Submitted Successfully!
To reward your contribution, here is a gift for you: A free trial for our video production service.
Thank you for your contribution! You can also upload a video entry or images related to this topic.
Version Summary Created by Modification Content Size Created at Operation
1 handwiki -- 2547 2022-10-13 01:35:57

Video Upload Options

We provide professional Video Production Services to translate complex research into visually appealing presentations. Would you like to try it?

Confirm

Are you sure to Delete?
Cite
If you have any further questions, please contact Encyclopedia Editorial Office.
HandWiki. Enterprise Client-server Backup. Encyclopedia. Available online: https://encyclopedia.pub/entry/29246 (accessed on 19 November 2024).
HandWiki. Enterprise Client-server Backup. Encyclopedia. Available at: https://encyclopedia.pub/entry/29246. Accessed November 19, 2024.
HandWiki. "Enterprise Client-server Backup" Encyclopedia, https://encyclopedia.pub/entry/29246 (accessed November 19, 2024).
HandWiki. (2022, October 14). Enterprise Client-server Backup. In Encyclopedia. https://encyclopedia.pub/entry/29246
HandWiki. "Enterprise Client-server Backup." Encyclopedia. Web. 14 October, 2022.
Enterprise Client-server Backup
Edit

Enterprise client-server" backup software describes a class of software applications that back up data from a variety of client computers centrally to one or more server computers, with the particular needs of enterprises in mind. They may employ a scripted client–server backup model with a backup server program running on one computer, and with small-footprint client programs (referred to as "agents" in some applications) running on the other computer(s) being backed up—or alternatively as another process on the same computer as the backup server program. Enterprise-specific requirements include the need to back up large amounts of data on a systematic basis, to adhere to legal requirements for the maintenance and archiving of files and data, and to satisfy short-recovery-time objectives. To satisfy these requirements (which World Backup Day (31 March) highlights), it is typical for an enterprise to appoint a backup administrator—who is a part of office administration rather than of the IT staff and whose role is "being the keeper of the data". In a client-server backup application, the server program initiates the backup activity by the client program. This is distinct from a "personal" backup application such as Apple's Time Machine, in which "Time Machine runs on each Mac, independently of any other Macs, whether they're backing up to the same destination or a different one." If the backup server and client programs are running on separate computers, they are connected in either a single platform or a mixed platform network. The client-server backup model was originated when magnetic tape was the only financially-feasible storage medium for doing backups of multiple computers onto a single archive file;[note 1][note 2] because magnetic tape is a sequential access medium, it was imperative (barring "multiplexed backup") that the client computers be backed up one at a time—as initiated by the backup server program. What is described in the preceding paragraph is the "two-tier" configuration (in one application's diagram, the second-tier backup server program is named "server" preceded by the name of the application, and first-tier "agents" are backing up interactive server applications). That configuration controls the backup server program via either an integrated GUI or a separate Administration Console. In some client-server backup applications, a "three-tier" configuration splits off the backup and restore functions of the server program to run on what are called media servers—computers to which devices containing archive files are attached either locally or as Network-attached storage (NAS). In those applications, the decision on which media server a script is to run on is controlled using another program called either a master server or an optional central admin. server.

software applications media server legal requirements

1. Performance

The steady improvement in hard disk drive price per byte has made feasible a disk-to-disk-to-tape strategy, combining the speed of disk backup and restore with the capacity and low cost of tape for offsite archival and disaster recovery purposes.[1] This, with file system technology, has led to features suited to optimization such as:

