dc.rights.license | All rights reserved | en_US |
dc.contributor.advisor | Ramírez, Juan | |
dc.contributor.author | Venegas Ríos, Jesús J. | |
dc.date.accessioned | 2020-07-21T17:43:42Z | |
dc.date.available | 2020-07-21T17:43:42Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Venegas Ríos, J. J. (2012). Off site database management [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico. | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12475/446 | |
dc.description | Design Project Article for the Graduate Programs at Polytechnic University of Puerto Rico | en_US |
dc.description.abstract | Abstract― In today’s database systems there is a rise in security needs and Database redundancy procedures in order to keep information readily available and secure in the event of a catastrophe. There are different ways to approach this with different types of Database Redundancy Protocols the most known of these are: Database Shadowing, Electronic Vaulting, Remote Journaling, Network attached storage and storage area networks. We are going to take a look at some of these into detail and see how they work, the advantages and the disadvantages they possess and their requirements
Key terms― Database Shadowing, Electronic Vaulting, Network Attached Storage, Remote Journaling | en_US |
dc.language.iso | en | en_US |
dc.publisher | Polytechnic University of Puerto Rico | en_US |
dc.relation.ispartof | Computer Science; | |
dc.relation.ispartofseries | Spring-2012; | |
dc.relation.haspart | San Juan | en_US |
dc.subject.lcsh | Database management | en_US |
dc.subject.lcsh | Database security | en_US |
dc.subject.lcsh | Polytechnic University of Puerto Rico--Graduate students--Research | |
dc.title | Off Site Database Management | en_US |
dc.type | Article | en_US |
dc.rights.holder | Polytechnic University of Puerto Rico, Graduate School | en_US |