Iteration 1: Familiarizing with general concepts of data recovery management
The session took two weeks, from February 02 2016 to February, 18th 2016. During the first half of the week, I took part in seeking for the library to search for books dealing with data recovery and management. First day scheduled to conduct research from written literature reviews. The session involved an introduction to data recovery management. The second day I analyzed journals written by dignified writers. The second half of the week involved carrying out web research to gather knowledge and understanding of data recovery techniques and procedures. I scheduled to research m web materials involving types of data recovery, importance and procedures implemented. The web research schedule involved checking various concepts discovered in books and journal such as contingency plans, big data handling, cloud computing, and other terms (H. J. Paul, Personal Communication, February 04, 2016). Iteration shall cover different site and video clips to ensure better presentations, simulations, and outline of every data recovery procedure.
During the second week, I scheduled online seminars that were facilitated through multimedia applications. The first half of the week involved watching educative data recovery and management video clips from various multimedia support websites. I also scheduled a session on online webinar training facilitated by experts. The session involved use of video conferencing to conduct online interviews and inquiries about the data recovery and management operations (A. S. Anthony, Personal Communication, February 06, 2016). The second half of week involved analyzing summary of concepts of data recovery and management. Summary session involved associating terms business analysis operations where data recovery is appropriate. Various concept and tools shall that implement data recovery shall be collected (G. J. Sarah, Personal Communication, February 08, 2016).
I implemented the plan through visiting public library and university library where I used books like Pro data backup and recovery by Steven Nelson through the book; I discovered various data recovery techniques such as incremental backup and differential backup. The book explained types of backup as online or network backup procedures. I also introduced another type of backup as an offline or on-premise backup (Steven, 2013). I analyzed types of backups and their significance in business operations. I took part in reviewing journals involving data backup and management with D2D for HP OpenVMS (Libraries .MIT. ed, 2015). It defined various terms and concepts in data recovery. It explained the various data backup procedures involving preparation operations, cleaning techniques as well as implementing cloud repository locations.
I analyzed online platforms to check in various website domains like https://libraries.mit.edu/data-management/store/backups/. It introduced various tools and hardware equipment that implement data storage, backups, and security. The website provided session introduction on storage options. I participated in sessions involving online training through webinars. The session explained the various mediums for backing up data and information on-premise backup hardware tools. They included
The session also explained about various online or network based backup m procedures like the use of cloud computing services offered by third parties. I downloaded video clips which demonstrated how to implement backup procedures. The clips observed were retrieved from https://www.youtube.com/watch?v=g2iJke0Q3sE and https://www.youtube.com/watch?v=hPSevIK07QU. The data storage video clips demonstrated how to implement online and offline data backup.
Through the research session based familiarizing with general concepts of data backup and storage I have discovered that main data forms of backup include online and offline data backup strategies. Books and journal revealed that offline backup is more economical, easy to implement and simple regarding management. On the other hand, offline backup procedures can behave limitations since they are subjected to high risks. Offline backup is subjected to the high probability of encountering natural and manmade disasters. They are vulnerable to risks like hacking, fire breakout, malware attacks and other IT threats and attacks (Steven, 2013). I discovered that online backup procedures are highly scalable, reliable and store relatively large amount of data and information. It has unlimited storage capacity with a high level of guaranteed security. However, options like cloud computing that provide data backup and management services are prone to lack of privacy and confidentiality.
Through online based platforms and seminar sessions, I studied that data backup can be implemented through conducting an incremental backup, differential backup, partial backup or full backup (K. D. Charles, Personal Communication, February 10, 2016). The various devices and tools that implement types of backup included personal hard drives, external hard drives, servers, and cloud repository locations. I discovered that CDs and DVDs backup tools and hardware are not recommended since they fail due to effects from environmental conditions (Carlos & Steven, 2016). Regarding backup storage options as well as a choice of data backup and recovery options cloud computing become the most relevant systems to implement a data backup and storage options.
The session involving familiarizing with general concepts of data recovery management was well covered. Throughout the iteration, I have studied and researched different areas where I have obtained materials with enough knowledge and information about data recovery. Library research operations were well covered where facts involving contingency planning, business continuity, and incident response methods were covered (Carlos, & Steven, 2016). The relationship between data recovery techniques and procedures were well incorporated into business operations to facilitate a better understanding of how to relate IT operations with business requirements and procedures.
