Data
collaboration, 184
damage, 83–84
messaging, 184
partitioning, 157–59
planning, 157–59
protection, 210–11
restoring, 158
verification, 180
Database engine
DBA, 75–77
transaction commitment, 77
at work, 74–77
Database files, 58–60
list of, 58–59
optimal placement of, 278–79
property store, 59
streaming store, 59–60
Databases
copying, 125, 132–33
defragmentation of, 172
logical corruption, 104–5
multiple, laying out, 186
physical corruption, 98–100
Data-collection points, 363–65
Exchange server, 364–65
server subsystem, 363–64
Data replication
asynchronous, 222
Exchange and, 223, 225–27
hardware-based, 222
software-based, 223–24
synchronous, 222
technologies, 222–25
vendor survey, 225
Data Replication Manager (DRM), 223
Decision/action point, 38
Demilitarized Zone (DMZ), 331
Denial of service (DoS), 298–99
forms, 299
viral replication, 299
Differential backups, 118–19
defined, 116
incremental backups vs., 118
restoring, 116
strategy, 170
See also Backups
Digital encryption, 348
Digital signatures, 302
Disaster recovery, 135–53
best practices, 155–86, 379
capability, 166
challenge, 146
clusters, 294–96
Exchange recovery servers, 146–50
growth's impact on, 184–86
LANs, 295
management, 177–84
plan development, 174–77
RSG, leveraging, 150–53
SLAs, 159–61
snap/clone technology, 136–38
successful management, 182
technology, 379
technology selection, 161–67
toolkit, 177, 178
VSS, 138–41
VSS support, 141–45
DLT
arrays, 173
drives, 165
Domain controller (DC), 96
Domain groups, 307–8
Domain Name Service (DNS), 109
Double Data Rate (DDR) SDRAM, 193
Downtime, 27–50, 378
anatomy, understanding, 35–42
black box, 35–42, 378
cause assessment, 42–47
clustering solution, 274
decision/action point, 38
Exchange and Domino comparison, 31
failure point, 37
hardware failures and, 15
hours, 28–29
impact on end-user basis, 34
issue resolution, 274
lost client opportunity, 29–30
measurement, 28–30
normal operational point, 40–41
notification point, 37–38
postrecovery action point, 39–40
prefailure errors, 36–37
recovery action point, 38–39
reliability and, 12
root causes, 15
as series of components, 41
server, 28–29
Downtime causes, 42–47
assessing, 42–47
categories, 42–43
environment, 45–47
hardware, 44–45
operator, 45
root, 15
software, 43–44
Downtime cost, 7–8, 27, 30–35
CNI study, 31, 32, 33, 34
determining, 30
illustrated, 33
study, 32
Dynamic Buffer Allocation (DBA), 75–77, 264
design goals, 76
server resource use, 76