COVID-19 Update — We are available to assist you during these trying times. Please contact us for assistance.

Only the Truth: Debunking TMF NonStop Data Protection Myths

Debunking TMF Myths and Leveraging this Technology

Perceptions remain that the use of TMF is superfluous, costly, or has bad performance issues, as well as a lack of understanding or disregard for the data integrity protection benefits offered by TMF. Debunking these myths and leveraging this transformative technology is critical to empowering mission- and business-critical applications and services, and for competitively positioning NonStop applications well into the future.

HPE NonStop Shadowbase Data Replication Software

HPE NonStop Shadowbase data replication software captures change data (data created or updated by users and applications) from a transaction log, for example the TMF log on NonStop systems. As data is changed, TMF writes the changes to the transaction log, where they are read by HPE Shadowbase software for replication to a target system or application.

Authors’ Note

We feel it is critically important to address this topic because we continue to find that considerable misinformation still exists regarding the use of TMF and data auditing in general on HPE NonStop systems.

Article:

adobe-icon Only the Truth: Debunking TMF NonStop Data Protection Myths
  • Print
  • Email link
  • Copy link to clipboard