A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Alternate Client Restore
The process of restoring files to a different client than the one from which they were backed up.
Alternate Path Restore
The process of restoring files to a different directory than the one from which they were backed up.
Archiving
Archiving is the process of moving information that is not being actively used to a separate location. This information can be retrieved at a later time and it is not a duplicate copy of the data.
Archiving Data
Data archiving is the process of moving data that is not being actively used to a separate data storage device or location for future reference. Data archives consist of older data that is still important and necessary for future reference, as well as data that must be retained for regulatory compliance. Data archives can be searched and are usually indexed so that the data in the files can be easily located and retrieved. Data archives are often confused with data backups, which are copies of data records. Data backups are used to restore data in case it is corrupted or destroyed. In contrast, data archives protect older information that is not needed for everyday operations but may occasionally need to be accessed.
Archiving Email
Archiving Email is a systematic approach to saving and protecting the data contained in e-mail messages so it can be accessed quickly at a later date. In the past, companies often relied on end-users to maintain their own individual e-mail archives but because of the lower cost of storage and regulatory concerns, companies usually take responsibility to back up emails.
AS/400
AS/400 (A-S four hundred) is an IBM computing platform. The AS/400 was first used in 1988 and continues to be in operation at many companies. AS/400 systems operate on a complex system of files and file structure. Cloudfirst offers AS/400 Hosting Services through our Cloudfirst VR solution. Visit our IBM AS/400 Cloud for more information about our AS/400 solutions.
Automatic Backup
A Backup triggered by an event (e.g., a schedule point, or a threshold reached) rather than by human action.
Availability
The amount of time that a system is available during those time periods when it is expected to be available, often measured as a percentage of an elapsed year. For example, 99.95% availability equates to 4.38 hours of downtime in a year (0.0005 * 365 * 24 = 4.38) for a system that is expected to be available all the time.
Backup Software
Backup Software backs up data; supplementary copies of files, databases or entire computers. These programs may later use the supplementary copies to restore the original contents in the event of data loss.
Backup and Recovery
Backup and Recovery refers to the various strategies and procedures involved in protecting your database against data loss and reconstructing the database after any kind of data loss.
Backup and Restore
Backup and Restore (formerly Windows Backup and Restore Center) is a component of Microsoft Windows introduced in Windows Vista and included in later versions that allows users to create backup. It is a replacement of NTBackup, which was included in previous Windows versions.
Backup Exec
Backup Exec is proprietary backup software currently developed by Symantec. Backup Exec has a long history of being sold from one company to another. Its earliest roots stretch back to the early 1980s when Maynard Electronics created a bundle of software drivers to help sell their tape drive products.[1] Today, Backup Exec is a data protection solution that provides continuous disk-to-disk-to-tape backup and recovery. Continuous protection is now available for Microsoft Exchange and SQL Server in addition to file servers and workstations, eliminating daily backups and providing point-in-time recovery.
Backups
Abackup or the process of backing up is making copies of data which may be used to restore the original after a data loss event. The verb form is back up in two words, whereas the noun is backup.
Backup Lifecycle Management
Data Lifecycle Management (DLM), a component of Information Lifecycle Management (ILM), defines the DLM concept where data is created on one storage system, then migrated to less expensive storage systems as it ages.
Business Continuity
Business Continuity is the essential activity performed by an organization to ensure that critical business functions will be available all users. Business continuity is not something implemented in the event of a man-made or natural disaster (that is disaster recovery); business continuity refers to those activities performed daily to maintain service, consistency, and recoverability in the event of a disaster. Visit Cloudfirst’s business continuity resources page for how Cloudfirst can help you put a business continuity plan in place.
Business Continuity Management
Business continuity management is a management process that identifies potential impacts that threaten an organization and provides a framework for building resilience and the capability for an effective response which safeguards the interests of its key stakeholders, reputation, brand and value creating activities. Visit Cloudfirst’s business continuity services page for how Cloudfirst can help you put a business continuity plan in place.
