O'Reilly logo

IBM ProtecTIER Implementation and Best Practices Guide by Rosane Goldstein Langnor, Jose Roberto Mosqueda Mejia, Mara Miranda Bautista, Karen Orlando

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

ProtecTIER replication
information technology (IT) organizations that use an IBM ProtecTIER system with replication can easily expand the coverage of that replication to all of the applications in their environment. You can create replication policies to set rules for replicating data objects across ProtecTIER repositories. This chapter describes the purpose of replication and the enhanced features of the latest ProtecTIER code.
This chapter describes the procedures that are used for replication deployment, including preinstallation steps, creation ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required