The document provides instructions for setting up a backup from a DSS V6 data server to an attached tape drive. The key steps include: 1) Configuring hardware and volume groups, 2) Creating NAS volumes and snapshots, 3) Configuring the backup to use the tape drive by defining pools, tasks, and schedules, and 4) Performing backups that store data from network shares on labeled tapes according to the defined configuration.
RH202 CertMagic Exam contains all the questions and answers to pass RH202 IT Exam on first try. The Questions & answers are verified and selected by professionals in the field and ensure accuracy and efficiency throughout the whole Product
RH202 CertMagic Exam contains all the questions and answers to pass RH202 IT Exam on first try. The Questions & answers are verified and selected by professionals in the field and ensure accuracy and efficiency throughout the whole Product
This document gives you detailed step-by-step instructions on KernSafe iStorage Server configuring for Windows Server 2008. We need at least two servers and one client to establish High-Availability on VMWare ESX and ESXi
What you will need for creating a bootable microSD card ?
1. A development machine with some version of linux (I had Ubuntu installed on my machine) .
You should have root access on this machine (or at least the ability to mount/unmount devices and run
fdisk).
2. A microSD card adapter. Your hardware should contain an adapter that converts microSD card into
an SD card which you can use on your computer. If your computer/laptop does not have an SD card
reader, please contact the course staff to get a USB adapter for the microSD card.
The example covered in this document will show the steps for setting up a brand new 2GB microSD card.
First insert your card into your development machine’s flash card slot.
On my Ubuntu 12.04 machine, the newly inserted card shows up as /dev/mmcblk0(or /dev/sdb) (with any
partitions showing up as /dev/mmcblk0p1 (or /dev/sdb1), /dev/mmcblk0p2(or /dev/sdb2), etc.) and that is
the device name that will be used through this example. You should substitute the proper device name for
your machine. You can use ’mount’ or ’df’ to see where the card mounts on your machine.
What’s Windows Storage Spaces & storage pool? How to create them in Settings & Control Panel? From Windows 10 to Windows 11, what has changed to them?
SysInfoTools RAID Recovery software is a thorough answer for RAID file recovery on Windows systems. Software has been insightfully programmed for recovering maximum conceivable data from corrupt RAID hard disks. It underpins both RAID-HDD and RAID-VHD, and restores data in their original form at user-defined location. Every single well-known file systems of Windows, Mac and Linux are profoundly supported by this product. Likewise, it supports both GPT and MBR partition table formats in which your hard disk partition is saved. The interactive and easy-to-use interface of this software makes recovery operation highly convenient for technical and non-technical users.
Learn about the IBM Flex System Storage Expansion Node. The IBM Flex System Storage Expansion Node is a storage enclosure that attaches to a single half-wide compute node to provide that compute node with additional direct-attach local storage. The Storage Expansion Node provide flexible storage to match capacity, performance, and reliability needs. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
This document gives you detailed step-by-step instructions on KernSafe iStorage Server configuring for Windows Server 2008. We need at least two servers and one client to establish High-Availability on VMWare ESX and ESXi
What you will need for creating a bootable microSD card ?
1. A development machine with some version of linux (I had Ubuntu installed on my machine) .
You should have root access on this machine (or at least the ability to mount/unmount devices and run
fdisk).
2. A microSD card adapter. Your hardware should contain an adapter that converts microSD card into
an SD card which you can use on your computer. If your computer/laptop does not have an SD card
reader, please contact the course staff to get a USB adapter for the microSD card.
The example covered in this document will show the steps for setting up a brand new 2GB microSD card.
First insert your card into your development machine’s flash card slot.
On my Ubuntu 12.04 machine, the newly inserted card shows up as /dev/mmcblk0(or /dev/sdb) (with any
partitions showing up as /dev/mmcblk0p1 (or /dev/sdb1), /dev/mmcblk0p2(or /dev/sdb2), etc.) and that is
the device name that will be used through this example. You should substitute the proper device name for
your machine. You can use ’mount’ or ’df’ to see where the card mounts on your machine.
What’s Windows Storage Spaces & storage pool? How to create them in Settings & Control Panel? From Windows 10 to Windows 11, what has changed to them?
