Browse Definitions :
Definition

disk cloning

What is disk cloning?

Disk cloning is the act of copying the contents of a computer's hard drive. The contents are typically saved as a disk image file and transferred to a storage medium, which could be another computer's hard drive or removable media such as a DVD or a USB drive.

Purposes of disk cloning include:

  • System recovery, for example to return a hard drive to its original configuration after serious problems.
  • Provisioning new computers before sale.
  • As a "reboot and refresh" option for public computers.
  • Recreating your system configuration on a new computer.
  • To return a system to an original configuration with no personal data before selling or giving a computer away.

Disk cloning is also known as ghost imaging.

Learn More About IT:
> Wikipedia has more information in its entry about disk cloning.
> Wikipedia also provides a comparison of disk cloning software.

This was last updated in July 2009

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

Actually what your describing is "Disk Imaging". Disk cloning is when a byte by byte copy of a drive is made onto another physical drive.

Jared Palmer
Data Medics
www.data-medics.com
Cancel
I want to recommend you one software, aomei partition assistant, which can be used to os migration, clone disk/copy. Maybe you know it before, http://www.disk-partition.com/disk-transfer/disk-cloning-software.html this can give you more information about this software. Hope this answer can give your users convenience and help them solve disk clone problem.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • network disaster recovery plan

    A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of ...

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close