Updated at: 2022-12-09 03:49:50
A   B   C   D   E   F   G   H   I   J   L   M   N   O   P   Q   R   S   T   V   W

A
Activation Code A string of characters used to activate licenses.
Active Cloning A technique or feature which creates  duplicated copies for running business data.
Advanced Compression The advanced features of MS SQL and Oracle themselves.
Agent A software module in the system that performs data protection operations.
Agent-based Agent needs to be installed before you perform backup and recovery.
Agentless No agent needs to be installed before you perform backup and recovery.
Alarm A function used to notify administrator the errors and exceptions occurred when the system or business is running.
Archive A technique that stores data which will not be accessed frequently in a specified storage media, such as tape and blu-ray disk.
Audit Administrator An administrator who audits the operation logs of system administrator and security administrator.
Auto Discovery A technique which discovers the workloads in user environment automatically.

B
BaaS An approach to backing up data that involves purchasing backup and recovery services from a backup provider.
Backup A technique that stores a copy of data so that it may be used to restore the original after a data loss event.
Backup Object The clients, virtualization platforms and cloud platforms to be backed up.
Backup Option The advanced features which can be chosen during backup, such as flow control, data compression, data deduplication, and more.
Backup Policy A pre-defined and set schedule for backup jobs, including backup contents, backup time and backup mode.
Backup Script Commands to perform backup.
Backup Server A type of server that facilitates data, file, application and database backup.
Backup Type Different backup types such as full backup, incremental backup and differential backup.
Backup Window The time slot when it is most suitable to back up data, applications or a system.
Bare Metal Restore A technique of data recovery that restores a system to a computer with a disk drive without operating system (OS) or applications.
Base Volume The basic unit providing storage service by snapshot storage service.
Blu-ray Archive A technique which transfers backup data to blu-ray disk library.
Blu-ray Object Storage A blu-ray storage device which supports standard S3 protocol.
Blu-ray Storage A blu-ray storage device which supports NAS (NFS/CIFS) protocol.
Built-in Client A client embedded in AnyBackup system (no need to install), used to provide services such as backup and replication in agentless backup solutions.
Built-in Tenants The tenant embedded in the system after  AnyBackup is deployed.

C
Cascading Replication A topology that has multiple tiers of servers, used in remote replication.
Changed Block Tracking A technique used to track block changes on VM disks, which helps perform incremental backups.
Chunk The minimum data unit in EOSS.
Chunking A process in data deduplication. Specified fingerprint will be generated after chunking.
Client A server on which AnyBackup Client Software is installed.
Clone Volume The basic unit providing data access by snapshot storage service.
Cloud Archive Back up data to local media and then archive to cloud, achieving long-term retention.
Cloud Host Cloud hosts are the virtual servers provided by cloud computing platforms. They are mainly composed of CPU, Memory, OS and Volumes. Cloud hosts are equivalent to virtual machines.
Cloud Migration The process of moving data, applications or other business elements to a cloud computing environment.
Cloud Platform Cloud Computing platforms which provide computing, networking and storage capability based on hardware and software resources.
Concurrency A parameter used to assign the number of concurrent threads during backup.
Concurrent Backup Two or more backups are performed at the same time.
Console A web interface where you can manage client resources and perform backup and recovery jobs.
Content-defined Chunking A method to split files into variable length chunks, where the cut points are defined by some internal features of the files.
Continuous Backup A technique which continuously transfers data to storage media.
Continuous Data Protection A technique which backs up whenever any change is made. In AnyBackup, it includes continuous backup, continuous replication, takeover, exercise, and data recovery.
Continuous Replication Real-time synchronization between hosts.
Copy Data Management An approach to reduce the number of physical copies and make them easier to use for multiple purposes.
Cumulative Incremental Backup A data backup process that saves data files and objects that have been modified since the last complete or archival backup.

D
Data Access An approach to access data via mounting in CDM solution.
Data Cleanup The process of deleting backup data in backup media or storage pool.
Data Compression The process of modifying, encoding or converting the bits structure of data in such a way that it consumes less space on disk.
Data Deduplication A technique that eliminates excessive copies of data and significantly decreases storage capacity requirements.
Data Integrity The overall accuracy, completeness, and consistency of data.
Data Migration Back The process of moving data back to the original location.
Data Retention Policy When the full backup copy expires or the copy count  is reached, the earliest backup copy will be deleted when the next full backup succeeds.
DD Volume The basic unit of managing data resources in DD Service.
Deduplication Ratio The measurement of data's original size versus the data's size after removing redundancy.
Deep Compression Better compression ratio but slower compression compared with data compression.
Destination The place where data is transferred to.
Differential Backup A backup method which backs up the changed data since the first full backup only.
Differential Recovery A recovery method which recovers the differential data between the current data and the recovery point data only.
DR Platform A platform used to take over the protection server when it fails.
DRaaS Also known as disaster recovery as a service, is the replication of hosting of physical or virtual servers by a third party to provide failover in the event of a man made or natural catastrophe.

E
Encryption A technique by which data is converted into secret code so that security can be guaranteed.
ECSS Enterprise Cloud Storage System
EOSS Enterprise Object Storage System
ESSS Enterprise Snapshot Storage System
ETSS Enterprise Tape Storage System
Entire Machine Restore A technique used to restore the whole database or document library to the original machine or a dissimilar machine with same version.
Exercise A way to test your plan, make adjustments, and improve your organization's ability to respond to future events
External Client A client deployed on the physical sever or virtual machines in user environment. It connects with AnyBackup console via installing AnyBackup Client software, and then jobs can be created.

F
Failover A technique switching to a redundant or standby computer server, system, hardware component or network upon the failure or abnormal termination of the previously active application, server, system, hardware component, or network.
Failover Cluster A group of servers that work together to maintain high availability of applications and services.
Failpoint The location where failure happens.
Fingerprint Used to represent and identify identical data blocks when performing data deduplication.
Fingerprint Library The maximum logical management unit to store fingerprints in DD service.
Fingerprint Pool The management unit of planning the storage node of fingerprint in DD Service.
Fixed-sized Partition A Deduplication algorithm which breaks the data into fixed size chunks or blocks from the beginning of the file.
Flow Control The process of managing the rate of data transmission between two nodes to control the occupation on the bandwidth during backup and recovery.
Full Replication The process of synchronizing all selected source data to the target end.

G
Global Deduplication Multiple backup jobs share one fingerprint library. It is supported in backup and recovery only.
Granular Recovery An advanced technology that enables to perform both file and database-based level recovery from a single pass backup operation.

H
HA client A unit formed by binding two clients together. Data protection for HA Client can be performed.
Hot Backup A backup performed on data while the database is actively online and accessible to users.

I
Incomplete Recovery A recovery method by which some data is lost, also called database point-in-time recovery (DBPITR). It restores the entire database to previous point-in-time, log sequence number or SCN number.
Incremental Backup A backup type that only copies data that has been changed or created since the previous backup activity was conducted.
Incremental Data Synthesis A technique which combines multiple sequential incremental data to complete data.
Incremental Forever Backup A technique which conducts only incremental backup since the first full backup.
Incremental Replication A technique which replicates new data on source end to target end.
Inspector An independent role who cannot be managed by system administrator, security administrator or audit administrator. Inspector can view all jobs created by other roles.
Instant Recovery A technique which allows a backup snapshot to run temporarily on secondary storage after a failure or disaster occurs.

J
Job A task created by users to manage the  process of data protection.
Job Alarm Different information will be sent based on different job results, so that users can be informed of whether there are severe problems to handle.
Job Details The detailed information of job configuration and the output information of job execution.
Job History It records the execution results and information of each job.
Job Log It records the job execution records and information.
Job Management A function used to manage jobs.
Job Monitoring A function which is used to capture related information in job execution continuously.
Job Policy A function where execution cycle, execution frequency and execution type can be configured.

L
LAN-Base Backup The process of backing up data over the  local-area network (LAN) to the storage media.
LAN-Free Backup The process of backing up data over the FC channel to the storage media.
License A string of characters which permit the use of related functions.
Load Balancing The process of distributing a set of tasks over a set of resources (computing units), with the aim of making their overall processing more efficient.
Log Level The priority of logs, from high to low.
Log Retention Time The duration the log file will be retained.
Logical Replication A method of replicating data objects and their changes, based upon their replication identity (usually a primary key).

M
Metadata Data that provides information about other data.
Metadata Volume The basic unit of managing data resources in backup storage.
Mount A process by which the operating system makes files and directories on a storage device available for users to access via the computer's file system.
Multi-user Mode Multiple users can log in and run the application via one server.

N
Native Format The default format of the workload.
Node An independent device in cluster.

O
Object Storage Also known as object-based storage, is a strategy that manages and manipulates data storage as distinct units, called objects.
Offline Archiving Offline the data after archiving completes.
Offline Backup Also known as a cold backup, occurs while a database is offline.
Offsite Protection The strategy of sending critical data out of the main site as part of a disaster recovery.
OFS Volume The basic unit of managing data resources by EOSS data service.
On-prem to Cloud Backup Back up on-prem data (either production or backup data) to cloud.
Operator A role to manage data protection jobs.

P
Parallel Deduplication A technique by which single job can concurrently search fingerprints on multiple nodes.
Physical Replication A data replication solution which captures changed data block.
Point in Time An identification of one data generated by one backup.
Policy The sequence of events defined by users.
Proxy Service The entry of unified backup and recovery, providing the capability of flow transfer.

Q
Quick Compression Faster compression but lower compression ratio compared with deep compression.

R
Recoverability Verification A technique to verify whether the data can be recovered.
Recovery Granularity The granularity of recovery, including instance level, database level or data table level, and more.
Recovery Point Objective The maximum amount of data that can be lost in a data loss event.
Recovery Time Objective The amount of time that an application can be down and not result in significant damage to a business.
Remote Replication The process of copying production data to a device at a remote location for disaster recovery purposes.
Resumable Data Transfer If the job is interrupted by network failure or insufficient storage, data transfer can
be resumed from the breakpoint other than from the very beginning if the network is resumed or the storage is sufficient.
Retention Period The period of how long data can be retained on snapshot pool.
Reverse Replication Also know as reverse synchronization, a technique which transfers backup data on remote console to local console.

S
Scale-out Also know as horizontal scaling, is done by adding more devices (nodes). Each device (node) includes storage capacity, own processing power and I/O (input/output) bandwidth. The inclusion of these resources means that as storage capacity increases, performance also increases.
Scale-up Also known as vertical scaling, is done by adding more storage resources to an existing system to reach a desired state of performance. Its bandwidth and computing capability is not enhanced.
Secondary Database An alternate database that can provide a copy for recovery or takeover if the server of primary database fails.
Secondary Server  Also called DR Server, is a type of server that serves as an addition to the primary server and is used for a variety of services. It has the same features and capabilities as the primary server and acts as a second or substitutive point of contact in case the primary server is unavailable.
Self Backup Volume A data volume type used to back up the system configuration data of AnyBackup.
Self-backup The backup for system configuration data automatically launched by system itself.
Shared Volume A volume belongs to shared disk group and is opened on multiple nodes at one time.
Single-user Mode A mode in which only one user can access the status of certain resource.
Snapshot Pool The basic unit of managing data resource by snapshot storage service.
Source Deduplication A technique which deduplicates data before data is sent to the target end.
Storage Media A physical carrier used to store backup data.
Sub-tenant A tenant created by another tenant.
System Administrator A role to manage system, storage and resources.

T
Takeover When the production server fails, the secondary server will take over the protection server to continue providing services.
Tape Backup The process of backing up data to a tape cartridge.
Tape Archive The process of archiving backup data to a tape cartridge.
Target Deduplication A technique to reduce the amount of duplicate backup data on the destination or the target device.
Tenant A role who can manage sources and perform data protection.
Tiered Data Protection A feature which provides three different technologies including backup, CDP and CDM on one platform to satisfy different SLAs.
Transport Mode The data transfer mode in VMware, including auto, NBD, NBD-SSL, Hot Add and SAN.

V
Virtual Client An entity formed by binding multiple clients in Dual-HA or Cluster environment.
Virtual Clone A copy or a mirror for all statuses of the original VM.
Virtual Copy The copy generated by virtual clone.
Volume The basic unit of managing resources in backup storage.
Volume-level Replication A replication technique based on volume level, not concerned with which files have changed.

W
Warning Threshold The critical value of space utilization. Alarms will be given if the warning threshold is reached.