Research involving backup operations and security measures has provided different encryption and storage parameters to facilitating security while backing up data for recovery purposes. Through web research, I have acquired knowledge based on storing good data practices such as involving encryption measures to secure sensitive data and information. Implementing data recovery techniques should accompany management procedures such as specifying security levels, access rights by implementing principles specified by international bodies such as NIST; ISO among others bodies (Carlos, & Steven, 2016). Sensitive data handling involving storing passwords, keys, and personal credentials were well covered through webinars as well as video sessions. Multimedia research operations facilitated effective and efficient information about management and data recovery and backup strategies. Some of the activities that never went well include conducting online interviews thro-ugh video conferencing. Experts such as consultants and other facilitators could not be traced online within the time scheduled. However, the details covered within research session were enough to provide required information to facilitate future developments of a research study (F.B Vivian, Personal Communication, February 12, 2016).
Iteration was scheduled to take two weeks of study between February, 20th 2016 to March, 16th 2016. The first half of week shall involve checking reading books and journals containing methodologies applied in collecting data and information based on data recovery procedures. I have scheduled research study to take place in public libraries. The requirements and needs collection activities were scheduled to implement a field study to gather data based on end user specifications and analysis. Various categories of users targeted by the study include data stakeholders, cloud computing service providers (H. J. Rachel, Personal Communication, February 23, 2016). I scheduled a session to gather assistance from data analysts to help in collecting data and information required. Expert’s activities were to facilitate preliminary study analysis on existing systems and users.
During second half of the week study session shall research on hardware requirements as well as software requirements needed to accomplish data and information recovery procedures. Iteration shall cover basic compatibility tools devices and hardware. The second-week schedule shall involve training on how to incorporate user needs and specialization in accomplishing a required data recovery systems as well as ensuring quality products is delivered within required time. The second half of week shall involve inquiries based on how to integrate user specifications into specific operations. Variables and user are determining factors shall be incorporated within main schedules of analysis to ensure that all details and variables are well incorporated within the system (C. K. Vivian, Personal Communication, February 25, 2016). The activities involving data recovery activities shall be accomplished in the schedule.
I took part in researching on methodologies involved in carrying out needs analysis and requirement analysis. I analyzed books and journals to gather data and information on methodologies applied in collecting data and information based on data and recovery procedures. I used questionnaire, interviews, and fieldwork analysis to collect data and information. The target group during needs and requirement analysis included clients, cloud computing and data backup providers as well as stakeholders. I took part in analyzing various tools and users of different hardware, software, and devices.
Required tools analyzed during data collection, and requirement analysis process included Athena lockers which provide storage for research laboratories in institutions of higher learning, courses work backups, and student projects through offering storage quotas. The students also require software tools like drop boxes to support handling assignments at a real time, avoid loss of data in the event of system failure and enhance access to data through website platforms (Microsoft .com, 2015). The cloud computing service providers require maintaining strong hardware components like storage servers (N. B. Gladys, Personal Communication, February 28, 2016).
I performed a close analysis of systems that multiple users recommended. Users specified for high-performance computing resources that could handle big data analysis operation. During the research the systems, I conducted systems analysis in Massachusetts Green High-Performance Computing Center a system that provides data recovery backup services for processed systems. Through inquiry, I enquired experts on implementation procedures for recovery systems such as services that can provide remote access to data using specialized data repository software such as Google storage. I took part in training involving accomplishment of systems that implement data security and coordination capabilities.
I realized that main methodologies applied in data collection, and requirements techniques include methodologies like questionnaires, interviews, and field analysis demographic study. Through questionnaire end users specified disaster recovery systems that can automate the process of keeping data backup by automating manual strategies. The specified system needs to have characteristics of implementing three copies that include original file, external copy, and remote copy. According to needs and requirements specified by cloud computing service providers they specified a data recovery systems capable of implementing a distribution procedure for entire stored files, processes, and information. Recovery procedures should allow local and remote downloading and uploading of data when necessary (L. Z. Charity, Personal Communication, March 05, 2016).
Development needs to be covered by experts involved accomplishing a system that ensures high-level backup restore performance. Professional data recovery and management systems must incorporate email backup and restore strategies implemented using coding techniques and operations (Carlos, & Steven, 2016). According to systems analyzed through benchmark studies, recovery systems should be tested to ensure that they have the ability to accomplish data archiving operations as required. I observed that main requirements of recovery systems included hardware like servers. I realized that various servers were required to implement different backup modes, types, topology, and service plan. Through the benchmarking operation, I studied different data storage backup topologies like Local Area Network Backup and Recovery required a central backup server, client agent media server and an inbuilt tape (Microsoft .com, 2015).
