Data Backup Glossary (Letter H)

Heterogeneous environment
An IT environment that includes computers, operating systems, platforms, databases, applications, and other components from different vendors.

Hierarchical storage management
Hierarchical storage management (HSM) is a data storage system that automatically moves data between high-cost and low-cost storage media. HSM systems exist because high-speed storage devices, such as hard disk drives, are more expensive (per byte stored) than slower devices, such as optical discs and magnetic tape drives. While it would be ideal to have all data available on high-speed devices all the time, this is prohibitively expensive for many organizations. Instead, HSM systems store the bulk of the enterprise’s data on slower devices, and then copy data to faster disk drives when needed. In effect, HSM turns the fast disk drives into caches for the slower mass storage devices. The HSM system monitors the way data is used and makes best guesses as to which data can safely be moved to slower devices and which data should stay on the hard disks.

High availability
The availability of resources in a computer system in the wake of component failures in the system. High availability can be achieved in a variety of ways—from solutions that use custom and redundant hardware to ensure availability to solutions that provide software solutions using off-the-shelf hardware components. The former class of solutions provides a higher degree of availability, but is significantly more expensive than the latter class. This high cost has led to the popularity of the latter class, with almost all vendors of computer systems offering various high availability products. Typically, these products survive single points of failure in the system.

High-level format
(n.) A formatting method that initializes portions of the hard disk and creates the file system structures on the disk, such as the master boot record and the file allocation tables. High-level formatting is typically done to erase the hard disk and reinstall the operating system back onto the disk drive.

(v.) The process of performing high-level formatting.

Holographic data storage
A mass storage technology that uses three-dimensional holographic images to enable more information to be stored in a much smaller space. In holographic storage, at the point where the reference beam and the data carrying signal beam intersect, the hologram is recorded in the light sensitive storage medium.

Hosted service
A service in which day-to-day related management responsibilities are transferred to the service provider. The person or organization that owns or has direct oversight of the organization or system being managed is referred to as the offerer, client, or customer. The person or organization that accepts and provides the hosted service is regarded as the service provider. Typically, the offerer remains accountable for the functionality and performance of a hosted service and does not relinquish the overall management responsibility of the organization or system.

Hot backup
A technique used in data storage and backup that enables a system to perform a routine backup of data, even if the data is being accessed by a user. Hot backups are a popular backup solution for multi-user systems as no downtime to perform the backup is required. If a user alters the data during the backup process (for example, makes changes at the exact moment the backup system is processing that data) the final version of the backup may not reflect those changes. Hot backup may also be called a dynamic backup or active backup.

Hot potato routing
A form of routing in which the nodes of a network have no buffer to store packets in before they are moved on to their final predetermined destination. In normal routing situations, when multiple packets contend for a single outgoing channel, packets that are not buffered are dropped to avoid congestion. But in hot potato routing, each packet that is routed is constantly transferred until it reaches its final destination because the individual communication links cannot support more than one packet at a time. The packet is bounced around like a “hot potato,” sometimes moving further away from its destination because it has to keep moving through the network. This technique allows multiple packets to reach their destinations without being dropped.

Hot standby
A method of redundancy in which the primary and secondary (backup) systems run simultaneously. The data is mirrored to the secondary server in real time so that both systems contain identical information.

Read More

Data Backup Glossary (Letter G)

Data Backup Glossary (Letter G)Ghost imaging
Using ghosting software, a method of converting the contents of a hard drive—including its configuration settings and applications—into an image, and then storing the image on a server or burning it onto a CD. When contents of the hard drive are needed again, ghosting software converts the image back to original form. Companies often use ghost imaging when they want to create identical configurations and install the same software on numerous machines.

Gigabyte
2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. Gigabyte is often abbreviated as G or GB.

Giant magnetoresistive
Giant magnetoresistive (GMR) is a hard disk drive storage technology. The technology is named for the giant magnetoresistive effect, first discovered in the late 1980s. While working with large magnetic fields and thin layers of magnetic materials, researchers noticed very large resistance changes when these materials were subjected to magnetic fields. Disk drives that are based on GMR head technology use these properties to help control a sensor that responds to very small rotations on the disk. The magnetic rotation yields a very large change in sensor resistance, which in turn provides a signal that can be picked up by the electric circuits in the drive.

Read More

RAID Array Failures & Recovery

RAID Arrays Failures & RecoveryA hardware RAID implementation requires at minimum a RAID controller. On a desktop system this may be a PCI expansion card, PCI Express expansion card or built into the motherboard. Controllers supporting most types of drives may be used – IDE/ATA, SATA, SCSI, SSA, Fibre Channel, sometimes even a combination. The controller and disks may be in a stand-alone disk enclosure, rather than inside a computer. The enclosure may be directly attached to a computer, or connected via SAN. The controller hardware handles drive management and performs any parity calculations required by the chosen RAID level.

Hardware RAID Failures:

  • Actuator Failure
  • Bad sectors
  • Controller Failure
  • Controller Malfunction
  • Corrupted RAID
  • Lightning, Flood and Fire Damage
  • Damaged Motor
  • Drive physical abuse
  • Hard disk component failure and crashes
  • Hard disk drive component failure
  • Hard drive crashes
  • Hard drive failure
  • Head Crash
  • Intermittent drive failure
  • Media Damage
  • Media surface contamination
  • Multiple drive failure
  • Power Spike
  • Power Supply Burn out or failure
  • RAID controller failure
  • RAID corruption
  • RAID disk failure
  • RAID disk overheat
  • RAID drive incompatibility
  • RAID drive overheat
  • RAID Array failed
  • Vibration damage

Hardware RAID Failures(Human Error):

  • Unintended deletion of files
  • Reformatting of drives / Array
  • Reformatting of partitions
  • Incorrect replacement of media components
  • Accidentally deleted records
  • Mistaken overwritten database files
  • Employee sabotage
  • Lost/Forgotten password
  • Overwritten files
  • Overwritten RAID config files
  • Overwritten RAID settings
  • RAID incorrect setup
  • RAID user error

Software RAID implementations are now provided by many operating systems. Software RAID can be implemented as:

  • layer that abstracts multiple devices, thereby providing a single virtual device (e.g. Linux’s md).
  • a more generic logical volume manager (provided with most server-class operating systems, e.g. Veritas or LVM).
  • component of the file system (e.g. ZFS or Btrfs).

Software RAID Failures:

  • Back up failures
  • Computer virus and worm damage
  • Corrupt files / data
  • Damaged files or folders
  • Directory corruption
  • Firmware corruption
  • Repartition
  • Server registry configuration
  • Missing partitions
  • RAID configuration
  • Reformatting

Software RAID Failures(Application Failure)

  • Applications that are unable to run or load files
  • Corrupted files
  • Corrupted database files
  • Data corrupted
  • Locked databases preventing access
  • Deleted tables

About RAID Data Recovery

The majority of Small-to-Medium Enterprises across the globe have turned to RAID-configured systems for their storage solutions. The most frequently cited reasons for utilizing RAID Arrays in businesses today are the highly fault-tolerant level the solution offers and the cost effectiveness of acquisition and maintenance.

However, if a RAID Array does fail due to component malfunctions (including hard drives and controller cards) or operating and application corruption, it leaves the data unusable and in most cases corrupted.

RAID data recovery is an intricate task since RAID data configurations are often custom-built applications developed by competing manufacturers. Without in-depth knowledge of how RAID arrays are configured at both a hardware, firmware and software level, data recovery attempts will not only fail, but result in further data corruption.

Read More

Hard Drive Data Recovery in Seattle

Hard Drive Data Recovery in SeattleLooking for a professional data recovery service in Seattle area? In Seattle area there are many recovery companies and here is a list just for your referance:

1. SalvageData Recovery Services
1100 Dexter Avenue N, Ste 100, Seattle, WA 98109, USA
+1 206-438-9044
www.salvagedata.com

2. DataTech Labs Data Recovery – Seattle
7324 15th Avenue Northwest, Seattle, WA 98117, USA
+1 206-452-2013
www.datatechlab.com

DataTech Labs is a full service data recovery company specializing in hard drive data recovery and Raid data recovery. We also service camera cards, flash drives or any other media device.

3. 1st Data Recovery . com
1425 Broadway, Seattle, WA 98122
(206) 548-4476
www.1stdatarecovery.com

22 Yrs Exp. Specializing In Physical Damaged Hard Drive, Server, Raid, And Tape Data Recovery.

4. Adr Data Recovery
1700 7th Ave # 2100, Seattle, WA 98101-1360
(206) 357-8406
www.datarecoveryseattle.com

We recover data from unbootable computers, unrecognized and crashed or clicking hard drives, deleted or formatted media and RAID Servers. We also specialize in Computer Forensics.

5. ReStoring Data
601 Union Street, Seattle, WA 98101
(206) 456-5151
www.restoringdata.com

Professional and affordable data recovery service from any hard drives, RAID, and flash media, regardless of OS, interface or make.

6. WeRecoverData.com Data Recovery Labs
701 5th Ave., Suite 4200, Seattle, WA 98104
(206) 407-3148
www.werecoverdata.com

Data recovery service from all hard drives, servers, RAID, flash drives, tape, memory cards and any other digital storage. Free evaluations. No-Data-No-Fee. 24/7 emergency service.

If you are living in Seattle area maybe you have heard about one or some all of them, they are all top-customer-reviews recovery companies that can help you so much. If you also know other companies can provide professional recovery services please feel free to contact me, I can list them here in time. Thank you!

Read More

Data Backup Glossary (Letter F)

Failback
After a failback event, the restoration of a failed system component’s share of a load to a replacement component. When a failed controller in a redundant configuration is replaced, the devices that were originally controlled by the failed controller are usually failed back to the replacement controller to restore the I/O balance, and to restore failure tolerance. Similarly, when a defective fan or power supply is replaced, its load, previously borne by a redundant component, can be failed back to the replacement part.

Failover
The automatic substitution of a functionally equivalent system component for a failed one. Failover most often involves intelligent controllers connected to the same storage devices and host computers. If one of the controllers fails, failover occurs, and the survivor takes over its I/O load.

Fibre Channel ATA
Fibre Channel ATA (FATA) is a hybrid hard drive first introduced by HP in 2004 that combines both Fibre Channel and ATA technologies. FATA drives use an ATA drive mechanism, offering the same performance and capacity as a standard ATA drive, but also feature a Fibre Channel connector, which enables the FATA drive to be used where conventional Fibre Channel drives are currently connected.

File server
A computer with the primary purpose of serving files to clients. A file server may be a general purpose computer that is capable of hosting additional applications or a special purpose computer capable only of serving files.

Popular data backup media:  Magnetic tape, Hard disk, Optical storage, Floppy disk, Solid state storage, Remote backup service…

Read More

Popular SSD(Solid-State Drive) Brands

Why Buy Solid-State Drives?

ssdsThese solid state drives are more expensive and come in smaller data sizes. Well, for mobile users, SSD technology offers more benefits over traditional hard drives with spinning parts. These pluses come in the form of much more efficient power usage and battery life for the computer it’s being used in like laptops. Solid State Drives have no movements so they consume less power and allows SSD drives to be able to withstand large impact loads – like dropping your laptop. The US military has been using SSD technology for a while now where harsh conditions and frequent impacts are the norm.

Popular SSD Brands:

Intel® Solid-State Drives

intelThe Intel® SSD’s unique, innovative technology designs provide longer battery life, faster system responsiveness, and more durability, for a better user experience.

  • Intel® Solid-State Drive 510 Series
  • Intel® Solid-State Drive 320 Series
  • Intel® Solid-State Drive 311 Series
  • Intel® Solid-State Drive 310 Series
  • Intel® X25-E Extreme SATA Solid-State Drive
  • Intel® X25-M and X18-M Mainstream SATA Solid-State Drives
  • Intel® X25-V High Performance Value Solid-State Drive

Corsair Solid-State Drives

corsairMaximum performance for the ultimate system. The Corsair SSD product line offers the highest performance in Read/Write speeds of up to a maximum read speed of 285MB/s and write speed of 275MB/s. If speed is what you are looking for Corsair SSD’s are the perfect choice

  • Force Series GT
  • Force Series 3
  • Performance 3 Series
  • Force Series

Kingston SSDNow Solid-State Drives

kingstonWith the increasing need to stay connected, Kingston offers a new line of Solid-State drives
to improve your computer’s performance. Flash technology makes SSDNow drives faster,
more durable and reliable than standard mechanical hard disk drives.

CURRENT DRIVES

  • SSDNow S100
  • SSDNow V100
  • SSDNow V+100
  • SSDNow V+100E
  • SSDNow V+180

LEGACY DRIVES

  • SSDNow E-SERIE
  • SSSDNow M-SERIES
  • SSDNow V+ SERIES
  • SSDNow V-SERIES

OCZ Solid-State Drives

ocz

    Solid State Drivescategory, OCZ Technology Group, Inc. has built on its expertise in high-speed memory to become a dominant player in the manufacturing and distribution of solid state drives (SSDs), a disruptive, game-changing technology that is replacing traditional rotating magnetic hard disk drives (HDDs).
  • OCZ PCI-Express solid state drives
  • OCZ’s High Speed Data Link (HSDL)
  • SATA solid state drives
  • OCZ Serial Attached SCSI (SAS) Solid State Drives
  • OCZ USB 3.0 drives

Crucial Solid-State Drives

Solid-state drives are the rugged, reliable, battery-efficient alternative to traditional hard drives.

ADATA Solid-State Drives

ADATA is committed in developing cutting-edge SSD technology and offers complete SSD product lineup that brings extraordinary performance. SATA 6Gb/s,SATA 3GB/s.

Related Links:

Top 20 Most Popular Solid State Hard Drive on Amazon.com

Read More

Data Backup Glossary (Letter E)

Data Backup Glossary (Letter E)

Ecosystem
A cohesive, robust, interconnected whole. The EVault cloud-connected ecosystem is built on a shared technology platform, leveraged in every deployment—software, appliances, software as a service (SaaS), and managed services—that creates a seamlessly integrated, cloud-connected data protection ecosystem.

Edge computing
A topological paradigm in which applications, data, and computing power (services) are pushed away from centralized points to the logical extremes of a network. Edge computing replicates fragments of information across distributed networks of web servers, which may be vast and include many networks. Edge computing is also referred to as mesh computing, peer-to-peer computing, autonomic (self-healing) computing, grid computing, and other names implying non-centralized, nodeless availability.

Emergency power off
Also referred to as an EPO switch, emergency power off (EPO) is a button or switch that shuts down the power in a room or network of electrical circuits. Typically used in data centers with a large number of computers using large amounts of electricity, the EPO is meant to be activated by a human only in emergency situations when it is necessary to cut the power if human life is in jeopardy or if there is the potential for major damage to the building or equipment (for example, in the case of a fire or electrocution). The sudden loss of power will inevitably lead to the loss of some data, and the EPO is not meant to be used under normal circumstances.

Electron-trapping optical memory
A method of erasable optical storage. Information is written, or stored, by a low-power laser tuned to a specific frequency. The laser elevates the energy level of electrons to a trapped state. The data is read by a second laser that returns the elevated electrons to their ground state.

Encryption
The conversion of plaintext to encrypted text with the intent that it only be accessible to authorized users who have the appropriate decryption key.

Enhanced capacity cartridge system
In data storage technology, enhanced capacity cartridge system (ECCST) is a double length tape cartridge with a nominal uncompressed capacity of approximately 800 Mbytes.

