Tata Power Company. Ltd.

Size: px
Start display at page:

Download "Tata Power Company. Ltd."

Transcription

1 System Backup Policy and Procedures Guidelines Tata Power Company. Ltd. October 2005 Corporate Information Technology 1

2 2

3 Approval History Rev. 0 October, Signature Created By SHA/FKT/CPS October, 2005 Checked By E. R. Batliwala October, 2005 Approved By VP 3

4 4

5 SAP System Database Backup Policy and Procedures Guidelines 1 Systems Requiring backup Production Landscape consists of Production Server, Quality Assurance Server and Development server. At Present, size of Production Server Database is about 150 GB, Quality Assurance is about 146 GB, and Development around 100 GB. 2 Backup Equipment and Facilities The following backup facilities are available for SAP Systems: At Dharavi, for Production and Quality Servers: The MSL 6000 Tape Library. At Carnac, for Development Server: The local SDLT tape drive (110/220 GB capacity) 3 Backup Schedule Backup of Production Server shall consist of following levels: 1. Production and Quality Assurance Server are in cluster. If Production instance fails, Quality takes over as the primary instance. 2. Dev/DR Server at Carnac is to be kept in sync with Production Server and thus serves as the DR server. 3. Database and Redo Log backups of Production System are to be taken daily. Details are as below: Database Backup cycle of Production Server shall be of 3 weeks. Online Database backup with redo logs is to be taken at 1 AM at night from Tuesday to Saturday. Also a second copy of Offline Redo Logs is to be taken every day in the morning. Offline Database backup with verification is to be taken at 1 am every Monday. Backup Cartridges are required to be sent to remote site storage at Carnac for storage in fire Proof safe twice every week. 4. Backup of Quality and Development Servers: Online Database Backup of Quality Server and Development Servers are to be taken once every week 5

6 Exchange System Backup Policy and Procedures Guidelines 1. Systems Requiring backup Exchange- Exchange 2000 database consisting of totally 10 data base files. (Carnac-bh.edb, Carnac-bh.stm, Hydro.edb, Hydro.stm, priv1.edb, priv1.stm, t&d.edb, t&d.stm, vsat.edb, esat.stm, gold.edb, gold.stm, infotech.edb, infotec.stm, others.edb, others.stm, public-folders.edb, public-folders.stm, trombay.edb, trombay.stm) of the size 33 GB all put together. Backup of the following server are taken in backup folder of Anant server Proxy-Configuration of ISA Server Proxy-Configuration of ISA Server Firewall- fwrules. Incoming mails- aliases Cisco and network device configuration. Domain controller Netscreen VPN 2. Backup Equipment and Facilities The following backup facilities are available for Exchange and backup folder in Anant Server which will have the backup of above mentioned servers. 3. Backup Schedule The MSL 6000 Tape Library (Data Protector). HP Ultrium 200GB Data Cartridge Exchange: Data Protector Auto Tape Library (MSL 6000) dual backup scheduled from Mon- Sat at 11:00 PM in the night. Register entry to be made in the backup log register entering the tape number, date, and operators name into the register, The success or failure of the backup should be recorded and ensure that the tapes are in good condition. The tapes are kept in the fire proof safe. After the backup is over the date of the last backup should be entered on the cover of the tape. If the write cycles have exceeded the limit of the maximum permissible limit, the tape is to be replaced with a new tape. If a change in tapes is to be done, use a fresh tape from Facility Management storage area in Ground Floor. New tape entry to be made in the register and the new tape to be used for backup. The old tapes are required to be marked for end of life and to be preserved for at least 60 days in the FM group safe keeping office at the designated location for old tapes. The work tapes are now to be loaded into the tape library holder. Total two backup copies are to be taken one to be kept in the safe and one in the remote site. 6

7 The DR site Second copy tape is put in Server room in a lockable briefcase to be kept at the DR site twice a week under lock and key. The files pertaining to Proxy and firewall are also stored in the Anant server and the above process will also back up the data for the other systems mentioned above. In case a tape encounters an error, the tape shall be marked with the type of error encountered, date and the operator s name. In such a condition, a new tape shall be used to replace the defective tape, and the original backup process resumed after the procedure for deploying new tapes into backup sequence. The verify switch should be set ON to ensure the integrity of backups taken. 4 Exchange database restoration test The exchange database that is backed up on the tape will be recovered at least once in three months to verify that the exchange backup procedure is working. For this two PC based servers will be used with all the required exchange software and recovery will be tested in a lab setup with no interconnection to the production environment and a record made after restoration. The restore operation will be done for the last backup taken. 7

8 Web based Systems Backup Policy and Procedures Guidelines 1. Systems Requiring backup Web based applications database consisting of totally 60 data base files covering 26 applications and 57 users (database users). The list of applications and users is as below. Backup of Production server and Development server is required to be done for Windows server and Linux server. 2. Backup Equipment and Facilities The following backup facilities are available for Web based applications at Dharavi: 3. Backup Schedule ANANT (NAS) for disk based backup The MSL 6000 Tape Library. HP Ultrium 200GB Data Cartridge Backup of Database and source code is taken at a predefined frequency. It is done in two phases. Phase I Disk based backup from Web application servers (namely Webappln, Webdb, Linuxdev and Windev) to NAS (ANANT). All the disk based backups are done through scripts which are executed through scheduler in server. Database : Following types of backup are taken Archive Log Database is configured in archive mode. This generates archive logs when redo logs are full. These archive logs are transferred to ANANT and stored in respective day s directory. The cycle of storing archive files are 7 days on ANANT and 12 days on Cartridges. Export dump : Export dump at user level is taken for all the users defined in Production database and transferred to local directory. Copy of the same is transferred to ANANT for disk based backup. The dump files are stored in application owner wise directory in local drive. Access to these directories has been provided to each application owner for downloading / uploading export 8

9 dump. Export backups are taken twice a day scheduled at 0430 hrs and 1900 hrs. The morning export dumps are transferred to ANANT and stored day wise. The cycle of storing these export dumps in local server is 1 day, in NAS is for 7 days and in cartridges is for 12 days. Hot Physical Backup Hot Physical backup of database is taken daily through script at 0530 hrs into the ANANT. The cycle of storing these hot physical backup is 6 days (excl Saturday because of cold backup) in ANANT and 12 days in cartridges. Cold Physical Backup Cold Physical backup of database is taken once a week on Saturday through script at 0700 hrs into the ANANT. The cycle of storing these cold physical backup is 1 day per week in ANANT and 6 days (1.5 month cycle) in cartridges. Source Code (Production) Backup of source code is taken once a week on Saturday through script at 0700 hrs into the ANANT. The cycle of storing these Source code backup is 1 day per week in ANANT and 6 days (1.5 month cycle) in cartridges. WEbdb (Linux) Backup of source code and data is taken everyday on Webdev server under individual week days and FTPed to Anant in respective day s folder. The cycle of storing these source and file backup is 6 days in ANANT and 12 days in cartridges Weekly cycle of data backup one day per week (Saturday) on ANANT and 6 days in cartridges. Development Servers Development servers follow sequence same as production and sends data on ANANT. 9

10 Phase II Backup of data transferred on ANANT remains in directories created day wise. The entire backup namely Archive, export, hot, physical and source code are stored in respective day s directory. Based on the schedule prepared these daily files are transferred into cartridges. As the total size of these files is much less compared to size of the cartridges, all these are stored in single cartridge only. With the help of Data Protector, data is saved onto cartridges. 10

11 General Media Handling, Storage and Security Guidelines 1. Backup Media Safe Keeping and Storage The backup safe keeping designated areas are the Administrator s seating place in Dharavi which is a lockable safe. The keys of this locker are to be kept with FM project manager. 2. Backup Security The security of the tapes is to be ensured by means of transporting the tapes in lockable briefcase to the remote site. The storage security of the tapes shall be ensured by means of lockable steel/fireproof cupboards at the designated storage location areas. 3. Purchase of Media- Quality Assurance, Testing, and Certification All media shall be purchased through reliable suppliers and made by reputed brands such as Fujitsu, Sony, HP, etc. The media shall be checked for any apparent physical damages. A test backup will be taken with verify switch on to check the integrity of the media before first use. A serial number will be assigned to the media which pass the media verification test. This number shall be entered into the register and clearly marked on the tape with date of first usage. New Tapes shall be ordered as soon as the number of spare tapes falls below the reorder level i.e. 2~4. 4. Discarding the Media All media at the end-of-life will be subject to discarding after a cycle of 30 usages (30 weeks) or with an upper limit as specified by the particular vendor. However the media on end of life shall be preserved for a period of at least 60 days before it is sent for erasure and destruction facility. The System Administrator shall ensure that the tapes are fully erased either by overwriting the tapes with blank data, before the tapes are sent for the destruction if the tape is still writeable. If a tape is known to be faulty, no attempt should be made to erase it by putting into the tape library in order to avoid possible damage to the tape mechanism. An entry in the log book shall be made recording the tape serial number, number of write cycles, and the reason for discarding the tape (physical damage, errors, or end of life) 5. Backup Responsibilities- Operation The FM group shall perform the backup on a day to day basis. After the backup has been taken automatically by the data protector at previous night, the FM engineer shall check the log for success of the backup. If there is any backup 11

12 failure, then the reason shall be investigated and resolved. The successful backup shall be kept at appropriate designated storage area after removing the tapes from the backup device. However in the event of any emergency situation wherein the regular FM engineer is not available, the System Administrator shall follow the above backup procedure. 6. Records, Logs Maintenance A register shall be maintained at Dharavi for recording the backup logs. The register will have the details of the tapes being used for the backup and the tape number to be used for the day. It will record the success and failure of the tape number for the tapes used the previous night. It will record which tape is present at the remote site. If there was any failure of the backup during the last backup operation, the type of error and action taken shall be clearly be mentioned. 7. Transport procedure A register shall be maintained at Dharavi for keeping the records of Offsite movement of Backup Tapes. The register will have the details of the Tapes which are sent offsite (Carnac) and received from offsite. While the tapes are sent to offsite two copies of forms shall also be sent which will have the information about the tapes which are going to Carnac and coming from Carnac. Verification of the form is to be done by the offsite backup supervisor, after examining the tapes the supervisor shall give one form back along with the tapes which is mentioned in the form. For sending Tapes to Offsite storage facility, a proper gate pass shall be prepared duly signed and authorized by FM Engineer, FM Manager & TPC IT Manager respectively. 8. Disposal of Media The table below describes the disposal method for various media types having high sensitivity: S.N. Media Treatment Comment 1. Tapes (Faulty or Working) Open case and cut the reel, or Direct Degauss 2. Floppies (Faulty or Working) Cut or Direct Degauss Safety to be exercise with cutting tools Safety to be exercised with cutting tools 3. Hard Disks (working) Full Format Do not Degauss 4. Hard Disks (Faulty) Direct Degauss, Crush 5. R/W CDROM (working) Full Erase 12

