what is the title of the page where data to be included in the backup is selected?

Duplicate data in figurer systems for data recovery

In information engineering, a backup, or data backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss outcome. The verb form, referring to the process of doing so, is "support", whereas the noun and adjective form is "backup".[1] Backups tin can be used to recover data later on its loss from data deletion or abuse, or to recover data from an earlier time.[2] Backups provide a simple form of disaster recovery; withal not all backup systems are able to reconstitute a figurer system or other complex configuration such as a computer cluster, active directory server, or database server.[3]

A backup system contains at least one copy of all information considered worth saving. The information storage requirements can be large. An information repository model may be used to provide construction to this storage. At that place are different types of information storage devices used for copying backups of data that is already in secondary storage onto annal files.[note one] [4] In that location are also different ways these devices tin be bundled to provide geographic dispersion, data security, and portability.

Data is selected, extracted, and manipulated for storage. The process tin include methods for dealing with live data, including open up files, as well as compression, encryption, and de-duplication. Additional techniques utilise to enterprise client-server backup. Backup schemes may include dry runs that validate the reliability of the data existence backed up. In that location are limitations[five] and human factors involved in any backup scheme.

Storage [edit]

A fill-in strategy requires an data repository, "a secondary storage space for information"[6] that aggregates backups of information "sources". The repository could be equally simple equally a list of all backup media (DVDs, etc.) and the dates produced, or could include a computerized index, catalog, or relational database.

The backup data needs to be stored, requiring a backup rotation scheme,[4] which is a system of backing up data to calculator media that limits the number of backups of different dates retained separately, by appropriate re-use of the data storage media past overwriting of backups no longer needed. The scheme determines how and when each piece of removable storage is used for a backup operation and how long it is retained once information technology has backup data stored on it.

3-2-1 rule [edit]

The 3-ii-1 rule tin aid in the backup process. It states that in that location should be at least 3 copies of the information, stored on ii different types of storage media, and one copy should be kept offsite, in a remote location (this tin include cloud storage). 2 or more unlike media should be used to eliminate data loss due to like reasons (for example, optical discs may tolerate being underwater while LTO tapes may not, and SSDs cannot neglect due to head crashes or damaged spindle motors since they don't take any moving parts, unlike hard drives). An offsite re-create protects against fire, theft of physical media (such as tapes or discs) and natural disasters like floods and earthquakes.[7] Disaster protected hard drives like those fabricated by ioSafe are an alternative to an offsite copy, only they have limitations like only being able to resist fire for a express period of time, so an offsite copy still remains every bit the platonic choice.

Fill-in methods [edit]

Unstructured [edit]

An unstructured repository may simply be a stack of tapes, DVD-Rs or external HDDs with minimal data about what was backed up and when. This method is the easiest to implement, but unlikely to accomplish a high level of recoverability as it lacks automation.

Full only/Organisation imaging [edit]

A repository using this backup method contains consummate source information copies taken at one or more specific points in time.[8] Copying system images, this method is frequently used by computer technicians to record known expert configurations. All the same, imaging[nine] is more often than not more useful every bit a way of deploying a standard configuration to many systems rather than as a tool for making ongoing backups of diverse systems.

Incremental [edit]

An incremental backup stores data changed since a reference indicate in time.[10] Duplicate copies of unchanged information aren't copied.[8] Typically a full fill-in of all files is in one case or at infrequent intervals, serving every bit the reference indicate for an incremental repository. Subsequently, a number of incremental backups are fabricated after successive time periods. Restores begin with the last full backup and and then apply the incrementals.[11] Forever incremental fill-in starts with one initial full backup and later on only incremental backups will be created. The benefits of forever incremental fill-in would exist less fill-in storage and less bandwidth usage, and users can schedule backups more oft to accomplish shorter RPO.[12] Some backup systems[xiii] tin create a synthetic full backup from a series of incrementals, thus providing the equivalent of frequently doing a full backup.[viii] When washed to alter a single archive file, this speeds restores of recent versions of files.

Near-CDP [edit]

Continuous Data Protection (CDP) refers to a backup that instantly saves a copy of every modify fabricated to the data. This allows restoration of data to any point in time and is the most comprehensive and advanced data protection.[14] Near-CDP backup applications—frequently marketed equally "CDP"—automatically take incremental backups at a specific interval, for example every 15 minutes, one hour, or 24 hours. They tin can therefore only allow restores to an interval boundary.[xiv] Well-nigh-CDP fill-in applications employ journaling and are typically based on periodic "snapshots",[15] read-simply copies of the data frozen at a item point in time.

Virtually-CDP (except for Apple tree Time Car)[16] intent-logs every modify on the host system,[17] oftentimes by saving byte or block-level differences rather than file-level differences.[8] This backup method differs from uncomplicated disk mirroring[eight] in that it enables a roll-back of the log and thus a restoration of old images of data. Intent-logging allows precautions for the consistency of live information, protecting self-consistent files but requiring applications "exist quiesced and made set for backup."