ReflectionThe session involving learning business requirements for data recovery operations was well covered. Through the process, various data recovery tools and requirements have been addressed. Through the research from books and journals general requirements for data recovery covered included, availability of the network, dedicated servers as well as established a network that supports sharing of files. Through data collection techniques I have realized that businesses require systems that are capable of implementing migration of files while retaining copies that enable the organization to recover data and information (Carlos, & Steven, 2016). Organizations require systems that can implement automatic print servers for ensuring files and data is reprinted for backup and restore operations. The training session was successful that implemented various standards and policies that business enterprises require to comply to while developing and implementing data recovery and management systems. The concepts involved included, monitoring and managing storage resources, as well as analyzing results of updated information (Y. F. Tom, Personal Communication, March 10, 2016).The session on identifying tools, hardware, and software requirements empowered me with detailed information based on selecting right tools to implement functions of business data recovery operations (Microsoft .com, 2015). Benchmarking operations equipped me with the knowledge to understand what companies, third parties, and groups that provide cloud computing services require providing standards like reliable data and resources, availability of sufficient bandwidth, as well as adequate storage capacity, to handle clients increasing data. The performance of data recovery system should be high regarding processing power and access (Y. F. Tom, Personal Communication, March 14, 2016). All planned activities were well implemented during iteration process.
PlanSchedule for iteration covered two weeks from March 18th, 2016 to April 5th, 2016. Session involved preparing systems to implement data and information recovery procedures. The first two days involved reading materials based on ways of developing a comprehensive backup plan. Books reviewed included Principles of Incident Response and Disaster Recovery by By Michael E. Whitman, Herbert J. Mattord, Andrew Green and Beginning Microsoft SQL Server 2008 Administration by Chris Leiter, Dan Wood, Michael Cierkowski, Albert Boettger. Subtasks in session involved determining what is required to be backed up for easier referencing and collection of data and information. The session involves preparation of devices to implement online backup and offline cold backup (G. K. David, Personal Communication, March 20, 2016). The following consecutive two days schedule was scheduled to determine appropriate backup procedures to implement during the backup process. Following week activities involved establishing strategies for handling very large database backup that requires handling big data operations.Other operations involved planned schedule for scheduling procedures for implementing Windows and other operating files backup operations. Subtasks involved deciding how to implement archiving of transaction logs. The second week required the researcher to enquire for appropriate locations to store onsite backup data and information to facilitate easier recovery during at event of data loss. The schedule also required specifying most appropriate systems for storing backups in an offsite location. The final activity in the iteration shall involve formulating policies to govern control and manage the entire process of data and information recovery (V. C. Ivy, Personal Communication, March 28, 2016). Subtask shall involve specifying deleting procedures, as well as appropriate considerations, form data to be discarded.
I implemented a procedure for carrying out research through reading books. I analyzed factors considered, to facilitate implementation of a plan that ensures data backup and recovery. I took part implementing a plan to implement data backup procedures. Through the session discovered data and information required to be backed up. Books research and reading activities proved Operating system backups were vital to retain system updates and configuration changes. Other sensitive data and information requiring data backup and recovery procedures include
1. Relational database management software settings and configurations should be backed up. Updates and patched information should be set to update automatically (Ali, Jeff, Michael & Kumar, 2012).
2. Application software, such as Oracle E-business Suite, Oracle Enterprise Manager (OEM), and Management Information Systems (MIS) should be configured to implement incremental backup procedures during startup or database closure (Ali et al., 2012).
3. Passwords and other user credentials should be updated, and updates refreshed (Ali et al., 2012).
4. Components of Oracle databases should be backed up like database parameter file, database control file, database data files, redo log files and archived redo logs (Ali et al., 2012).
5. Microsoft SQL Server databases should also be backed up to facilitate recovery of vital information and data within the organization (Ali et al., 2012).
I formulated ways of dealing and handling information based on various ways of handling backup information from various servers technical to handle SQL data server studied included logical backup that utilizes business continuity planning utility such as import and export wizard. The research revealed how to perform a full recovery of data and information ensuring that system rolls back to the good initial state or at the point of failure.
Through session of learning process changes ensure implementation of a dynamic plan that should implement a data recovery action. The session has enabled me to have clear information concerning various trends of data recovery. Through the session, I have acquired methods of dealing with critical data and information as well as very sensitive organization data. I have discovered data and information requiring priority in the implementation of data recovery operations. The session involving identifying data for recovery has facilitated discovering of automated backup operations that implement Online Enterprise management (Chris, Dan, Michael & Albert, 2009). I have observed that tools applied in implementing database backup include operating systems scheduling tool and output log file tools. The research has facilitated discovering new ways of dealing with monitoring of backup procedures and operations. The implementation of monitoring strategies includes designing and configuring systems to send alert information through mobile-enabled short messages and cell phone applications.
