1. Glossary

Glossary

  • AES – Advanced Encryption Standard
  • Apple OSX – Apple Operating System, also known as macOS

  • Bare-metal restore – is a technique in the field of data recovery and restoration where the backed up data is available in a form which allows one to restore a computer system from "bare metal", i.e. without any requirements as to previously installed software or operating system.*

  • Brick Level backup – possibility for recovering individual mailbox items

  • CDP – also called continuous backup or real-time backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user or administrator to restore data to any point in time.*

  • CLI - Command Line Interface. A command-line user interface (CLI), also known as a console user interface, and character user interface (CUI), is a means of interacting with a computer program where the user (or client) issues commands to the program in the form of successive lines of text (command lines). A program which handles the interface is called a command language interpreter or shell.*

  • Computer virus - is a type of malicious software program (malware) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them. Infecting computer programs can also include data files, or the boot sector of the hard drive. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.*

  • Cryptolocker – is a ransomware Trojan that targets computers running Microsoft Windows. Cryptolocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid cash voucher) is made by a stated deadline, and it will threaten to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin.
    Although a cryptolocker itself can be easily removed, the affected files remained encrypted in a way which researchers considered impossible to break. Many said that the ransom should not be paid, but did not offer any way to recover files; others said that paying the ransom was the only way to recover files that had not been backed up. Some victims claimed that paying the ransom did not always lead to the files being decrypted.*

  • Cybercrime – or computer related crime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target*

  • Datacenter – is a facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (e.g., air conditioning, fire suppression) and various security devices. Large datacentres are industrial scale operations using as much electricity as a small town.*

  • Dekra - is an inspection company founded in Berlin, Germany in 1925. With approximately 36,000 employees and revenues of roughly €1.9 billion, DEKRA is the largest inspection company in Germany and the third largest in the world. By its own account, it is the European market leader. The group focuses on the inspection of vehicles and technical systems, but also offers other services. DEKRA has been headquartered in Stuttgart since 1946. Business operations are carried out by DEKRA SE, which is wholly owned by DEKRA e.V.*

  • Differential backup – is a type of data backup that preserves data, saving only the difference in the data since the last full backup. The rationale in this is that, since changes to data are generally few compared to the entire amount of data in the data repository, the amount of time required to complete the backup will be less than if a full backup was performed every time that the organization or data owner wishes to back up changes since the last full backup. Another advantage, at least as compared to the incremental backup method of data backup, is that at data restoration time, at most two backup media are ever needed to restore all the data. This simplifies data restores as well as increases the likelihood of shortening data restoration time.*

  • Disaster Recovery – (DR) involves a set of policies and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster. Disaster recovery focuses on the IT or technology systems supporting critical business functions, as opposed to business continuity, which involves keeping all essential aspects of a business functioning despite significant disruptive events. Disaster recovery is therefore a subset of business continuity.*

  • Encryption – is the process of encoding a message or information in such a way that only authorised parties can access it. Encryption does not of itself prevent interference, but denies the intelligible content to a would-be interceptor. In an encryption scheme, the intended information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. In principle it is possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorised recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorised users.

  • Encryption key – for most computer security purposes and for most users, "key" is not synonymous with "password" (or "passphrase"), although a password can in fact be used as a key. The primary practical difference between keys and passwords is that the latter are intended to be generated, read, remembered, and reproduced by a human user (although nowadays the user may delegate those tasks to password management software). A key, by contrast, is intended for use by the software that is implementing the cryptographic algorithm, and so human readability etc. is not required. In fact, most users will, in most cases, be unaware of even the existence of the keys being used on their behalf by the security components of their everyday software applications.*

  • ESX – VMware ESX (until v4.1) is an enterprise-class type-1 hypervisor, developed by VMware. It is a system for virtual computers. The name ESX originated as an abbreviation of Elastic Sky X.*

  • ESXi – VMware ESXi (formerly ESX) is an enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers. As a type-1 hypervisor, ESXi is not a software application that one installs in an operating system (OS); instead, it includes and integrates vital OS components, such as a kernel.
    After version 4.1 (released in 2010), VMware renamed ESX to ESXi. ESXi replaces Service Console (a rudimentary operating system) with a more closely integrated OS. ESX/ESXi is the primary component in the VMware Infrastructure software suite. The name ESX originated as an abbreviation of Elastic Sky X.*

  • Exchange Server – is a mail server and calendaring server developed by Microsoft. It runs exclusively on Windows Server operating systems. Exchange Server was initially Microsoft's internal mail server. The first version of Exchange Server to be published outside Microsoft was Exchange Server 4.0. Exchange initially used the X.400 directory service but switched to Active Directory later. Versions 4.0 and 5.0 came bundled with an email client called Microsoft Exchange Client. It was discontinued in favour of Microsoft Outlook.*

  • GB – Gigabyte (=1024 MB)

  • Granular recovery – Granular Recovery for Exchange lets email administrators search for and recover emails, email folders, and mailboxes. Whether you need to recover all Exchange data since the previous month's backup or a single accidentally deleted email

  • HTTPS – HyperText Transfer Protocol Secure, in its popular deployment on the internet, HTTPS provides authentication of the website and associated web server with which one is communicating, which protects against man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with or forging the contents of the communication. In practice, this provides a reasonable guarantee that one is communicating with precisely the website that one intended to communicate with (as opposed to an impostor), as well as ensuring that the contents of communications between the user and site cannot be read or forged by any third party.*

  • Hyper-V – Microsoft Hyper-V, codenamed Viridian and formerly known as Windows Server Virtualisation, is a native hypervisor; it can create virtual machines on x86-64 systems running Windows. Starting with Windows 8, Hyper-V supersedes Windows Virtual PC as the hardware virtualization component of the client editions of Windows NT. A server computer running Hyper-V can be configured to expose individual virtual machines to one or more networks. Hyper-V supports many Windows Server versions and also several Linux versions.*

