A disaster recovery plan is necessary to ensure all systems and data can be quickly restored if a disaster occurs. It is important to determine and prepare for all the steps required to respond to each type of disaster, and to test the recovery steps by simulating a catastrophic event. A disaster recovery plan can be structured in many different ways and can contain many types of information,
and can include the following:
• Information on who owns the administration of the plan.
• A list of people to be contacted if there is a disaster and instructions on how to contact them.
• A list of potential disasters and a checklist for recovery from each disaster scenario.
• Procedure for performing backups.
• Off-site storage policies.
• Procedures for restoring servers and the network.
• A plan to obtain hardware, if it is necessary.
• How long recovery will take and the final database state the users can expect.
• Steps for reviewing the documentation whenever changes are made to the computers or network.
Regards,
Hossein Karimi
Sunday, July 22, 2018
Planning Disaster Recovery
Labels:
AX 2012,
Installation
+10 years of experience with hands-on lead-level background in the full life cycle of software development with demonstrated cross-functional team leadership skills.
Programming:
• ERP :Microsoft Dynamics AX 2012
• Language :X++, C#, C++, XAML, Asp.Net, Html, VB.Net, Android
• Environment : Windows XP, Windows 8, Windows 10, Windows Server
• DataBase : Oracle 9i,10g,11g and SqlServer and SQLlite
Subscribe to:
Post Comments (Atom)
Configure the Firewall on the Enterprise Portal Server
After you install Enterprise Portal, enable Web Server (HTTP) in Windows Firewall. If you do not enable the web server in Windows Firewall...
-
To integrate Microsoft Dynamics AX and Analysis Services, you must connect Analysis Services to the Application Object Server (AOS). To do s...
-
The below select query will give the both the Sales Line record count and the sum of sales quantity. static void Test_Data(Args _args) ...
-
In Reporting Services, reports and resources are processed under the security identity of the user who is running the report. If the report ...
No comments:
Post a Comment