HP A.06.11 User Manual

Page 330

Advertising
background image

database backups. By applying transaction log backups, you
can recover the database to a specific point in time.

transaction log
files

Files that record transactions of the database modifications, and
provide fault tolerance in case of a database disaster.

transaction logs

(Data Protector specific term) Keep track of IDB changes. The
archiving of transaction logs should be enabled to prevent you
from losing the transaction log files that are created after the
last IDB backup and are necessary for IDB recovery.

transaction log
table

(Sybase specific term) A system table in which all changes to
the database are automatically recorded.

transportable
snapshot

(Microsoft VSS specific term) A shadow copy that is created on
the application system and can be presented to the backup
system where a backup can be performed.
See also

Microsoft Volume Shadow Copy Service (VSS)

.

TSANDS.CFG file

(Novell NetWare specific term) A file that allows you to specify
the names of containers where you want backups to begin. It
is a text file located in the SYS:SYSTEM\TSA directory on the
server where TSANDS.NLM is loaded.

UIProxy

The Java GUI Server (UIProxy service) runs on the Data
Protector Cell Manager. It is responsible for communication
between the Java GUI Client and the Cell Manager, moreover,
it performs business logic operations and sends only important
information to the client. The service is started as soon as Data
Protector is installed on the Cell Manager.

unattended
operation

See

lights-out operation

.

user account (Data
Protector user
account)

You can use Data Protector only if you have a Data Protector
user account, which restricts unauthorized access to Data
Protector and to backed up data. Data Protector administrators
create this account specifying a user logon name, the systems
from which the user can log on, and a Data Protector user group
membership. This is checked whenever the user starts the Data
Protector user interface or performs specific tasks.

User Account
Control (UAC)

A security component in Windows Vista and Windows
Server 2008 that limits application software to standard user

Glossary

330

Advertising