Data Backup Glossary (Letter D)

Dark archive
A data archive that cannot be accessed by any user. Access to the data is either limited to a set of few individuals or completely restricted to all. The purpose of a dark archive is to function as a repository for information that can be used as a failsafe during disaster recovery.

Data at rest
All data in storage excluding any data that frequently traverses the network or that resides in temporary memory. Data at rest includes, but is not limited to, archived data; data which is not accessed or changed frequently; files stored on hard drives; USB thumb drives; files stored on backup tape and disks; and files stored offsite or on a storage area network (SAN).

Data at rest protection
Security protection measures such as password protection, data encryption, or a combination of both that protect data at rest from hackers and other malicious threats. The measures prevent this data from being accessed, modified, or stolen.

Database
A system intended to organize, store, and retrieve large amounts of data easily. It consists of an organized collection of data for one or more uses, typically in digital form.

Data center
A facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (for example, air conditioning or fire suppression), and security devices.

Data center tiers
A four-tier system that provides a simple and effective means for identifying different data center site infrastructure design topologies. The Uptime Institute’s tiered classification system is an industry standard approach to site infrastructure functionality that addresses common benchmarking standard needs. The four tiers, as classified by The Uptime Institute, include the following:

  • Tier I: Composed of a single path for power and cooling distribution, without redundant components, providing 99.671 percent availability.
  • Tier II: Composed of a single path for power and cooling distribution, with redundant components, providing 99.741 percent availability.
  • Tier III: Composed of multiple active power and cooling distribution paths, but only one path active, has redundant components, and is concurrently maintainable, providing 99.982 percent availability.
  • Tier IV: Composed of multiple active power and cooling distribution paths, has redundant components, and is fault tolerant, providing 99.995 percent availability.

Data cleansing
Also referred to as data scrubbing, the act of detecting and removing and/or correcting a database’s dirty data (data that is incorrect, out-of-date, redundant, incomplete, or formatted incorrectly). The goal of data cleansing is not just to clean up the data in a database, but also to bring consistency to different sets of data that have been merged from separate databases. Sophisticated software applications are available to clean a database’s data using algorithms, rules, and look-up tables. This task was once done manually and was therefore still subject to human error.

  • In a RAID system, the act of correcting parity bit errors so that drives remain synchronized.

Data deduplication
The elimination of redundant data. In the deduplication process, duplicate data is deleted, leaving only one copy of the data to be stored. However, indexing of all data is still retained should that data ever be required. Deduplication reduces the required storage capacity since only the unique data is stored.

Data dictionary
In database management systems, a file that defines the basic organization of a database. A data dictionary contains a list of all files in the database, the number of records in each file, and the names and types of each field. Most database management systems keep the data dictionary hidden from users to prevent them from accidentally destroying its contents. Data dictionaries do not contain any actual data from the database, only book keeping information for managing it. Without a data dictionary, however, a database management system cannot access data from the database.

Data infrastructure hygiene
Practices that promote or preserve the shape of an entire data infrastructure (for example, network, servers, databases, storage, and software). These practices include any activity that reduces the stress of information growth on the data infrastructure and enables the efficient access, movement, and protection of data while reducing overall infrastructure and maintenance costs. Such practices include active archiving of relational databases, e-mail archiving, and document archiving.

Data mirroring
The act of copying data from one location to a storage device in real time. Because the data is copied in real time, the information stored from the original location is always an exact copy of the data from the production device. Data mirroring is useful in the speedy recovery of critical data after a disaster. Data mirroring can be implemented locally or offsite at a completely different location.

Data protection
Assurance that data is not corrupted, is accessible for authorized purposes only, and is in compliance with applicable requirements.

Data recovery
The salvaging of data stored on damaged media, such as magnetic disks and tapes. Many software products help recover data damaged by a disk crash or virus. In addition, many companies specialize in data recovery. Although not all data is recoverable, data recovery specialists can often restore a surprisingly high percentage of the data on damaged media.

Data retention policy
The policy of persistent data and records management for meeting legal and business data archival requirements. A data retention policy weighs legal and privacy concerns against economics and need to know concerns to determine retention time, archival rules, data formats, and the permissible means of storage, access, and encryption.

Data space transfer protocol
Data space transfer protocol (DSTP) is a protocol used to index and categorize data using an XML -based catalogue. Data, no matter how it is stored, has corresponding XML files which contain UCK (universal correlation key) tags that act as identification keys. Data is retrieved when a user connects to DSTP servers with a DSTP client and asks for specific information. Data is found and retrieved based on the labels contained in the UCK tags.

Data vaulting
The process of sending data from its primary source, where it can be protected from hardware failures, theft, and other threats. Several companies now provide web backup services that compress, encrypt, and periodically transmit a customer’s data to a remote vault. In most cases the vaults will feature auxiliary power supplies, powerful computers, and manned security.

DDP

  • Acronym for disk-based data protection, where a disk or RAID system is used as a data backup and archival system in place of tape.
  • Acronym for distributed data protection, a managed (or hosted) service that provides customers with online, scheduled, automated computer system data backup and self-serve restoration.
  • Acronym for development data platform, a web-based platform for data analysis, presentation, and dissemination. 
  • Acronym for distributed data processing, a data processing network in which some functions are performed in different places on different computers and are connected by transmission facilities.

Delta Backup
The backup of all data files that have been modified since the last incremental backup or archival backup. Also known as differential incremental backup.

DeltaPro
Patented EVault technology that performs delta backup and compresses the data before sending it over the wire.

Digital asset management
Digital asset management (DAM) is a system that creates a centralized repository for digital files that allows the content to be archived, searched, and retrieved. The digital content is stored in databases called asset repositories. Metadata—such as photo captions, article key words, advertiser names, contact names, file names, or low-resolution thumbnail images—is stored in separate databases called media catalogs and points to the original items. Digital asset management also is known as enterprise digital asset management, media asset management, or digital asset warehousing.

Digital footprint
The trail, traces, or "footprints" that people leave online. A digital footprint includes information transmitted online, such as forum registration, e-mails and attachments, uploaded videos or digital images, and any other form of transmission of information. All of this activity leaves traces of personal information about yourself that is available to others online.

Direct access file system
Direct access file system (DAFS) is a file-access sharing protocol that uses memory-to-memory interconnect architectures, such as VI and InfiniBand. DAFS is designed for storage area networks (SANs) to provide bulk data transfer directly between the application buffers of two machines without having to packetize the data. With DAFS, an application can transfer data to and from application buffers without using the operating system, which frees up the processor and operating system for other processes and allows files to be accessed by servers using several different operating systems.

Direct-attached storage
Direct-attached storage (DAS) is non-networked storage in which the hardware is connected to an individual server. Although more than one server can be present, storage for each server is managed separately and cannot be shared.

Disaster recovery
The process, policies, and procedures related to preparing for the recovery or continuation of a business-critical technology infrastructure after a natural or human-induced disaster. Disaster recovery is a subset of business continuity. While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions.

Disaster recovery plan
A plan for business continuity in the event of a disaster that destroys part or all of a business’s resources, including IT equipment, data records, and the physical space of an organization. The goal of a disaster recovery plan is to resume normal computing capabilities in as little time as possible. A typical disaster recovery plan has several stages:

  1. Understanding an organization’s activities and how all of its resources are interconnected
  2. Assessing an organization’s vulnerability in all areas, including operating procedures, physical space and equipment, data integrity, and contingency planning
  3. Understanding how all levels of the organization would be affected in the event of a disaster
  4. Developing a short-term recovery plan
  5. Developing a long-term recovery plan, including how to return to normal business operations and prioritizing the order of functions that are resumed
  6. Testing and consistently maintaining and updating the plan as the business changes A key to a successful disaster recovery plan is taking steps to prevent the likelihood of disasters from occurring, such as using a hot site or cold site to back up data archives.
  7. Disk array
    A linked group of one or more physical independent hard disk drives generally used to replace larger, single disk drive systems. The most common disk arrays are in daisy chain configuration or implement RAID (Redundant Array of Independent Disks) technology. A disk array may contain several disk drive trays and is structured to improve speed and increase protection against loss of data. Disk arrays organize their data storage into Logical Units (LUs), which appear as linear block paces to their clients. Disk arrays are an integral part of high-performance storage systems.

