< Day Day Up > |
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Radio frequency interference (RFI) RAID (Redundant Array of Independent Disks) 2nd 3rd controllers in 2nd defined remote copy with vs. remote copy 2nd Random errors in restore operations RDBMs (Relational Database Management Systems) Read heads Records management vs. ILM 2nd Recovery [See also Restoration and recovery] Recovery Point Objective (RPO) defined in backups 2nd Recovery Time Objective (RTO) defined in backups 2nd Redundant Array of Independent Disks (RAID) 2nd 3rd controllers in 2nd defined remote copy with vs. remote copy 2nd Regulatory concerns and laws costs data protection for e-Privacy Directive Health Insurance Portability and Accountability Act Sarbanes-Oxley Act 2nd Relational Database Management Systems (RDBMs) Relationships 2nd 3rd Remote copy 2nd 3rd 4th case study defined design considerations for 2nd bandwidth 2nd 3rd bunkering 2nd 3rd costs latency 2nd 3rd 4th SANs synchronous and asynchronous 2nd 3rd failover in 2nd key points topologies in disk system 2nd 3rd host-based 2nd network-based 2nd 3rd vs. backups 2nd 3rd vs. replication Remote network connections Replacement value of information Replication 2nd case study database and e-mail 2nd defined event-driven vs. timed file key points vs. backups 2nd 3rd Resource efficiency, ILM for Resource material 2nd Restoration and recovery 2nd 3rd [See also Backups] application-level 2nd 3rd 4th 5th 6th costs of defined in disaster recovery 2nd issues bad backups 2nd bad media 2nd data corruption 2nd network congestion selective 2nd software for 2nd 3rd storage systems for 2nd 3rd Retention policies RFI (radio frequency interference) Risk 2nd from connectivity 2nd 3rd 4th storage security breach outcomes 2nd vendor lock-in 2nd Rotating backups 2nd RPO (Recovery Point Objective) defined in backups 2nd RTO (Recovery Time Objective) defined in backups 2nd Rules, policies for Rules-based context 2nd |
< Day Day Up > |