS goals for Workstation
More informationThe TRELLIS Real-Time Infrastructure Optimization Platform
The TRELLIS Real-Time Infrastructure Optimization Platform Disaster Recovery Technical Bulletin Technical Support Site If you encounter any installation or operational issues with your product, check the
More informationConfiguring the Cisco Emergency Responder 8.0 Disaster Recovery System
CHAPTER 9 Configuring the Cisco Emergency Responder 8.0 Disaster Recovery System These topics describe how to configure the Cisco Emergency Responder (Cisco ER) 8.0 Disaster Recovery System: What is the
More informationSA-027WQ. Manual. 7-Day Timer. Lighting Systems Access Controls Security Systems Environmental Controls. Automate the following:
SA-027WQ 7-Day Timer Manual Automate the following: Lighting Systems Access Controls Security Systems Environmental Controls 12~24 VAC/VDC Program up to 60 flexible events Holiday function (up to 99 days)
More informationInformation Systems. Data Protection Disaster recovery Backups
Information Systems Data Protection Disaster recovery Backups Data protection act 1998 - Rights The rights of data subjects People whose personal data is stored are called data subjects. The DPA sets uprights
More informationDATA LOSS. - Whitepaper - A look at various data loss issues, how they happen and how you can solve the problem of data loss.
DATA LOSS - Whitepaper - A look at various data loss issues, how they happen and how you can solve the problem of data loss. 1 P a g e Prepared by Try A Million TM for GuruSquad. (C) GuruSquad, 2015. E&OE.
More informationInstalling Acronis Backup Advanced Edition
2015 Installing Acronis Backup Advanced Edition BEST PRACTISE Table of Contents Acronis Backup Advanced components... 4 Management Server... 4 Acronis Storage Node... 4 Agents / Appliance... 4 Bootable
More informationUniversity of Hawaii Hosted Website Service
University of Hawaii Hosted Website Service Table of Contents Website Practices Guide About These Practices 3 Overview 3 Intended Audience 3 Website Lifecycle 3 Phase 3 Begins 3 Ends 3 Description 3 Request
More informationVeritas System Recovery 18 Management Solution Administrator's Guide
Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are
More informationDisaster Recovery System
Backup and Restore Overview, on page 1 Backup Prerequisites, on page 1 Backup Taskflow, on page 3 Backup and Restore Overview The (DRS) provides full data backup for all servers in a Cisco Unified Intelligence
More informationIs Tape Really Cheaper Than Disk?
White Paper 20 October 2005 Dianne McAdam Is Tape Really Cheaper Than Disk? Disk Is... Tape Is... Not since the Y2K phenomenon has the IT industry seen such intensity over technology as it has with the
More informationSpring CISM 3330 Section 01D (crn: # 10300) Monday & Wednesday Classroom Miller 2329 Syllabus revision: #
Spring 2018 - CISM 3330 Section 01D (crn: # 10300) Monday & Wednesday 0800 0915 Classroom Miller 2329 Syllabus revision: # 171124 FACULTY DATA: Dr. Douglas Turner Phone: 678.839.5252 Miller 2223 OFFICE
More informationFile Protection. Whitepaper
Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of... 3 2. Backup considerations... 4 Exchange VM support... 4 Restore
More informationOPERATION MANUAL. Room thermostat EKRTW
OPERATION MANUAL 1 1 2 3 1 2 4 1 2 1 2 3 4 5 6 7 8 11 12 13 14 9 10 15 16 17 18 19 20 21 22 23 2 WARNINGS Never let the thermostat get wet, this may cause an electric shock or fire. Never press the buttons
More informationSAS SOLUTIONS ONDEMAND
DECEMBER 4, 2013 Gary T. Ciampa SAS Solutions OnDemand Advanced Analytics Lab Birmingham Users Group, 2013 OVERVIEW SAS Solutions OnDemand Started in 2000 SAS Advanced Analytics Lab (AAL) Created in 2007
More informationTechnology Disaster Recovery Plan updated 06/16/16
Technology Disaster Recovery Plan updated 06/16/16 Overview In the case of natural or other disaster the district needs to be back in operation and functioning in all areas - business, security, education
More informationCyber security tips and self-assessment for business
Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this
More informationHP Dynamic Deduplication achieving a 50:1 ratio
HP Dynamic Deduplication achieving a 50:1 ratio Table of contents Introduction... 2 Data deduplication the hottest topic in data protection... 2 The benefits of data deduplication... 2 How does data deduplication
More informationHitachi Storage Adapter for Oracle Recovery Manager
Hitachi Storage Adapter for Oracle Recovery Manager v07.1.0 Release Notes Contents About This Document... 2 Intended Audience... 2 Getting Help... 2 About This Release... 3 Hardware and Software... 3 Hardware
More informationMicrosoft Certified Solution Associate Windows Server 2016 Training
