1. Using i2COOPY, bypass monitoring, real-time capture of data changes, and real-time replication to the target. Using byte-level replication to minimize bandwidth usage
2. Use i2CDP to record every operation in the log. When there is a recovery requirement, according to the log, you can specify a time point, specify the operation to restore the data to the specified location.
3. Support multiple rollbacks, even if the restored data is not the expected data, but also support multiple rollbacks until the data is restored to the desired data.