Almost-CDP is more than practicable for ordinary personal fill-in applications, equally opposed to truthful CDP, which must be run in conjunction with a virtual motorcar[eighteen] [19] or equivalent and is therefore generally used in enterprise client-server backups.

Reverse incremental [edit]

A Reverse incremental backup method stores a recent archive file "mirror" of the source data and a series of differences betwixt the "mirror" in its current state and its previous states. A reverse incremental backup method starts with a not-paradigm full backup. After the full backup is performed, the organization periodically synchronizes the full backup with the alive re-create, while storing the data necessary to reconstruct older versions. This can either be done using hard links—as Apple Fourth dimension Machine does, or using binary diffs.

Differential [edit]

A differential fill-in saves only the data that has changed since the final full fill-in. This ways a maximum of ii backups from the repository are used to restore the data. Even so, every bit time from the final full backup (and thus the accumulated changes in data) increases, so does the time to perform the differential backup. Restoring an entire system requires starting from the most contempo full backup and then applying simply the last differential fill-in.

A differential fill-in copies files that have been created or changed since the last full backup, regardless of whether any other differential backups take been made since, whereas an incremental backup copies files that have been created or changed since the most recent backup of whatsoever type (full or incremental). Changes in files may be detected through a more than recent date/fourth dimension of last modification file aspect, and/or changes in file size. Other variations of incremental backup include multi-level incrementals and cake-level incrementals that compare parts of files instead of just entire files.

Storage media [edit]

Regardless of the repository model that is used, the information has to be copied onto an archive file data storage medium. The medium used is likewise referred to as the blazon of backup destination.

Magnetic tape [edit]

Magnetic tape was for a long time the almost commonly used medium for bulk data storage, backup, archiving, and interchange. It was previously a less expensive selection, but this is no longer the case for smaller amounts of data.[21] Tape is a sequential access medium, and then the rate of continuously writing or reading information tin be very fast. While tape media itself has a low cost per space, record drives are typically dozens of times as expensive as hard deejay drives and optical drives.

Many tape formats have been proprietary or specific to certain markets like mainframes or a detail make of personal computer. By 2014 LTO had become the primary tape technology.[22] The other remaining viable "super" format is the IBM 3592 (as well referred to equally the TS11xx series). The Oracle StorageTek T10000 was discontinued in 2016.[23]

Hard disk drive [edit]

The employ of hard disk drive storage has increased over time as information technology has become progressively cheaper. Hard disks are usually like shooting fish in a barrel to use, widely bachelor, and tin can be accessed quickly.[22] Nevertheless, hard disk backups are close-tolerance mechanical devices and may be more easily damaged than tapes, specially while beingness transported.[24] In the mid-2000s, several drive manufacturers began to produce portable drives employing ramp loading and accelerometer technology (sometimes termed a "daze sensor"),[25] [26] and by 2010 the industry average in drop tests for drives with that technology showed drives remaining intact and working afterwards a 36-inch non-operating drop onto industrial carpet.[27] Some manufacturers likewise offering 'ruggedized' portable hard drives, which include a daze-arresting case around the hd, and merits a range of higher drop specifications.[27] [28] [29] Over a period of years the stability of hard disk drive backups is shorter than that of record backups.[23] [thirty] [24]

External hard disks can be connected via local interfaces like SCSI, USB, FireWire, or eSATA, or via longer-distance technologies similar Ethernet, iSCSI, or Fibre Channel. Some disk-based backup systems, via Virtual Tape Libraries or otherwise, support data deduplication, which can reduce the amount of disk storage capacity consumed past daily and weekly backup data.[31] [32] [33]

Optical storage [edit]

Optical storage uses lasers to store and retrieve data. Recordable CDs, DVDs, and Blu-ray Discs are commonly used with personal computers and are mostly cheap. In the past, the capacities and speeds of these discs accept been lower than difficult disks or tapes, although advances in optical media are slowly shrinking that gap.[34] [35]

Potential future information losses caused past gradual media degradation tin can exist predicted by measuring the rate of correctable minor data errors, of which consecutively also many increase the risk of uncorrectable sectors. Support for error scanning varies among optical drive vendors.[36]

Many optical disc formats are WORM blazon, which makes them useful for archival purposes since the information cannot be changed. Moreover, optical discs are not vulnerable to head crashes, magnetism, imminent water ingress or power surges, and a mistake of the bulldoze typically just halts the spinning.

Optical media is modular; the storage controller is external and not tied to media itself like with hard drives or flash storage (flash memory controller), allowing information technology to be removed and accessed through a different bulldoze. However, recordable media may degrade before nether long-term exposure to lite.[37]

The lack of internal components and magnetism makes optical media unaffected by single event furnishings from ionizing radiation that can be caused by environmental disasters like a nuclear meltdown or solar tempest.

Some optical storage systems allow for cataloged data backups without human contact with the discs, allowing for longer data integrity. A French written report in 2008 indicated that the lifespan of typically-sold CD-Rs was 2–x years,[38] but one manufacturer later estimated the longevity of its CD-Rs with a gilded-sputtered layer to exist as high as 100 years.[39] Sony'south proprietary Optical Disc Annal[22] can in 2016 accomplish a read rate of 250MB/due south.[40]

Solid-state drive (SSD) [edit]

Solid-state drives (SSDs) use integrated circuit assemblies to store data. Wink retentiveness, thumb drives, USB flash drives, CompactFlash, SmartMedia, Retentiveness Sticks, and Secure Digital carte du jour devices are relatively expensive for their low capacity, but convenient for backing up relatively low data volumes. A solid-country drive does non comprise any movable parts, making it less susceptible to physical harm, and can take huge throughput of around 500 Mbit/southward up to 6 Gbit/due south. Available SSDs have go more than capacious and cheaper.[41] [28] Wink memory backups are stable for fewer years than difficult deejay backups.[23]

Remote backup service [edit]

Remote backup services or cloud backups involve service providers storing data offsite. This has been used to protect against events such every bit fires, floods, or earthquakes which could destroy locally stored backups.[42] Cloud-based fill-in (through services like or like to Google Bulldoze, and Microsoft OneDrive) provides a layer of information protection.[24] Nonetheless, the users must trust the provider to maintain the privacy and integrity of their data, with confidentiality enhanced by the use of encryption. Because speed and availability are limited by a user's online connexion,[24] users with large amounts of data may need to use cloud seeding and large-scale recovery.

Management [edit]

Various methods tin be used to manage fill-in media, striking a residual betwixt accessibility, security and cost. These media management methods are not mutually exclusive and are frequently combined to meet the user's needs. Using on-line disks for staging information before information technology is sent to a near-line tape library is a common example.[43] [44]

Online [edit]

Online fill-in storage is typically the about accessible type of data storage, and can brainstorm a restore in milliseconds. An internal hard disk drive or a deejay assortment (maybe continued to SAN) is an example of an online backup. This blazon of storage is convenient and speedy, but is vulnerable to beingness deleted or overwritten, either by blow, by malevolent action, or in the wake of a information-deleting virus payload.

Nearline [edit]

Nearline storage is typically less accessible and less expensive than online storage, but still useful for backup data storage. A mechanical device is usually used to move media units from storage into a bulldoze where the data can exist read or written. Generally it has condom properties similar to on-line storage. An example is a tape library with restore times ranging from seconds to a few minutes.

Off-line [edit]

Off-line storage requires some direct action to provide access to the storage media: for instance, inserting a record into a tape drive or plugging in a cable. Because the data is non accessible via whatever computer except during limited periods in which they are written or read back, they are largely immune to on-line fill-in failure modes. Access time varies depending on whether the media are on-site or off-site.

Off-site data protection [edit]

Backup media may be sent to an off-site vault to protect against a disaster or other site-specific problem. The vault can be every bit simple as a arrangement administrator's home office or as sophisticated every bit a disaster-hardened, temperature-controlled, loftier-security bunker with facilities for backup media storage. A data replica tin be off-site just as well on-line (eastward.g., an off-site RAID mirror). Such a replica has adequately limited value as a backup.

Backup site [edit]

A backup site or disaster recovery center is used to store data that tin can enable figurer systems and networks to exist restored and properly configure in the event of a disaster. Some organisations have their ain data recovery centres, while others contract this out to a third-political party. Due to high costs, bankroll upwards is rarely considered the preferred method of moving data to a DR site. A more typical way would be remote disk mirroring, which keeps the DR information every bit up to appointment as possible.

Pick and extraction of information [edit]

A backup operation starts with selecting and extracting coherent units of information. Near information on modern calculator systems is stored in detached units, known every bit files. These files are organized into filesystems. Deciding what to back up at any given time involves tradeoffs. By backing upwards too much redundant data, the information repository will make full upwardly also speedily. Backing up an insufficient amount of data tin can somewhen lead to the loss of critical data.[45]

Files [edit]

  • Copying files : Making copies of files is the simplest and most common way to perform a fill-in. A means to perform this basic function is included in all backup software and all operating systems.
  • Partial file copying: A backup may include only the blocks or bytes inside a file that have changed in a given period of fourth dimension. This can substantially reduce needed storage space, merely requires higher sophistication to reconstruct files in a restore situation. Some implementations require integration with the source file system.
  • Deleted files : To preclude the unintentional restoration of files that have been intentionally deleted, a record of the deletion must be kept.
  • Versioning of files : Most backup applications, other than those that do simply full but/System imaging, also back up files that have been modified since the last fill-in. "That style, y'all tin can retrieve many different versions of a given file, and if y'all delete information technology on your hard disk, you can nevertheless find it in your [data repository] archive."[4]

Filesystems [edit]

