Data Protection Software

 View Only

Latest Discussions

  • Hi Tomas, we can import or export the volume group because when the copy process detects it can't activate the volume group because of the duplicated PVs, starts a removevg command and the volume group is removed. Linux OS expert thinks that the problem ...

  • Hi Markus, I sent the log file and fctool.ini in an email. The target system now is empty, originally it was not. I talked to the customer to warn him that data and log file systems, vgs and pvs should be removed from that system and they detached them. ...

  • Hi Maria, These PV conflicts you have, can these be minor major related? It is common to encounter LVM disk conflicts using snapshot techniques, where special attentions has to be done with the minor major numbers, to avoid such conflicts. Perhaps you ...

Latest Blogs

  • Focusing on ever-growing customer needs in the data protection field is an important part of IBM Spectrum Protect development and this is no more evident than in the latest release of the product. In the 8.1.13 release, IBM Spectrum Protect ...

    1 person recommends this.
  • This week marks our 50th episode of the SpectrumCast. From myself, Randy, Tricia and Sean we all wish you happy holidays and deliver our 50th and last episode of the year loaded with predictions for 2022. Hope you enjoy.

    1 person recommends this.
  • In this episode, we are joined by Alex Martin of the CSA team who tells us about the value of not only CSAs but the value of taking stock of your environment and understanding what you have, how its meeting your business needs and areas for improvement. ...

  • What is new in IBM Spectrum Protect 8.1.13, IBM Spectrum Protect Plus 10.1.9 and IBM Spectrum Copy Data Management 2.2.14? The December 7 th , 2021, announcement introduced several functional enhancements towards IBM’s core data resilience offerings ...

    1 person recommends this.
  • In this episode, Fraser MacIntosh, SpectrumCast allium, speaks with us about the pros and cons of paying out the ransom of a ransomware attack when a breach happens. We discuss the cost differential of architecting a robust cyber resilient environment ...

Latest Files