13 6. R/W, R CDROM Cut Safety to be exercised with cutting tools. 7. Pen Drives, Flash, SDRAM Crush etc After the data sanitization exercise is complete, a record will be made in the media register maintained by the data/media owners and certified by the owner and at least one witness. 13

DATA BACKUP AND RECOVERY POLICY

DATA BACKUP AND RECOVERY POLICY DATA BACKUP AND RECOVERY POLICY 4ITP04 Revision 01 TABLE OF CONTENTS 1. REVISION RECORD... 3 2. PURPOSE... 4 3. SCOPE AND APPLICABILITY... 4 4. DEFINITIONS AND ABBREVIATIONS... 4 5. POLICY STATEMENTS...

More information

Backup Exec Supplement

Backup Exec Supplement Vision 3 Backup Exec Supplement INPS INPS The Bread Factory, 1A Broughton Street, Battersea, London, SW8 3QJ T: +44 (0) 207 501700 F:+44 (0) 207 5017100 W: www.inps.co.uk Table of Editions and Contents

More information

Backup and Restore SOP FOR CONGO CLUSTER

Backup and Restore SOP FOR CONGO CLUSTER Backup and Restore SOP FOR CONGO CLUSTER IT Department, Congo Cluster Version 1.0 January 2008 1. Contents 1. CONTENTS... 2 2. INTRODUCTION TO BACKUPS... 3 2.1. Objectives... 3 2.2. Scope of the document...

More information

IT CONTINUITY, BACKUP AND RECOVERY POLICY

IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption

More information

Back up and Restoration Policy. of VIJETA BROKING INDIA PRIVATE LIMITED

Back up and Restoration Policy. of VIJETA BROKING INDIA PRIVATE LIMITED Back up and Restoration Policy of VIJETA BROKING INDIA PRIVATE LIMITED Table of Content 1 Overview... 3 2 Purpose... 3 3 Scope... 3 4 Definitions... 3 5 Timing... 4 6 Policy... 4 7 Backup of Older Versions...

More information

Data Storage, Recovery and Backup Checklists for Public Health Laboratories

Data Storage, Recovery and Backup Checklists for Public Health Laboratories Data Storage, Recovery and Backup Checklists for Public Health Laboratories DECEMBER 2018 Introduction Data play a critical role in the operation of a laboratory information management system (LIMS) and

More information

University Information Systems. Administrative Computing Services. Contingency Plan. Overview

University Information Systems. Administrative Computing Services. Contingency Plan. Overview University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview

More information

University Information Technology Data Backup and Recovery Policy

University Information Technology Data Backup and Recovery Policy University Information Technology Data Backup and Recovery Policy I. Purpose and Scope A. The purpose of this policy is to document the University of Utah Information Technology (UIT) data backup and recovery

More information

Chapter 17: Recovery System

Chapter 17: Recovery System Chapter 17: Recovery System Database System Concepts See www.db-book.com for conditions on re-use Chapter 17: Recovery System Failure Classification Storage Structure Recovery and Atomicity Log-Based Recovery

More information

When Will Client Computer Backups Be Backed-up Online?

When Will Client Computer Backups Be Backed-up Online? Using KeepVault to Backup your WD Sentinel KeepVault Online Backup provides offsite disaster- proof protection for all your important data. KeepVault lets you backup regular directories and folder shares,

More information

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version : HP HP0-771 Designing and Implementing HP Enterprise Backup Solutions Download Full Version : http://killexams.com/pass4sure/exam-detail/hp0-771 A. copy backup B. normal backup C. differential backup D.

More information

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise SQL 2008 R2 Enterprise Restrictions 8 CPU 2 TB Ram Use Limit 524 PB Database Size High Availability Options Database Mirroring,

More information

DBDS Backup and Restore Procedures For SR 2.2 and SR 3.2, SR 2.4 and SR 3.4, SR 2.5 and SR 3.5, and SR 3.3

DBDS Backup and Restore Procedures For SR 2.2 and SR 3.2, SR 2.4 and SR 3.4, SR 2.5 and SR 3.5, and SR 3.3 DBDS Backup and Restore Procedures For SR 2.2 and SR 3.2, SR 2.4 and SR 3.4, SR 2.5 and SR 3.5, and SR 3.3 Please Read Important Please read this entire guide. If this guide provides installation or operation

More information

ZYNSTRA TECHNICAL BRIEFING NOTE

ZYNSTRA TECHNICAL BRIEFING NOTE ZYNSTRA TECHNICAL BRIEFING NOTE Backup What is Backup? Backup is a service that forms an integral part of each Cloud Managed Server. Its purpose is to regularly store an additional copy of your data and

More information

EMC VNXe3200 Unified Snapshots

EMC VNXe3200 Unified Snapshots White Paper Abstract This white paper reviews and explains the various operations, limitations, and best practices supported by the Unified Snapshots feature on the VNXe3200 system. July 2015 Copyright

More information

Practice Test. Microsoft Microsoft PRO: Deploying Messaging Solutions with Microsoft Exchange Server Version 2.