  • Filesystem dump: A copy of the whole filesystem in block-level tin be made. This is as well known as a "raw partition fill-in" and is related to disk imaging. The process commonly involves unmounting the filesystem and running a program like dd (Unix).[46] Because the deejay is read sequentially and with big buffers, this blazon of backup can be faster than reading every file normally, especially when the filesystem contains many small-scale files, is highly fragmented, or is about full. But considering this method as well reads the free disk blocks that incorporate no useful data, this method can also exist slower than conventional reading, specially when the filesystem is almost empty. Some filesystems, such as XFS, provide a "dump" utility that reads the disk sequentially for high functioning while skipping unused sections. The corresponding restore utility can selectively restore individual files or the entire volume at the operator'southward choice.[47]
  • Identification of changes: Some filesystems have an archive bit for each file that says it was recently changed. Some fill-in software looks at the date of the file and compares it with the last backup to determine whether the file was changed.
  • Versioning file system : A versioning filesystem tracks all changes to a file. The NILFS versioning filesystem for Linux is an example.[48]

Live data [edit]

Files that are actively being updated nowadays a challenge to support. One way to back upward live data is to temporarily quiesce them (e.g., close all files), take a "snapshot", and so resume live operations. At this point the snapshot can be backed up through normal methods.[49] A snapshot is an instantaneous function of some filesystems that presents a copy of the filesystem as if it were frozen at a specific point in time, often by a copy-on-write mechanism. Snapshotting a file while it is existence inverse results in a corrupted file that is unusable. This is too the instance beyond interrelated files, every bit may be institute in a conventional database or in applications such as Microsoft Exchange Server.[xv] The term fuzzy backup can be used to describe a backup of live information that looks similar it ran correctly, but does not correspond the state of the data at a single point in time.[50]

Fill-in options for data files that cannot be or are not quiesced include:[51]

  • Open up file fill-in: Many backup software applications undertake to back up open files in an internally consistent land.[52] Some applications but check whether open files are in utilise and try again later.[49] Other applications exclude open files that are updated very frequently.[53] Some low-availability interactive applications tin be backed upwards via natural/induced pausing.
  • Interrelated database files backup: Some interrelated database file systems offer a ways to generate a "hot backup"[54] of the database while information technology is online and usable. This may include a snapshot of the data files plus a snapshotted log of changes fabricated while the backup is running. Upon a restore, the changes in the log files are practical to bring the copy of the database upwards to the point in fourth dimension at which the initial backup ended.[55] Other low-availability interactive applications can be backed up via coordinated snapshots. However, genuinely-high-availability interactive applications tin be simply be backed up via Continuous Information Protection.

Metadata [edit]

Non all information stored on the computer is stored in files. Accurately recovering a complete system from scratch requires keeping rail of this non-file information too.[56]

  • System description: Organization specifications are needed to procure an exact replacement after a disaster.
  • Kicking sector : The boot sector tin sometimes be recreated more easily than saving it. Information technology normally isn't a normal file and the system won't kicking without it.
  • Partition layout: The layout of the original disk, as well as sectionalisation tables and filesystem settings, is needed to properly recreate the original system.
  • File metadata : Each file'due south permissions, possessor, group, ACLs, and any other metadata need to be backed up for a restore to properly recreate the original surround.
  • System metadata: Unlike operating systems have different ways of storing configuration information. Microsoft Windows keeps a registry of system information that is more than difficult to restore than a typical file.

Manipulation of information and dataset optimization [edit]

It is often useful or required to manipulate the data beingness backed up to optimize the backup process. These manipulations can improve backup speed, restore speed, information security, media usage and/or reduced bandwidth requirements.

Automated information grooming [edit]

Out-of-date data can be automatically deleted, just for personal fill-in applications—as opposed to enterprise client-server fill-in applications where automated information "training" can be customized—the deletion[note 2] [57] [58] can at almost[59] be globally delayed or exist disabled.[lx]

Compression [edit]

Diverse schemes can exist employed to compress the size of the source data to be stored and so that it uses less storage space. Compression is ofttimes a built-in feature of tape drive hardware.[61]

Deduplication [edit]

Back-up due to bankroll upwardly similarly configured workstations tin be reduced, thus storing just 1 re-create. This technique can be applied at the file or raw block level. This potentially big reduction[61] is called deduplication. Information technology can occur on a server before any information moves to backup media, sometimes referred to as source/customer side deduplication. This approach as well reduces bandwidth required to ship fill-in information to its target media. The procedure can also occur at the target storage device, sometimes referred to as inline or dorsum-end deduplication.

Duplication [edit]

Sometimes backups are duplicated to a second set of storage media. This tin be done to rearrange the annal files to optimize restore speed, or to have a second copy at a different location or on a dissimilar storage medium—as in the disk-to-disk-to-tape capability of Enterprise client-server backup.

If backup media is unavailable, duplicates on the same device may allow merging files' intact parts using a byte editor in example of data corruption.