Database recovery planning guarantees good implementation of disaster recovery and business continuity through associating data recovery parameters with actual organization information. User sessions should be monitored via capturing system logs and catalogs. The study has revealed operations for implementing database recovery through the use of import and, export modules in Oracle database (Chris, et al., 2009). I have discovered that Oracle database procedures solve various issues associated with recovering data from loss disasters and calamities. Implementation of secures data recovery operations shall ensure that information is protected from loss triggered by operations such as fire, theft, distortion and stealing of data and information. The research also provided physical backup handling of data and information implemented through setting database and configurations.
A session involving learning changes for data recovery and management process was well accomplished. The process has enabled me to learn different preparation operations associated with ensuring data and information have been securely maintained and managed using principles and strategies that enable the business to restore data after a loss. Recovery procedures analyzed in research are critical. I have gained experience required to implement database operations and strategies. Various portable hard disks, hard drives as well as external plug and play devices can be used to keep and store data and information that may be used to recover data (G. L. Salome, Personal Communication, March 30, 2016). Organizations implementing data and information require experienced, skilled and well-trained database administrators to facilitate configurations and settings of the database that promote the implementation of the comprehensive backup plan (Michael, et al., 2014).
The system must facilitate failure signals through sending alert messages at an event where data and information scheduled backup may fail. Good practices should be practiced in data recovery and management procedures through ensuring running of seamless time-saving operations that guarantee data and information are archived, secured accurately (Michael, et al., 2014). IT auditors should help database administrators in strengthening their controls of data and information within the system. Plan based on testing data recovery process to validate backup operations should be encouraged be carried out by IT systems auditors. The constant approval of quality data recovery plan gives assurance of well and proper implementation of database systems. The improving of data recovery systems and implementation of new tools and technology should be implemented through the use of analyzed research procedures (X. H. Diana, Personal Communication, March 30, 2016).
The session was scheduled to take about two weeks from May 5th, 2016 to May 20th, 2016. Session involved conducting effective and efficient data recovery procedures that implement data and information backup. The first half of week involved performing database cleaning operations to ensure that the system shall implement effective backup management operations. Subtask in session involved directing data and information to human resource controller. Effective backup management shall involve validation of backed up data information within the organization. The second half of week involved carrying out settings and configuration operations on the database. Subtasks during data recovery setting included setting up dependencies for backing data and information to external drivers and plug and play devices such as hard disks and hard drives (K. B. Ruth, Personal Communication, April 07, 2016). The session shall provide data and information sensitive m to the company that must be backed up by the organization.
The second week shall involve the provision of resources and activation of data recovery. Operations involved shall include determination of network connection to implement for ensuring data and information repository location is ready. The session shall provide data backup resources on-premise and offsite repository centers. Testing of repository locations and storage mediums shall take place to ensure that all operations have been securely put into implementation. The second half of the week shall define various techniques that ensure IT team have the mandate to guarantee data and information handling systems can be tested for the validating plan. The session shall define strategies to restore from database during the event of data interruption corruption or deletion. The session shall involve checking if the system can detect corrupt blocks of data before implementing data backup operation.
I participated in the process of ensuring Oracle databases were clean and updated. I carried out database cleansing operations using antivirus software as well as implementing database updating. Recent trends and operations were activated into database active mode. I also conducted database setting to facilitate automated data backup operation. Through testing operations database could effectively carry out various data backup operating such as operating system backups. I ensured data recovery operations could implement actual backing up database user sessions through backing up systems logs, and validating backup logs. I set the procedures for ensuring that database shall get perfect checking through scheduled IT plan. The main objective of the plan ensured that IT auditors have a duty to accomplish by ensuring the system is fully checked for continuous business operations (Chris, et al., 2009). I configured output ports for plug play devices to facilitate easier detection of storage devices that can guide on-premise backup of data, and information.
I provided active network systems linking active site with third-party cloud computing providers. Through their active site organization could facilitate direct access to upload backup files in cloud repository system (B. L. Dan, Personal Communication, April 10, 2016). I implemented configuration settings to enhance automatic backup implementation by systems databases. The system could implement backup effectively through the cloud without human intervention. Testing and analyzing of data recovery system guaranteed that all data and resources could facilitate required effective business continuity as well as trusted recovery of data and information. I finally provided a response plan to facilitate maintenance of system at the event of a disaster. The alternative site could be implemented to offer similar services as the main site.