Disk-to-disk
Disk-to-disk (D2D) is a type of data storage backup in which the data is copied from one disk (typically a hard disk) to another disk (such as another hard disk or other disk storage medium). In a D2D system, the disk that the data is being copied from typically is referred to as the primary disk and the disk that the data is copied to typically is called the secondary or backup disk.

Disk-to-disk-to-tape
Disk-to-disk-to-tape (D2D2T) is a type of data storage backup in which data is first backed up on a disk system, but then is spooled to a tape or an optical storage system. A D2D2T backup system can help eliminate data loss issues due to tape drive or tape failure. In a D2D2T system, a copy of the data is kept onsite for faster retrieval and tape copies are kept offsite for disaster recovery purposes. D2D2T devices may be appliances, virtual tape, or disk libraries.

Disk-to-tape
Disk-to-tape (D2T) is a type of data storage backup in which the data is copied from a disk (typically a hard disk) to a magnetic tape. D2T systems are used widely in enterprises that require the safe storage of vital information in the case of disaster recovery.

Read More

Top 10 Data Disasters Stories for 2011 (Kroll Ontrack)

Think you have the worst data disaster story? Let’s find out! Submit your top data disaster for the chance to win an iPad2. – Ontrackdatarecovery.co.uk

data-disasters-2011

Top 10 Data Disasters Stories for 2011:

1. Triple whammy
When a lightning strike caused a fire that sent a famous Caribbean island home up in smoke, the computer servers were burned and then doused with water by the firemen. The media then corroded while the building sat idle until it was safe to re-enter. In the end, the triple whammy of a lightning strike, fire and water damage was overcome in the Ontrack Data Recovery cleanroom.

2. Doggy eat dog world
A man encouraged his girlfriend to back up her photo library, which contained thousands of high-resolution photos from her photo studio. She diligently moved the data from her laptop to an external hard drive, but unfortunately that represented the only good copy. A friend then pulled into the driveway and the couple went out to meet her, but not before the hyperactive family dog heard someone at the door and came tearing out from underneath the table where the drive was sitting. The drive went crashing to the floor, causing much damage to the data.

3. A little piece of history
A freelance photographer happened to have his camera with him in the midst of the recent London riots. Some rioters saw they were being filmed and opted to smash the camera in order to destroy the potentially incriminating evidence. The camera made its way to Kroll Ontrack where 100 percent of the data and the video footage was recovered and supplied to the police.

4. In the safe not on the safe
To avoid arriving late to a business meeting, an IT person opted to put a tape drive on top of the waterproof safe instead of inside it. Within an hour of doing so, the city was struck by a powerful earthquake and the tape was knocked to the ground. Then, the premise was engulfed by mud, water and sand. The tape looked irrecoverable.

5. Smoking kills
A newly hired security guard was doing his first evening security check in a chemical ingredients warehouse. While he was informed that smoking is forbidden, he pondered who could possibly spot him enjoying a cigarette after company hours. After it was lit, the fire alarm sounded and prompted the anti-fire sprinkler system. All the electronic equipment, including 44 desktops and two servers, were flooded.

6. Sunken business deal
Two businessmen met in a pub to discuss a future deal over a beer. The waitress accidently knocked over one of the glasses she was delivering, soaking the laptop which contained the business plans. A paper towel was not enough to save the laptop and its important deal files.

7. End of month disaster
A corporate accounting department stayed late to reconcile the books for the month. While rejuvenating on a coffee break, a power outage occurred. All of the computers shut down including the financial server. Luckily the department’s computers were connected to a UPS. However, the continued brewing of their cups of Java drained the UPS battery, resulting in a crashed server.

8. Magnetic attraction
A laptop was set down on a desk near some rare earth magnets. The earth magnets came into contact with the laptop and when the user went to turn on the machine, it did not fully boot up and started clicking. Physical damage was caused to the platters.

9. Virtual reality
To increase system performance, an IT administrator split the C and D partition of his virtual server across two different systems. Running out of space, the admin needed to rush and consolidate C and D onto the same system. Not knowing that the same naming convention already existed on the target system, he copied over the important data set.

10. Bad image
An actor deleted her entire portfolio including her model card samples and recent pictures by accidently selecting the wrong externally attached USB drive using the MAC disk utility program.

Note: Submit your worst data disaster story by January 31, 2012. Include how the data disaster occurred, how it impacted you or your business and if you were able to recover your data (if so, how much you recovered). The winner will be selected on February 1, 2012. Join Now

Read More

Before You Pull Your Hair Out, Call a Data Recovery Company

What happens when you are working on a special document or project on the computer and your screen goes blank! Panic? No – get help!

The good news about a crash is that most data, in most situations, can be recovered. Some projects may require several days, or even weeks, but about 75 per cent of all assignments can be turned around in less than 48 hours and the average data recovery success rate is 85 per cent.

The bad news is that organizations can sometimes make matters worse by delaying their response in a crisis situation, or taking action that makes their data harder, or in a bad case, impossible to retrieve.

Sometimes people fail to recognize that any loss of data is an immediate and urgent problem. What if the hard drives on all the new computers start to fail or all the new software is corrupt?

But denial can carry a much higher price than inconvenience. The McGladrey and Pullen accounting firm says 43 per cent of those companies that experience a disaster in their data center never reopen and 29 per cent close within two years. The company estimates that this year, one out of every 500 data centers will have a severe disaster. Together, hardware or system malfunctions and human error account for three out of four outage incidents. The rest are due to software corruption, computer viruses and ‘physical’ disasters like fire and water damage.

Background On Backups

There would be less work for data recovery companies if existing backup technology and practices protected data adequately. Backups and redundant storage technologies can be a successful backup strategy for many companies. But unfortunately, of those who do back up their data, they could not restore the data from backups.

There is a long chain of assumptions in a backup procedure: the hardware is working properly; users know how to perform the backup; the backup software works; the media is actually capturing the data; and, the data being backed up is the right information. Any break in the chain creates a dangerous vulnerability.

When systems do break down, clients can turn to a data recovery solution. One of the most important tasks is creating a climate of trust. By the time we are called in, the seriousness of the situation can no longer be denied and relieving the psychological pressure is crucial. In some situations, the client has to make some choices. ‘Which data do you need first? Are you willing to sacrifice some data, or receive it a different file format from the original?’

Environmental Controls

Companies can reduce the risk by controlling three environments.

In the hardware environment, the organization should keep computers in clean, temperature-controlled, low-traffic areas to reduce accidents and equipment failures. Computers must be protected from power surges and backups stored in a safe, off-site location. Today’s magnetic storage media is becoming more vulnerable to Extraneous Static Discharge (ESD) damage so protect your system from static.

Check hard drives at least once a month, with software that alerts you to any problems. “New” noises like scraping and grinding noises are a signal to shut down the system immediately and call in an expert. They can mean serious damage. Running the drive could not only destroy it but all the data as well. Never use a hard drive or storage device that has been physically damaged in any way, or exposed to a harmful environment.

Control the software environment with regular, verified backups to make sure the right data is actually being stored. Scan for viruses with software updated at least four times a year and screen all incoming data. Always create “undo” disks when new software offers that choice, so you can reverse any changes. In the case of suspected electrical or mechanical drive failure, never use file recovery software, because it can make things worse.

Most importantly, create a human environment that creates awareness and responsibility. If data is critical to the success or even survival of your organization, make sure those directly responsible have the right tools and training, and make sure all your employees how important the data protection procedures and policies are to the business. They will be motivated to follow them.

Finally, when disaster does strike, recognize it, be decisive and get help quickly. The faster a data recovery service gets the assignment, the better you chances of getting back in business quickly

Read More

A customer’s USB flash drive cannot be recognized and the data recovery is successful

Case:Kingston’s 2G U disk suddenly couldn’t recognize it. It couldn’t work after changing several computers, and it kept research data for several years. Solution:Based on customer description, preliminary judgment should be chip damage, and there is a chance of recovery.By detecting the damage of the main control chip of the U disk, the U disk…

Read More