Encryption [edit]

High-capacity removable storage media such equally backup tapes present a data security take a chance if they are lost or stolen.[62] Encrypting the data on these media can mitigate this problem, still encryption is a CPU intensive process that tin slow down backup speeds, and the security of the encrypted backups is only equally constructive equally the security of the key direction policy.[61]

Multiplexing [edit]

When there are many more computers to be backed upwards than there are destination storage devices, the ability to use a single storage device with several simultaneous backups can exist useful.[63] Nonetheless cramming the scheduled fill-in window via "multiplexed backup" is only used for record destinations.[63]

Refactoring [edit]

The process of rearranging the sets of backups in an archive file is known as refactoring. For example, if a backup organization uses a unmarried tape each twenty-four hour period to store the incremental backups for all the protected computers, restoring one of the computers could require many tapes. Refactoring could be used to consolidate all the backups for a single computer onto a single tape, creating a "synthetic full fill-in". This is especially useful for backup systems that do incrementals forever mode backups.

Staging [edit]

Sometimes backups are copied to a staging deejay before being copied to tape.[63] This process is sometimes referred to as D2D2T, an acronym for Disk-to-disk-to-tape. It tin can be useful if there is a problem matching the speed of the final destination device with the source device, as is ofttimes faced in network-based backup systems. It can also serve as a centralized location for applying other data manipulation techniques.

Objectives [edit]

  • Recovery point objective (RPO) : The point in time that the restarted infrastructure volition reflect, expressed equally "the maximum targeted menses in which information (transactions) might be lost from an IT service due to a major incident". Essentially, this is the ringlet-dorsum that volition be experienced as a consequence of the recovery. The most desirable RPO would be the point just prior to the information loss event. Making a more than recent recovery point achievable requires increasing the frequency of synchronization between the source data and the fill-in repository.[64]
  • Recovery time objective (RTO) : The amount of fourth dimension elapsed between disaster and restoration of concern functions.[65]
  • Information security : In addition to preserving admission to information for its owners, data must be restricted from unauthorized access. Backups must be performed in a manner that does not compromise the original owner'southward undertaking. This can be achieved with data encryption and proper media handling policies.[66]
  • Information retention menses : Regulations and policy can lead to situations where backups are expected to be retained for a particular flow, but non any farther. Retaining backups after this period tin lead to unwanted liability and sub-optimal use of storage media.[66]
  • Checksum or hash function validation : Applications that back up to tape archive files demand this pick to verify that the data was accurately copied.[67]
  • Backup process monitoring : Enterprise client-server fill-in applications need a user interface that allows administrators to monitor the backup process, and proves compliance to regulatory bodies outside the organisation; for example, an insurance visitor in the Usa might be required under HIPAA to demonstrate that its client data meet records memory requirements.[68]
  • User-initiated backups and restores : To avoid or recover from pocket-sized disasters, such every bit inadvertently deleting or overwriting the "good" versions of i or more files, the computer user—rather than an administrator—may initiate backups and restores (from non necessarily the most-recent backup) of files or folders.

Meet as well [edit]

About backup
  • Backup software & services
    • List of backup software
    • List of online backup services
  • Glossary of backup terms
  • Virtual backup appliance
Related topics
  • Data consistency
  • Data degradation
  • Data portability
  • Data proliferation
  • Database dump
  • Digital preservation
  • Disaster recovery and concern continuity auditing
  • Swiss cheese model

Notes [edit]

  1. ^ In contrast to everyday apply of the term "annal", the data stored in an "archive file" is non necessarily old or of historical interest.
  2. ^ Some backup applications—notably rsync and CrashPlan—term removing fill-in information "pruning" instead of "grooming".

References [edit]