Practice Test. Microsoft Microsoft PRO: Deploying Messaging Solutions with Microsoft Exchange Server Version 2. Microsoft 70-238 Microsoft 70-238 PRO: Deploying Messaging Solutions with Microsoft Exchange Server 2007 Practice Test Version 2.1 QUESTION NO: 1 Microsoft 70-238: Practice Exam You are a messaging professional.

More information

Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2)

Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2) Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2) Published: April 2, 2010 This guide provides an overview of the Disaster Recovery System, describes

More information

FEATURES OUR PROMISE U.S U.K. +44 (0)

FEATURES OUR PROMISE U.S U.K. +44 (0) DATAGONE LG A high speed Automatic Hard Drive & Backup Tape Degausser with Data Destruction Auditor Report Writer - Now with optional self adhesive Degauss Details Label FEATURES Single Pass fully automatic

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Data Lifecycle Management No: Effective: OSC-1 May 1, 2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication

More information

Integrating RDX QuikStor into NetJapan ActiveImage Protector

Integrating RDX QuikStor into NetJapan ActiveImage Protector Integrating RDX QuikStor into NetJapan ActiveImage Protector INTEGRATION BRIEF Backup is the life insurance of a company as it protects its crown jewels. Backup ensures data availability and business continuity

More information

Nortel Quality Monitoring. Maintenance Guide NN

Nortel Quality Monitoring. Maintenance Guide NN NN44480-504 Document status: Standard Document version: 0102 Document date: 6 November 2009 All Rights Reserved While the information in this document is believed to be accurate and reliable, except as

More information

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules

More information

Retrospect 8 for Windows Reviewer s Guide

Retrospect 8 for Windows Reviewer s Guide Retrospect 8 for Windows Reviewer s Guide 2012 Retrospect, Inc. About this Reviewer s Guide This document provides a concise guide to understanding Retrospect 8 for Windows. While it is not designed to

More information

Department of Chemistry

Department of Chemistry Department of Chemistry Guidelines for the Confocal Laser Scanning Microscopes The Department of Chemistry (CHEM) has two confocal laser scanning microscopes (confocal microscope) for imaging uses: 1.

More information

Chapter 2 CommVault Data Management Concepts

Chapter 2 CommVault Data Management Concepts Chapter 2 CommVault Data Management Concepts 10 - CommVault Data Management Concepts The Simpana product suite offers a wide range of features and options to provide great flexibility in configuring and

More information

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015 VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation

More information

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES RECORDS MANAGEMENT DEPARTMENT OF THE TREASURY, DIVISION OF REVENUE AND ENTERPRISE SERVICES, RECORDS MANAGEMENT SERVICES RECORDS MANAGEMENT SERVICES Records Management Services, Division of Revenue and

More information

Cisco Unified CM Disaster Recovery System

Cisco Unified CM Disaster Recovery System Cisco Unified CM Disaster Recovery System Disaster Recovery System, page 1 Quick-reference tables for backup and restore procedures, page 3 Supported features and components, page 5 System requirements,

More information

HP Data Protector Media Operations 6.11

HP Data Protector Media Operations 6.11 HP Data Protector Media Operations 6.11 Getting started This guide describes installing, starting and configuring Media Operations. Copyright 2009 Hewlett-Packard Development Company, L.P. Part number:

More information

Tuskegee Backup and Offsite Policy and Procedures

Tuskegee Backup and Offsite Policy and Procedures TUSKEGEE UNVERSTY OCE O NORMATON TECHNOLOGY Tuskegee Backup and Offsite Policy and Procedures Purpose This policy defines how to safeguard the information assets of the University and how copies of stored

More information

2. Scope: 2.1 This procedure encompasses all organisations within the Clement Clarke Holdings group.

2. Scope: 2.1 This procedure encompasses all organisations within the Clement Clarke Holdings group. Date: 01/06/2011 Reviewed: 08/12/2011 Issue: 2 SI No: P3010 Prepared by: J. Hopkins Approved by: G. Ostacchini Title: Backup & Retrieval Procedure 1 Introduction: 1.1 The purpose of this procedure is to

More information

IronSync File Synchronization Server. IronSync FILE SYNC SERVER. User Manual. Version 2.6. May Flexense Ltd.

