Browse Definitions :

Data deduplication

Terms related to data deduplication, including definitions about single-instance storage and words and phrases about eliminating redundant data.

DAT - TAR

  • data archiving - Data archiving migrates infrequently used data to low-cost, high-capacity archive storage for long-term retention.
  • data at rest - Data at rest is a term that is sometimes used to refer to all data in computer storage while excluding data that is traversing a network or temporarily residing in computer memory to be read or updated.
  • data center - A data center (or datacenter) is a facility composed of networked computers and storage that businesses or other organizations use to organize, process, store and disseminate large amounts of data.
  • data deduplication - Data deduplication -- often called intelligent compression or single-instance storage -- is a process that eliminates redundant copies of data and reduces storage overhead.
  • data deduplication hardware - Data deduplication hardware is a storage product that eliminates redundant copies of data and retains one instance to be stored.
  • data deduplication ratio - To calculate the deduplication ratio, divide the capacity of backed up data before dupliates are removed by the actual capacity used once the backup is complete.
  • data federation software - Data federation software is programming that provides an organization with the ability to collect data from disparate sources and aggregate it in a virtual database where it can be used for business intelligence (BI) or other analysis.
  • data life cycle management (DLM) - Data life cycle management (DLM) is a policy-based approach to managing the flow of an information system's data throughout its life cycle: from creation and initial storage to the time when it becomes obsolete and is deleted.
  • data management - Data management is the practice of organizing and maintaining data processes to meet ongoing information lifecycle needs.
  • data reduction - Data reduction is the process of reducing the amount of capacity required to store data.
  • data reduction in primary storage (DRIPS) - Data reduction in primary storage (DRIPS) is the application of capacity optimization techniques for data that is in active use.
  • data scrubbing (data cleansing) - Data scrubbing, also called data cleansing, is the process of cleaning up data in a database that is incorrect, incomplete, or duplicated.
  • global deduplication - Global deduplication is a method of preventing redundant data when backing up data to multiple deduplication devices.
  • inline deduplication - Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.
  • KSM (kernel samepage merging) - KSM (kernel samepage merging) is a Linux kernel feature that allows the KVM hypervisor to share identical memory pages among different process or virtual machines on the same server.
  • memory mirroring - Memory mirroring is the division of memory on a server into two channels.
  • post-processing deduplication (PPD) - Post-processing deduplication (PPD), also known as asynchronous de-duplication, is the analysis and removal of redundant data after a backup is complete and data has been written to storage.
  • source deduplication - Source deduplication is the removal of redundancies from data before transmission to the backup target.
  • target deduplication - Target deduplication is the removal of redundancies from a backup transmission as it passes through an appliance sitting between the source and the backup target.

-ADS BY GOOGLE

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits an end user to enter one set of login credentials ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

  • RAID controller

    A RAID controller is a hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in...

Close