  1. ^ "back•up". The American Heritage Dictionary of the English language Language. Houghton Mifflin Harcourt. 2018. Retrieved ix May 2018.
  2. ^ South. Nelson (2011). "Chapter one: Introduction to Backup and Recovery". Pro Data Backup and Recovery. Apress. pp. 1–16. ISBN978-1-4302-2663-5 . Retrieved viii May 2018.
  3. ^ Heiberger, E.L.; Koop, K. (2003). "Chapter one: What'due south a Disaster Without a Recovery?". The Backup Book: Disaster Recovery from Desktop to Data Centre. Network Frontiers. pp. ane–14. ISBN0-9729039-0-ix.
  4. ^ a b c Joe Kissell (2007). Accept Control of Mac OS Ten Backups (PDF) (Version 2.0 ed.). Ithaca, NY: TidBITS Electronic Publishing. pp. eighteen–20 ("The Archive", meaning data repository, including versioning), 24 (client-server), 82–83 (archive file), 112–114 (Off-site storage fill-in rotation scheme), 126–141 (old Retrospect terminology and GUI—yet used in Windows variant), 165 (customer-server), 128 (subvolume—later renamed Favorite Folder in Macintosh variant). ISBN978-0-9759503-0-2 . Retrieved 17 May 2019.
  5. ^ Terry Sullivan (xi January 2018). "A Beginner'southward Guide to Backing Upward Photos". The New York Times. a difficult drive ... an established company ... alleged bankruptcy ... where many ... had ...
  6. ^ McMahon, Mary (i April 2019). "What Is an Information Repository?". wiseGEEK. Theorize Corporation. Retrieved eight May 2019. In the sense of an approach to information management, an information repository is a secondary storage space for information.
  7. ^ "The iii-ii-1 Backup Dominion – Data Protection Strategy". Official NAKIVO Blog. thirteen Nov 2017.
  8. ^ a b c d e Mayer, Alex (6 November 2017). "Backup Types Explained: Full, Incremental, Differential, Synthetic, and Forever-Incremental". Nakivo Web log. Nakivo. Full Backup, Incremental Fill-in, Differential Backup, Mirror Backup, Reverse Incremental Backup, Continuous Information Protection (CDP), Synthetic Total Backup, Forever-Incremental Backup. Retrieved 17 May 2019.
  9. ^ "Five fundamental questions to inquire about your backup solution". sysgen.ca. 23 March 2014. Does your company have a depression tolerance to longer "data admission outages" and/or would you lot like to minimize the time your company may be without its data?. Archived from the original on 4 March 2016. Retrieved 23 September 2015.
  10. ^ Reed, Jessie (27 February 2018). "What Is Incremental Fill-in?". Nakivo Blog. Nakivo. Reverse incremental, Multilevel incremental, Block-level. Retrieved 17 May 2019.
  11. ^ "Incremental Fill-in". Tech-FAQ. Independent Media. 13 June 2005. Archived from the original on 21 June 2016. Retrieved 10 March 2006.
  12. ^ "Forever incremental backup in Vinchin Backup & Recovery". Vinchin Weblog. Vinchin. 26 Baronial 2021.
  13. ^ Pond, James (31 Baronial 2013). "How Time Machine Works its Magic". Apple tree OSX and Time Auto Tips. baligu.com. File Organisation Event Store,Difficult Links. Retrieved 19 May 2019.
  14. ^ a b Behzad Behtash (half-dozen May 2010). "Why Continuous Data Protection's Getting More Practical". Disaster recovery/business continuity. InformationWeek. Retrieved 12 November 2011. A true CDP approach should capture all data writes, thus continuously backing up data and eliminating backup windows.... CDP is the gold standard—the most comprehensive and advanced information protection. But "near CDP" technologies can evangelize plenty protection for many companies with less complication and cost. For example, snapshots tin provide a reasonable near-CDP-level of protection for file shares, letting users direct admission data on the file share at regular intervals--say, every half-hour or xv minutes. That's certainly a higher level of protection than tape-based or disk-based nightly backups and may be all you need.
  15. ^ a b "Continuous information protection (CDP) explained: True CDP vs almost-CDP". ComputerWeekly.com. TechTarget. July 2010. Retrieved 22 June 2019. ... copies data from a source to a target. Truthful CDP does this every time a change is fabricated, while so-called near-CDP does this at pre-ready fourth dimension intervals. Nigh-CDP is effectively the same as snapshotting....True CDP systems record every write and copy them to the target where all changes are stored in a log. [new paragraph] By contrast, near-CDP/snapshot systems copy files in a straightforward manner only require applications to be quiesced and made fix for fill-in, either via the application's fill-in style or using, for instance, Microsoft'due south Volume Shadow Copy Services (VSS).
  16. ^ Pond, James (31 Baronial 2013). "How Time Machine Works its Magic". Apple tree OSX and Fourth dimension Machine Tips. Baligu.com (as mirrored later James Swimming died in 2013). Retrieved ten July 2019. The File System Event Shop is a subconscious log that OSX keeps on each HFS+ formatted disk/partition of changes fabricated to the data on it. It doesn't list every file that's changed, but each directory (binder) that's had anything changed inside it.
