Data Protection and Information Lifecycle Management

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Radio frequency interference (RFI)

RAID (Redundant Array of Independent Disks) 2nd 3rd     controllers in 2nd     defined     remote copy with     vs. remote copy 2nd

Random errors in restore operations

RDBMs (Relational Database Management Systems)

Read heads

Records management vs. ILM 2nd

Recovery [See also Restoration and recovery]

Recovery Point Objective (RPO)

     defined

     in backups 2nd

Recovery Time Objective (RTO)

     defined

     in backups 2nd

Redundant Array of Independent Disks (RAID) 2nd 3rd

     controllers in 2nd

     defined     remote copy with

     vs. remote copy 2nd

Regulatory concerns

     and laws

     costs     data protection for     e-Privacy Directive

     Health Insurance Portability and Accountability Act     Sarbanes-Oxley Act 2nd Relational Database Management Systems (RDBMs) Relationships 2nd 3rd

Remote copy 2nd 3rd 4th     case study     defined     design considerations for 2nd         bandwidth 2nd 3rd         bunkering 2nd 3rd         costs

         latency 2nd 3rd 4th

         SANs         synchronous and asynchronous 2nd 3rd     failover in 2nd

     key points

     topologies in

         disk system 2nd 3rd

         host-based 2nd         network-based 2nd 3rd

     vs. backups 2nd 3rd     vs. replication

Remote network connections Replacement value of information Replication 2nd     case study     database and e-mail 2nd

     defined

     event-driven vs. timed

     file

     key points

     vs. backups 2nd 3rd

Resource efficiency, ILM for

Resource material 2nd

Restoration and recovery 2nd 3rd [See also Backups]

     application-level 2nd 3rd 4th 5th 6th

     costs of

     defined

     in disaster recovery 2nd

    issues

         bad backups 2nd         bad media 2nd

         data corruption 2nd

         network congestion

     selective 2nd

     software for 2nd 3rd     storage systems for 2nd 3rd Retention policies

RFI (radio frequency interference) Risk 2nd     from connectivity 2nd 3rd 4th     storage security breach outcomes 2nd

     vendor lock-in 2nd Rotating backups 2ndRPO (Recovery Point Objective)     defined     in backups 2ndRTO (Recovery Time Objective)     defined

     in backups 2nd

Rules, policies for Rules-based context 2nd

 < Day Day Up >   

Категории