Microsoft Certified Solution Associate Windows Server 2016 Training INNOVATIVE ACADEMY s Best Microsoft Training in Bangalore is designed so Innovative to help you clear the Microsoft Certified Solution
More informationOperations ISO Version: 1.6. Effective Date: 8/02/2018. Fieldwork Guide. Fieldwork Guide
REVISION HISTORY VERSION NO. (Must match header) DATE REVISED BY DESCRIPTION 1.0 6/6/2016 EDAS Created Document 1.1 6/29/2016 EDAS Updates to include all Meter Work and instruction 1.2 8/29/2016 EDAS Included
More informationSteps for starting a new installation of JSEAsy
Steps for starting a new installation of JSEAsy The first time you run JSEAsy after installation, if a license has not been previously entered then the following dialogue box will appear. Click on OK and
More information5 Days Course on Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010
PROFESSIONAL TRAINING COURSE 5 Days Course on Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 About the Course This Microsoft Exchange 2010 training class will provide you with
More informationJN0-355 Q&As. Junos Pulse Secure Access, Specialist (JNCIS-SA) Pass Juniper JN0-355 Exam with 100% Guarantee
JN0-355 Q&As Junos Pulse Secure Access, Specialist (JNCIS-SA) Pass Juniper JN0-355 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money
More informationAP41 / AP81 SERIES TIME SWITCHES
FN:AP41_81M1.DOC AP41 / AP81 SERIES TIME SWITCHES AP41 AP81 TABLE OF CONTENTS INTRODUCTION 2 SPECIFICATIONS 2 INSTALLATION 5 FRONT PANEL DESCRIPTION 7 OPERATION 8 Filling out the Program Record Sheet 8
More informationSummary Table of Contents
Copyright Notice Copyright 2006 Online Backup Solution.com All rights reserved. Any technical documentation that is made available by Online Backup Solution.com is the copyrighted work of Online Backup
More informationSystem Management Guide for an STC UTC System
SIEMENS TRAFFIC CONTROLS Sopers Lane, POOLE, Dorset. BH17 7ER. SYSTEM/PROJECT/PRODUCT: STC UTC SYSTEM System Management Guide for an STC PC SCOOT System This is an unpublished work the copyright in which
More informationUsing Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager
White Paper Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager Author(s): Computer Associates International and Microsoft Corporation Published September 2005 Abstract
More informationBackup and Recovery FAQs
Backup and Recovery FAQs Introduction The Backup and Recovery application is an easy to use, easy to manage data backup and disaster recovery solution for your DeltaV Distributed Control System (DCS),
More informationXenData Product Brief: SX-550 Series Servers for LTO Archives
XenData Product Brief: SX-550 Series Servers for LTO Archives The SX-550 Series of Archive Servers creates highly scalable LTO Digital Video Archives that are optimized for broadcasters, video production
More informationAligning Backup, Recovery and Archive
Aligning Backup, Recovery and Allen Ruster EMC Corporation May 9, 2006 Backup and Efficiencies Through ILM Enterprises seeking a successful approach to ILM must embrace a strategy that appropriately addresses
More informationChapter 14: Recovery System
Chapter 14: Recovery System Chapter 14: Recovery System Failure Classification Storage Structure Recovery and Atomicity Log-Based Recovery Remote Backup Systems Failure Classification Transaction failure
More informationChapter 11. SnapProtect Technology
Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting
More informationV91 HDD MAX. Hard drive degausser and Tape eraser
V91 HDD MAX Hard drive degausser and Tape eraser FEATURES High energy degausser for hard drives & magnetic tape 7,000 gauss field strength Less than 12 seconds for complete erasure Cost effective OUR PROMISE
More informationVBAK BEST PRACTICES V3.0
VBAK BEST PRACTICES V3.0 Table of Contents Important Note...2 File System Backup task...3 Microsoft SQL Backup Task...4 Microsoft Exchange DR Backup Task...5 Microsoft Exchange Mailbox Backup Task...6
More informationesureit Online Backup vs. Portable Media
esureit Online Backup vs. Portable Media Online Backup vs. Portable Media May 2008 Backing up data has become a standard business practice and in most industries it is an operational requirement. With
More informationWelcome to Gumnut Cloud
Welcome to Gumnut Cloud How does it work : Benefits Of Gumnut Cloud In our Cloud solution, applications and data are stored, run from, and managed by a central Cloud server. Users do not download and install
More informationICT Security Policy. ~ 1 od 21 ~
ICT Security Policy ~ 1 od 21 ~ Index 1 INTRODUCTION... 3 2 ELEMENTS OF SECURITY CONTROL... 4 2.1 INFORMATION MEDIA MANAGEMENT... 4 2.2 PHYSICAL PROTECTION... 6 2.3 COMMUNICATION AND PRODUCTION MANAGEMENT...
More informationFile Protection Whitepaper
Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of over traditional file copy methods... 3 2. Backup considerations...
More information