Verified Document

Database Shadowing Or Mirroring What Term Paper

This would also mean that the shadowing process goes on behind the scenes, and one need not even be aware that the process is in fact going on at any point of time; it can go on without creating any sort of disturbance to the user of the application, at any point of time. (Shadow Files) Another important advantage of using the shadowing of a database is that data would be immediately available, even when the primary database has failed due to some reason or another. Non-exclusive usage of the primary database is also permitted, and this means that the database will not be locked, and this in turn means that it can be updated and changed during the process of its creation. Computer resource can be conserved, and this is because of the fact that shadowing does not use any separate process; the database process gives the shadow database the function of updating its own database. (Sygate Secure Enterprise, 4.0)

There can be certain disadvantages when creating a shadow for one's primary database, and some of them are as follows: not all types of conflicts can be detected, and some updates can even get lost due to undetected reasons. (Critical Data Availability in Real time.) Another great disadvantage of using shadowing is that all the data tends to become quite declustered after some time. (Write Optimized Object Oriented Database Systems) Since today's working environment dictates that there must be total and complete data recovery after a crash or a failure, all businesses are in fact making serious attempts to protect themselves and each other from data loss, and this is one of the benefits of using a shadow as a back up whenever and wherever required.

However, some people do opine that these are not adequate solutions and that if a regional disaster or an outage were to occur, then it is not an exaggeration to state that the entire production may get affected by it. The Remote Data recovery Facility used by several companies all over ensures that the relevant data is not only well protected but is also insulated against...

This is an excellent solution for the read only functions like, for example, data warehousing and mining, batch reporting cycles, complex and complicated SQL queries, load balancing, and local online access at the site of the shadow. Information and data can be safeguarded and protected using the system of shadows for database applications. (Data Recovery without data loss)
References

Database Shadowing System with data tags that select an operation of the save command"

Retrieved at http://www.freepatentsonline.com/5230075.html. Accessed 4 October, 2005

Data Recovery without data loss" Retrieved at http://www.enet.com/enet.com.nsf/PAGES_RRDF_Recov.html?OpenPage&charset=iso-8859-1Accessed 4 October, 2005

Eng, Audra. (July, 2004) "Sygate Secure Enterprise, 4.0" Retrieved at http://www.sygate.com/solutions/datasheets/wp/WP-Sygate-Secure-Enterprise.pdf. Accessed 4 October, 2005

Flesher, Tom. (19 August, 2004) "Critical Data Availability in Real time" Retrieved at http://www.trescon.com.br/trescon.com.br/news/2/Comdex%20Brasil%20August%202004%20Tutorial.pdf. Accessed 4 October, 2005

Mimer 8, Product Overview" Retrieved at http://developer.mimer.com/documentation/pdf_81/prodov_81.pdf. Accessed 4 October, 2005

Norvag, Kjetil; Bratbergsengen, Kjell. "Write Optimized Object Oriented Database Systems"

Retrieved at http://www.idi.ntnu.no/grupper/db/research/tech_papers/SCCC97_writeopt/sccc97.pdf. Accessed 5 October, 2005

Resilience" Retrieved at http://developer.mimer.com/documentation/html_82/Mimer_SQL_Technical_Description/24%20_7%20Operation2.html. Accessed 4 October, 2005

Shadow Files" Retrieved at http://www.cvalde.net/features/f4/ShadowFiles.htm. Accessed 4 October, 2005

Welcome, a Cautionary Tale" (July, 2004) Vol: 7. Retrieved at http://www.imagingsolutions.com/pdf/July%202004%20newsletter%20-%20Disaster%20Recovery.pdf. Accessed 4 October, 2005

Sources used in this document:
References

Database Shadowing System with data tags that select an operation of the save command"

Retrieved at http://www.freepatentsonline.com/5230075.html. Accessed 4 October, 2005

Data Recovery without data loss" Retrieved at http://www.enet.com/enet.com.nsf/PAGES_RRDF_Recov.html?OpenPage&charset=iso-8859-1Accessed 4 October, 2005

