Mostrar el registro sencillo del ítem

dc.rights.licenseAll rights reserveden_US
dc.contributor.advisorRamírez, Juan
dc.contributor.authorVenegas Ríos, Jesús J.
dc.date.accessioned2020-07-21T17:43:42Z
dc.date.available2020-07-21T17:43:42Z
dc.date.issued2012
dc.identifier.citationVenegas Ríos, J. J. (2012). Off site database management [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico.en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12475/446
dc.descriptionDesign Project Article for the Graduate Programs at Polytechnic University of Puerto Ricoen_US
dc.description.abstractAbstract― In today’s database systems there is a rise in security needs and Database redundancy procedures in order to keep information readily available and secure in the event of a catastrophe. There are different ways to approach this with different types of Database Redundancy Protocols the most known of these are: Database Shadowing, Electronic Vaulting, Remote Journaling, Network attached storage and storage area networks. We are going to take a look at some of these into detail and see how they work, the advantages and the disadvantages they possess and their requirements Key terms― Database Shadowing, Electronic Vaulting, Network Attached Storage, Remote Journalingen_US
dc.language.isoenen_US
dc.publisherPolytechnic University of Puerto Ricoen_US
dc.relation.ispartofComputer Science;
dc.relation.ispartofseriesSpring-2012;
dc.relation.haspartSan Juanen_US
dc.subject.lcshDatabase managementen_US
dc.subject.lcshDatabase securityen_US
dc.subject.lcshPolytechnic University of Puerto Rico--Graduate students--Research
dc.titleOff Site Database Managementen_US
dc.typeArticleen_US
dc.rights.holderPolytechnic University of Puerto Rico, Graduate Schoolen_US


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem