HP Data Protector A.06.11 Recovery Manual page 202

Disaster recovery guide
Hide thumbs Also See for Data Protector A.06.11:
Table of Contents

Advertisement

transaction log
files
transaction logs
transaction log
table
transportable
snapshot
TSANDS.CFG file
UIProxy
unattended
operation
user account (Data
Protector user
account)
User Account
Control (UAC)
202
Glossary
database backups. By applying transaction log backups, you
can recover the database to a specific point in time.
Files that record transactions of the database modifications, and
provide fault tolerance in case of a database disaster.
(Data Protector specific term) Keep track of IDB changes. The
archiving of transaction logs should be enabled to prevent you
from losing the transaction log files that are created after the
last IDB backup and are necessary for IDB recovery.
(Sybase specific term) A system table in which all changes to
the database are automatically recorded.
(Microsoft VSS specific term) A shadow copy that is created on
the application system and can be presented to the backup
system where a backup can be performed.
See also
Microsoft Volume Shadow Copy Service
(Novell NetWare specific term) A file that allows you to specify
the names of containers where you want backups to begin. It
is a text file located in the SYS:SYSTEM\TSA directory on the
server where TSANDS.NLM is loaded.
The Java GUI Server (UIProxy service) runs on the Data
Protector Cell Manager. It is responsible for communication
between the Java GUI Client and the Cell Manager, moreover,
it performs business logic operations and sends only important
information to the client. The service is started as soon as Data
Protector is installed on the Cell Manager.
See
lights-out
operation.
You can use Data Protector only if you have a Data Protector
user account, which restricts unauthorized access to Data
Protector and to backed up data. Data Protector administrators
create this account specifying a user logon name, the systems
from which the user can log on, and a Data Protector user group
membership. This is checked whenever the user starts the Data
Protector user interface or performs specific tasks.
A security component in Windows Vista and Windows
Server 2008 that limits application software to standard user
(VSS).

Advertisement

Table of Contents
loading

Table of Contents