SysInfoTools RAID Recovery software is a thorough answer for RAID file recovery on Windows systems. Software has been insightfully programmed for recovering maximum conceivable data from corrupt RAID hard disks. It underpins both RAID-HDD and RAID-VHD, and restores data in their original form at user-defined location. Every single well-known file systems of Windows, Mac and Linux are profoundly supported by this product. Likewise, it supports both GPT and MBR partition table formats in which your hard disk partition is saved. The interactive and easy-to-use interface of this software makes recovery operation highly convenient for technical and non-technical users.
Learn about the IBM Flex System Storage Expansion Node. The IBM Flex System Storage Expansion Node is a storage enclosure that attaches to a single half-wide compute node to provide that compute node with additional direct-attach local storage. The Storage Expansion Node provide flexible storage to match capacity, performance, and reliability needs. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
Deploy Storage Spaces
The Contoso Ltd. contains an Active Directory domain named contoso.com. There is a server named Server1 that runs Windows Server 2012 R2.
The company currently looking for a storage solution that must meet the following requirements:
a. Provide fault tolerance if a single disk fails.
b. Maximize the amount of files that can be stored in the storage space.
c. New storage can be added anytime as per requirement.
This document provides a detailed description of the Gluster Storage Platform installation process. For demonstration purposes this guide will detail how to install and configure a two-node storage cluster. It also outlines how to create a storage volume and mount on clients.
Unitrends offers data protection appliances that provide the lowest total cost of ownership (TCO) in the industry in terms of protecting and restoring critical data and systems. Our family of disk-to-disk (D2D) data protection appliances provides unmatched backup and rapid recovery of lost systems, applications, and unstructured, and structured data as well as disaster recovery protection. Our on-premise Data Protection Units (DPUs) for local backups, our disk-to-disk-to-disk (D2D2D) rotational archiving appliances, and Data Protection Vaults (DPVs) for off-site data vaulting (replication) eliminate the need for multi-vendor software and hardware and coupled with our world-class customer support provides an integrated, simple, and elegant solution that is designed from the ground-up for small- and medium-sized enterprises.
Quick-Start Guide: Deploying Your Cloudian HyperStore Hybrid Storage ServiceCloudian
This document will help a new user deploy a 3-node Cloudian storage cluster in your data center for use with the Cloudian HyperStore Hybrid Cloud Service from AWS Marketplace.
This article demonstrates how iStorage Server works under VMware ESX Server. Such powerful combination will expand the application scope of your virtual server, thereby enabling WINDOWS server to expand the storage of your virtualized server. It also allows you to directly use the storage devices of the existing Windows server for VMware ESX Server. With IP SAN solution provided by iStorage Server, you may set up operating system, install application and server software, as well as store data required by your virtual machines. Your ESX Server storage can be expanded in the following 3-most-commonly-used ways:
• Use Virtual Image File Disk Device to create a file-based virtual storage device for VMware ESX Server, this allows quick data migration and backup.
• Directly use the physical disk or partition of Windows server. This enables you to make good use of resource. No additional configurations, just add the storage media to iSCSI Targets.
• Use CD/DVD/RW bridge device or Virtual CD/DVD to map physical CD/DVD drives or CD/DVD image files (iso, .bin, .mdf, .cdi, .b5i, .nrg, .ccd, .sub, .img, .raw) on your Windows server to CD/DVD devices on VMware ESX Server virtual machine.
After iStorage Server 2.0, it supports server side mirroring, synchronous replication and failover which allows user to create a high-availability iSCSI SAN for VMware ESX / ESXi Server.
The Unofficial VCAP / VCP VMware Study GuideVeeam Software
Veeam® is happy to provide the VMware community with new, unofficial study guides prepared by VMware certified professionals Jason Langer and Josh Coen.
Free VCP5-DCV Study Guide
In this 136-page study guide Jason and Josh cover all seven of the exam blueprint sections to help prepare you for the VCP exam.
Free VCAP5-DCA Study Guide
For those currently holding their VCP certification and want to take it up a notch, Jason and Josh have you covered with the 248-page VCAP5-DCA study guide. Using this study guide along with hands-on lab time will help you in the three and a half hours, lab-based VCAP5-DCA exam.
Needle In An Encrypted Haystack: Forensics in a hardened environment (with Fu...Nicolas Collery
Full Disk Encryption (FDE) may be rather useful as a defense mechanism against potential theft of a computer system. However, when the system is compromised and requires careful forensic analysis, FDE can be quite painful to forensic analysts. Unless you deal with standard and widely supported encryption such as LUKS, Bitlocker, TrueCrypt or few others, it might really hard to get through the layers of crypto code in proprietary software.
This presentation delivered at HTCIA (HIGH TECHNOLOGY CRIME INVESTIGATION ASSOCIATION - Singapore) highlights few techniques to let a remote analyst perform investigations.
https://htcia.org
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Open-E Backup to Attached Tape Drive
1. Backup to attached Tape
Drive using Open-E DSS V6
Software Version: DSS ver. 6.00 up13
Presentation updated: March 2010
2. Backup to attached Tape Drive
TO SET UP A BACKUP TO AN ATTACHED TAPE DRIVE,
PERFORM THE FOLLOWING STEPS:
1. Hardware configuration
2. Creating Volume Group, NAS Volume and
snapshot
3. Configure the Backup to use with a Tape Drive
4. Create the Restore from Backup
www.open-e.com 2
3. Backup to attached Tape Drive
1. Hardware configuration
Data residing on the DSS V6 is backed
up from RAID Array to the Tape Drive. Data Server (DSS)
IP Address: 192.168.0.220
RAID Array
Volume Group (vg00)
NAS volume (lv0000) Tape Drive
Share: Data Backup
Snapshot of lv0000:
snap00000
Restore
Share: Restore from Backup
www.open-e.com 3
4. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 2. Creating Volume Group, NAS Volume and Snapshot Volume
Under the
„CONFIGURATION” tab,
select “volume manager” and
next Vol. Groups.
Volume Groups (vg00)
In the Unit manager add the
selected physical units (Unit
S000) to create a new volume
group (in this case, vg00) and
click apply button.
www.open-e.com 4
5. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 2. … Continue
Volume Groups (vg00)
NAS volume (lv0000)
Select the appropriate volume
group (vg00) from the list on
the left and create a new NAS
volume of the required size.
This logical volume lv0000 will
be the source of the local
backup.
After assigning an appropriate
amount of space for the NAS
volume, click the apply button.
www.open-e.com 5
6. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 2. … Continue
Snapshot
To run the local backup
process, you must first define a
new Snapshot volume in the
Volume manager for the
volume to be backed up.
After assigning the appropriate
amount of space for the
Snapshot volume, click the
apply button.
Option:
Instead of selecting:
„Just create snapshot volume”
you can select: „Assign to volume lv0000”.
In such case you can skip the next slide.
www.open-e.com 6
7. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 2. … Continue
NAS volume
(lv0000)
Snapshot
Assign snap00000 to the logical
volume to be backed up (in this
example - lv0000) and click the
apply button.
www.open-e.com 7
8. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 3. Configure the Backup to be used with the Tape Drive
Under the “CONFIGURATION”
tab, select the “NAS settings”
menu.
Local Backup
Check to Use local backup
box. Also select, Default share
on LV as lv0000, and click the
apply button.
NOTE:
In order to increase safety of the backup to
the tape drive, it is recommended to place
database on another volume (e.g. lv0001).
www.open-e.com 8
9. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 3. … Continue
Under the “CONFIGURATION”,
select the “NAS resources”
and Shares.
Shares: Data
A tree listing of the NAS shared
volumes (Shares) will appear
on the left side of the DSS V6
web GUI. In the example, a
shared volume named
Data has been created on
lv0000.
www.open-e.com 9
10. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 3. … Continue
Under the “MAINTENANCE”,
select “backup” menu
Backup pools: Pool02week
In the “Create new pool”, enter
a name for the pool and select
Tape retention after. In this
example, enter 2 weeks (14
days) and click on the create
button.
www.open-e.com 10
11. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 3. … Continue
Next, choose Tape Drive, in
the Backup devices tree.
