Skip to Content
Microsoft® Exchange Server 2003 Scalability with SP1 and SP2
book

Microsoft® Exchange Server 2003 Scalability with SP1 and SP2

by Pierre Bijaoui
October 2006
Intermediate to advanced content levelIntermediate to advanced
600 pages
23h 55m
English
Digital Press
Content preview from Microsoft® Exchange Server 2003 Scalability with SP1 and SP2
156 3.3 Volume Shadow Copy Services
Requestors
The Requestor is basically driving the creation and use of the shadow cop-
ies. It does not interface directly with the application or with the storage
array, and it is only with a requestor that you realize the full power of the
VSS framework. With no knowledge of an application or a back-end disk
array, a requestor can obtain a physically identical point-in-time copy that
only took seconds to create (regardless of the volume size), and that copy
contains data that is exploitable and consistent vis-à-vis the application.
We generally break down the types of requestors in three categories:
Category 1: ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

WebSphere Application Server V8: Administration and Configuration Guide

WebSphere Application Server V8: Administration and Configuration Guide

Martin Bentancour, Libor Cada, Jing Wen Cui, Marcio d'Amico, Ural Emekci, Sebastian Kapciak, Jennifer Ricciuti, Margaret Ticknor
IBM Tivoli Workload Scheduler for z/OS Best Practices: End-to-end and mainframe scheduling, 2nd Edition

IBM Tivoli Workload Scheduler for z/OS Best Practices: End-to-end and mainframe scheduling, 2nd Edition

Vasfi Gucer, Michael A Lowry, Darren Pfister, Cy Atkinson, Anna Dawson, Neil E Ogle, Stephen Viola, Sharon Wheeler

Publisher Resources

ISBN: 9781555583002