Transaction Journaling

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

Why should I consider Implementing a Document Imaging / Management System? Created by Harold Hegerhorst North American Technology. LLC © North American.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Harris LiveVault® Online Backup System. Harris LiveVault 2  What is Harris LiveVault?  Why Harris LiveVault?  How Harris LiveVault works  Harris LiveVault.
Chapter 5: Server Hardware and Availability. Hardware Reliability and LAN The more reliable a component, the more expensive it is. Server hardware is.
1 Welcome to Jon Snyder and Priscilla Miccio. 2 Purchase Orders The Purchasing Department receives the orders from either the HR department or Marketing.
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
DataBase Administration Scheduling jobs Backing up and restoring Performing basic defragmentation and index rebuilding Using alerts Archiving.
June 23rd, 2009Inflectra Proprietary InformationPage: 1 SpiraTest/Plan/Team Deployment Considerations How to deploy for high-availability and strategies.
Disaster Protection and Recovery By: Michael Morrell Ross Ashenfelter Teresa Furnish Karla Maddox.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
Back Up and Recovery Sue Kayton February 2013.
Source XP vs Windows 7 XPWin 7.
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
November 2009 Network Disaster Recovery October 2014.
Object Oriented Databases by Adam Stevenson. Object Databases Became commercially popular in mid 1990’s Became commercially popular in mid 1990’s You.
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
SmartLog X 3 TEAM Basic SmartLog X 3 TEAM Basic DescoEMIT.com USER STATUS USER EDIT TEST LOG ADMIN TEST MACHINE SCHEDULE INSTALL System Requirements:
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Auditors: Why do they ask all those questions? LGC Resource April 2015 Penny Austin, Assistant Director – IS Local Government Audit.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Chapter 10 : Designing a SQL Server 2005 Solution for High Availability MCITP Administrator: Microsoft SQL Server 2005 Database Server Infrastructure Design.
McGraw-Hill/Irwin Copyright © 2011 The McGraw-Hill Companies, All Rights Reserved Chapter 14 Enterprise Resource Planning Systems.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
1 © 2006 SolidWorks Corp. Confidential. Clustering  SQL can be used in “Cluster Pack” –A pack is a group of servers that operate together and share partitioned.
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Dr.Backup Online Backup Service (888) (toll free)
Chapter 18: Windows Server 2008 R2 and Active Directory Backup and Maintenance BAI617.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
SXe on Windows 2000 Installing Windows 2000 Server, Progress, and SXe.
Installing SIGNZ on a stand- alone machine. These slides will guide you through the installation of the SIGNZ ‘server’ and ‘client’ components on one machine.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Introduction Journal Analysis and Optimization Journaling Uses and Benefits Understanding Costs and Implications Ongoing Management and Administration.
Printing: This poster is 48” wide by 36” high. It’s designed to be printed on a large-format printer. Customizing the Content: The placeholders in this.
A Document Management Solution Joe Axne IT-GURU LLC
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
0 Glencoe Accounting Unit 2 Chapter 11 Copyright © by The McGraw-Hill Companies, Inc. All rights reserved. Protecting Cash In any business, cash is used.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Who Says Servers Can’t Crash? Rocky Mountain PBS Survives Multiple Server Crashes and Lives to tell about it! Presented By Michelle Nesmith Rocky Mountain.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
Security and Backup. Introduction A back-up strategy must cover all eventualities: Accidental damage Equipment failure Deliberate damage It must consider:
Types of Processing of Data www. ICT-Teacher.com.
C2 Applications Software Getting the Work Done Solve a particular problem or perform a particular task.
3 Copyright © 2005, Oracle. All rights reserved. Creating an Oracle Database.
Install, configure and test ICT Networks
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Storage Netværk Mød Microsoft Feb 2005, Agenda Data Protection Server (opdatering) Microsoft og iSCSI Demo.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Security Operations Chapter 11 Part 2 Pages 1262 to 1279.
ALSMS Upgrade Configuration Example Alcatel-Lucent Security Products Configuration Example Series.
DISASTER RECOVERY PLAN By: Matthew Morrow. WHAT HAPPENS WHEN A DISASTER OCCURS  What happens to a business during a disaster?  What steps does a business.
Installing the ALSMS Software on a Windows Platform Configuration Example Alcatel-Lucent Security Products Configuration Example Series.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Installing RMS 3.0 Contractor Mode
Integrating Disk into Backup for Faster Restores
Introduction of Accounterlive - Online accounting software
Download Verified EMC E Certifications Questions - Realexamdumps.com
Back Up and Recovery Sue Kayton October 2015.
SpiraTest/Plan/Team Deployment Considerations
Exploring the Power of EPDM Tasks - Working with and Developing Tasks in EPDM By: Marc Young XLM Solutions
Backup and restoration of data, redundancy
Please use speaker notes for additional information!
data backup & system report
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
DIY GP Maintenance Paul Johnson.
Enterprise Resource Planning Systems
Professional Services Tools Library (PSTL)
Presentation transcript:

Transaction Journaling

Synopsis Where is your data? How would its loss impact you? How do you protect it? What does transaction journaling add? How easy is it to implement? How do I use it after it is installed? When can I get it? Discussion on implementation and options

Where is your data? Now 1970’s Nothing is written down Filing cabinets are seldom accessed Receipts are queued and printed later All major documents are put in a fragile electronic box 1970’s Everything is written down All papers are filed (usually twice) Receipts are duplicated and filed Major documents are in a fireproof vault Computers have changed business All papers filed usually twice because there was a numeric and alpha copy. Nothing is written down – I know when I am on the computer and someone wants me to write something down, I generally have to find a pen.

Data loss impact Average hourly downtime is expensive $78,000 per hour $8,000 per minute Somewhere in between Priceless problems include New customers entered that day Phone information without a paper trail Average hourly is theoretical and some times hard to prove. I mean only if overtime was needed to catch-up and with computers, a lot of times the people at them are salaried. Priceless problems we all can see. If a customer calls me at 8:00am, by 8:05 I have no recollection of that call.

How do you protect it? Nightly Saves Uninterruptible Power Supplies RAID – Redundant array of inexpensive disks Dual (or more) everything Processors Memory Network Cards

Nightly Save Backup the data - usually to tape Verify the backup is good Either a courier service or employee takes the day’s tape off-site This is great and now you are reasonably assured that your days data is safe.

Nightly Save Nightly saves alone are comparable to having your employees use an etch-a-sketch during the day and then taking a picture of it every night. The picture at the end of the day will be complete and perfect, but if somebody “shakes” that thing during the day…. But… why worry, you have RAID and everything is redundant

They all happen INSTANTLY, oh and redundantly RAID All data is written at least 2 ways to disk Most RAID systems now allow hot-swap Every transaction is done instantly Newly created items and changes CLEAR-FILE DELETE-FILE DELETE They all happen INSTANTLY, oh and redundantly

Dual Everything Processors even if redundant, require a reboot and often data loss occurs Memory is much the same Network cards really only influence current data entry

What’s Missing? Everything is written down Not until the end of the day (backup) All papers are filed (usually twice) This is pretty much covered by backup / offsite Receipts are duplicated and filed Again only at the end of the day Major documents are in a fireproof vault Again, covered by the offsite storage

What does TJ add? Everything is written down With TJ, transactions are instantly “written down” in a separate journal Receipts are duplicated and filed Again, “all” transactions including the receipts are duplicated to a separate journal. TJ adds up-to-the-minute journaling so that zero percent captured data is lost

How easy is it to implement? The entire procedure is on the next slide. It is incorporated in jBASE and no new software is needed. Run reports and/or recovery processes immediately. This is a marketing presentation, but it really can be that simple.

Implementation Run the tjinit script provided by your vendor License the jBASE transaction journaling Add process to change logsets to the backup process or to an administrator’s daily task list Create a TJLOG file for reporting and admin processes.

How do I use it? The journals are updated automatically and require no changes to your installation Use the TJLOG file to report and/or select journals for processing SORT TJLOG WITH ….. SELECT TJLOG WITH …. Followed by jlogdup which “plays back” the transaction journal.

When can I get it? NOW! Transaction journaling is included in your current jBASE server. You need only purchase a license from your vendor and run the setup process

Planning your Implementation What existing files hold temporary or transitory information and should not be logged? Should newly CREATED files be logged? Should print jobs be logged? Do any processes need to be changed to use the jBASE jEDI so that they get logged?

Options Hot standby configuration Transactional management methods Audit reports Offsite journaling Professional services can help with the implementation

jBASE and the jBASE logo are registered trademarks of T-jBASE SA, a company of the TEMENOS Group, copyright © 2009 T-jBASE SA.