Enterprise content management
Enterprise content management (ECM) describes the technologies used by organizations to capture, manage, store, and control enterprise-wide content, including documents, images, e-mail messages, instant messages, video, and more. ECM software is used to assist in content control associated with business processes, and can be used to assure compliance with regulations (such as Sarbanes-Oxley , HIPPA, and others). ECM has emerged from the convergence of many related technologies such as document management, web content management, and collaboration.

Equipment footprint
The physical area that is occupied only by data center equipment. This area does not include aisles between racks or any space left at end of equipment rows.

Enterprise storage
A centralized storage system used by a large business or organization to manage data. Enterprise storage also indicates processes for data sharing and connectivity. Enterprise storage is different from consumer or home computer storage in terms of the size of the storage system, the amount of data handled by the system, the number of users accessing the system, and also the technology used to create the storage system. Enterprise storage systems usually focus on providing the networking and management operations for data storage, backup, disaster recovery, and archiving.

In Information Technology, a backup or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. The verb form is back up in two words, whereas the noun is backup (often used like an adjective in compound nouns).

Read More

Cheapest Data Recovery Service

Cheapest Data Recovery ServiceWhen the computer is not operational it can cause a lot of direct and indirect problems. You can not work, browse the web, send emails, etc. Fortunately computer hardware is available in many online stores, you order it and the next day you will have it. Anything can fail and everything is replaceable except the data. If the hard drive fails you will also lose all the files. Many users never think of this possibility and therefore they do nothing to prevent data loss. Failed hard drives are then sent to some data recovery company to rescue valuable files. But data recovery service is expensive. Is there any cheaper alternative?

Data Backup Instead of Data Recovery
Of course, data recovery can be cheap if you understand basic principles of computers. The fact is that every computer component can fail, including the hard drive. This is the disk where the operating system is located and where you also store your files. Everything you use, create or share is stored there. Therefore it makes sense to create a copy of this data. And not just one copy-you should periodically back up the disk drive. This can be done in two different ways and both are needed to have peace of mind. If the hard drive data will be properly backed up, no computer malfunction will cause you headache, only a minor annoyance.

Disk or Partition Image
The first type of backup is the disk or partition image. This is a complete copy of all the data on the disk. The image is usually one file that contains the operating system and all your files. This image can be used to recreate the original disk in the case of failure. You simply install a new drive and restore the latest disk image. This method has disadvantage of being time consuming. But because it is mandatory to have a method to quickly restore the disk you should make one at least every few months. There many free disk imaging tools on the web. Simply choose one that fits your operating system and needs.

Regular Backup of Important Files
The second type is the real backup of your recent data. You should periodically (weekly or even daily) create a backup of all important files. The cheapest way to create backups is to use existing CD or DVD drive and free backup/restore software. And the easiest way is to create incremental backups. The first backup contains all files–the next backups only save new or modified files. This significantly speeds ups the backup process and saves a lot of time. You can create backups to CD/DVD, external hard drive, remote computer or any other suitable media. You can also few times a year create a complete archive of all your projects. This will further simplify data recovery process and you will also have a history overview of your work.

Your Own Cheapest Data Recovery Service
Having both disk images and recent backups is a guarantee for quick and painless data recovery process. If the hard drive fails you get a new one. When the computer hardware is working again you restore the last disk image and then you restore the missing or changed files from the latest backup. This is the cheapest data recovery service you could imagine. Anybody who uses computers should also take care for the data. Backups should become routine as it is sending emails or reading news. To prevent searching for a cheap data recovery service you better prevent data loss. With free backup software it is easy, cheap and fun.

Free Data Recovery Services:

  • Analysis is Free for Single Hard Drives
    Find out for FREE what can be recovered from your hard drive with FREE Data Recovery Analysis.
  • “No Data, No Charge”
    You only pay for recovery once you are 100% happy we have recovered the data you need.