  17. ^ de Guise, P. (2009). Enterprise Systems Backup and Recovery: A Corporate Insurance Policy. CRC Press. pp. 285–287. ISBN978-1-4200-7639-4.
  18. ^ Wu, Victor (4 March 2017). "EMC RecoverPoint for Virtual Car Overview". Victor Virtual. WuChiKin. Retrieved 22 June 2019. The splitter splits out the Write IOs to the VMDK/RDM of a VM and sends a copy to the production VMDK and besides to the RecoverPoint for VMs cluster.
  19. ^ "Zerto or Veeam?". RES-Q Services. March 2017. Retrieved 7 July 2019. Zerto doesn't use snapshot engineering similar Veeam. Instead, Zerto deploys small virtual machines on its physical hosts. These Zerto VMs capture the data as it is written to the host and and so send a copy of that data to the replication site.....Still, Veeam has the advantage of being able to more efficiently capture and shop information for long-term retention needs. There is too a significant pricing difference, with Veeam being cheaper than Zerto.
  20. ^ Gardner, Steve (9 December 2004). "Disk to Disk Backup versus Tape – War or Truce?". Engenio. Peaceful coexistence. Archived from the original on seven February 2005. Retrieved 26 May 2019.
  21. ^ a b c "Digital Information Storage Outlook 2017" (PDF). Spectra. Spectra Logic. 2017. p. seven(Solid-State), ten(Magnetic Disk), 14(Record), 17(Optical). Retrieved eleven July 2018.
  22. ^ a b c Tom Coughlin (29 June 2014). "Keeping Data for a Long Time". Forbes. para. Magnetic Tapes(popular formats, storage life), para. Hard disk Drives(active annal), para. Get-go consider flash memory in archiving(... may non have skilful media archive life). Retrieved 19 April 2018.
  23. ^ a b c d Jacobi, John L. (29 February 2016). "Hard-core information preservation: The best media and methods for archiving your data". PC Globe. sec. External Hard Drives(on the shelf, magnetic backdrop, mechanical stresses, vulnerable to shocks), Tape, Online storage. Retrieved 19 April 2018.
  24. ^ "Ramp Load/Unload Technology in Hd Drives" (PDF). HGST. Western Digital. November 2007. p. 3(sec. Enhanced Stupor Tolerance). Retrieved 29 June 2018.
  25. ^ "Toshiba Portable Hard Drive (Canvio® 3.0)". Toshiba Data Dynamics Singapore. Toshiba Data Dynamics Pte Ltd. 2018. sec. Overview(Internal shock sensor and ramp loading engineering science). Retrieved 16 June 2018.
  26. ^ a b "Iomega Drop Guard ™ Technology" (PDF). Difficult Drive Storage Solutions. Iomega Corp. xx September 2010. pp. two(What is Drop Shock Technology?, What is Drop Guard Applied science? (... features special internal cushioning .... xl% above the industry average)), 3(*NOTE). Retrieved 12 July 2018.
  27. ^ a b John Burek (15 May 2018). "The Best Rugged Hard Drives and SSDs". PC Magazine. Ziff Davis. What Exactly Makes a Drive Rugged?(When a drive is encased ... you're mostly at the mercy of the drive vendor to tell y'all the rated maximum drib distance for the drive). Retrieved 4 August 2018.
  28. ^ Justin Krajeski; Kimber Streams (twenty March 2017). "The All-time Portable Difficult Bulldoze". The New York Times. Archived from the original on 31 March 2017. Retrieved four August 2018.
  29. ^ "All-time Long-Term Information Archive Solutions". Fe Mount. Iron Mountain Inc. 2018. sec. More Reliable(average mean time between failure ... rates, best practice for migrating information). Retrieved 19 April 2018.
  30. ^ Kissell, Joe (2011). Take Command of Backing Upwards Your Mac. Ithaca NY: TidBITS Publishing Inc. p. 41(Deduplication). ISBN978-i-61542-394-ane . Retrieved 17 September 2019.
  31. ^ "Symantec Shows Fill-in Exec a Little Dedupe Honey; Lays out Source Side Deduplication Roadmap – DCIG". DCIG. Archived from the original on four March 2016. Retrieved 26 February 2016.
  32. ^ "Veritas NetBackup™ Deduplication Guide". Veritas. Veritas Technologies LLC. 2016. Retrieved 26 July 2018.
  33. ^ S. Wan; Q. Cao; C. Xie (2014). "Optical storage: An emerging option in long-term digital preservation". Frontiers of Optoelectronics. 7 (4): 486–492. doi:10.1007/s12200-014-0442-2. S2CID 60816607.
  34. ^ Q. Zhang; Z. Xia; Y.-B. Cheng; 1000. Gu (2018). "Loftier-capacity optical long data retentiveness based on enhanced Young's modulus in nanoplasmonic hybrid glass composites". Nature Communications. 9 (1): 1183. Bibcode:2018NatCo...9.1183Z. doi:10.1038/s41467-018-03589-y. PMC5864957. PMID 29568055.
  35. ^ BÀrwaldt, Erik (2014). "Total Command » Linux Mag". Linux Mag.
  36. ^ "five. Conditions That Affect CDs and DVDs • CLIR". CLIR.
  37. ^ Gérard Poirier; Foued Berahou (3 March 2008). "Periodical de 20 Heures". Institut national de l'audiovisuel. approximately minute 30 of the Telly news broadcast. Retrieved iii March 2008.
  38. ^ "Archival Golden CD-R "300 Year Disc" Binder of 10 Discs with Scratch Armor Surface". Delkin Devices. Delkin Devices Inc. Archived from the original on 27 September 2013.