Backup devices: Tape Drive
In „Label new tape”, enter a
Name for the Tape , and select
the Pool. In this example
choose Pool02week and click
the apply button.
www.open-e.com 11
12. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 3. … Continue
After the DSS V6 WEB page
has been reloaded, the new
Backup device tapes
(Tape001) should appear.
Backup devices: Tape001
www.open-e.com 12
13. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 3. … Continue
Next ,select Backup tasks. In
the “Create new backup task”
function enter a name for the
backup tasks and select the
Logical volume. In this
example choose lv0000
Backup tasks: BackupTask001
Next, you must select the
shares for the local backup
(Data). Move the Available
shares to be used for the local
backup to the Assigned shares
area by clicking button.
www.open-e.com 13
14. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 3. … Continue
Backup tasks: BackupTask001
In the “Create new backup
task” function, select the
Snapshot volume and select
Store on pool. In this
example, snap0000 and
Pool02week
Next, select the backup Level
(e.g. incremental) check box,
Compress data, and click the
apply button.
NOTE:
Most of the tape devices have internal
compression for the data. If your tape
device has internal compression, you can
skip this option “Compress data”.
www.open-e.com 14
15. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 3. … Continue
After the DSS V6 WEB page
has been reloaded, the new
Backup tasks should appear.
Next, click BackupTask001, in
the Backup tasks tree.
Backup tasks: BackupTask001
In the “Create new schedule
for backup” function, enter a
Comment for the new
schedule and Select time. In
this example we will use the
Weekly and check the box for
all of days of the week. Select
time for the start task (8 pm).
Next, click the apply button.
www.open-e.com 15
16. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 3. … Continue
After clicking button in the
Backup tasks, shows the
status of the backup tasks.
Backup tasks: BackupTask001
www.open-e.com 16
17. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 3. … Continue
The Backup tasks function
shows the backup task running
at 8 pm.
Backup tasks: BackupTask001
www.open-e.com 17
18. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 3. … Continue
Under the “STATUS”, select
“tasks” and Backup
Backup tasks: BackupTask001
Click on the “Runnings tasks”
to display detailed information
on the current Backup task.
www.open-e.com 18
19. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 3. … Continue
After the end of the Backup all
data from "Data" share are
located in „Tape001”. Showing
us that 3.29 Gb of 60Gb has
been backed up.
Backup device: Tape001
The configuration of Backup is
now complete.
www.open-e.com 19
20. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 4. Create a Restore from the Backup
Under the “CONFIGURATION”
tab, select the “NAS
resources” menu
Shares: Restore from Backup
In order to execute the Restore,
you must create a new share.
Click Shares on the left side of
the DSS V6 web GUI. In the
example, a shared volume
named Restore from Backup
has been created on lv0000.
www.open-e.com 20
21. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 4. … Continue
Under the “MAINTENANCE”
tab, select the “restore” menu.
Restore task: RestoreTask
In the “Create new restore
task”, check the box
BackupTask001. Enter a
name for the Restore tasks
name (e.g. RestoreTask), and
select the destination share in
the Restore to field. In this
example, choose Restore from
Backup share. Next, click on
the apply button.
www.open-e.com 21
22. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 4. … Continue
Next, click on the “Restore
Task” name
Restore task: RestoreTask
On the “Restore task”, to
display detailed information on
the current restore task
www.open-e.com 22
23. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 4. … Continue
Under the “STATUS” tab,
select “tasks” and Restore
from backup.
Restore tasks: RestoreTask
On the “Runnings tasks” to
display detailed information on
the current Restore from
backup task.
www.open-e.com 23
24. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 4. … Continue
After the end of the Restore
Backup in “Backup Restore
tasks”, you can start the task
again.
Restore task: RestoreTask
www.open-e.com 24
25. Backup to attached Tape Drive
Data Server (DSS)
IP Address: 192.168.0.220 4. … Continue
After the end of the Restore
from Backup all data from the
„Data” share are available on
the “Restore from Backup”
share.
Share: Restore from Backup
The configuration of the Restore
from Backup is now complete.
www.open-e.com 25