It is important for customers to have a feel of data recovery pricing before they send their disks to recovery companies. Pricing comes down to Drive Size, Media Type (Hard Drive, RAID, SSD), and Issue with the Drive:

  1. Types of disk (interface, model and size)
  2. Failure modes
  3. Types of operating system
  4. User attempts before sending
  5. Any special user ‘s requirements

Related Link: Data Recovery Cost

Read More

Data Backup Glossary (Letter D)

Dark archive
A data archive that cannot be accessed by any user. Access to the data is either limited to a set of few individuals or completely restricted to all. The purpose of a dark archive is to function as a repository for information that can be used as a failsafe during disaster recovery.

Data at rest
All data in storage excluding any data that frequently traverses the network or that resides in temporary memory. Data at rest includes, but is not limited to, archived data; data which is not accessed or changed frequently; files stored on hard drives; USB thumb drives; files stored on backup tape and disks; and files stored offsite or on a storage area network (SAN).

Data at rest protection
Security protection measures such as password protection, data encryption, or a combination of both that protect data at rest from hackers and other malicious threats. The measures prevent this data from being accessed, modified, or stolen.

Database
A system intended to organize, store, and retrieve large amounts of data easily. It consists of an organized collection of data for one or more uses, typically in digital form.

Data center
A facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (for example, air conditioning or fire suppression), and security devices.

Data center tiers
A four-tier system that provides a simple and effective means for identifying different data center site infrastructure design topologies. The Uptime Institute’s tiered classification system is an industry standard approach to site infrastructure functionality that addresses common benchmarking standard needs. The four tiers, as classified by The Uptime Institute, include the following:

  • Tier I: Composed of a single path for power and cooling distribution, without redundant components, providing 99.671 percent availability.
  • Tier II: Composed of a single path for power and cooling distribution, with redundant components, providing 99.741 percent availability.
  • Tier III: Composed of multiple active power and cooling distribution paths, but only one path active, has redundant components, and is concurrently maintainable, providing 99.982 percent availability.
  • Tier IV: Composed of multiple active power and cooling distribution paths, has redundant components, and is fault tolerant, providing 99.995 percent availability.

Data cleansing
Also referred to as data scrubbing, the act of detecting and removing and/or correcting a database’s dirty data (data that is incorrect, out-of-date, redundant, incomplete, or formatted incorrectly). The goal of data cleansing is not just to clean up the data in a database, but also to bring consistency to different sets of data that have been merged from separate databases. Sophisticated software applications are available to clean a database’s data using algorithms, rules, and look-up tables. This task was once done manually and was therefore still subject to human error.

  • In a RAID system, the act of correcting parity bit errors so that drives remain synchronized.

Data deduplication
The elimination of redundant data. In the deduplication process, duplicate data is deleted, leaving only one copy of the data to be stored. However, indexing of all data is still retained should that data ever be required. Deduplication reduces the required storage capacity since only the unique data is stored.

Data dictionary
In database management systems, a file that defines the basic organization of a database. A data dictionary contains a list of all files in the database, the number of records in each file, and the names and types of each field. Most database management systems keep the data dictionary hidden from users to prevent them from accidentally destroying its contents. Data dictionaries do not contain any actual data from the database, only book keeping information for managing it. Without a data dictionary, however, a database management system cannot access data from the database.

Data infrastructure hygiene
Practices that promote or preserve the shape of an entire data infrastructure (for example, network, servers, databases, storage, and software). These practices include any activity that reduces the stress of information growth on the data infrastructure and enables the efficient access, movement, and protection of data while reducing overall infrastructure and maintenance costs. Such practices include active archiving of relational databases, e-mail archiving, and document archiving.

Data mirroring
The act of copying data from one location to a storage device in real time. Because the data is copied in real time, the information stored from the original location is always an exact copy of the data from the production device. Data mirroring is useful in the speedy recovery of critical data after a disaster. Data mirroring can be implemented locally or offsite at a completely different location.

Data protection
Assurance that data is not corrupted, is accessible for authorized purposes only, and is in compliance with applicable requirements.

