Friday, December 3, 2010

7 Data Protecting Technologies-2

5.SAN
SAN, called Storage Area Network or Network behind servers, is specialized, high speed network attaching servers and storage devices. A SAN allows "any to any" connection across the network, using  interconnect  elements  such  as  routers,  gateways,  hubs  and  swithes.  [Paid Recommendations^^: Using Mac photo recovery to recover your lost photos.] It  eliminates the traditional  dedicated  connection  between  a  server  and  storage,  and  concept  that  the  server effectively "owns and manages" the storage devices. It also eliminates any restriction to amount of data that a server can access, currently limited by the number of storage devices, which can be attached to the individual server. Instead, a SAN introduces the flexibility of networking to enable one  server  or  many  heterogeneous  servers  to  share  a  common  storage "utility",  which  may comprise many storage devices, including disk, tape, and optical storage. And, the storage utility may be located far from the servers which use it.

6.NAS
NAS is Network Attached Storage. It can store the quick-increased information.Backup means to prepare a spare copy of a file, file system, or other resource for use in the event of  failure  or  loss  of  the  original.  This  essential  precaution  is  neglected  by  most  new  computer users until the first time they experience a disk crash or accidentally delete the only copy of the file they have been working on for the last six months. Ideally the backup copies should be kept at a different site or in a fire safe since, though your hardware may be insured against fire, the data on it is almost certainly neither insured nor easily replaced.


7.Backup
Backup in time may reduce the danger and disaster to the lowest, [Paid Recommendations^^: Using photo recovery to recover your lost photos.] thus data security can be most ensured. In different situations, there are different ways. Both backing up important data of system with hardware and backing up key information with cloning mirror data to different storage device can work well.

All the content of this blog comes from internet. If you notice that your rights is violated, please inform us. We will corrected it promptly.

Another article:Le Data Warehouse, cloches et sifflets


 

No comments:

Post a Comment