Business Continuity Planning
Business Continuity Planning (BCP) is “planning which identifies the organization’s exposure to internal and external threats and synthesizes hard and soft assets to provide effective prevention and recovery for the organization, whilst maintaining competitive advantage and value system integrity”. It is also called Business Continuity & Resiliency Planning (BCRP). The logistical plan used in BCRP is called a business continuity plan. The intended effect of BCP is to ensure business continuity, which is an ongoing state or methodology governing how business is conducted. Cloudfirst can assist with any disaster by helping to protect your company reputation, access to your company data, operation of your telephone and email systems, and getting back to normal after disaster strikes. Visit Cloudfirst’s resource page on business continuity for more information.
Cloud Backup
A cloud backup moves data to an external server outside your home or office. See remote backup service. Visit Cloudfirst’s Backup page for more information about our cloud backup and recovery solutions.
Cloud Backup and Recovery
Cloud backup and recovery solutions relieve users from the need to manage backup tapes at their production sites and help them eliminate tape-based restores as their primary method of data recovery. Visit Cloudfirst’s Recovery page for more information about our cloud backup and recovery solutions.
Cloud Computing
Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). Visit Cloudfirst’s Hosting page for more information about our cloud computing solutions.
Cloud Infrastructure
A set of data processing components that can be automatically provisioned by consumers, accessed over a network and that provide secure multi-tenancy. .
Cloud Storage
Cloud storage is a storage solution for the Internet. A Cloud Storage Service Provider will have a cluster of highly scalable servers with a simple web services interface that can be used to store and retrieve any amount of data, at any time, from anywhere on the web. In simple terms, Cloud Storage, from an end user perspective is nothing but an unlimited amount of online disk space that is secure; usually available to store, backup and restores data. Cloudfirst offers a cloud storage solution called Cloudfirst Cloud, a fully managed service, offering “Capacity on Demand” for IBM Power Systems (AS400/IBM i, AIX) and Windows based applications. This infrastructure as a service (IaaS) offering is a secure and reliable solution for any enterprise.
Continuous Data Protection (CDP)
A class of mechanisms that continuously capture or track data modifications enabling recovery to previous points in time.
Data Archiving
Data archiving is the process of moving information that is not being actively used to a separate data storage device or location for future reference. Data archives consist of older data that is still important and necessary for future reference, as well as data that must be retained for regulatory compliance. Data archives can be searched and are usually indexed so that the data in the files can be easily located and retrieved. Data archives are often confused with data backups, which are copies of data records. Data backups are used to restore data in case it is corrupted or destroyed. In contrast, data archives protect older information that is not needed for everyday operations but may occasionally need to be accessed.
Data Backup
A data backup is a copy of the data which may be used to restore the original after a data loss event. The verb form is back up in two words, whereas the noun is backup.
Data Center
Known as the server farm or the computer room, the data center is where the majority of an enterprise servers and storage are located, operated and managed.
Data Deduplication
The replacement of multiple copies of data at variable levels of granularity with references to a shared copy in order to save storage space and/or bandwidth.
Data In Motion
Data being transferred from one location to another.
Data Integrity
The property that data has not been altered or destroyed in an unauthorized manner.
Data Lifecycle Management (DLM)
The policies, processes, practices, services and tools used to align the business value of data with the most appropriate and cost-effective storage infrastructure from the time data is created through its final disposition.
Data Protection
Data protection is the use of techniques such as file locking and record locking, database shadowing, disk mirroring, to ensure the availability and integrity of the data.
Data Recovery
Data recovery is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external hard disk drives, solid state drives (SSD), USB flash, storage tapes, CDs, DVDs, RAID, and other electronics. Recovery may be required due to physical damage to the storage device or logical damage to the file system that prevents it from being mounted by the host operating system. For more information about data recovery, please visit Cloudfirst’s data recovery solutions page.
Data Recovery Program
Data recovery program is a quick, effective, and easy to use software with extremely attractive graphical user interface (GUI) for restoring lost or deleted partitions, files, and folders.
Data Replication
Data replication is a set of data copied from a data site and placed at another data site during data replication. It is also a set of data characteristics from a single data subject or data occurrence group that is copied from the official data source and placed at another data site. Data Replicates are not the same as redundant data.
Data Security
Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. Data security is part of the larger practice of Information security.
