Browse Definitions :

Data backup and disaster recovery

Terms related to backup and recovery, including definitions about making copies of data and words and phrases about restoring original data after a data loss event.
  • organization resilience - Organizational resilience is an organization's ability to anticipate issues ahead of time and develop a plan for handling identified problems.
  • pandemic plan - A pandemic plan is a documented strategy for business continuity in the event of a widespread outbreak of a dangerous infectious disease.
  • personal health record (PHR) - A personal health record (PHR) is an electronic summary of health information that a patient maintains control of themselves, as opposed to their healthcare provider.
  • purpose-built backup appliance (PBBA) - A purpose-built backup appliance (PBBA) is a standalone disk-based storage device that is configured and optimized for storing backup data.
  • ransomware recovery - Ransomware recovery is the process of resuming operations following a cyberattack that demands payment in exchange for unlocking encrypted data.
  • recovery point objective (RPO) - The recovery point objective (RPO) is the age of files that must be recovered from backup storage for normal operations to resume if a computer, system or network goes down as a result of a hardware, program or communications failure.
  • recovery time objective (RTO) - The recovery time objective (RTO) is the maximum tolerable length of time that a computer, system, network or application can be down after a failure or disaster occurs.
  • remote desktop - A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • remote office/branch office (ROBO) - A ROBO is a smaller office than the company headquarters and located in another town, state or country.
  • removable media - Removable media is any type of storage device that can be removed from a computer while the system is running.
  • secondary storage - Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary storage or that doesn't have the same performance or availability requirements.
  • security incident - A security incident is an event that could indicate that an organization's systems or data have been compromised or that security measures put in place to protect them have failed.
  • security operations center (SOC) - A security operations center (SOC) is a command center facility in which a team of information technology (IT) professionals with expertise in information security (infosec) monitors, analyzes and protects an organization from cyberattacks.
  • software redundant array of independent disk (software RAID) - Software RAID, also known as virtual RAID, is a form of RAID (software redundant array of independent disk) performed on an internal server.
  • software resilience testing - Software resilience testing is a method of software testing that focuses on ensuring that applications will perform well in real-life or chaotic conditions.
  • solid-state storage - Solid-state storage is a type of computer storage media that stores data electronically and has no moving parts.
  • storage capacity planning - Storage capacity planning is the practice of assessing current data storage needs and forecasting future storage requirements.
  • storage filer - A storage filer is a type of file server designed and programmed for high-volume data storage, backup and archiving.
  • storage snapshot - A storage snapshot is a set of reference markers for data at a particular point in time (PIT).
  • synchronous replication - Synchronous replication is the process of copying data over a network to create multiple current copies of the data.
  • System Restore (Windows) - System Restore is a Microsoft Windows utility designed to protect and revert the operating system (OS) to a previous state.
  • tabletop exercise (TTX) - A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a simulated disaster scenario.
  • tape backup - Tape backup is the practice of periodically copying data from a primary storage device to a tape cartridge.
  • tape drive - A tape drive is a device that stores computer data on magnetic tape, especially for backup and archiving purposes.
  • tape library - In data storage, a tape library is a collection of magnetic tape cartridges and tape drives.
  • triage in IT - Triage is a term referring to the assignment of priority levels to tasks or individuals to determine the most effective order in which to deal with them.
  • utility storage - Utility storage is a service model in which a provider makes storage capacity available to an individual, organization or business unit on a pay-per-use basis.
  • value-based healthcare - Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing quality care to patients.
  • Veeam Backup & Replication - Veeam Backup & Replication is a software product developed by Veeam Software to back up, restore and replicate data on virtual machines (VMs).
  • Veritas NetBackup (Symantec NetBackup) - Veritas NetBackup -- known as Symantec NetBackup from 2005 to 2016 -- is a backup and recovery software suite designed for enterprise users.
  • virtual disaster recovery - Virtual disaster recovery is a type of DR that typically involves replication and enables a user to fail over to virtualized workloads.
  • virtual hard disk (VHD) - A virtual hard disk (VHD) is a disk image file format for storing the entire contents of a computer's hard drive.
  • virtual machine replication - Virtual machine replication is a process used by information technology (IT) professionals to create backup versions of virtual machines (VMs) The backup can be kept and used to restore the machine in the event that its data is corrupted or lost.
  • virtual SAN appliance (VSA) - A virtual SAN appliance (VSA) is a software bundle that allows a storage manager to turn the unused storage capacity in his network's virtual servers into a storage area network (SAN).
  • VUCA (volatility, uncertainty, complexity and ambiguity) - VUCA is an acronym that stands for volatility, uncertainty, complexity and ambiguity -- qualities that make a situation or condition difficult to analyze, respond to or plan for.
  • warm site - A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down.
  • wbadmin - Wbadmin is an elevated command prompt that allows administrators or backup operators to backup and restore an operating system (OS), volume, file, folder or application.
  • What is a private cloud? - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
  • What is a SAN? Ultimate storage area network guide - A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
  • What is BCDR? Business continuity and disaster recovery guide - Business continuity (BC) and disaster recovery (DR) are closely related practices that support an organization's ability to remain operational after an adverse event.
  • What is cloud backup and how does it work? - Cloud backup, also known as online backup or remote backup, is a strategy for sending a copy of a physical or virtual file or database to a secondary, off-site location for preservation in case of equipment failure, site catastrophe or human malfeasance.
  • What is data backup? An in-depth guide - Data backup is the process of copying data in an IT system to another location so it can be recovered if the original data is lost.
  • What is data protection and why is it important? - Data protection is the process of safeguarding important information from corruption, compromise or loss.
  • What is incident response? A complete guide - Incident response is an organized, strategic approach to detecting and managing cyberattacks in ways that minimize damage, recovery time and total costs.
  • What is network-attached storage (NAS)? A complete guide - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • What is risk mitigation? - Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.
  • write-back - Write-back is a technique used to cache data between the local processor or central processing unit and the final storage location, which is typically either main memory -- RAM -- or disk.
  • write-through - Write-through is a storage method in which data is written into the cache and the corresponding main memory location at the same time.
  • Zerto - Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and cloud environments.
Networking
Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • Workday

    Workday is a cloud-based software vendor that specializes in human capital management (HCM) and financial management applications.

  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close