Through data and information handling techniques I have observed that disaster strikes can affect business operations within the organization. One of the major techniques implemented by an organization to enhance recovery of data and information is through implementation of data recovery plan. Data recovery plan ensures that organizations vital data and information can be secured within a dedicated repository area and guarantee continuity of business operations in the event of a disaster (Joshua, 2013). The various strategies that implement such plan include providing tools and systems for storing data for emergency purposes. The sites provided include online repository area and offline repository locations. Both locations are vital in business operations since they guarantee alternative security for data and information during events of disasters. Database administrators have a role to play in facilitating data backup and recovery operations. Main activities that assure business operations shall persist is the implementation of continuous systems of operation that promise business data can be recovered at the point of failure.
I realized that financial information, business transactions information required being referenced in future for decision making. Company historical information, as well as background information, is useful for maintaining traditions and culture of business operations. Similarly, data concerning organization polices, standards, rules and regulations must be properly handled (Joshua, 2013). Losing such data and information through disasters can lead to the closure of business entity. I have observed that Organizations their essential data and the information is retained through a data recovery plan. Such data and other files copies could be transferred to an alternative site which could provide another area for an operation to facilitate recovery process (B. L. Dan, Personal Communication, April 12, 2016).
Formulation of a mock data recovery plan was well implemented. The operation has provided different enough knowledge, experience, and skills in setting and configuring databases to facilitate automated data and information recovery. Through the session, I have known step by step operations of maintaining reliable company data and information. Through the preparation of data recovery and backup systems, I have gained information required for ensuring data, and information systems have embraced mutual significance in recovering data and information systems. The operations have provided various ways of maintaining customer relations through maintaining transparency and user reliable data and information (Peter, 2008). Developed plan ensure consistent data and information that can provide customers with evidence of having historical information about their data. Such working parameters assure organization that the entire IT procedures can maintain business in the event of disasters through enabling easier recovery of replicated duplicate files.
Backup strategies implemented in study equipped me with the ability to implement systems that can ensure that data can be backed up with the frequency within which data changes. Dynamic systems data and information backup procedures require implementing real-time updating of data and information (Joseph, 2010). The study has equipped me with the ability to implement constraints of backup strategies that ensure data and information can be implemented to suit better operation and implementation of backup operations. I have discovered different storage mediums that can facilitate data and information storage in on-premise and offsite locations. The major driving move towards implementing data recovery operations needs to guarantee retention of business data at the event of a disaster to ensure business continuity (N. R. Peter, Personal Communication, April 19, 2016).
Research session has been of great significance by helping me to create a relationship between theory work and practical industrial operations. A research study involving data recovery management has introduced to me major business requirement skills. Through research, I have discovered the significance of applying techniques such as data recovery. I have appreciated the need for data and information backup strategies within the business organization. Through research, I have acquired techniques for setting and configuring database systems to implement various operations like automated database backup. Thro-ugh inquiries and training operations I have gained knowledge in troubleshooting, diagnosing and repairing database systems. Experience in a research study has equipped me with professional skills in IT as well as expertise knowledge in data recovery and management.
The research has equipped me with principles, standards, and policies that are involved i0mn development and implementation of Oracle database and servers that facilitate data recovery. Session of study research has enabled me to link IT techniques into business operations as well as gaining the knowledge required in integrating IT technology into business operations. The various techniques and theories learned in class as well as library research study could be practically implemented through the use of academic internship session. Research has paved the way to new ventures can career opportunities triggering more research work in fields of bi0g data handling, contingency planning, business continuity and data and disaster recovery. Future study research shall implement various needs, in the implementation of databases and analyze tools in cloud computing.
Ali N. A., Jeff B., Michael R.,, & Kumar S., (2012).Database Backup and Recovery Best Practices. Retrieved from
Chris L., Dan W., Michael C., Albert B. (2009). Beginning Microsoft SQL Server 2008 Administration. USA: Willey Publishers
Joseph F. G. (2010). Disaster & Recovery Planning: A Guide for Facility Managers. USA: Fairmont Press
Michael E. W., Herbert J. M., Andrew G. (2014). Principles of Incident Response and Disaster Recovery USA: Sengage learning
Microsoft .com (2015). Capability: Data protection and Recovery. Retrieved from: Peter H. G. (2008). IT Disaster Recovery Planning For Dummies: USA: Willey Publishers