Friday, February 1, 2008

An overview of the continuous data protection


IT-organisms were caught between a rock and a hard ground. Charged with protecting the information of their business, IT organizations have aggressive Service Level Agreements (SLA), the impact on nature and the way the Council of the implementation of data protection hiring Recovery Point Objectives ( RPO), and the recovery time (RTO).
Organizations are struggling with shrinking or nonexistent backup window, the need to restore quickly, in most cases at a certain point in time, as well as compliance with legal or regulatory guidelines. The creation of backup copies on tape no longer appropriate, it is not only difficult to manage for backups and recoveries, but there is a lack of speed, reliability, flexibility and simplicity of the computer needs SLAs strict. Save it to disk with virtual tape or simulated Virtual Tape Libraries brief also notes that the administration of the solution is pushed Tape-centric and a timetable. You stick to the explosion of data, with the challenge to ensure the protection of remote offices, and you have risen to the challenge, there is a lot of today's business environment - with computers before the meeting on Harmonization of lines of business life today, the requirements related to technology.

As a result, a growing number of IT organizations traditional development of their backup and recovery strategies for continuous data protection (CDP) solutions. RPOs CDP, and improves dramatically, while the elimination of RTOs backup window. What's more, PSC not only reduces the need for a cartridge in the backup and recovery process, but it is also quite simple, often Recovery, users can restore their own files without the aid of computers.

What is the CDP?

CDP is a process that will enable organizations to collect continuous tracks or modifications of data and records regardless of changes in primary education, the recovery of certain items in the past. PSC can block file systems, or application and can be based on objects restored granularities fine gradations of recovery points in time.

PSC reduces the complexity of data protection system and represents a classic challenge theing the backup window, since it eliminates the need for complete information, differential or incremental backups by the continuous data protection, and then immediately the hard disk. CDP is not a complete replacement for traditional backup, but an important part of a good flare backup and restore of the Community strategy.

Maybe increased the CDP for backup and recovery of the e-mail? Given that the dominant form of communication for business transactions, E-Mail is an application of Mission-Critical for organizations of all sizes. It produces an enormous amount of information that is readily available and protected. The loss of a single message May generate hours of unnecessary work and frustrating for administrators and / or the user and can be low productivity or likely to affect the activity. And with the introduction of Microsoft Exchange 2007, organizations need to be protective measures solutions, including the assumption of the last offer from Microsoft.

It is not surprising that the amount of data e-mail, to the protection and availability grows exponentially. IT, which is faced with the challenge of securing these critical data within the existing backup window, and is recovering rapidly. In addition, they must not only be able to save and restore the overall e-mail databases, but they also need a system that allows the recovery of individual mailboxes or by e-mail . However, if the directors should have a complete backup copy of the e-mail, database, disaster recovery purposes and to be able to individual e-mail, folders or mailboxes, they usually make backups were separated.

Granular Recovery born New technologies that enable e-mails, mailboxes and individual files must be restored, without having to start all over a database of mail, and letters without separate and redundant backups. In an Exchange environment, for example, a simple pastime full or incremental backups of Exchange is necessary to dramatically reduce the time needed to protect all mailboxes, but at the same time reduces the backup storage required.

PSC considerably simplified backup and recovery of the e-mail to completely eliminate the need for implementing planned daily E-mail backup and recovery acceleration, in order to ensure continuity of supply ' e-mail.

How does the CDP end users can improve their own data?

Given that the CDP is a disk-based protection and recovery of the solution, it is possible to detail allow their own data. Some offer solutions PSC for this type of functionality, some with the help of a simple web interface that do not have the training, and allows users of old versions of files, without contact with computers. Empowering users to retrieve their own data free spread to other needs of business-critical of the organization.

SB-Thanks to these solutions recovery, the recovery lost, damaged or replaced data is as simple as searching and download files from the Internet. There is no tape to find or load and no further information on the restoration, see the appropriate file. Most importantly, these solutions do not require the installation of client software or individual officers on desktops and laptops a paradigm familiar Web does not require training. Users need only a standard Web browser, so that retrieval of data easier than ever.

Is CDP protection against data loss or corruption, because of security threats?

DP offers inherent in dealing with security threats by protecting data from the destructive impact of these attacks by viruses, worms, Trojan horses, etc.. Thanks to backing up data continuously CDP allows organizations, and the latest "good" data that are stored prior to the attack. The ability to "dial-back", a short time before that loss is a major gain for today's economy and information technology.

What is the role of traditional tape backup and data protection play today?

For decades, band has emerged as an effective tool for data protection and recovery. Tape is inexpensive media for data storage and portable format can easily be moved off-site. The administrators are also familiar with adhesive tape and procedural backup band, so it's a fairly simple task to be fulfilled, if only directors can be trained data from tapes.

Tape-based backup systems with the flexibility and simplicity, that many organizations now have to be given to a solution. The speed of the recovery, especially for files or e-mails is also a problem with the support solutions. Proper media and bandwidth management turnover, coupled with the need to strengthen the monitoring and management of the health of the band equipment are complex systems that require computer skills of the staff.
Today, there are more and more organizations have become a Disk-to-Disk-to-Tape strategy. It capitalizes on the characteristics of speed and reliability for Disk-based Backup - continues, including the protection and data migration, and then on the tape data and long-term side of data protection and storage off-site.

Utilizing both disk and tape-based data systems and methods of nature and in the right way, the greatest protection for businesses and help to ensure that IT strategies on the approximation of its needs best.

Pat Hanavan, Vice President, Product Management, Data & Systems Management Group at Symantec.



Read more.....

Network Protocols


Network protocols such as
HTTP, TCP / IP, SMTP and provide a basis that a large part of the Internet is based on. To find out more about these protocols and how they work.

•IP and IPv6
•FireWire
•DHCP
•PPPoE
•FTP
•TCP and UDP

What is a network protocol?
Network protocols defined a language of rules and conventions to improve communication between the network devices.
What is Debian?

For packages, is a method of network protocols, including IP and frame relay for the provision of data on a network of individual computers as part of the small pieces.
ARP - Address Resolution Protocol
ARP converts an IP address for the network physical address. ARP protocol is a low-level rule supplement, in the drivers of the operating systems network. ARP is the most frequently used on Ethernet networks.
Http - Hypertext Transfer Protocol
The Hypertext Transfer Protocol - HTTP - provides a standard for browsers and Web servers to communicate. HTTP is a protocol to the application layer network built on TCP.
ATM protocol - Asynchronous Transfer Mode networking
ATM is a broadband networking standard developed for both voice and data communications. ATM works, the backup layer (OSI Layer 2), that is more than the fiber or twisted-pair cable.

Spanning Tree Protocol
The Spanning Tree protocol implements a standardized to prevent the transmission of redundant data along hops between a source and destination.
NTP - Network Time Protocol
Network Time Protocol, is a system that runs on the servers synchronize clocks time for the computer of the day through the Internet.
SOCKS
SOCKS is an Internet protocol developed for the customer to communicate with the proxy server (or VPN server) via the network firewall.
Frame Relay
Frame Relay is a network protocol designed for use in Wide Area Networks (WAN). Frame Relay works on glass fibre or ISDN lines.
X.25
X.25 is a standard for connecting protocols for the placement and routing of packets between networks. The X.25 protocols work, the physical, data-linking, and network layers (layers 1 to 3) of the OSI model.
SNMP - Simple Network Management Protocol
SNMP is a TCP / IP protocol for the management of the network, including the monitoring and control of network devices.
H.323
H.323 is a standard protocol for multimedia communications. H.323, support for the real-time transmission of audio and video over networks, the packet.
SS7 - Signaling System 7
The SS7 protocol provides mechanisms for the exchange of special purposes or messages through the public telephone network.
SCTP - Stream Control Transmission Protocol
SCTP is an alternative to TCP and UDP ports. Some network protocols at a higher level, SIP and SS7-use SCTP.
Protocol analyzer Ethereal Network
Ethereal is a utility program of high quality, by the students, researchers and companies for the monitoring of network traffic.
"Internet Core Protocols - The Definitive Guide"
The book brings in terms of the basic technical background, such as TCP, ICMP and ARP.ireless?
Wired Wireless
Easy installation of moderate difficulty, but attention interference
Costing more with less
High reliability relatively high
Performance very well, well,
Security quite well enough
Limited mobility pending


Read more.....

Wired Wireless Networking?


Building the Local Area Network, the way ahead
Computer networks for the home and small businesses can be built with wireless or landline. Wired Ethernet, the traditional election in homes, but the Wi-Fi, wireless technologies are rapidly growing. Both wireline and wireless, has advantages over the other, the two viable options to represent the house and other local area networks (LANs).

Here you can compare the wired and wireless networks in five key areas:

•Easy installation
•Total Cost
•Reliability
•Power
•Security

About Wired LAN
Wired Ethernet LAN, using the cable and network adapter.
Although both computers can be directly connected with one Ethernet cable crossover cable, wireline LANs Rule also a power devices such as hubs, switches, routers or multiple computers.

Dial-up Internet connections and hosting your computer you need to use the modem Internet connection sharing or similar software to share the connection with other computers on the local network. Broadband Router facilitate the exchange of cable modem or ADSL-Internet, and they are often also a built-in firewall care.
Installation
Ethernet cable needs from any computer to another computer or to the central unit. It can be expensive and difficult to run cables underground, or by walls, especially when the computers are based in different areas. Some newer homes are already wired with cable CAT5, significantly simplified and reduced cabling I adidas cable is underway.

The correct settings for wiring on a local area network drahtgebundenes varies depending on the composition of the device, type of Internet connection and whether internal or external modems are used. It should, however, not to use these options represent more difficult, for example, the wiring system of a home theater.

As a result of the installation of equipment, the steps in the pattern of local networks wired or wireless, do not differ greatly. Both rely on standard Internet protocol network and operating system configuration options. Portable computers and other portable devices are often more mobility and wireless home network of installation (at least as long as the batteries permitting).
Cost
Ethernet cable, hubs and switches are very cheap. Sharing Connection Some software, like ICS, were released, some priced a little expense. Broadband Router more expensive, but they are optional components of a cable network, and their cost is higher by the performance of the ease of use and built-in security features.
Reliability
Ethernet cable, hubs and switches are highly reliable, in part because producers have increasingly to continue to improve Ethernet technology over several decades. A good number of cables likely remains the most common retail and annoying source of failure in a cable network. During the installation of a local area network or drahtgebundenes Move one of the components of the suite, you should carefully check the connections.

Routers broadband have also suffered some reliability problems in the past. Unlike other speed Ethernet, these products are relatively new, multifunction devices. Broadband Router matured, in recent years, and greatly improved their reliability.
Performance
Wired LAN offer a remarkable performance. Traditional Ethernet offer only 10 Mbps bandwidth, but 100 Mbps Fast Ethernet, the technology is a bit more and can be easily reached. Although 100 Mbit / s provides a theoretical maximum performance never really achieved in practice, Fast Ethernet should be enough for the house, sharing files, games and high-speed Internet access for many years into the future .

Wired LAN Hubs suffer from the use of performance computers slowed down if the network at the same time. Instead, use Ethernet hubs to avoid this problem, a switch costs just over a turnstile.
Security
In the case of a cable network connected to the Internet, are the main firewall security are taken into account. Wired Ethernet hubs and switches do not support firewalls. However, the firewall software like ZoneAlarm products can be installed on the computer itself broadband router offer qualifications firewall, which in the device, software configurable own.
The comparison of wireless LANs with wired technologies
On the subject of wireless LANs
Popularity monitor all wireless technologies one of the top three Wi-Fi communication. The advantages of wireless networking vary depending on the standard used:

•802.11b, the first standard widely used in wireless networks.
•The 802.11a standard is faster but more expensive than 802.11b, 802.11a is more prevalent in business networks.
•The final 802.11g standard, attempts to combine the best of both 802.11a and 802.11b, although it is also the most expensive is not an option for home networking.

Installation
Wi-Fi networks can be configured so that one of two ways:

•"Ad hoc" mode allows you to communicate on mobile devices and networks Peer-To-Peer mode.
•"Infrastructure" mode allows mobile devices to communicate with a central node, which provide communication with the LAN cable node.

Most wireless LANs are in need of infrastructure for the method of accessing the Internet a local printer or other cable services, while the ad hoc mode only supports basic file sharing between mobile devices .

The two uses Wi-Fi, wireless network adapters necessary, and sometimes wireless LAN cards. Infrastructure Mode wireless network requires a complement to the central access point. The access point should be installed in a central location, the wireless radio signals reach with minimal intervention. Although Wi-Fi technology, generally signals up to 100 feet (30 meters) or more, obstacles such as walls can reduce significantly their assortment.
Cost
Gearbox wireless costs a little more than the equivalent wired Ethernet products. In retail prices, wireless adapter and access costs three or four times more than the Ethernet cable adapters and hubs / switches, respectively. 802.11b fell in the prices of essential products for the release 802.11g and, of course, to conclude the sale shall, if they are persistent Shopper.
Reliability
Wireless Local Area Networks are a bit more problematic than the reliability of wireless LANs, even though it may not be enough for great concern. 802.11b and 802.11g wireless signals interfere with other home applicances including microwaves, cordless phones and garage door opening. With care taken in the facility, the likelihood of disturbances can be minimized.

The products of wireless networks, in particular those in the implementation 802.11g, are relatively new. As with any new technology, with whom he still has some time to mature these products.
Performance
Wireless LAN 802.11b supports with maximum theoretical bandwidth of 11 Mbps, roughly the same as that of the old, traditional Ethernet. 802.11a and 802.11g wireless 54 Mbit / s over, that's about half the bandwidth of Fast Ethernet. In addition, the Wi-Fi is far from the performance sensitive, which means that the maximum power of computers deteriorate further from the access point or other termination point communications. Among other wireless devices for greater use of wireless networking, performance even further with the devil.

Overall, the performance of 802.11a and 802.11g is sufficient for domestic use and sharing of Internet file sharing, but as a general rule, is not sufficient for domestic use LAN Gaming.

The greater mobility of wireless LANs will help offset the performance disadvantage. Computer mobile should not be attached to an Ethernet cable, and can freely in the wireless sector. However, many computers at home are more models of desktop and laptop computers are sometimes a cable and electrical outlets for guarantees of power. It undermines the advantage of the mobility of wireless networks in many homes.
Security
In theory, wireless LANs are less secure than wired LANs, wireless, because communication signals through the air and can be easily intercepted. To prove his point of view, some engineers have encouraged the practice of wardriving that travel through a residential area with Wi-Fi equipment to scan the airwaves for wireless networks unprotected. The balance, but the weaknesses of the wireless security are more theoretical than practical. WLANs protect their data by the Wired Equivalent Privacy (WEP) encryption standard that wireless communications as safe as reasonably cable are available in retirement homes.

No network is absolutely safe and owner of this research topic should ensure that they are aware of and comfortable with the risks. Key security considerations for homeowners are generally not linked, if the network wired or wireless, but also to ensure:

•The origin of the Internet, the firewall properly configured
•The family about the dangers of the Internet "e-mails, and how to recognize
•The family is incompatible with the concept of "spyware" and how to avoid it
•Childcare, and other unwanted visitors Haushälterinnen have no access to the network
What is better - wired or wireless?
Conclusion
She studied at the analysis and who are ready to make your choice. In fact, therefore, it is best - wired or wireless? The table below summarizes the main criteria that we have in this article. If you are very conscious of costs, we must optimize the performance of your system at home, not a lot of care and mobility, then drahtgebundenes Ethernet LAN is perhaps the most suitable for you.

If, on the other hand, the cost is less of a problem, as you a fan of advanced technologies, and you are really concerned about the role wiring your home or small business with an Ethernet cable, then you should certainly wireless LAN.

Many of you have, of course, somewhere between these two extremes. If you are still undecided, fashion, friends and family wondered about the experience gained in establishing LANs.d, spend only a few minutes on our interactive network Home Advisor Tool. It should help you decide on the type of network that you have of the gearbox.

Give it a try: Home Network Advisor

Wired Wireless?
Wired Wireless
Easy installation of moderate difficulty, but attention interference
Costing more with less
High reliability relatively high
Performance very well, well,
Security quite well enough
Limited mobility pending



Read more.....

What network?


N in the world of computers, networks, the practice of linking two or more devices together on the computer, for the purposes of data sharing. Networks with a mixture of computer hardware and computer software.

Area Networks

The networks can be of several types. An approach defined the nature of the network of the geographical area bounded. Local Area Networks (LANs), for example, who, as a general rule, which is accessible by a single house, and Wide Area Networks (WAN), and reach across cities, countries, or in the world. The Internet is the biggest festival of the public WAN.

Network Design

Computer networks also differ in their design of the two types of high-level design are referred client-server and peer-to-peer. Client-server network with a central server, computers, storing e-mails, Web pages, files and / or applications. In the case of a network peer-to-peer, in contrast, tend to take charge of all computers, the same functions. Client / server networks are much more common in business and peer-to-peer much more common in homes.

