index_R

 < Day Day Up >   


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Radio frequency interference (RFI)
RAID (Redundant Array of Independent Disks) 2nd 3rd
     controllers in 2nd
     defined
     remote copy with
     vs. remote copy 2nd
Random errors in restore operations
RDBMs (Relational Database Management Systems)
Read heads
Records management vs. ILM 2nd
Recovery [See also Restoration and recovery]
Recovery Point Objective (RPO)
     defined
     in backups 2nd
Recovery Time Objective (RTO)
     defined
     in backups 2nd
Redundant Array of Independent Disks (RAID) 2nd 3rd
     controllers in 2nd
     defined
     remote copy with
     vs. remote copy 2nd
Regulatory concerns
     and laws
     costs
     data protection for
     e-Privacy Directive
     Health Insurance Portability and Accountability Act
     Sarbanes-Oxley Act 2nd
Relational Database Management Systems (RDBMs)
Relationships 2nd 3rd
Remote copy 2nd 3rd 4th
     case study
     defined
     design considerations for 2nd
         bandwidth 2nd 3rd
         bunkering 2nd 3rd
         costs
         latency 2nd 3rd 4th
         SANs
         synchronous and asynchronous 2nd 3rd
     failover in 2nd
     key points
     topologies in
         disk system 2nd 3rd
         host-based 2nd
         network-based 2nd 3rd
     vs. backups 2nd 3rd
     vs. replication
Remote network connections
Replacement value of information
Replication 2nd
     case study
     database and e-mail 2nd
     defined
     event-driven vs. timed
     file
     key points
     vs. backups 2nd 3rd
Resource efficiency, ILM for
Resource material 2nd
Restoration and recovery 2nd 3rd [See also Backups]
     application-level 2nd 3rd 4th 5th 6th
     costs of
     defined
     in disaster recovery 2nd
    issues
         bad backups 2nd
         bad media 2nd
         data corruption 2nd
         network congestion
     selective 2nd
     software for 2nd 3rd
     storage systems for 2nd 3rd
Retention policies
RFI (radio frequency interference)
Risk 2nd
     from connectivity 2nd 3rd 4th
     storage security breach outcomes 2nd
     vendor lock-in 2nd
Rotating backups 2nd
RPO (Recovery Point Objective)
     defined
     in backups 2nd
RTO (Recovery Time Objective)
     defined
     in backups 2nd
Rules, policies for
Rules-based context 2nd

 < Day Day Up >   


Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net