Data Storage
Data storage is a permanent storehouse of data. Data storage is often used to lump the storage of all types of data structures (files, spreadsheets, databases, documents, etc.) into one generic category.
Data Storage as a Service
Delivery over a network of appropriately configured virtual storage and related data services, based on a request for a given service level. Typically, DaaS hides limits to scalability, is either self-provisioned or provision-less and is billed based on consumption.
Data Store
A data store is a data repository of a set of integrated objects. These objects are modeled using classes defined in database schemas. Data store includes not only data repositories like databases, it is a more general concept that includes also flat files that can store data.
Data Warehouse
A data warehouse (DW) is a database used for reporting and analysis. The data stored in the warehouse is uploaded from the operational systems. The data may pass through an operational data store for additional operations before it is used in the DW for reporting.
Differential Incremental Backup
A backup in which data objects modified since the last full backup or incremental backup are copied. To restore data when differential incremental backups are in use, the newest full backup and all differential backups newer than the newest full backup are required.
Digital Archive
A storage repository or service used to secure, retain, and protect digital information and data for periods of time less than that of long-term data retention.
Disaster Recovery
Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. Disaster recovery is a subset of business continuity. While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the restoring of IT or technology systems that support business functions. Visit our disaster recovery resources page for more information about disaster recovery.
Disaster Recovery Plan
A disaster recovery plan (DRP) – sometimes referred to as a business continuity plan (BCP) or business process contingency plan (BPCP) – describes how an organization is to deal with potential disasters. Just as a disaster is an event that makes the continuation of normal functions impossible, a disaster recovery plan consists of the precautions taken so that the effects of a disaster will be minimized and the organization will be able to either maintain or quickly resume mission-critical functions. Visit our disaster recovery resources page for more information about disaster recovery.
Disaster Recovery Plan Template
A disaster recovery plan template helps facilitate the initiation and completion of an IT DR plan. Visit our disaster recovery resources page for more information about disaster recovery.
Effective Capacity
The amount of data storage system, plus the amount of unsued formatted capacity in that system.
Email Archiving
E-mail archiving is a systematic approach to saving and protecting the data contained in e-mail messages so it can be accessed quickly at a later date.
Encryption
Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. The receiver of the encrypted text uses a “key” to decrypt the message, returning it to its original plain text form. The key is the trigger mechanism to the algorithm.
ezAvailability
ezAvailability is an IBM System i( iSeries, AS/400) High Availability service that provides full management of a customer’s HA environment. We replicate/mirror systems and data from the client’s production facility to our data centers, where we have an installed base of IBM AS/400 units, or the client may have their own HA units (which we would manage). Visit Cloudfirst’s High Availability (HA) page for more information.
ezHost
ezHost is a fully managed service, offering “Capacity on Demand” for IBM Power Systems (AS400/IBM i, AIX) and Windows based applications. This infrastructure as a service (IaaS) offering is a secure and reliable solution for any enterprise. Visit Cloudfirst’s Cloud Hosting page for more information.
ezRecovery
ezRecovery is a Cloudfirst Solution. ezRecovery is only part of a comprehensive disaster recovery plan. ezRecovery that ensures business continuity is one that fully protects your IT infrastructure and ensures access to business critical data and applications in the event of downtime or disaster. With today’s technology advances, comprehensive disaster recovery is easy and affordable for any-sized business. Cloudfirst is leading the way, with our high availability, data recovery and virtual recovery managed services that are best in class and budget friendly. Visit Cloudfirst’s ezRecovery page for more information.
E-Discovery
E-Discovery is a Cloudfirst network discovery solution. Those looking for a backup consolidation solution to manage the backup at their remote office/branch office (ROBO) locations are advised to begin with a network E-Discovery that provides a clear view of their data at a ROBO environment by scanning and analyzing files on the LAN. Visit our E-Discovery solution page to learn more about network discovery solution.
File Backup
File backup is the process of making a copy of data files to protect the information in case the data is compromised because of a system crash, accidental deletion or become corrupted. Backups are typically the last line of defense against data loss.
File Recovery
File recovery is the process of retrieving data after it has been removed from the storage device through deletion, corruption, or even formatting. Often data can be restored back to its original state.
