Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Chapter 15
Chapter 16
Chapter 17
Chapter 18
Chapter 19
Chapter 20
Chapter 21
Chapter 22
Chapter 23
Chapter 24
Chapter 25
Chapter 26
Chapter 27
Chapter 28

Chapter 25

Back to Previous Chapter

Forward to Next Chapter

Back to Contents


Advanced Search



If it aint broke, dont fix it.  Wrong!  Leave that attitude outside of computing.  You can see the surface of your file, but not the supporting structure. The interior seems arcane, it is arcane, but you can XE "file maintenance"  protect yourself.  The tools are available, and they work, if you use them.

You want to be sure the numbers are there to work for you, and you may want to exclude others from access to all or part of your data. Your files face risks ranging from a logical crash of the hard drive to a disaster that annihilates all of the physical assets of your business.  You can implement protection from data damage, XE "data damage"  and can limit the access to your data.  And you can make your data more accessible by separating the old stuff from current activity.  These functions are handled as follows:

Available function

Requirement met by function


Access Control

Back up files

Hard drive disruption or damage

Second back up, stored remotely

Protection from fire or other disaster, or from malicious damage.

Condense Data

Old data removal, for more efficient operation.


Contents |   Up   |   Previous   |   Next

About BlockTax   |   Awards   |   Contacts   |   QB Newsletter   |   Home   |   Legal
Last modified: May 21, 2004