A network topology present its layout or structure from the point of view of data flows. In the so-called bus systems, for example, all computers to share and communicate on a common approach, whereas in a star network, all data flowing through a central. Common types of network topologies, bus, star, ring and mesh.

Network protocols

In networking, language communication devices used by a computer means the record. Another way to classify networks is the amount of minutes they support. Networks often several protocols supported to implement specific applications. More popular are the TCP / IP protocols, the protocol most commonly found on the Internet and home networks.
Wired Wireless Networking?

Several of the same network protocols such as TCP / IP, working in the wired and wireless networks. Networks Ethernet cables are superior in businesses, schools and homes for several decades. In recent times, however, the wireless networking, alternatives have been identified as the main technology for the development of new networks.



Read more.....

Sprint extends Mobile Broadband EV-DO Rev. A, in central Missouri


Operator Sprint (NYSE: S), announced that it was in possession of the expansion of its high-speed mobile EV-DO Revision A (Rev. A) technology service center in Missouri, USA , a creation fastest mobile broadband services for Compatible with users to send and receive e-mails, access the Internet and use streaming video and other real-time applications, with location-based solutions.

Sprint expands its stated EV-DO Rev. A, improves service coverage along the Central Missouri State Interstate 70 in Kansas City, St. Louis, Columbia, and between Highway 63 and Highway 54 Ashland Clark and from Mexico to Fulton.

Sprint confirmed that the regions and communities where EV-DO Rev. A, the coverage will be available: Ashland, Boonville, Centralia, Clark, Columbia, Fulton, Kingdom City, University of Missouri - Columbia campus, and Faurot Field Mizzou Arena, The Columbia Mall, The Downtown District of Columbia, The Isle of Capri Casinos and hotels, Hallsville, Mexico, port and Sturgeon Roche.

According to Sprint, the development of the EV-DO Rev. A, the network of skills in the middle of saying, Missouri, the user can enjoy, because it believed that Sprint Speed travel in the country. He said that most of the sprint Mobile Broadband Network has expanded EV-DO Rev. A technology designed to help customers data rates of 350-500kb / s and the download speed of 600kb / s to 1.4Mb / S.
Print provides data without restriction of the use of USD59.99 per month for customers sign a two-year contract sprint subscriber agreement with other individual plans for mobile broadband services from aircraft by USD39.99 months.



Read more.....

Basic Electrical suitcase


Security boxes

•Do not forget the energy on and off the circuit breaker box or fuse box before the change, or to a container. You can check that the circuit is dead with a tester.
•Never try to repair, in the vicinity of the Head of Service. Call a professional.
•No drilling in the walls or ceilings, blindly without stopping. Use a detector to determine whether the son behind the walls.
•If the owner of the small children as covers for the safety of the containers in the world. It is a small device made of plastic with two blades, which over the cracks in the vessel and prevents that the little finger reaches po

Wall Box

•If the switch and the container housing.
•Done made of metal or plastic and in a position to be pointing to a wall or bolts.
•The holes in the vicinity of the box, where the pipe between in the Box called knockouts. In the boxes of metal, it could also be the guarantees holes.
•A type is a four-inch square box, which only 1-1/2 "or 2" depth to the places too little to a box standard.
•A mobile field is at the surface and rounded corners in safety.

•A box Drywall arm and can be expanded to the dry subjects.
•A boîte plastique en est la meilleure pour l'installation de nouveaux et, souvent, un clou a built-in pour la saisie rapide pour le goujon.
•A Gem field is a field, as educated, mostly 2 "wide, 3" high and 2-1/2 "deep and made of metal. Deeper boxes.

Box Cover

•Also known as a jack or splices field.
•Uses ceiling mount and this is the junction box, where children can meet and run in tze other areas of the chamber.
•They are either # 4 "round or octagonal shape, and 1-1/2" and 2-1/8 "in depth.
•You can also use the adjustable hanger assembly, which is in angle brackets in the ceiling, and that the box can be positioned where between the two.
•Hangers also briefly or nipple threaded rod, for the lighting.

Resistant Box

•Also known as a box outside.
•Is the outdoor switches or receptacles.
•Stark, in the interior of the boxes and has a rubber seal between the cover and the box on the water.
•Covers screws or snap-on.

Wall panels


•Also known under the name facades or blankets.
•A plate made of metal, plastic or wood, rooms, focusing on the openings in the wall caused by the vessels and the switch.
•The holes in the lid with the nature and number or the container or the switches. Blank blankets are also available.


Read more.....