Full Backup
A backup in which all of a defined set of data objects are copied, regardless of whether they have been modified since the last backup..
No terms at this time
High Availability
High availability is a system design approach and associated service implementation that ensures a prearranged level of operational performance will be met during a contractual measurement period. Cloudfirst offers Cloudfirst/HA, a 15 minute access to your data in the event of a service interruption. Visit Cloudfirst’s High Availability (HA) page for more information about high availability.
High Availability Solutions
A high-availability solution masks the effects of a hardware or software failure and maintains the availability of applications so that the perceived downtime for users is minimized. Visit Cloudfirst’s High Availability (HA) page for more information about high availability solutions.
HIPAA Compliance
HIPAA (Health Insurance Portability and Accountability Act of 1996) is the defining authority on how the healthcare industry handles patient-related information. This includes regulations regarding various messaging systems used for transmitting and storing patient health information. Visit HIPAA page for more information.
Hot Site
A hot site is a duplicate of the original site of the business, with full computer systems as well as near-complete backups of user data. Following a disaster, the hot site enables business to relocate with minimal losses to normal operations. Ideally, a hot site will be up and running within a matter of hours.
Hybrid Cloud
By using a Hybrid approach, companies can maintain control of an internally managed private cloud while relying on the public cloud as needed. For instance during peak periods individual applications, or portions of applications can be migrated to the Public Cloud.
IaaS (Infrastructure as a Service)
Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking components. The service provider owns the equipment and is responsible for housing, running and maintaining it. The client typically pays on a per-use basis.
IBM
IBM is a technology and consulting firm headquartered in Armonk, New York. IBM manufactures and sells computer hardware and software, and it offers infrastructure, hosting and consulting services. CloudFirst is an IBM Business Partner.
IBM Power Systems
IBM Power Systems provide servers and software that are the foundation for an enterprise infrastructure that can help businesses manage rapid change, reduce business risk, and meet higher service levels – all in the most cost-effective manner.
Information Security
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
Infrastructure as a Service (IaaS)
Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking components. The service provider owns the equipment and is responsible for housing, running and maintaining it. The client typically pays on a per-use basis.
Internet Security
Internet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing.
iSeries
iSeries is IBM’s midrange server line, designed for small businesses and departments in large enterprises. It was later branded as IBM i. Cloudfirst offers IBM iSeries cloud hosting.
Local Backup
A backup methodology that utilizes host resources to copy data to a backup location that is under control of the same host.
Managed Services Provider (MSP)
Managed services is the practice of transferring day-to-day related management responsibility as a strategic method for improved effective and efficient operations inclusive of Production Support and lifecycle build/maintenance activities.
Network Security
Network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources.
Offsite Backup
A customer-focused, business-oriented data backup and recovery solution that is effortless and worry-free to manage.
Online Backup
Online backup, also known as remote backup, is a method of offsite data storage in which files, folders, or the entire contents of a hard drive are regularly backed up on a remote server or computer with a network connection. Visit Cloudfirst’s Online Backup resource page for more information about our online backup solutions.
Online Storage
Online storage services can keep your files from being vulnerable to damage, lost and impossible to access unless from only your computer.
Power HA
IBM Power HA System Mirror represents a new name for the IBM High Availability Cluster Multiprocessing (HACMP) product.
Power Systems
Power Systems is an IBM servers and software solution which is a foundation for an enterprise infrastructure that can help businesses manage rapid change, reduce business risk, and meet higher service levels – all in the most cost-effective manner.
Precisely
Precisely. is the world’s leading provider of high availability and disaster recovery software for Windows, Linux and IBM Power Systems. Precisely’s HA & DR support business continuity, satisfy compliance requirements and increase productivity.
Private Cloud
Private clouds are data center architectures owned by a single company that provides flexibility, scalability, provisioning, automation and monitoring. The goal of a private cloud is not sell “as-a-service” offerings to external customers but instead to gain the benefits of cloud architecture without giving up the control of maintaining your own data center.
Public Cloud
A public cloud is basically the internet. Service providers use the internet to make resources, such as applications (also known as Software-as-a-service) and storage, available to the general public, or on a ‘public cloud.
