HPE Shadowbase Data Recovery Software: UNDO & REDO

  • Copy link to clipboard
  • Email link
  • Print

Data Corruption

HPE Shadowbase Data Recovery Software can safely restore corrupted databases with a minimum of downtime and a maximum of confidence, quickly and reliably eliminating the potential costs and risks associated with corrupted data.

These products are flexible and able to meet specific needs, including customization via powerful Shadowbase User Exit facilities.

Why does data corruption occur?

Database corruption in a data processing system can occur because of programming, user, administrative staff, or other types of errors. This corruption could prevent an application program that depends upon the database from behaving properly or cause the application to return erroneous results, either of which could have serious financial or other consequences.

Resolve significant data corruption and enable rapid recovery of business services

Depending on the nature of the corruption, Shadowbase REDO may be used when significant data corruption has occurred, affecting a large part of the database, or Shadowbase UNDO may be used if the amount of data corruption is smaller, localized, or service availability must be maintained while recovery is in process.

Shadowbase UNDO is a procedure that will mine the change queue to retrieve the backout operations to reverse a set of changes originally made to a database.

Shadowbase REDO is a procedure that safe-stores a copy of the database before allowing it to be altered by applications.  If the database later becomes corrupted, the original database can be restored along with replaying the change queue of valid transactions that occurred just before the corruption.

In either case, HPE Shadowbase Data Recovery Software products enable the rapid recovery of business services from the effects of corrupted data.

Solution Brief:
Adobe PDF iconHPE Shadowbase Data Recovery Software

White Paper:
HPE Shadowbase Data Recovery Software