Eng, Audra. (July, 2004) "Sygate Secure Enterprise, 4.0" Retrieved at http://www.sygate.com/solutions/datasheets/wp/WP-Sygate-Secure-Enterprise.pdf. Accessed 4 October, 2005
Flesher, Tom. (19 August, 2004) "Critical Data Availability in Real time" Retrieved at http://www.trescon.com.br/trescon.com.br/news/2/Comdex%20Brasil%20August%202004%20Tutorial.pdf. Accessed 4 October, 2005
Mimer 8, Product Overview" Retrieved at http://developer.mimer.com/documentation/pdf_81/prodov_81.pdf. Accessed 4 October, 2005
Retrieved at http://www.idi.ntnu.no/grupper/db/research/tech_papers/SCCC97_writeopt/sccc97.pdf. Accessed 5 October, 2005
Resilience" Retrieved at http://developer.mimer.com/documentation/html_82/Mimer_SQL_Technical_Description/24%20_7%20Operation2.html. Accessed 4 October, 2005
Shadow Files" Retrieved at http://www.cvalde.net/features/f4/ShadowFiles.htm. Accessed 4 October, 2005
Welcome, a Cautionary Tale" (July, 2004) Vol: 7. Retrieved at http://www.imagingsolutions.com/pdf/July%202004%20newsletter%20-%20Disaster%20Recovery.pdf. Accessed 4 October, 2005
Cite this Document:
Copy Bibliography Citation

Related Documents

Object Oriented Vs. Relational Database
Words: 2917 Length: 10 Document Type: Term Paper

This is one of the greatest limitations of this technology. A second major disadvantage of RDBMS-based systems is their lack of support for image- and spatial-based databases that include Computer-Aided Design (CAD) drawings, 3D rendering and model-based data. Their table-based structure is inefficient in defining the attributes of these data types and lacks the necessary data tagging and data types to manage imaging and CAD-based design files and data

Transition of Traditional Relational Database
Words: 7211 Length: 26 Document Type: Capstone Project

They in short link and map ideas that already exist, creating real time answers to questions as they are applied to new and archived knowledge or action plans. According to IDC reports, most data warehouses will be stored in a columnar fashion and not in rows, reporting and data collection problems will be solved with databases that have no formal schema at all, horizontal scalability through clustering will be achieved

Database Technology Administration Database Technology
Words: 4402 Length: 15 Document Type: Essay

" "STUDENT INFORMATION TABLE" ( "STUDENT ID" CHARACTER (4) NOT NULL, NAME CHARACTER (25) NOT NULL, "STREET NUMBER" CHARACTER (10) NOT NULL, "STREET NAME" CHARACTER (25) NOT NULL, CITY CHARACTER (25) NOT NULL, STATE CHARACTER (10) NOT NULL, EMAIL CHARACTER (25) NOT NULL, "PHONE NUMBER" CHARACTER (15) NOT NULL ); CONNECT RESET; SQL FOR Book_Information CONNECT TO LIBRARY; CREATE TABLE "USER"; CREATE TABLE BookInformation ( "BookISBN" CHARACTER (10) NOT NULL; "AUTHOR" CHARACTER (25) NOT NULL; "TITLE" CHARACTER (50) NOT NULL; "PRICE" CHARACTER (10) NOT NULL; CONNECT RESET; SQL STATEMENT FOR

Database What Is a Database
Words: 1421 Length: 5 Document Type: Term Paper

These factors further accelerate the value and TCO of databases over time. Describe the features, tools, and utilities of Structured Query Language (SQL). How can tasks be automated with SQL? SQL has specifically been designed with features, tools and utilities to enable programmers to support nth-tier data architectures in addition to legacy client-server computing scenarios. The development and continual improvement of the features, tools and utilities of SQL for automating tasks

Database Data Warehousing Design Data Warehousing Is
Words: 1314 Length: 4 Document Type: Essay

Database Data Warehousing Design Data warehousing is a powerful tool that business organizations use to enhance competitive advantages. Data warehousing supports business decision by collecting, organizing and consolidating data for analysis and reporting using tools such as OLAP (online analytical processing ) and data mining. Typically, the relational database technology is generally being used to design a data warehousing and a relational database is a database having collection of tables, and

Database Design for SPA Hotel Booking System
Words: 3480 Length: 12 Document Type: Term Paper

Database Design for Spa/Hotel Booking System The WR (Woodlands Retreat) is a medium sized organization currently intending to build a database system to integrate modern IT (information systems) in its business operation to enhance its dynamic and innovative business operations. Although, the Woodlands Retreat has an IT system, however, the current systems are not capable of keeping book records as well as not capable of managing all data for the company

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now