IronSync File Synchronization Server. IronSync FILE SYNC SERVER. User Manual. Version 2.6. May Flexense Ltd. IronSync FILE SYNC SERVER User Manual Version 2.6 May 2014 www.ironsync.com info@flexense.com 1 1 Product Overview...3 2 Product Installation Procedure...4 3 Using IronSync Client GUI Application...5 3.1

More information

Records Information Management

Records Information Management Information Systems Sciences Records Information Management Region V Spring Conference March 26, 2015 Was I supposed to keep that 1 Where did we store that 2 Space Issues. Need storage space for a classroom

More information

Backup and Restore Introduction

Backup and Restore Introduction The ability to recover from a disaster is an essential part of any system maintenance plan. As part of your disaster recovery plan, Cisco recommends that you back up the Firepower Management Center and

More information

Recommended Backup Strategy for FileMaker Pro Server 7/8/9 for Macintosh & Windows Updated February 2008

Recommended Backup Strategy for FileMaker Pro Server 7/8/9 for Macintosh & Windows Updated February 2008 Recommended Backup Strategy for FileMaker Pro Server 7/8/9 for Macintosh & Windows Updated February 2008 This document provides a single cohesive document for managing and understanding data backups for

More information

Google Cloud Whitepaper September Data deletion on Google Cloud Platform

Google Cloud Whitepaper September Data deletion on Google Cloud Platform Google Cloud Whitepaper September 2018 Data deletion on Google Cloud Platform Table of contents Overview 3 CIO-level summary 3 Introduction 4 Data storage and replication 5 Secure and effective data deletion

More information

PowerLink Host Data Manager User Guide

PowerLink Host Data Manager User Guide PowerLink Host Data Manager User Guide Last Updated: July 2009 Version: 2.06014 Contents Contents... 2 Introduction... 4 Quick Start... 5 Enable File Monitoring... 7 Enabling Attaché 7 File Monitoring

More information

Chapter 10 Protecting Virtual Environments

Chapter 10 Protecting Virtual Environments Chapter 10 Protecting Virtual Environments 164 - Protecting Virtual Environments As more datacenters move to virtualize their environments and the number of virtual machines and the physical hosts they

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

Solution Brief: Archiving Avid Interplay Projects using NLT and XenData

Solution Brief: Archiving Avid Interplay Projects using NLT and XenData Solution Brief: Archiving Avid Interplay Projects using NLT and XenData Contents 1. Introduction to the Open Interplay Archive 2. Solution Benefits 3. System Architecture 4. How to Archive and Restore

More information

SOUTH AFRICAN LIBRARY FOR THE BLIND (SALB)

SOUTH AFRICAN LIBRARY FOR THE BLIND (SALB) Name of Institution SOUTH AFRICAN LIBRARY FOR THE BLIND (SALB) Bid Number SALB 2019/01/01 A Description ICT Disaster Recovery and ICT Business Continuity Services to SALB Date Published 20/03/2019 Closing

More information

General Data Protection Regulation policy (exams) 2017/18

General Data Protection Regulation policy (exams) 2017/18 General Data Protection Regulation policy () 2017/18 This policy is annually reviewed to ensure compliance with current regulations This policy can beviewed on the school website Approved/reviewed by Gail

More information

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault Introduction What is Microsoft Data Protection Manager (DPM)? The Microsoft Data Protection Manager is a member of the Microsoft System Center family of management products. DPM provides continuous data

More information

INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE

INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE Michael Poulson and Devin Jansen EMS Software Software Support Engineer October 16-18, 2017 Performance Improvements and Best Practices Medium-Volume Traffic

More information

Administrative Procedures Manual. Office of Information Technology Services Cape Fear Community College October 23, 2015

Administrative Procedures Manual. Office of Information Technology Services Cape Fear Community College October 23, 2015 Administrative Procedures Manual Office of Information Technology Services Cape Fear Community College October 23, 2015 1 Introduction Cape Fear Community College has adopted the IT Standards published

More information

File Protection Whitepaper

File Protection Whitepaper File Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of File Protection over traditional file copy methods... 3

More information

NETVAULT BACKUP SYSTEM ADMINISTRATION COMPLETE - INSTRUCTOR LED TRAINING

NETVAULT BACKUP SYSTEM ADMINISTRATION COMPLETE - INSTRUCTOR LED TRAINING NETVAULT BACKUP SYSTEM ADMINISTRATION COMPLETE - INSTRUCTOR LED TRAINING The NetVault Backup System Administration Complete Instructor-led training course is designed to instruct students on the essentials

More information

Mag EraSURE TM Professional Value Product Manual

Mag EraSURE TM Professional Value Product Manual Mag EraSURE TM Professional Value Product Manual Yamagata Fujitsu Limited - 1 - Table of Contents 1.0 Mag EraSURE...- 3-2.0 Mag EraSURE Overview...- 4-3.0 Mag EraSURE Operation...- 6-3-1 Setting Up...-

More information

Back Up and Restore Cisco DNA Center

Back Up and Restore Cisco DNA Center About Backup and Restore, page 1 Back Up the DNA Center, page 2 Restore DNA Center, page 3 About Backup and Restore The backup and restore procedure for DNA Center can be used for the following purposes:

More information

BackupAssist V4 vs V5

BackupAssist V4 vs V5 TECHNICAL COMPARISON BackupAssist Version 4 vs Version 5 www.backupassist.com 2 What s new in BackupAssist Version 5? After another 18 months of solid development, we have three new exciting backup engines,

More information

DOORKING SYSTEMS. PROGRAMMING OVERVIEW Programming from System Keypad Programming through Software Communication from PC to Controller

DOORKING SYSTEMS. PROGRAMMING OVERVIEW Programming from System Keypad Programming through Software Communication from PC to Controller DOORKING SYSTEMS ACCESS CONTROL SOLUTIONS DKS SOFTWARE AND SYSTEM CONNECTIVITY WORKSHOP PROGRAMMING OVERVIEW Programming from System Keypad Programming through Software Communication from PC to Controller

More information

LiveVault. Agent Guide

LiveVault. Agent Guide LiveVault Software Version: 7.82 Agent Guide Note The guide primarily provides instruction on how to install the LiveVault agent on Windows and Linux servers. Additionally it provides information about

More information

Providing a first class, enterprise-level, backup and archive service for Oxford University

Providing a first class, enterprise-level, backup and archive service for Oxford University Providing a first class, enterprise-level, backup and archive service for Oxford University delivering responsive, innovative IT 11th June 2013 11 th June 2013 Contents Service description Service infrastructure

More information

Backup the System. Backup Overview. Backup Prerequisites

Backup the System. Backup Overview. Backup Prerequisites Backup Overview Backup Overview, on page 1 Backup Prerequisites, on page 1 Backup Task Flow, on page 2 Backup Interactions and Restrictions, on page 7 Cisco recommends performing regular backups. You can

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

GuideTorrent. The best excellent exam certification guide torrent and dumps torrent provider

GuideTorrent.   The best excellent exam certification guide torrent and dumps torrent provider GuideTorrent http://www.guidetorrent.com The best excellent exam certification guide torrent and dumps torrent provider Exam : E20-555 Title : Isilon Solutions and Design Specialist Exam for Technology

More information

10 Reasons Why Your DR Plan Won t Work

10 Reasons Why Your DR Plan Won t Work 10 Reasons Why Your DR Plan Won t Work Jim Damoulakis CTO, GlassHouse Technologies, Inc. Sept. 29, 2005 DR Vision Imagine Prepared to handle multiple categories of disaster Clearly documented policies

More information

Policy & Procedure HIPAA / PRIVACY DESTRUCTION

Policy & Procedure HIPAA / PRIVACY DESTRUCTION PURPOSE To ensure that any medium containing Protected Health Information ( PHI ) is properly destroyed. POLICY PHI stored in paper, electronic or other format will be destroyed utilizing an acceptable

More information

Great Western Painting Assured Equipment Grounding Conductor Program OR Ground Fault Circuit Interrupter (GFCI)

Great Western Painting Assured Equipment Grounding Conductor Program OR Ground Fault Circuit Interrupter (GFCI) Assured Equipment Grounding Conductor Program OR Ground Fault Circuit Interrupter (GFCI) GROUND FAULT CIRCUIT INTERRUPTERS Wiring design and protection. - 1926.404 Our company uses ground fault circuit

More information

StoreVault and NetApp Snapshot Technology

StoreVault and NetApp Snapshot Technology StoreVault and NetApp Snapshot Technology Instant backup and instant restore The backup window eliminated Added data protection and ease of recovery Introduction 2 How NetApp Snapshot Technology Can Help

More information

File Protection using rsync. User guide

File Protection using rsync. User guide File Protection using rsync User guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Rsync considerations... 3 3. Creating a File Protection backup using rsync... 4 4.

More information

Author: Janice M. Anderson Date: 5/1/2006

Author: Janice M. Anderson Date: 5/1/2006 Subject: AHC-IS Desktop Policies, Proc and Standards Policy No. 3001 Applicable to: AHC-IS Pages: 6 Author: Janice M. Anderson Date: 5/1/2006 Replaces version Dated: 2005 POLICY: AHC-IS goals for Workstation

More information

The TRELLIS Real-Time Infrastructure Optimization Platform

The TRELLIS Real-Time Infrastructure Optimization Platform The TRELLIS Real-Time Infrastructure Optimization Platform Disaster Recovery Technical Bulletin Technical Support Site If you encounter any installation or operational issues with your product, check the

More information

Configuring the Cisco Emergency Responder 8.0 Disaster Recovery System

Configuring the Cisco Emergency Responder 8.0 Disaster Recovery System CHAPTER 9 Configuring the Cisco Emergency Responder 8.0 Disaster Recovery System These topics describe how to configure the Cisco Emergency Responder (Cisco ER) 8.0 Disaster Recovery System: What is the

More information

SA-027WQ. Manual. 7-Day Timer. Lighting Systems Access Controls Security Systems Environmental Controls. Automate the following:

SA-027WQ. Manual. 7-Day Timer. Lighting Systems Access Controls Security Systems Environmental Controls. Automate the following: SA-027WQ 7-Day Timer Manual Automate the following: Lighting Systems Access Controls Security Systems Environmental Controls 12~24 VAC/VDC Program up to 60 flexible events Holiday function (up to 99 days)

More information

Information Systems. Data Protection Disaster recovery Backups

Information Systems. Data Protection Disaster recovery Backups Information Systems Data Protection Disaster recovery Backups Data protection act 1998 - Rights The rights of data subjects People whose personal data is stored are called data subjects. The DPA sets uprights

More information

DATA LOSS. - Whitepaper - A look at various data loss issues, how they happen and how you can solve the problem of data loss.

