1st Edition

Designing a Total Data Solution
Technology, Implementation, and Deployment




  • This format is currently out of stock.
ISBN 9780849308932
Published September 28, 2000 by Auerbach Publications
520 Pages 100 B/W Illustrations

USD $185.00

Prices & shipping based on shipping country


Preview

Book Description

Your company's global competitiveness depends on the utilization and maintenance of information. Current data handling practices-storing, updating, and accessing data-can be either a problem or a significant strategic advantage for your company. Designing a Total Data Storage Solution: Technology, Implementation, and Deployment gives you the information you need to compare current technologies and determine which is best suited to your enterprise.

This book defines and explains the components that make up total cost of ownership along with the impact of integrating current changes in technology. It discusses the storage, security, volume, growth, and access to data and provides everything an IT manager needs in order to develop an efficient and cost-effective data storage plan.

Table of Contents

INTRODUCTION
UNDERSTANDING THE ENVIRONMENT
Documentation
Data Source Platforms
SAN, Failover, and RAID technologiesData Sources-primary and secondary
Data Ownership
Data structures
Data Usage
Global Enterprise versus Entrepreneurial
Multi media sources
Built or leased services, equipment, and telecom infrastructure
MAINTAINING THE DATA
Data Change Processes
Database normalization/standards
Backups
Upgrades
Outsourcing programming and DBA activities
Changing to a relational database
Data warehousing
Cost of change
Keeping technical resources available for maintaining systems
Cost of ownership for technology
The effect of the emerging technology vendor's distribution model
DATA ACCESS
Internal/External Access
Customer Relationship Management
Financial Information
Fat Client versus Thin Client-impact of the current trends
Software licensing
Reporting
Data subsets
Search engines
SAFEKEEPING A PRIMARY ENTERPRISE RESOURCE
Security
Encryption
E-mails
Firewalls
Viruses inoculation
Web Sources
Data Integrity
Long term data storage
Disaster Recovery

...
View More