  39. ^ "Optical Disc Archive Generation two" (PDF). Optical Disc Archive. Sony. Apr 2016. p. 12(World'southward Get-go 8-Channel Optical Drive Unit). Retrieved 15 August 2019.
  40. ^ R. Micheloni; P. Olivo (2017). "Solid-State Drives (SSDs)". Proceedings of the IEEE. 105 (9): 1586–88. doi:10.1109/JPROC.2017.2727228.
  41. ^ "Remote Backup". EMC Glossary. Dell, Inc. Retrieved 8 May 2018. Effective remote backup requires that production data exist regularly backed up to a location far plenty away from the primary location so that both locations would not exist afflicted past the same disruptive consequence.
  42. ^ Stackpole, B.; Hanrion, P. (2007). Software Deployment, Updating, and Patching. CRC Press. pp. 164–165. ISBN978-1-4200-1329-0 . Retrieved 8 May 2018.
  43. ^ Gnanasundaram, S.; Shrivastava, A., eds. (2012). Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments. John Wiley and Sons. p. 255. ISBN978-1-118-23696-3 . Retrieved viii May 2018.
  44. ^ Lee (25 January 2017). "What to backup – a critical await at your data". Irontree Blog. Irontree Cyberspace Services CC. Retrieved viii May 2018.
  45. ^ Preston, W.C. (2007). Fill-in & Recovery: Inexpensive Backup Solutions for Open up Systems. O'Reilly Media, Inc. pp. 111–114. ISBN978-0-596-55504-7 . Retrieved eight May 2018.
  46. ^ Preston, Due west.C. (1999). Unix Fill-in & Recovery . O'Reilly Media, Inc. pp. 73–91. ISBN978-1-56592-642-4 . Retrieved 8 May 2018.
  47. ^ "NILFS Home". NILFS Continuous Snapshotting System. NILFS Community. 2019. Retrieved 22 Baronial 2019.
  48. ^ a b Cougias, D.J.; Heiberger, E.50.; Koop, Yard. (2003). "Affiliate 11: Open file backup for databases". The Backup Book: Disaster Recovery from Desktop to Information Center. Network Frontiers. pp. 356–360. ISBN0-9729039-0-9.
  49. ^ Liotine, Chiliad. (2003). Mission-disquisitional Network Planning. Artech Business firm. p. 244. ISBN978-1-58053-559-five . Retrieved eight May 2018.
  50. ^ de Guise, P. (2009). Enterprise Systems Backup and Recovery: A Corporate Insurance Policy. CRC Press. pp. 50–54. ISBN978-one-4200-7639-4.
  51. ^ "Open File Backup Software for Windows". Handy Backup. Novosoft LLC. 8 November 2018. Retrieved 29 November 2018.
  52. ^ Reitshamer, Stefan (five July 2017). "Troubleshooting backing up open/locked files on Windows". Arq Blog. Haystack Software. Stefan Reitshamer is the principal programmer of Arq. Retrieved 29 November 2018.
  53. ^ Dominate, Nina (10 December 1997). "Oracle Tips Session #3: Oracle Backups". world wide web.wisc.edu. University of Wisconsin. Archived from the original on 2 March 2007. Retrieved 1 December 2018.
  54. ^ "What is Archive-LOG and NO-Annal-LOG manner in Oracle and the advantages & disadvantages of these modes?". Arcserve Backup. Arcserve. 27 September 2018. Retrieved 29 November 2018.
  55. ^ Grešovnik, Igor (Apr 2016). "Preparation of Bootable Media and Images". Archived from the original on 25 April 2016. Retrieved 21 Apr 2016.
  56. ^ "rsync(one) - Linux man folio". linux.die.net.
  57. ^ "Annal maintenance". Code42 Support. 22 July 2015.
  58. ^ Pond, James (ii June 2012). "12. Should I delete old backups? If so, How?". Time Car. baligu.com. Light-green box, Gray box. Retrieved 21 June 2019.
  59. ^ Kissell, Joe (12 March 2019). "The Best Online Cloud Backup Service". wirecutter. The New York Times. Next, in that location's file memory. Retrieved 21 June 2019.
  60. ^ a b c D. Ruddy (2015). Securing SQL Server: Protecting Your Database from Attackers. Syngress. pp. 306–308. ISBN978-0-12-801375-v . Retrieved 8 May 2018.
  61. ^ Backups tapes a backdoor for identity thieves Archived 5 April 2016 at the Wayback Automobile (28 April 2004). Retrieved 10 March 2007
  62. ^ a b c Preston, W.C. (2007). Backup & Recovery: Inexpensive Fill-in Solutions for Open Systems. O'Reilly Media, Inc. pp. 219–220. ISBN978-0-596-55504-7 . Retrieved 8 May 2018.
  63. ^ "Recovery Bespeak Objective (Definition)". ARL Risky Thinking. Albion Enquiry Ltd. 2007. Retrieved 4 August 2019.
  64. ^ "Recovery Time Objective (Definition)". ARL Risky Thinking. Albion Enquiry Ltd. 2007. Retrieved 4 Baronial 2019.
  65. ^ a b Little, D.B. (2003). "Chapter two: Concern Requirements of Backup Systems". Implementing Backup and Recovery: The Readiness Guide for the Enterprise. John Wiley and Sons. pp. 17–thirty. ISBN978-0-471-48081-5 . Retrieved eight May 2018.
  66. ^ "How do the "verify" and "write checksums to media" processes work and why are they necessary?". Veritas Support. Veritas.com. 15 October 2015. Write checksums to media. Retrieved xvi September 2019.
  67. ^ HIPAA Informational Archived 11 April 2007 at the Wayback Machine. Retrieved 10 March 2007

External links [edit]

sabalapereplou.blogspot.com

Source: https://en.wikipedia.org/wiki/Backup

0 Response to "what is the title of the page where data to be included in the backup is selected?"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel