The following table provides helpful definitions for some of the terms used in this knowledge base and other Intronis resources. This list is not all-inclusive.
Term | Definition |
---|---|
Archive Rules | Used to control the number of file revisions that are stored by deleting unneeded copies of files indicated in the rule. When the backup set is run, each rule is applied in the order listed within the set's rule list. |
Asynchronously | An attribute of a Before and After Action. If designated for a Before Action, the action finish before the backup job begins. If designated for an After Action, the backup job finishes before the action is run. |
Backup | Sending a copy of data to another location. Online backups send backed-up data over the Internet to an off-site server. Local backups send backed-up data to a destination on either the same computer or the same network. |
Backup Set | The combination of a backup job (with its accompanying settings) and the data selected to be backed up. Backup set types include File and Folder, SQL, System State, Exchange, VMware, Hyper-V, and Images. |
Cloud | Off-site servers |
Cloud Archive | Data that is backed up to a cloud storage provider's servers. |
Cloud Application | A software application that is never installed on a local machine and is always accessed via the Internet. |
Cloud Provider | A company that provides cloud-based platform, infrastructure, application, or storage services to other organizations and/or individuals. |
Computer ID | A unique four-digit code used to keep track of multiple subaccounts within a single client account. The first computer you install the Intronis software on has the computer ID 0000. Subsequent subaccounts have the next sequential computer ID of 0001, 0002, and so on. |
Differential Backup | A type of backup associated with SQL Server, File and Folder, VMware Standard, and Hyper-V Standard backup set types. After the initial full backup is completed, a differential backup backs up all data which has changed since the full backup. |
Encryption | A digital cipher that protects your data. Encrypting your data is the digital equivalent of locking your valuables in a safe. Encrypted data can only be decrypted (unlocked) with the right encryption key. |
Encryption Key | The encryption key is used both to encrypt and decrypt data; without it, encrypted data cannot be decrypted without the exact key used for the initial encryption. |
File Catalog | Also known as just the catalog, it is a record of all of the data and revisions contained within a backup set. The catalog is updated and transmitted to the backup servers with every backup. |
Incremental Backup | Only backs up the data changed since the last backup. Exchange, Imaging, VMware QuickSpin, and Hyper-V Rapid Recovery backup set types use incremental backups. |
IntelliBlox | A proprietary technology that uploads only the changed blocks of a file. At your next backup, data is scanned, any changes at the block level are detected, and only these changes are uploaded. |
MSP | Managed Service Provider - provides delivery and management of a variety of services which include, but are not limited to, network-based services (online backup), applications, and equipment. |
NTFS | New Technology File System - the standard file system of all supported operating systems. Supersedes the FAT and FAT32 as the preferred file system for Microsoft's Windows-branded operating systems. |
Remote Server | The location from which data is backed up and to which data is restored |
Replication | The process of duplicating data in order to have multiple copies |
Restore | The process of retrieving backed up data and copying it to your computer |
Revision | Changes to a backed-up file, database, or image |
Revision Rules | See Archive rules. |
Synchronously | An attribute of a Before and After Action. If designated for a Before Action, the action starts at the beginning of a backup job but does not necessarily finish before the backup job begins. If designated for an After Action, the backup job may not completely finish before the action is run. |
UNC | Uniform Naming Convention - specifies a well-formed syntax to describe the location of a network resource, such as a shared file, directory, or printer. The UNC syntax for Windows systems is as follows: \\ComputerName\SharedFolder\Resource. |