No terms at this time
Recovery Point Objective (RPO)
The maximum acceptable time period prior to a failure or disaster during which changes to data may be lost as a consequence of recovery. Data changes preceding the failure or disaster by at least this time period are preserved by recovery. Zero is a valid value and is equivalent to a “zero data loss” requirement.
Recovery Time Objective (RTO)
The maximum acceptable time period required to bring one or more applications and associated data back from an outage to a correct operational state.
Remote Backup Services
A remote, online, or managed backup service is a service that provides users with a system for the backup and storage of computer files. Online backup systems are typically built around a client software program that runs on a schedule, typically once a day, and usually at night while computers aren’t in use. This program typically collects, compresses, encrypts, and transfers the data to the remote backup service provider’s servers or off-site hardware.
Remote Recovery
Remote Recovery recovers lost data, including deleted files, damaged or deleted partition, format, Fdisk, corrupt or missing operating system files, corrupt files, missing partitions etc.
Replication
Replication is the process of sharing information so as to ensure consistency between redundant resources, such as software or hardware components, to improve reliability, fault-tolerance, or accessibility. It could be data replication if the same data is stored on multiple storage devices, or computation replication if the same computing task is executed many times.
Replication Services
Replication services are for distributing shared files and Group Policy Objects. It replaced the (Windows NT) LAN Manager Replication service, and has been partially replaced by Distributed File System Replication.
Saas (Software as a Service)
Software as a Service (SaaS, typically pronounced [sæs]), sometimes referred to as “on-demand software,” is a software delivery model in which software and its associated data are hosted centrally (typically in the (Internet) cloud) and are typically accessed by users using a thin client, normally using a web browser over the Internet. See Software as a Service.
Sample Disaster Recovery Plan
A sample disaster recovery plan is provided to generate ideas for the creation of an organization’s plan. It is not intended to be a complete work. Plans can be developed using many different formats this represents just one. Additionally, not every recovery function is represented and not every plan component is presented.
Software as a Service (Saas)
Software as a Service (SaaS, typically pronounced [sæs]), sometimes referred to as “on-demand software,” is a software delivery model in which software and its associated data are hosted centrally (typically in the (Internet) cloud) and are typically accessed by users using a thin client, normally using a web browser over the Internet. See Software as a Service.
SAN replication
SANs are primarily used to make storage devices, such as disk arrays, tape libraries, and optical jukeboxes, accessible to servers so that the devices appear like locally attached devices to the operating system.
Secure Offsite Backup
Provides an automatic way for you to backup your important and sensitive information safely and above all securely.
Security Software
Security software is a generic term referring to any computer program or library whose purpose is to (help) secure a computer system or computer network.
Software Backup
Software that performs data backups.
SQL Replication
SQL Replication term describes a group of technologies allowing information distribution and mirroring between different databases.
Storage Data
Refers to anything with information recorded on it. Using this broad definition, a hardback volume of an encyclopedia, an audio cassette of a pop song, and even a piece of paper with random words written on it would all be considered examples of datastorage. The most popular definition of the term limits it to only the storage of information on computers and similar devices.
Tape Transport
A storage device that writes data sequentially in the order in which it is delivered, and reads data in the order in which it is stored on the media. Unlike disks, tapes use implicit data addressing.
Uptime
Uptime is a measure of the time a machine has been up without any downtime.
Virtual Data Storage
Virtual data storage technology provides a better way to manage storage resources for a virtual infrastructure.
Virtual Hosting and Standby (DR)
Virtual Hosting and Standby (DR) is a Data Storage Corporation virtual hosting solution. Virtual Hosting and Standby DR solution provides all essential virtual components you need to scale from 1 to 100 virtual machines. This provides all the benefits of private cloud computing in a simple, affordable package. This solution lets you define the processor, memory and storage resources you need to create a dedicated pool of virtual machines (VMs). The package includes firewall and network resources, and resides on a best-in-class infrastructure provided by six high-availability datacenters in North America and Europe. Visit our Virtual Hosting and Standby (DR) solution page for more information about our virtual hosting solution.
Virtual Storage
The storage seen by clients when storage virtualization is used.
No terms at this time
No terms at this time
No terms at this time
No terms at this time