How Does Point-In-Time Recovery Work
Be ready when this happens
Point-in-time recovery explained
It can happen to anyone. Somehow your computer crashes and files show up as corrupted. If you were smart and made a backup of the database, then it’s possible to restore the computer to better times using a point-in-time recovery.
What is point-in-time recovery? In the big picture, it is a system in which a set of data can be restored to or recovered from a particular time in the past – sort of like a time machine for computers. This also works for a particular setting that needs to be reinserted. Windows XP and Vista both feature these capabilities as well as Time Machine for Mac OS X. The recovery is made to a specified date and time in which to restore the data base.
Point-in-time recovery works in certain systems by recording system file changes in order to restore to the previous points. These restore points can be done periodically, even daily by the program, or you can set up their own points. If a system failure occurs, then you can restore in either Safe Mode or Normal Mode, and recover system function. The system also records these points any time a new program is installed or a substantial change is made.
Some servers, such as Oracle perform crash recovery and instant recoveries automatically after a failure. There are two options: rolling forward the backup to a more current time by applying online re-do records or rolling back, in which changes are made to their original state. The Oracle system is very similar to the point in recovery systems mentioned above.
Most of the programs available are very simple to use and only prompt you for the date/time you need restored to. Sometimes it is necessary to perform several point-in-time recoveries to determine the exact time you need if you were not aware when the original corruption occurred, however this can be time consuming. The SQL Server provides instructions if you need to only restore certain databases. With SQL, there are three phases in the recovery and restoration that include data copy, redo (roll forward) and undo (roll back) phases. The data copy phase creates a copy of all the information backed up by the database previously and initialized the contents to be restored. The second phase, redo, takes the data and returns it to its original state at the recovery point or the date you specify. Lastly, the undo phase identifies uncommitted transactions which have become inconsistent with the recovered data. Once a consistency is established, the database is brought back to life.
Even with a point-in-time recovery system, it is still important to make a backup of your files regularly. The system restore is ideally meant for when the computer is corrupted or suffers some other catastrophe. With a backup, you still have important documents ready at hand. Most PC’s come with a disk providing a system restore program that can be installed at any time. With these disks it is important to remember that this process completely overwrites the files on your disk with any new files, rendering your old copy worthless. Having a previous backup will ensure that you still have the files you need.
Point-In-Time Recovery Companies
- Online Backup for Windows With Point-In-Time Features
Online Backup for windows systems that allows for point-in-time recovery.
- Online Backup With Point-In-Time Features
Storagepipe is a provider of online backup, featuring point-in-time recovery.
Does your company do backups that allow for point-in-time recovery?See results without voting
More by this Author
Hackers, hackers everywhere, and I don’t mean people coughing. Our personal information is at risk at any given time with all the conspiring of how to get at it. It seems that no matter what advances...
There is nothing more frustrating than your computer locking up, freezing, or just being pokey, especially if the client is patiently waiting for the presentation or the paper is due. Laptops are extremely...
Advanced Encryption Standard or AES was invented by Joan Daemen and Vincent Rijmen, and accepted by the US federal government in 2001 for top secret approved encryption algorithms. It is also referred to as Rijndael,...
No comments yet.