Improved disk-to-disk-to-tape capabilities
Enable automated transfers to tape for safe offsite storage of disk archive files that were created for fast onsite restores.[2][3][4]
Create synthetic full backups
For example, onto tapes from existing disk archive files—by copying multiple backups of the same source(s) from one archive file to another. The second archive file is typically created in part to satisfy legal retention requirements, and may intentionally omit some backups—either because there is no need to retain them or because retaining them would violate regulations such as the European GDPR Right to erasure. Therefore one application can exclude[5] files and folders from the synthetic full backup.[6] This is termed a "synthetic full backup" because, after the transfer, the destination archive file contains the same data it would after a full backup of the non-excluded data.[2][7][8]
Automated data grooming
Frees up space on disk archive files by removing out-of-date backup data—usually based on an administrator-defined retention period.[1][2][9][10][11][12][13] One method of removing data is to keep the last backup of each day/week/month for the last respective week/month/specified-number-of-months, permitting compliance with regulatory requirements.[14] One application has a "performance-optimized grooming" mode that only removes outdated information from an archive file that it can quickly delete.[15] This is the only mode of grooming allowed for cloud archive files and is also up to 5 times as fast when used on locally stored disk archive files. The "storage-optimized grooming" mode reclaims more space because it rewrites the archive file and in this application also permits exclusion compliance with the GDPR "right of erasure"[16] via rules[5]—that can instead be used for another type of filtering.[17]
Multithreaded backup server
Capable of simultaneously performing multiple backup (first paragraph of that article says it's one un-hyphenated word), restore, and copy operations in separate "activity threads" (once needed only by those who could afford multiple tape drives).[18][19][20] In one application, all the categories of information for a particular "backup server" are stored by it; when an "Administration Console" process is started, its process synchronizes information with all running LAN/WAN backup servers.[21]
Block-level incremental backup
The ability to back up only the blocks of a file that have changed, a refinement of incremental backup that saves space[22][23][24] and may save time.[18][25] Such partial file copying is especially applicable to a database.
"Instant" scanning of source volumes
Uses the USN Journal on Windows NTFS and FSEvents on macOS (for non-APFS source volumes only) to reduce the time of the scanning phase[16] on both incremental backups, thus fitting more sources into the scheduled backup window,[18][26][27] and on restores.[28]
Cramming or evading the scheduled backup window
Some applications have the "multiplexed backup" capability of cramming the scheduled backup window by sending data from multiple clients to a single tape drive simultaneously;[29] "This is useful for low-end clients with slow throughput ... [that] cannot send data fast enough to keep the tape drive busy .... will reduce the performance of restores."[19] Another application allows an enterprise that has computers transiently connecting to the network over a long workday to evade the scheduled window by using Proactive scripts.

2. Source File Integrity

Backing up interactive applications via pausing
Interactive applications can be protected by having their services paused while their live data is being backed up, and then unpaused.[30] Alternatively, the backup application can back up a snapshot initiated at a natural pause.[6][16] Some enterprise backup applications accomplish pausing and unpausing of services via built-in provisions—for many specific databases and other interactive applications—that become automatically part of the backup software's script execution; these provisions may be purchased separately.[6][31][32] However, another application has also added "script hooks" that enable the optional automatic execution—at specific events during runs of a GUI-coded backup script—of portions of an external script containing commands pre-written in a standard scripting language.[16] For some databases—such as MongoDB and MySQL—that can be run on filesystems that do not support snapshots, the external script can pause writing during backup.[16] Since the external script is provided by an installation's backup administrator, its code activated by the "script hooks" may accomplish not only data protection—via pausing/unpausing interactive services—[16]but also integration with monitoring systems.[33]
Backing up interactive applications via coordinated snapshots
Some interactive applications such as databases must have all portions of their component files coordinated while their live data is being backed up. One database system—PostgreSQL—can do this via its own "snapshotting" MVCC running on filesystems that do not support snapshots, and can—therefore—be backed up without pausing using an external script containing commands that use "script hooks".[16] Another equivalent approach is to use some filesystems' capability of taking a snapshot and to back up the snapshot without pausing the application itself. An enterprise backup application using filesystem snapshotting can be used either to back up all user applications running on a virtual machine[34][35] or to back up a particular interactive application that directly uses its filesystem's snapshot capability.[6] Conceptually this approach can still be considered client-server backup; the snapshotting capability by itself constitutes the client, and the backup server runs as a separate process that initiates (second paragraph) and then reads the snapshot on the machine that generated it. The software installed on each machine to be backed up is referred to as an "agent"; if "agents" are being used to back up all user applications running on a virtual machine, one or more such "agents" are controlled by a console.[35][36]
Backing up interactive applications via true Continuous Data Protection
Continuous Data Protection (CDP), also called continuous backup was patented by British entrepreneur Pete Malcolm in 1989, "a backup system in which a copy [editor's emphasis] of every change made to a storage medium is recorded as the change occurs [editor's emphasis]".[37] In an ideal case of continuous data protection, the recovery point objective—"the maximum targeted period in which data (transactions) might be lost from an IT service due to a major incident"—is zero, even though the recovery time objective—"the targeted duration of time and a service level within which a business process must be restored after a disaster (or disruption) in order to avoid unacceptable consequences associated with a break in business continuity"—is not zero.[38] An example of a period in which data transactions might be lost is a major discount chain having card readers at its checkout counters shut down at multiple locations for close to two hours in the month of June 2019.
Because it allows restoring data to any point in time, "[true] CDP is the gold standard—the most comprehensive and advanced data protection. But 'near CDP' technologies can deliver enough protection for many companies with less complexity and cost."[39] Because "near-CDP does this [copying] at pre-set time intervals",[40] it is essentially incremental backup initiated by a timer instead of a script.
True CDP differs from RAID, replication, or mirroring by enabling rollback to any point in time. However, because true CDP "backup write operations are executed at the level of the basic input/output system (BIOS) of the microcomputer in such a manner that normal use of the computer is unaffected",[37] true CDP backup must in practice be run in conjunction with a virtual machine[41][42] or equivalent[43]—ruling it out for ordinary personal backup applications.
True CDP uses journaling. It intent-logs every change on the host system,[40] often by saving byte or block-level differences rather than file-level differences.[44][45] This backup method differs from simple disk mirroring[45] in that it enables a roll-back of the log and thus a restoration of old images of data. Intent logging allows proper precautions for the consistency of live data, so that captured changes can provide fine granularities of restorable objects ranging from crash-consistent images to logical objects such as files, databases, and logs.[46]
When real-time edits—especially in multimedia and CAD design environments—are backed up offsite over the upstream channel of the installation's broadband network,[47] network bandwidth throttling[48] may be needed to reduce the impact of true CDP.[47]

3. User Interface

To accommodate the requirements of a backup administrator who may not be part of the IT staff with access to the secure server area, enterprise client-server software may include features such as:

Administration Console
The backup administrator's backup server GUI management and near-term reporting tool.[49] Its window shows the selected backup server, with a standard toolbar on top. A sidebar on the left or navigation bar shows the clickable categories of backup server information for it; each category shows a panel, which may have a specialized toolbar below or in place of the standard toolbar. The built-in categories include activities—thus providing monitored backup, past backups of each source, scripts/policies/jobs (terminology depending on the application), sources (directly/indirectly), archive files, and storage devices.[33][50][51]
User-initiated backups and restores
These supplement the administrator-initiated backups and restores which backup applications have always had, and relieve the administrator of time-consuming tasks.[52] The user designates the date of the past (not necessarily the last) backup from which files or folders are to be restored—once IT staff has mounted the proper volume(s) of the relevant archive file on the backup server.[1][33][53][54]
High-level/medium-term reports supplementing the Administration Console[49]
Within one application's Console panel displayed by clicking the name of the backup server itself in the sidebar, an activities pane on the top left of the displayed Dashboard has a moving bar graph for each activity going on for the backup server together with a pause and stop button for the activity. Three more backup validation panes give the results of activities in the past week: backups each day, sources backed up, and sources not backed up; as of 2019 the last two panes—together with failed backups—are summarized in an additional color-coded bullseye pane.[55] Finally, a storage reporting pane has a line for each archive file, showing the last-modified date and depictions of the total bytes used and available;[22][33] as of 2019, this is supplemented by a pane that gives a linear-regression prediction for growth of each archive file.[55] For the application's Windows variant, the Dashboard acts as a display-only substitute for a non-existent Console[6]—but was upgraded in 2019 into an optional two-way Web-based Management Console.[16] Other applications have a separate reporting and monitored backup facility that can cover multiple backup servers.[56][57]
E-mailing of notifications about operations to chosen recipients[49]
Can alert the recipient to, e.g., errors or warnings, including extracts of logging to assist in pinpointing problems.[6][56][58]
Integration with monitoring systems[49]
Such systems provide longer-term backup validation. One application's administrators can deploy custom scripts that—invoking webhook code via script hooks—populate such systems as the freeware Nagios and IFTTT and the freemium Slack with script successes and failures corresponding to the activities category of the Console, per-source backup information corresponding to the past backups category of the Console, and media requests.[33] Another application has integration with two of the developer's monitoring systems, one that is part of the client-server backup application and one that is more generalized.[56] Yet another application has integration with a monitoring system that is part of the client-server backup application[59] but can also be integrated with Nagios.[60]

4. LAN/WAN/Cloud

Advanced network client support
All applications include support for multiple network interfaces.[18][61][62] However one application, unless deduplication is done by a separate sub-application between the client and the backup server, cannot provide "resilient network connections" for machines on a WAN.[63] One application can extend support to "remote" clients anywhere on the Internet for a Proactive script and user-initiated backups/restores.[16]
Cloud seeding and Large-Scale Recovery
Because of a large amount of data already backed up,[18] an enterprise adopting cloud backup likely will need to do "seeding". This service uses a synthetic full backup to copy a large locally-stored archive file onto a large-capacity disk device, which is then physically shipped to the cloud storage site and uploaded.[64][65] After the large initial upload, the enterprise's backup software may facilitate reconfiguration for writing to and reading from the archive file incrementally in its cloud location.[66] The service may need to be employed in reverse for faster large-scale data recovery times than would be possible via an Internet connection.[64] Some applications offer seeding and large-scale recovery via third-party services, which may use a high-speed Internet channel to/from cloud storage rather than a shippable physical device.[67][68]

References

  1. Fernando, Sal (30 April 2008). "Combine disk, tape benefits to protect data". ZDNet. http://www.zdnet.com/article/combine-disk-tape-benefits-to-protect-data/. Retrieved 13 November 2017. 
  2. "New EMC Dantz Retrospect 7 Improves Data Protection for SMBs and the Distributed Enterprise". EMC Corp. [orig. publisher]. 31 January 2005. http://www.emc.com/about/news/press/us/2005/20050131-2906.htm. Retrieved 23 November 2016. 
  3. "About NetBackup Replication Director". Veritas Technologies LLC (US). 13 July 2017. https://www.veritas.com/support/en_US/doc/59229900-126796169-0/v58079997-126796169. Retrieved 18 November 2017. 
  4. "Symantec Backup Exec: About duplicating backed up data". HelpMax Software Help & Shop Inc.. http://backup-exec.helpmax.net/en/backing-up-data/about-duplicating-backed-up-data/. Retrieved 13 January 2018. 
  5. Exclusion and/or inclusion is done with Selectors in the Windows variant; this misleading term has been changed to Rules in the Macintosh variant.
  6. "Retrospect ® 12 Windows User's Guide" (PDF). Retrospect Inc.. 2017. pp. 30-31(deduplication via "Snapshots"—a Retrospect term which predates and is distinct from Snapshot (computer storage)), 31-32(Dashboard), 41-43(removable disk drives), 216-218(selector as subset filter for synthetic full backups), 230-233(Scripted Verification), 280(Multiple Executions), 369(Duplicate Execution Options), 420(Startup Preferences—Launcher for auto-launch), 426-427(E-mail), 433-434(Open File Backup Tips—VSS snapshot at natural pause), 530-544(SQL Server Agent—coordinating VSS snapshot), 545-566(Exchange Server Agent—coordinating VSS snapshot). http://download.retrospect.com/docs/win/v12/user_guide/Retrospect_Win_User_Guide-EN.pdf. Retrieved 2 September 2018. 
  7. "About synthetic backups". Veritas Technologies LLC (US). 25 September 2017. https://www.veritas.com/content/support/en_US/doc/18716246-126559472-0/id-SF780163836-126559472. Retrieved 18 November 2017. 
  8. "Symantec Backup Exec: About the synthetic backup feature". HelpMax Software Help & Shop Inc.. http://backup-exec.helpmax.net/en/symantec-backup-exec-advanced-disk-based-backup-option/about-the-synthetic-backup-feature/. Retrieved 13 January 2018. 
  9. Preimesberger, Chris (31 March 2017). "World Backup Day 2017: 'We Don't Know the Day Nor the Hour'". QuinStreet. Ian Wood of Veritas. http://www.eweek.com/storage/world-backup-day-2017-we-don-t-know-the-day-nor-the-hour. Retrieved 11 November 2017. 
  10. Kaczorek, Mariusz (15 August 2015). "NetBackup Storage Lifecycle Policy (SLP): Overview". Settlersoman. https://www.settlersoman.com/netbackup-storage-lifecycle-policy-slp-overview/. Retrieved 2 February 2018. 
  11. Jain, Hemant (14 April 2015). "VOX Knowledge Base: Data Protection Knowledge Base: Data Protection". Veritas Technologies LLC. https://vox.veritas.com/t5/Articles/Automated-Disk-management-and-Data-retention-in-Backup-Exec-DLM/ta-p/809167. Retrieved 13 January 2018. "Employee [of Veritas]" 
  12. Dorion, Pierre (January 2007). "IBM Tivoli Storage Manager vs. traditional backup". Tech Target Inc.. Backup versions. https://searchdatabackup.techtarget.com/tip/IBM-Tivoli-Storage-Manager-vs-traditional-backup. Retrieved 30 October 2018. 
  13. Some backup applications—notably rsync and CrashPlan—term removing backup data "pruning" instead of "grooming".[1][2]
  14. "Retrospect ® 12.0 Mac User's Guide" (PDF). Retrospect Inc.. 2015. pp. 8-9(Improved Grooming). http://download.retrospect.com/docs/mac/v12/user_guide/Retrospect_Mac_User_Guide-EN.pdf. Retrieved 28 December 2017. 
  15. Schmitz, Agen (5 March 2016). "Retrospect 13". TidBITS Publishing Inc.. https://tidbits.com/article/16311. Retrieved 27 October 2016. 
  16. "Support: Knowledge Base". Retrospect Inc.. 24 April 2019. #Resources (Auto Launching Guide ..., ... difference between "Backup" and "Duplicate", Avid Support ..., Instant Scan FAQ, Can't use Open File Backup ...), #Email Backup, #Top Articles (BackupBot – Deep Dive into ProactiveAI, How to Set Up Remote Backup, GDPR – Deep Dive into Data Retention Policies, Deep Dive - Components [and phases] of a Retrospect Backup, How to Set Up the Management Console, Management Console - How to Use Shared Scripts, How to Use Storage Groups, Support End-of-Life Announcement for Mac OS X 10.3, 10.4, and 10.5, Retrospect Compatibility with Apple File System (APFS)), #Hooks (Script Hooks: External Scripting with Event Handlers, Script Hooks: How to Protect MongoDB with Retrospect, Script Hooks: How to Protect MySQL with Retrospect, Script Hooks: How to Protect PostgreSQL with Retrospect). https://www.retrospect.com/en/support/kb/. Retrieved 4 May 2019. 
  17. Schmitz, Agen (28 May 2018). "Retrospect 15.1.1". TidBITS Publishing Inc.. https://tidbits.com/watchlist/retrospect-15-1-1/. Retrieved 20 June 2018. 
  18. Rassokhin?, Alexander? (2012). "Enterprise Network Backup Challenges". Novosoft LLC. http://www.backupschedule.net/enterprise-network-backup.html. Retrieved 13 November 2017. 
  19. "What is the difference between multiplexing and multistreaming?". Veritas Technologies LLC (US). 29 January 2015. https://www.veritas.com/support/en_US/article.TECH10085. Retrieved 19 November 2017. 
  20. McMillen, Robert (21 July 2015). "How to run concurrent jobs in Backup exec 15" (Video). Google. https://www.youtube.com/watch?v=1-9x9So038g. Retrieved 14 January 2018. 
  21. Engst, Adam (23 March 2009). "EMC Ships Modernized Retrospect 8". TidBITS Publishing Inc.. New Backup Capabilities. https://tidbits.com/article/10159. Retrieved 3 November 2018. 
  22. Schmitz, Agen (6 March 2014). "Retrospect 11". TidBITS Publishing Inc.. https://tidbits.com/article/14573. Retrieved 27 April 2017. 
  23. "How Veritas NetBackup block-level incremental backup works for Oracle database files". Veritas Technologies LLC (US). 2013. https://sort.symantec.com/public/documents/sfha/6.0/aix/productguides/html/sf_adv_ora/ch21s01s01.htm. Retrieved 18 November 2017. 
  24. Harbaugh, Logan (Fall 2015). "Developing a Real Backup Plan with Symantec's Backup Exec 15". CDW LLC. https://edtechmagazine.com/higher/article/2015/10/developing-real-backup-plan-symantecs-backup-exec-15. Retrieved 14 January 2018. 
  25. Whitehouse, Lauren (September 2008). "The pros and cons of file-level vs. block-level data deduplication technology". Tech Target Inc.. http://searchdatabackup.techtarget.com/tip/The-pros-and-cons-of-file-level-vs-block-level-data-deduplication-technology. Retrieved 13 November 2017. 
  26. "About the Accelerator feature in NetBackup 7.5". Veritas Technologies LLC (US). 10 November 2017. https://www.veritas.com/support/en_US/article.000086263. Retrieved 18 November 2017. 
  27. "Veritas Backup Exec Administrator's Guide: How Backup Exec determines if a file has been backed up". Veritas Technologies LLC. 11 November 2017. https://www.veritas.com/content/support/en_US/doc/59226269-99535599-0/v63768146-99535599. Retrieved 7 February 2018. 
  28. Engst, Adam (6 November 2012). "Retrospect 10 Reduces Backup Time with Instant Scan Technology". TidBITS Publishing Inc.. https://tidbits.com/article/13379. Retrieved 25 October 2016. 
  29. "Archiware P5 Reference Manual" (PDF). Archiware. 20 August 2017. 6.4.3(Pool Configuration: Concurrency Options). https://p5.archiware.com/sites/p5/files/atoms/files/P5Manual5.5_EN.pdf. Retrieved 11 June 2019. "Note: the data within one stream is spread over the given drives. Therefore, the data of a single client will be written across multiple tapes (and possibly mixed with the data of other clients)." 
  30. Rassokhin?, Alexander? (2012). "Enterprise Backup Software: Backup Network Workstations, Email and Databases". Novosoft LLC. http://www.backupschedule.net/enterprise-backup.html. Retrieved 24 January 2018. 
  31. null
  32. null
  33. "Retrospect ® 14.0 Mac User's Guide" (PDF). Retrospect Inc.. March 2017. pp. 8-9(Script Hooks—backing up interactive applications with pausing and integration with monitoring system), 18-26(Overview of the Retrospect Console), 27-28(High-level Dashboard—high-level/medium-term reports), 29(How Retrospect Works—Smart Incremental), 31-33(Media Sets), 73(Adding network shares), 74-75(User-initiated backups and restores), 124-126(Archiving), 168-169(Email Preferences), 217(Retrospect for iOS). http://download.retrospect.com/docs/mac/v14/user_guide/Retrospect_Mac_User_Guide-EN.pdf. Retrieved 27 April 2019. 
  34. null
  35. "Retrospect: Retrospect Virtual". Retrospect Inc.. 2018. https://www.retrospect.com/en/products/virtual?locale=en. Retrieved 28 October 2018. 
  36. null
  37. Peter B. Malcolm (13 November 1989). "US Patent 5086502: Method of operating a data processing system". Google Patents. http://www.google.com/patents/US5086502. Retrieved 29 November 2016. "Filing date Nov 13, 1989 ... a backup system in which a copy of every change made to a storage medium is recorded as the change occurs ... backup write operations are executed at the level of the basic input/output system (BIOS) ..." 
  38. Richard May (November 2012). "Finding RPO and RTO". Archived from the original on 2016-03-03. https://web.archive.org/web/20160303224604/http://www.virtualdcs.co.uk/blog/business-continuity-planning-rpo-and-rto.html. 
  39. Behzad Behtash (2010-05-10). "Why Continuous Data Protection's Getting More Practical". Disaster recovery/business continuity. Informationweek. https://www.informationweek.com/why-continuous-data-protections-getting-more-practical/d/d-id/1088884. Retrieved 2011-11-12. "CDP is the gold standard—the most comprehensive and advanced data protection. But "near CDP" technologies can deliver enough protection for many companies with less complexity and cost ..." 
  40. "Continuous data protection (CDP) explained: True CDP vs near-CDP". TechTarget. July 2010. https://www.computerweekly.com/Continuous-data-protection-CDP-explained-True-CDP-vs-near-CDP. Retrieved 22 June 2019. "... copies data from a source to a target. True CDP does this every time a change is made, while so-called near-CDP does this at pre-set time intervals. Near-CDP is effectively the same as snapshotting....True CDP systems record every write and copy them to the target where all changes are stored in a log. [new paragraph] By contrast, near-CDP/snapshot systems copy files in a straightforward manner but require applications to be quiesced and made ready for backup, either via the application's backup mode or using, for example, Microsoft's Volume Shadow Copy Services (VSS)." 
  41. Wu, Victor (4 March 2017). "EMC RecoverPoint for Virtual Machine Overview". WuChiKin. https://wuchikin.wordpress.com/2017/03/04/emc-recoverpoint-for-virtual-machine-overview/. Retrieved 22 June 2019. "The splitter splits out the Write IOs to the VMDK/RDM of a VM and sends a copy to the production VMDK and also to the RecoverPoint for VMs cluster." 
  42. "Zerto or Veeam?". March 2017. https://resqdr.com/zerto-or-veeam/. Retrieved 7 July 2019. "Zerto doesn’t use snapshot technology like Veeam. Instead, Zerto deploys small virtual machines on its physical hosts. These Zerto VMs capture the data as it is written to the host and then send a copy of that data to the replication site.....However, Veeam has the advantage of being able to more efficiently capture and store data for long-term retention needs. There is also a significant pricing difference, with Veeam being cheaper than Zerto." 
  43. "Agent Related". 2019. What does the CloudEndure Agent do?. https://docs.cloudendure.com/Content/FAQ/FAQ/Agent_Related.htm. Retrieved 3 July 2019. "The CloudEndure Agent performs an initial block-level read of the content of any volume attached to the server and replicates it to the Replication Server. The Agent then acts as an OS-level read filter to capture writes and synchronizes any block level modifications to the CloudEndure Replication Server, ensuring near-zero RPO." 
  44. Brian Posey (August 2016). "CDP technology offers organizations a steady data protection method". TechTarget. Other differentiators, Value in block-level backup. https://searchdatabackup.techtarget.com/feature/CDP-backup-offers-organizations-a-steady-data-protection-method. Retrieved 10 May 2019. 
  45. Mayer, Alex (6 November 2017). "Backup Types Explained: Full, Incremental, Differential, Synthetic, and Forever-Incremental". Nakivo. Full Backup, Incremental Backup, Differential Backup, Mirror Backup, Reverse Incremental Backup, Continuous Data Protection (CDP), Synthetic Full Backup, Forever-Incremental Backup. https://www.nakivo.com/blog/backup-types-explained-full-incremental-differential-synthetic-and-forever-incremental/. Retrieved 17 May 2019. 
  46. "An Overview of Continuous Data Protection". Infosectoday.com. http://www.infosectoday.com/Articles/Continuous_Data_Protection.htm. Retrieved 2011-11-12. 
  47. Carter, Nick (5 August 2010). "Off-Site Backup – The Bandwidth Hog". Accel Networks. Archived from the original on 2011-07-07. https://web.archive.org/web/20110707080023/http://www.accel-networks.com/blog/index.php?q=%2F2010%2F08%2Foff-site-backup-bandwidth-hog.html. "In a true CDP environment, whenever large files are saved – images, audio, video, CAD or 3D models – the data is transmitted over the same broadband connection that feeds users' email and internet, not to mention back-end business-critical processes. Moreover, these transmissions rely on the scarcer of the two channels, the upstream channel. The result for many companies is an erratic broadband performance, and even server slow-down." 
  48. David Pogue (4 January 2007). "Fewer Excuses for Not Doing a PC Backup". The New York Times. https://www.nytimes.com/2007/01/04/technology/04pogue.html. "options like "Enable Bandwidth Throttle" and "Don’t back up if the CPU is over this % busy."" 
  49. Dorion, Pierre (June 2008). "Why you need a data backup reporting tool". Tech Target Inc.. http://searchdatabackup.techtarget.com/tip/Why-you-need-a-data-backup-reporting-tool. Retrieved 13 November 2017. 
  50. "Symantec NetBackup ™ Administrator's Guide, Volume I Windows". Veritas Technologies LLC (US). 2012. pp. 35–45(Administration Console), 833–843(Activity Monitor), 888–894(Reports utility), 912(Remote Administration Console), 915–938(Java Console). http://www-personal.umich.edu/~danno/symantec/NetBackup_AdminGuideI_WinServer.pdf. Retrieved 18 November 2017. 
  51. "Symantec Backup Exec: About the Administration Console". HelpMax Software Help & Shop Inc.. http://backup-exec.helpmax.net/en/introducing-backup-exec/about-the-administration-console/. Retrieved 10 December 2017. 
  52. Dorion, Pierre (4 August 2008). "The true role of a backup administrator". TechTarget, Inc.. http://searchdatabackup.techtarget.com/news/1322981/The-true-role-of-a-backup-administrator. Retrieved 13 November 2017. "On the other hand, the role of a backup administrator should be one of administration, not operation....whose role is "being the keeper of the data"" 
  53. "OpsCenter Operational Restore". Veritas Technologies LLC (US). 12 March 2012. https://www.veritas.com/support/en_US/article.100038022. Retrieved 18 November 2017. 
  54. "How Backup Exec Retrieve works". HelpMax Software Help & Shop Inc.. http://backup-exec.helpmax.net/en/using-backup-exec-retrieve/how-backup-exec-retrieve-works/. Retrieved 14 January 2018. 
  55. "Data Hooks: Modular Web Plugins for Retrospect Dashboard". Retrospect Inc.. 2019. screenshots. https://www.retrospect.com/en/products/data_hooks. Retrieved 14 April 2019. 
  56. Antony, Erica; Tim Burlowski (January 2008). "NetBackup Operations Manager: Monitoring, Alerting and Reporting for Veritas NetBackup" (PDF attachment). Veritas Technologies LLC (US). pp. 4–5(monitoring), 6–7(alerting), 7(3rdPartyEventMgmt.), 11–18(reporting). https://vox.veritas.com/t5/Articles/NetBackup-Operations-Manager-Monitoring-Alerting-and-Reporting/ta-p/806080. Retrieved 18 November 2017. 
  57. "Windows® Enterprise Data Protection with Symantec Backup Exec™" (PDF). Veritas Technologies LLC. 2007. pp. 5–8 (CASO). http://www.r2gen.com.br/images/symantec/pdf/symantec_protegendo_sua_empresa.pdf. Retrieved 14 January 2018. 
  58. "How to configure notification recipients in Backup Exec 12.0 and above". Veritas Technologies LLC. 10 November 2017. https://www.veritas.com/support/en_US/article.100016176. Retrieved 15 January 2018. 
  59. "Veritas Backup Exec Administrator's Guide: About the Job Monitor". Veritas Technologies LLC. 11 November 2017. https://www.veritas.com/content/support/en_US/doc/59226269-99535599-0/v76313540-99535599. Retrieved 15 January 2018. 
  60. "Nagios plugins for monitoring BackupExec". Nagios Enterprises. https://exchange.nagios.org/directory/Plugins/Backup-and-Recovery/BackupExec. Retrieved 15 January 2018. 
  61. "EMC Announces Retrospect 8.0 Backup and Recovery Software For Mac". EMC Corp. [orig. publisher]. 6 January 2009. http://www.infotomorrowmag.com/about/news/press/2009/20090106-02.htm. Retrieved 10 November 2016. 
  62. "Veritas Backup Exec Administrator's Guide: Configuring network options for backup jobs". Veritas Technologies LLC. 17 November 2017. https://www.veritas.com/content/support/en_US/doc/59226269-99535599-0/v96257307-99535599. Retrieved 15 January 2018. 
  63. "Veritas NetBackup™ Deduplication Guide" (PDF). Veritas Technologies LLC (US). 2016. p. 171(Resilient network properties). https://www.veritas.com/content/support/en_US/doc/ka6j00000000ADEAA2. Retrieved 18 November 2017. 
  64. "What Is an AWS Snowball Appliance?". Amazon.com. 2018. https://docs.aws.amazon.com/snowball/latest/ug/whatissnowball.html. Retrieved 8 March 2018. 
  65. Rouse, Margaret (December 2011). "Definition: cloud seeding". Tech Target Inc.. http://searchdatabackup.techtarget.com/definition/cloud-seeding. Retrieved 16 November 2017. 
  66. "Changing paths Cloud Mac" (Video). Retrospect Inc.. 29 February 2016. https://www.youtube.com/watch?v=Ac3BhXO4T1g. Retrieved 7 October 2016. 
  67. High, Dave; Mahmud, Fozz (10 March 2016). "NBU and the Amazon Storage Gateway VTL" (Video). Veritas Technologies LLC. https://www.youtube.com/watch?v=rU1rFK9o20s. Retrieved 17 January 2018. 
  68. "Backup Exec 16: Best Practices for Using the Veritas Backup Exec Cloud Connector". Veritas Technologies LLC. 25 October 2017. https://www.veritas.com/content/support/en_US/doc/72686287-129480082-0/v128967126-129480082. Retrieved 15 January 2018. 
More
Information
Subjects: Others
Contributor MDPI registered users' name will be linked to their SciProfiles pages. To register with us, please refer to https://encyclopedia.pub/register :
View Times: 427
Entry Collection: HandWiki
Revision: 1 time (View History)
Update Date: 14 Oct 2022
1000/1000
ScholarVision Creations