Media management .......................................................................................... | |
Backup devices ................................................................................................. | |
User interfaces .................................................................................................. | |
Data Protector GUI ...................................................................................... | |
Data Protector Java GUI ........................................................................ | |
Overview of tasks to set up Data Protector ............................................................ | |
2 Planning your backup strategy .......................................... | |
In this chapter ................................................................................................... | |
Backup strategy planning ................................................................................... | |
Defining the requirements of a backup strategy ............................................... | |
Factors influencing your backup strategy ........................................................ | |
Preparing a backup strategy plan ................................................................. | |
Planning cells .................................................................................................... | |
One cell or multiple cells? ............................................................................ | |
Installing and maintaining client systems ........................................................ | |
Creating cells in the UNIX environment .......................................................... | |
Creating cells in the Windows environment .................................................... | |
Windows domains ............................................................................... | |
Windows workgroups ........................................................................... | |
Creating cells in a mixed environment ........................................................... | |
Geographically remote cells ......................................................................... | |
Understanding and planning performance ............................................................ | |
The infrastructure ......................................................................................... | |
Network versus local backups ................................................................ | |
Network or server versus direct backups .................................................. | |
Devices ............................................................................................... | |
High performance hardware other than devices ........................................ | |
Advanced high performance configuration .............................................. | |
Using hardware in parallel .................................................................... | |
Configuring backups and restores ................................................................. | |
Software compression ........................................................................... | |
Hardware compression ......................................................................... | |
Full and incremental backups ................................................................. | |
Disk image versus filesystem backups ...................................................... | |
Object distribution to media ................................................................... | |
Disk performance ........................................................................................ | |
SAN performance ....................................................................................... | |
Online database application performance ..................................................... | |
Planning security ............................................................................................... | |
Cells ......................................................................................................... | |
Data Protector users accounts ....................................................................... |
4