Data recovery
The salvaging of data stored on damaged media, such as magnetic disks and tapes. Many software products help recover data damaged by a disk crash or virus. In addition, many companies specialize in data recovery. Although not all data is recoverable, data recovery specialists can often restore a surprisingly high percentage of the data on damaged media.

Data retention policy
The policy of persistent data and records management for meeting legal and business data archival requirements. A data retention policy weighs legal and privacy concerns against economics and need to know concerns to determine retention time, archival rules, data formats, and the permissible means of storage, access, and encryption.

Data space transfer protocol
Data space transfer protocol (DSTP) is a protocol used to index and categorize data using an XML -based catalogue. Data, no matter how it is stored, has corresponding XML files which contain UCK (universal correlation key) tags that act as identification keys. Data is retrieved when a user connects to DSTP servers with a DSTP client and asks for specific information. Data is found and retrieved based on the labels contained in the UCK tags.

Data vaulting
The process of sending data from its primary source, where it can be protected from hardware failures, theft, and other threats. Several companies now provide web backup services that compress, encrypt, and periodically transmit a customer’s data to a remote vault. In most cases the vaults will feature auxiliary power supplies, powerful computers, and manned security.

DDP

  • Acronym for disk-based data protection, where a disk or RAID system is used as a data backup and archival system in place of tape.
  • Acronym for distributed data protection, a managed (or hosted) service that provides customers with online, scheduled, automated computer system data backup and self-serve restoration.
  • Acronym for development data platform, a web-based platform for data analysis, presentation, and dissemination. 
  • Acronym for distributed data processing, a data processing network in which some functions are performed in different places on different computers and are connected by transmission facilities.

Delta Backup
The backup of all data files that have been modified since the last incremental backup or archival backup. Also known as differential incremental backup.

DeltaPro
Patented EVault technology that performs delta backup and compresses the data before sending it over the wire.

Digital asset management
Digital asset management (DAM) is a system that creates a centralized repository for digital files that allows the content to be archived, searched, and retrieved. The digital content is stored in databases called asset repositories. Metadata—such as photo captions, article key words, advertiser names, contact names, file names, or low-resolution thumbnail images—is stored in separate databases called media catalogs and points to the original items. Digital asset management also is known as enterprise digital asset management, media asset management, or digital asset warehousing.

Digital footprint
The trail, traces, or "footprints" that people leave online. A digital footprint includes information transmitted online, such as forum registration, e-mails and attachments, uploaded videos or digital images, and any other form of transmission of information. All of this activity leaves traces of personal information about yourself that is available to others online.

Direct access file system
Direct access file system (DAFS) is a file-access sharing protocol that uses memory-to-memory interconnect architectures, such as VI and InfiniBand. DAFS is designed for storage area networks (SANs) to provide bulk data transfer directly between the application buffers of two machines without having to packetize the data. With DAFS, an application can transfer data to and from application buffers without using the operating system, which frees up the processor and operating system for other processes and allows files to be accessed by servers using several different operating systems.

Direct-attached storage
Direct-attached storage (DAS) is non-networked storage in which the hardware is connected to an individual server. Although more than one server can be present, storage for each server is managed separately and cannot be shared.

Disaster recovery
The process, policies, and procedures related to preparing for the recovery or continuation of a business-critical technology infrastructure after a natural or human-induced disaster. Disaster recovery is a subset of business continuity. While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions.

Disaster recovery plan
A plan for business continuity in the event of a disaster that destroys part or all of a business’s resources, including IT equipment, data records, and the physical space of an organization. The goal of a disaster recovery plan is to resume normal computing capabilities in as little time as possible. A typical disaster recovery plan has several stages:

  1. Understanding an organization’s activities and how all of its resources are interconnected
  2. Assessing an organization’s vulnerability in all areas, including operating procedures, physical space and equipment, data integrity, and contingency planning
  3. Understanding how all levels of the organization would be affected in the event of a disaster
  4. Developing a short-term recovery plan
  5. Developing a long-term recovery plan, including how to return to normal business operations and prioritizing the order of functions that are resumed
  6. Testing and consistently maintaining and updating the plan as the business changes A key to a successful disaster recovery plan is taking steps to prevent the likelihood of disasters from occurring, such as using a hot site or cold site to back up data archives.
  7. Disk array
    A linked group of one or more physical independent hard disk drives generally used to replace larger, single disk drive systems. The most common disk arrays are in daisy chain configuration or implement RAID (Redundant Array of Independent Disks) technology. A disk array may contain several disk drive trays and is structured to improve speed and increase protection against loss of data. Disk arrays organize their data storage into Logical Units (LUs), which appear as linear block paces to their clients. Disk arrays are an integral part of high-performance storage systems.

Disk-to-disk
Disk-to-disk (D2D) is a type of data storage backup in which the data is copied from one disk (typically a hard disk) to another disk (such as another hard disk or other disk storage medium). In a D2D system, the disk that the data is being copied from typically is referred to as the primary disk and the disk that the data is copied to typically is called the secondary or backup disk.

Disk-to-disk-to-tape
Disk-to-disk-to-tape (D2D2T) is a type of data storage backup in which data is first backed up on a disk system, but then is spooled to a tape or an optical storage system. A D2D2T backup system can help eliminate data loss issues due to tape drive or tape failure. In a D2D2T system, a copy of the data is kept onsite for faster retrieval and tape copies are kept offsite for disaster recovery purposes. D2D2T devices may be appliances, virtual tape, or disk libraries.

Disk-to-tape
Disk-to-tape (D2T) is a type of data storage backup in which the data is copied from a disk (typically a hard disk) to a magnetic tape. D2T systems are used widely in enterprises that require the safe storage of vital information in the case of disaster recovery.

Read More

Data Backup! Data Disasters Happen Every Day

databackupEarthquakes, tornadoes, floods, and tsunamis. While recent natural disasters may remind business leaders about the importance of continuity plans, most CEOs may not realize that data disasters occur every day, and the repercussions can be devastating.

Data backup is easily one of the most critical elements of a complete disaster recovery plan. For example, a 2009 study by MetaGroup cited that just 6% of businesses survive catastrophic data loss.

A 2007 MetaGroup study found that only 3% of data losses occur due to natural disasters; 97% are due to mechanical failure or human error, both of which are far more common. Fortunately, the preparation for both types of disasters is much the same.

In planning for disaster recovery, CEOs should consider five important questions:

What systems and information are absolutely critical to running your business day-to-day? Emails? Accounting data? Customer records? All of the above?

Understanding what data is mission-critical may just save your business in a disaster. Evaluating the importance of your data will help determine what needs to be quickly accessible and what isn’t as critical, which will help you control data storage costs.

How long could you operate without that data before your business suffered? A few hours? A day? Several days?

Data backed up to tape rather than a cloud-based platform could take several days to be restored. There’s no reason to wait that long today with solutions that allow you to recover data within minutes.

When is your data backed up? Multiple times a day? Every day?

Understand approximately how many hours’ worth of data you risk losing.

Where and how is your backup data stored? On site? Off site? Out of market?

Data should be backed up in multiple locations, including somewhere out of the area. If your city were flooded, tapes stored at your office or even elsewhere in your same city might prove worthless. The best bet for many business owners is a solution that allows you to back up your encrypted data via the cloud, safely, to locations off-site and out of the area.

Who will retrieve your data in the event of a loss?

In a natural disaster, your key personnel may be wearing several hats. Have a specific person designated for data recovery. Even better, choose a company that will manage your data recovery for you, lifting that burden from your shoulders.

Bottom line: Businesses with continuity plans outlining where they will go and what equipment they will use may be ahead of the game, but if they don’t know how they will recover their data, those plans won’t really matter.

Gayle Rose is founder and CEO of Electronic Vaulting Services, a cloud backup and recovery company.

Read More