Flylib.com
List of Sidebars
Previous page
Table of content
< Day Day Up >
Chapter 1: Oracle and Availability: Illustrated Downtime Scenarios
Partitioning, mviews, and Index-Organized-Tables
Cross-Platform Transportable Tablespaces
Use Services to Allocate Workloads to Higher Priority Applications
Use AWR and ADDM to Quickly Identify and Resolve Bottlenecks
Use ASM to Simplify Disk and File Management
RAC Clusters Mask Problems Involving a Single Node
Transparent Application Failover (TAF) Allows Queries to Be Failed Over to Another Node and Restarted Automatically
RAC Handles Instance Recovery from Surviving Nodes
Recovery Manager (RMAN) Provides Media Recovery of Data Blocks
Avoid Long Tape Restores with RMAN Flashback Recovery Area
Protect Against Node Failure with a Robust Archive Strategy
Use Flashback Table to Restore a Table to a Previous State
Use Flashback Drop to Restore Dropped Objects
When There Is an Unrecoverable Operation, Use Flashback Database
Use Oracle Streams to Replicate Data to Unique Databases on Different Operating Systems
Protect Yourself Against Disaster with Data Guard
Chapter 6: Utility Computing: Applications as Services
Modifying Services
Chapter 8: Backup and Recovery for High-Availability Environments
What is the snapshot controlfile?
Parallelization and Multiplexing for RMAN Backups
Chapter 9: Oracle Flashback: Surviving User-Induced Trauma
Enabling Row Movement and Flashback Table
How long do objects live in the Recycle Bin?
Chapter 10: Oracle Streams for High Availability
Streams Pool vs. Shared Pool
< Day Day Up >
Previous page
Table of content
Oracle Database 10g. High Availablity with RAC Flashback & Data Guard
ISBN: 71752080
EAN: N/A
Year: 2003
Pages: 134
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Welcome to DarkBASIC
Basic Graphics Commands
Programming the Keyboard, Mouse, and Joystick
Playing Some Tunes CD Audio, MIDI and MP3 Music
Appendix A Answers to the Chapter Quizzes
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 3.1 Use PuTTY as a Graphical Replacement for telnet and rlogin
Step 4.4 How to Generate a Key Using PuTTY
Step 5.1 General Troubleshooting
Conclusion
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Appendix A MRP vs. Kanban
Appendix B Kanban Supermarkets
Appendix F Implementation in Large Plants
Appendix G Intra-Cell Kanban
Appendix J Abbreviations and Acronyms
Network Security Architectures
Good Network Security Is Predictable
Applied Knowledge Questions
Applications
Routing Considerations
Appendix A. Glossary of Terms
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Status Bar
Fundamentals of a Notes Application
Project A: Build an Event Calendar
Refresh a Document from the User Interface
Get the Current Day of the Week
File System Forensic Analysis
Digital Investigations and Evidence
Summary
File System Analysis
Application Category
Bibliography
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies