Basic questation about how works DPM

HI all,
sorry how DPM detect which files is changed I must copy to replika ? Or how is created replika . DPM also reguester create full backup and then use incremental backup copy-and-write method ? 
thanx
Falcon

Closing for housekeeping.
DPM uses a file system filter driver (DPMFilter) to track block level changes between backup times and only transmits changed file blocks during synhronizations for file data.  DPM never transfers the whole file except for initial replica
creation.  
Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. Regards, Mike J. [MSFT]
This posting is provided "AS IS" with no warranties, and confers no rights.

Similar Messages

  • Basic questation about backup SQL database

    Hi I have basic questation about backup database . If I set DPM to backup database and the database have full model and another application truncate log. Detect this dpm and create full backup or create error ?
    Falcon

    Hi,
    If you want another backup process to truncate the logs instead of DPM, you can just configure DPM to synchronize
    just before a recovery point.  That basically tells DPM to just perform express full backups which will not truncate logs.
    Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. Regards, Mike J. [MSFT]
    This posting is provided "AS IS" with no warranties, and confers no rights.

  • Basic questation about VSS and windows backup

    hi all, basic questation about backup and VSS
    Environment:
    windows 2008r2,NAS backup disk connected with iSCSI
    If i create in the windows backup server job , where i backup disk D , target is NAS disk and start it . Windows backup is requester and is created shadow copy . This shadow copy is created in the disk D or in the NAS disk ? If in the disk D is created for
    everyone application snapshot ? After created snapshot the windows backup copy data from snapshot to windowsimagebackup ? And If windows backup create different snapshot how detect which files is changed ? 
    thank you
    Falcon

    Hi,
    Windows Server Backup stores backup versions in volume shadow copies. After the data write is complete, Windows Server Backup creates a shadow copy of the volume where the backup is stored using Volume Shadow Copy Service (VSS). This shadow copy retains the
    state of the storage volume as a “backup version” or “point-in-time” of the backup and must restore using this backup version.
    You could refer to the article below to know the steps of a back up operation performs: 
    Backup Version and Space Management in Windows Server Backup
    http://blogs.technet.com/b/filecab/archive/2009/06/22/backup-version-and-space-management-in-windows-server-backup.aspx
    Windows Server Backup uses Volume Shadow Copy Service (VSS) and block-level backup technology to back up and recover your operating system, files and folders, and volumes. The Volume Shadow Copy Service is used to differentiate between backup sets, and to track
    where the various blocks are being written to within the shadow copy storage.
    For more information about the incremental backup technology, please see:
    Learn more about system image backup
    http://blogs.technet.com/b/filecab/archive/2009/10/31/learn-more-about-system-image-backup.aspx
    Backup and Recovery Issues with Windows Server 2008 (Part 2)
    http://www.windowsnetworking.com/articles-tutorials/windows-server-2008/Backup-Recovery-Issues-Windows-Server-2008-Part2.html
    Please Note: Since the website is not hosted by Microsoft, the link may change without notice. Microsoft does not guarantee the accuracy of this information.
    Best Regards,
    Mandy 
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • Basic questation about collation

    HI all,
    I have basic questation about create colletion . I want read and compare value from enviromnemt variables . But in the query i find "select *  from  SMS_R_System inner join SMS_G_System_ENVIRONMENT on SMS_G_System_ENVIRONMENT.ResourceId =
    SMS_R_System.ResourceId where SMS_G_System_ENVIRONMENT.VariableValue = xzy " But where is the name for this value . I want etc. variable name PUBLIC value = "c:\public"
    thanx
    Falcon

    OK, I think I follow now:
    SELECT SMS_G_System_ENVIRONMENT.ResourceId
    FROM SMS_G_System_ENVIRONMENT
    WHERE SMS_G_System_ENVIRONMENT.Name = "FP_NO_HOST_CHECK"
    AND SMS_G_System_ENVIRONMENT.VariableValue = "Yes"
    Jason | http://blog.configmgrftw.com

  • Basic questation about MBAM

    HI all , sorry for basic questation .
    I try set with gpo mbam client in the windows 7 . I set requerid encrypt os drive and fixed drivers .and questtaion :
    in the error log is write :
    detect OS volume encryption policies conflict . check bitlocker anb MBAM policies related OS drive protectors . 
    I set MBAM only in MBAM GPO .
    an second quetstaion . 
    I cannot enable bitlocker only with GPO ? I must enable manualy ? 
    thanx
    Falcon

    Recovery key and the PIN are two different protectors. PIN is something you set to unlock your machine at boot. It provides an additional protection. You can always change the PIN choosing option, bitlocker drive encryption option from control panel.
    Recovery key is to log in the machine if your machine goes into the recovery mode. If you will not be able to access your OS Drive how you will be able to boot. TPM string is called as the Ownership Hash password which is different from the recovery string
    of the OS Drive which is a 48 digit numerical password.
    Gaurav Ranjan

  • Very basic questions about how Airport Express works

    I'm using a non-Apple wireless router at home. I'd like to stream music from my iBook to my stereo. Will an Airport Express do that? Will it get confused that there's another access point? Can my iBook receive streaming radio via the non-Apple wireless router and send it to Airport Express?
    Alternatively: can I simply replace my non-Aple wireless router with an Airport Express? Will an Airport Express work as a wireless router? Will it to DHCP and NAT so that multiple computers can connect to the Internet through it?
    Thanks.

    johnbkim, Welcome to the discussion area!
    I'd like to stream music from my iBook to my stereo. Will an Airport Express do that?
    Yes
    Will it get confused that there's another access point?
    You would simply configure the AirPort Express (AX) to join your current wireless network.
    Can my iBook receive streaming radio via the non-Apple wireless router and send it to Airport Express?
    To stream non-iTunes items you will need to use Airfoil.
    Alternatively: can I simply replace my non-Aple wireless router with an Airport Express?
    Yes as long as you don't have any devices connected to that router via Ethernet.
    Will it to DHCP and NAT so that multiple computers can connect to the Internet through it?
    Yes it is a router.

  • Some basic questation about mbam and bitlocker

    Sorry for questation . What doing options Auto-unlock ?
    allow auto-unlock and require auto-unlock .
    and exist some construction betwen setting fixed drive and os drive . If I disable encrypting fixed drive or set only read fixed drive it mean that os drive is set to ?
    and about bitocker:
    exist solution how i enforce encrypting ? 
    thank you
    Falcon

    Recovery key and the PIN are two different protectors. PIN is something you set to unlock your machine at boot. It provides an additional protection. You can always change the PIN choosing option, bitlocker drive encryption option from control panel.
    Recovery key is to log in the machine if your machine goes into the recovery mode. If you will not be able to access your OS Drive how you will be able to boot. TPM string is called as the Ownership Hash password which is different from the recovery string
    of the OS Drive which is a 48 digit numerical password.
    Gaurav Ranjan

  • Basic questation about sql backup

    HI all, sorry for my englisch . I have quetstaion about DPM and SQL 2012 database recovery model .
    If I select recovery model simple , that DPM always backup full backup ... This create with vss providera ?
    If I select full backup what work synchranization ? Every log files is copy to replica , and after copy truncate log ? 
    thanx
    Falcon

    For application data that support incremental backups (exchange, SQL Db's in full recovery mode) there are two job types.
    A) Synchronization - This is equivalent of an incremental backup and only brings over log changes.  Each incremental synchronization is equivalent to a recovery point.  Each incremental synchronization results in application log truncation which
    is performed by the application (SQL / Exchange)
     B) Express full - This is equivalent to FULL backup, however only brings over Database changed blocks and applies them to the replica volume then makes a snapshot  Each express full backup is recoverable.  Express full backups do not result
    in log truncation by the application.  There is a 512 snapshot limit for express full backups.
    For applications that do not support incremental backups (SharePoint, SQL Db's in simple recovery mode, Hyper-V VMs)  always use express full backups.
    http://social.technet.microsoft.com/Forums/en-US/b767a3fb-ce59-4599-a92e-2e5e7e1c8b98/help-to-understand-the-difference?forum=dpmfilebackup
    Backing up SQL with DPM
    SCDPM: Backup SQL and Truncate SQL Logs
    Does DPM Clear transaction Log when Backup?
    Have a nice day !!!

  • Basic questation

    HI ,
    I have 2 basic questation about adobe premiere element 7 . Can I intergarte 2 clips to one clips ? And can I cahnge speed of the clip with the keyframe ? I wan in the begin clip slow and accelerate .....
    thanx

    Marek,
    To elaborate on what Steve says in Post 10, what you have on your Timeline is a pair "virtual" Clips. They appear as separate on the Timeline only, but Premiere is referencing back to your original Clip, which is in your Project Panel. It has not been physically cut, but has just had references added to it for editing.
    When you Delete the second Clip, the one you "created," and drag the end of the first Clip back out, you are just erasing those references. Your Clip is essentially now unchanged.
    The Undo (Ctrl-z) works while you are editing. If you Save your Project and close it, you cannot use the Undo. You can also use your History Palette (Window>History) to have multiple Undo's. These also disappear when you Save and Close, then reopen PE.
    Hunt

  • The password I use for installing downloaded applications or installing basically anything isn't working but I didn't change it or let alone touched it. How do I fix this? I'm on an iMac 21.5 inch, Mid 2011 and Mac OS X Version 10.7.3

    The password I use for installing downloaded applications or installing basically anything isn't working but I didn't change it or let alone touched it. How do I fix this? I'm on an iMac 21.5 inch Mid 2011 and Mac OS X Version 10.7.3

    I've no idea why it has stopped working, but you could reset it:
    http://osxdaily.com/2011/08/24/reset-mac-os-x-10-7-lion-password/

  • Round trip workflow with proxies between Premiere and AE / a more general question about how these programs work?

    Hi all,
    I'm new to editing with proxies in Premiere and have some questions about how to handle the relationship with After Effects. Say I have a rough cut (with proxies) and I want to send it to AE to do some effects. The simplest thing to do seems to be to replace the proxies with the originals in Premiere, send the project to AE and do my thing. But if I then want to send the project back to Premiere, it will involve the original files, which are too machine-intensive for me to edit. In theory, it seems like there should be a way to send the project with original footage to AE, do effects, send it back to Premiere, and then replace it with proxies to do further editing while retaining the effects.
    This leads to a confusion about how AE works. When I do an effect, am I correct in assuming that it does nothing to the original file? If that's the case, it seems like it shouldn't matter (in the editing stage) what file AE "applies" an effect to (proxy or original). But I feel like there's a hitch in this workflow. The same question could also be asked about going back and forth in Speed Grade.
    Perhaps there is no real answer to this and the best option is to save effects and grading for after I have picture lock, but sometimes that's not entirely possible or convenient, etc.
    Hopefully this makes some sense—It's a little hard to explain.
    Thanks.

    Hi Mark,
    Here are the specific sections of the manual that should give you the best explanation regarding the Check out/in workflow for FCP projects in Final Cut Server:
    Check out:
    http://documentation.apple.com/en/finalcutserver/usermanual/#chapter=7%26section =5
    Editing:
    http://documentation.apple.com/en/finalcutserver/usermanual/#chapter=7%26section =6
    Check in:
    http://documentation.apple.com/en/finalcutserver/usermanual/#chapter=7%26section =7
    -Daniel

  • The password I use for installing downloaded applications or installing basically anything isn't working but I didn't change it or let alone touched it. How do I fix this?

    The password I use for installing downloaded applications or installing basically anything isn't working but I didn't change it or let alone touched it. How do I fix this?

    iMac 21.5-inch Mid 2011
    Mac OS X Version 10.7.3

  • A few questions about how ZPM works.

    We have patch management (in ZCM 11.2.2), but honestly don't use it much. I have a few questions about how it works that might make me use it more, if I understand it more.
    If I deploy a patch (or a set of patches), it creates a bundle for that deployment. That bundle seems to include actions that deploy the actual patch bundles (correct?). Do I have to recreate a new deployment bundle every time I want to push a new patch? i.e. If I push a Java update, and a month later, a new one comes out, do I build out a new bundle with the new patch in it, or do I modify the old one?
    Once the patch is deployed, can I safely delete that deployment bundle, or should they just pile up?
    Is there a way to "auto-approve" patches? Lets say I always want a group of machines to have the latest Adobe Flash Player patches. Can I set up ZPM to automatically cache and push the latest patches for a specific product, or do I have to manually remediate each patch? (I'm thinking of how MS's WSUS does "auto-approval")
    I see most packages aren't cached in list, but occasionally, a patch is cached without me touching it. Why? Can I change what gets automatically cached?
    Thanks for any help/answers you can provide.
    -Adam

    Originally Posted by adrockk
    We have patch management (in ZCM 11.2.2), but honestly don't use it much. I have a few questions about how it works that might make me use it more, if I understand it more.
    If I deploy a patch (or a set of patches), it creates a bundle for that deployment. That bundle seems to include actions that deploy the actual patch bundles (correct?). Do I have to recreate a new deployment bundle every time I want to push a new patch? i.e. If I push a Java update, and a month later, a new one comes out, do I build out a new bundle with the new patch in it, or do I modify the old one?
    Once the patch is deployed, can I safely delete that deployment bundle, or should they just pile up?
    Is there a way to "auto-approve" patches? Lets say I always want a group of machines to have the latest Adobe Flash Player patches. Can I set up ZPM to automatically cache and push the latest patches for a specific product, or do I have to manually remediate each patch? (I'm thinking of how MS's WSUS does "auto-approval")
    I see most packages aren't cached in list, but occasionally, a patch is cached without me touching it. Why? Can I change what gets automatically cached?
    Thanks for any help/answers you can provide.
    -Adam
    For #1, (assuming you're not using baselines), you would check the new version of the patch (vulnerability) and do a new deployment.
    #2 - once you're satisified that the machines are deployed (or the best to your ability) you can delete the DEPLOYMENT package. It doesn't delete the actual vulnerability bundles to my knowledge. That's why it's a good idea to name your bundle deployments with something meaningful, IMO (and maybe include a nice desription).
    #3 - currently I don't believe this is possible. I know you can probably configure it to auto-download the patches, but not auto-deploy everything. Given the propensity for software to wreck other things (hello MS .NET patches), this is probably not a good idea. At least I'd never auto-download and auto-deploy any patches without testing them first, and certainly take my servers a little more cautiously than my workstations.
    #4 - I think you can configure what's cached, but I could be wrong.
    I know there's a lot of improvements coming in the pipeline, and it doesn't hurt to "vote" for your enhancements via the enhancement system (more work for Shaun--haha)
    --Kevin

  • The last Apple I used was a IIe. Where can I find basic information about what an Ipad will do and how it differs from an Android tablet?

    The last Apple I used was a IIe. Where can I find basic information about what an Ipad will do and how it differs from an Android tablet?
    I am considering purchasing this for my wife who has only had experience with Windows machines.

    Here are a number of possibilities:
    http://ipad.about.com/od/iPad_Guide/a/How-To-Use-The-iPad-Best-Uses.htm
    http://www.macobserver.com/tmo/article/8-important-things-you-can-do-with-an-ipa d
    http://iconlibrary.iconshock.com/tutorials/50-things-you-can-and-cant-do-with-yo ur-new-ipad/
    iPad vs Android:
    http://ipad.about.com/od/ipad_competition/tp/iPad-vs-Android-Which-Tablet-Should -You-Buy.htm
    http://www.cnet.com/topics/tablets/best-tablets/

  • Question/Baffled about how binding works

    In an attempt to position my canvas in the center of the
    user's browser (no matter what the size). I ended up using the
    following code. The Application is set to a width and height of
    100%.
    <mx:Canvas id="primaryCanvas" horizontalScrollPolicy="off"
    verticalScrollPolicy="off" x="{(parentDocument.width >
    backgroundImage.width)? parentDocument.width /2 -
    primaryCanvas.width / 2 : 0}" y="{(parentDocument.height >
    backgroundImage.height)? parentDocument.height /2 -
    primaryCanvas.height / 2 : 0}">
    In particular, focus on the x and y attributes. This works as
    I expect, as in, I get the result I want. However, I'm a bit
    baffeld about the under pinnings about how/why it works :)
    How does the canvas know to re-position itself each time the
    browser is re-sized?
    How would I make these bindings into a function so I don't
    have to have my "code" intermingled with the actual mxml parts? Or
    is this even possible?
    I have read various things on binding but still have the
    above outstanding questions.
    Shiv.

    This is how it appears to work to me...
    The binding mechanism recognizes bindable variables in the
    expression you give it. If any of those variables change, the
    entire expression is re-evaluated. In this case,
    parentDocument.width is a bindable variable.
    One thing you can do is bind to a method call. The trick is
    to pass the method a bindable variable so that the binding
    mechanism calls your method whenever the variable changes.
    Something like:
    x="{getx(parentDocument.width)}"
    And getx() does the calculations and returns an int.

Maybe you are looking for