DATA LOSS. - Whitepaper -   A look at various data loss issues, how they happen and how you can solve the problem of data loss. DATA LOSS - Whitepaper - A look at various data loss issues, how they happen and how you can solve the problem of data loss. 1 P a g e Prepared by Try A Million TM for GuruSquad. (C) GuruSquad, 2015. E&OE.

More information

Installing Acronis Backup Advanced Edition

Installing Acronis Backup Advanced Edition 2015 Installing Acronis Backup Advanced Edition BEST PRACTISE Table of Contents Acronis Backup Advanced components... 4 Management Server... 4 Acronis Storage Node... 4 Agents / Appliance... 4 Bootable

More information

University of Hawaii Hosted Website Service

University of Hawaii Hosted Website Service University of Hawaii Hosted Website Service Table of Contents Website Practices Guide About These Practices 3 Overview 3 Intended Audience 3 Website Lifecycle 3 Phase 3 Begins 3 Ends 3 Description 3 Request

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

Disaster Recovery System

Disaster Recovery System Backup and Restore Overview, on page 1 Backup Prerequisites, on page 1 Backup Taskflow, on page 3 Backup and Restore Overview The (DRS) provides full data backup for all servers in a Cisco Unified Intelligence

More information

Is Tape Really Cheaper Than Disk?

Is Tape Really Cheaper Than Disk? White Paper 20 October 2005 Dianne McAdam Is Tape Really Cheaper Than Disk? Disk Is... Tape Is... Not since the Y2K phenomenon has the IT industry seen such intensity over technology as it has with the

More information

Spring CISM 3330 Section 01D (crn: # 10300) Monday & Wednesday Classroom Miller 2329 Syllabus revision: #

Spring CISM 3330 Section 01D (crn: # 10300) Monday & Wednesday Classroom Miller 2329 Syllabus revision: # Spring 2018 - CISM 3330 Section 01D (crn: # 10300) Monday & Wednesday 0800 0915 Classroom Miller 2329 Syllabus revision: # 171124 FACULTY DATA: Dr. Douglas Turner Phone: 678.839.5252 Miller 2223 OFFICE

More information

File Protection. Whitepaper

File Protection. Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of... 3 2. Backup considerations... 4 Exchange VM support... 4 Restore

More information

OPERATION MANUAL. Room thermostat EKRTW

OPERATION MANUAL. Room thermostat EKRTW OPERATION MANUAL 1 1 2 3 1 2 4 1 2 1 2 3 4 5 6 7 8 11 12 13 14 9 10 15 16 17 18 19 20 21 22 23 2 WARNINGS Never let the thermostat get wet, this may cause an electric shock or fire. Never press the buttons

More information

SAS SOLUTIONS ONDEMAND

SAS SOLUTIONS ONDEMAND DECEMBER 4, 2013 Gary T. Ciampa SAS Solutions OnDemand Advanced Analytics Lab Birmingham Users Group, 2013 OVERVIEW SAS Solutions OnDemand Started in 2000 SAS Advanced Analytics Lab (AAL) Created in 2007

More information

Technology Disaster Recovery Plan updated 06/16/16

Technology Disaster Recovery Plan updated 06/16/16 Technology Disaster Recovery Plan updated 06/16/16 Overview In the case of natural or other disaster the district needs to be back in operation and functioning in all areas - business, security, education

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

HP Dynamic Deduplication achieving a 50:1 ratio

HP Dynamic Deduplication achieving a 50:1 ratio HP Dynamic Deduplication achieving a 50:1 ratio Table of contents Introduction... 2 Data deduplication the hottest topic in data protection... 2 The benefits of data deduplication... 2 How does data deduplication

More information

Hitachi Storage Adapter for Oracle Recovery Manager

Hitachi Storage Adapter for Oracle Recovery Manager Hitachi Storage Adapter for Oracle Recovery Manager v07.1.0 Release Notes Contents About This Document... 2 Intended Audience... 2 Getting Help... 2 About This Release... 3 Hardware and Software... 3 Hardware

More information

Microsoft Certified Solution Associate Windows Server 2016 Training

Microsoft Certified Solution Associate Windows Server 2016 Training Microsoft Certified Solution Associate Windows Server 2016 Training INNOVATIVE ACADEMY s Best Microsoft Training in Bangalore is designed so Innovative to help you clear the Microsoft Certified Solution

More information

Operations ISO Version: 1.6. Effective Date: 8/02/2018. Fieldwork Guide. Fieldwork Guide

Operations ISO Version: 1.6. Effective Date: 8/02/2018. Fieldwork Guide. Fieldwork Guide REVISION HISTORY VERSION NO. (Must match header) DATE REVISED BY DESCRIPTION 1.0 6/6/2016 EDAS Created Document 1.1 6/29/2016 EDAS Updates to include all Meter Work and instruction 1.2 8/29/2016 EDAS Included

More information

Steps for starting a new installation of JSEAsy

Steps for starting a new installation of JSEAsy Steps for starting a new installation of JSEAsy The first time you run JSEAsy after installation, if a license has not been previously entered then the following dialogue box will appear. Click on OK and

More information

5 Days Course on Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010

5 Days Course on Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 PROFESSIONAL TRAINING COURSE 5 Days Course on Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 About the Course This Microsoft Exchange 2010 training class will provide you with

More information

JN0-355 Q&As. Junos Pulse Secure Access, Specialist (JNCIS-SA) Pass Juniper JN0-355 Exam with 100% Guarantee

JN0-355 Q&As. Junos Pulse Secure Access, Specialist (JNCIS-SA) Pass Juniper JN0-355 Exam with 100% Guarantee JN0-355 Q&As Junos Pulse Secure Access, Specialist (JNCIS-SA) Pass Juniper JN0-355 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money

More information

AP41 / AP81 SERIES TIME SWITCHES

AP41 / AP81 SERIES TIME SWITCHES FN:AP41_81M1.DOC AP41 / AP81 SERIES TIME SWITCHES AP41 AP81 TABLE OF CONTENTS INTRODUCTION 2 SPECIFICATIONS 2 INSTALLATION 5 FRONT PANEL DESCRIPTION 7 OPERATION 8 Filling out the Program Record Sheet 8

More information

Summary Table of Contents

Summary Table of Contents Copyright Notice Copyright 2006 Online Backup Solution.com All rights reserved. Any technical documentation that is made available by Online Backup Solution.com is the copyrighted work of Online Backup

More information

System Management Guide for an STC UTC System

System Management Guide for an STC UTC System SIEMENS TRAFFIC CONTROLS Sopers Lane, POOLE, Dorset. BH17 7ER. SYSTEM/PROJECT/PRODUCT: STC UTC SYSTEM System Management Guide for an STC PC SCOOT System This is an unpublished work the copyright in which

More information

Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager

Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager White Paper Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager Author(s): Computer Associates International and Microsoft Corporation Published September 2005 Abstract

More information

Backup and Recovery FAQs

Backup and Recovery FAQs Backup and Recovery FAQs Introduction The Backup and Recovery application is an easy to use, easy to manage data backup and disaster recovery solution for your DeltaV Distributed Control System (DCS),

More information

XenData Product Brief: SX-550 Series Servers for LTO Archives

XenData Product Brief: SX-550 Series Servers for LTO Archives XenData Product Brief: SX-550 Series Servers for LTO Archives The SX-550 Series of Archive Servers creates highly scalable LTO Digital Video Archives that are optimized for broadcasters, video production

More information

Aligning Backup, Recovery and Archive

Aligning Backup, Recovery and Archive Aligning Backup, Recovery and Allen Ruster EMC Corporation May 9, 2006 Backup and Efficiencies Through ILM Enterprises seeking a successful approach to ILM must embrace a strategy that appropriately addresses

More information

Chapter 14: Recovery System

Chapter 14: Recovery System Chapter 14: Recovery System Chapter 14: Recovery System Failure Classification Storage Structure Recovery and Atomicity Log-Based Recovery Remote Backup Systems Failure Classification Transaction failure

More information

Chapter 11. SnapProtect Technology

Chapter 11. SnapProtect Technology Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting

More information

V91 HDD MAX. Hard drive degausser and Tape eraser

V91 HDD MAX. Hard drive degausser and Tape eraser V91 HDD MAX Hard drive degausser and Tape eraser FEATURES High energy degausser for hard drives & magnetic tape 7,000 gauss field strength Less than 12 seconds for complete erasure Cost effective OUR PROMISE

More information

VBAK BEST PRACTICES V3.0

VBAK BEST PRACTICES V3.0 VBAK BEST PRACTICES V3.0 Table of Contents Important Note...2 File System Backup task...3 Microsoft SQL Backup Task...4 Microsoft Exchange DR Backup Task...5 Microsoft Exchange Mailbox Backup Task...6

More information

esureit Online Backup vs. Portable Media

esureit Online Backup vs. Portable Media esureit Online Backup vs. Portable Media Online Backup vs. Portable Media May 2008 Backing up data has become a standard business practice and in most industries it is an operational requirement. With

More information

Welcome to Gumnut Cloud

Welcome to Gumnut Cloud Welcome to Gumnut Cloud How does it work : Benefits Of Gumnut Cloud In our Cloud solution, applications and data are stored, run from, and managed by a central Cloud server. Users do not download and install

More information

ICT Security Policy. ~ 1 od 21 ~

ICT Security Policy. ~ 1 od 21 ~ ICT Security Policy ~ 1 od 21 ~ Index 1 INTRODUCTION... 3 2 ELEMENTS OF SECURITY CONTROL... 4 2.1 INFORMATION MEDIA MANAGEMENT... 4 2.2 PHYSICAL PROTECTION... 6 2.3 COMMUNICATION AND PRODUCTION MANAGEMENT...

More information

File Protection Whitepaper

File Protection Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of over traditional file copy methods... 3 2. Backup considerations...

More information