  • IEC – International Electrotechnical Commission.*

  • Incremental backup – is one in which successive copies of the data contain only that portion that has changed since the preceding backup copy was made. When a full recovery is needed, the restoration process would need the last full backup plus all the incremental backups until the point of restoration. Incremental backups are often desirable as they reduce storage space usage, and are quicker to perform than differential backups.*

  • ISO – International Organisation for Standardisation*

  • ISO/IEC 27001:2013 – is an information security standard that was published in September 2013. It supersedes ISO/IEC 27001:2005, and is published by the International Organisation for Standardisation (ISO) and the International Electrotechnical Commission (IEC) under the joint ISO and IEC subcommittee, ISO/IEC JTC 1/SC 27. It is a specification for an information security management system (ISMS). Organisations which meet the standard may be certified compliant by an independent and accredited certification body on successful completion of a formal compliance audit.*

  • Key – also see encryption key. The individual key, to properly store data. The key is meant to encrypt and decrypt backups and therefore is not to be shared with anybody else

  • Linux – is a Unix-like computer operating system assembled under the model of free and open-source software development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. The Free Software Foundation uses the name GNU/Linux to describe the operating system, which has led to some controversy.
    Linux was originally developed for personal computers based on the Intel x86 architecture, but has since been ported to more platforms than any other operating system. Because of the dominance of Android on smartphones, Linux has the largest installed base of all general-purpose operating systems. Linux is also the leading operating system on servers and other big iron systems such as mainframe computers, and is used on 99.6% of the TOP500 supercomputers.*

  • MariaDB - is a community-developed fork of the MySQL relational database management system intended to remain free under the GNU GPL. Development is led by some of the original developers of MySQL, who forked it due to concerns over its acquisition by Oracle Corporation. Contributors are required to share their copyright with the MariaDB Foundation.*

  • MB – Megabyte (1024 KB - kilobyte)

  • MMS – Mindtime Management System, the system Mindtime Backup has developed for monitoring and managing the customer backups by the service providers.

  • MSSQL - is a relational database management system developed by Microsoft. As a database server, it is a software product with the primary function of storing and retrieving data as requested by other software applications—which may run either on the same computer or on another computer across a network (including the Internet).*

  • MySQL - is an open-source relational database management system (RDBMS). Its name is a combination of "My", the name of co-founder Michael Widenius' daughter, and "SQL", the abbreviation for Structured Query Language. The MySQL development project has made its source code available under the terms of the GNU General Public License, as well as under a variety of proprietary agreements. MySQL was owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, now owned by Oracle Corporation. For proprietary use, several paid editions are available, and offer additional functionality.*

  • NAS – Network Attached Storage is a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients. NAS is specialised for serving files either by its hardware, software, or configuration. It is often manufactured as a computer appliance – a purpose-built specialised computer. NAS systems are networked appliances, which contain one or more storage drives, often arranged into logical, redundant storage containers or RAID.

  • NEN – Nederlands Normalisatie instituut-Dutch Standardisation institute

  • NEN 7510 – By The Nederlands Normalisatie-instituut developed standard for information security in the Dutch national healthcare system.

  • Network – a computer or data network is a telecommunications network, which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet.*

  • Office365 – is the brand name Microsoft uses for a group of software and services subscriptions, which together provide productivity software and related services to subscribers. For consumers, the service allows the use of Microsoft Office apps on Windows and macOS, provides storage space on Microsoft's cloud storage service OneDrive, and grants 60 Skype minutes per month. For business users, Office 365 offers service plans providing e-mail and social networking services through hosted versions of Exchange Server, Skype for Business Server, SharePoint and Office Online, and integration with Yammer, as well as access to the Microsoft Office software.
    The desktop / PC application is comparable to Microsoft Office with the difference that you always working with the most recent version through Office 365. Some of the versions are:

    • 365 for Home;

    • 365 for Small business;

    • 365 for Enterprises;

    • 365 for Government;

    • 365 for Education.

  • Off-site – off-site data protection is storing critical company data at an external location, often as a part of a Disaster Recovery plan. You can think of a datacenter as ‘off-site’.

  • OneDrive – (previously SkyDrive, Windows Live SkyDrive, and Windows Live Folders) is a file-hosting service operated by Microsoft as part of its suite of online services. It allows users to store files as well as other personal data like Windows settings or BitLocker recovery keys in the cloud. Files can be synced to a PC and accessed from a web browser or a mobile device, as well as shared publicly or with specific people.*

  • Oracle – Oracle Database (commonly referred to as Oracle RDBMS or simply as Oracle) is an object-relational database management system produced and marketed by Oracle Corporation.
    An Oracle database system—identified by an alphanumeric system identifier or SID—comprises at least one instance of the application, along with data storage. An instance—identified persistently by an instantiation number (or activation id: SYS.V_$DATABASE.ACTIVATION#)—comprises a set of operating-system processes and memory-structures that interact with the storage. Typical processes include PMON (the process monitor) and SMON (the system monitor). Oracle documentation can refer to an active database instance as a "shared memory realm".*

  • PC – a personal computer is a multi-purpose electronic computer whose size, capabilities, and price make it feasible for individual use. PCs are intended to be operated directly by an end-user, rather than by a computer expert or technician. Personal computers are forms of microcomputers, distinct from larger, more expensive minicomputer and mainframe systems. Home computers were an early class of personal computers. In the 2010s, PCs run using an operating system (OS), such as Microsoft Windows, Linux (and the various operating systems based on it), or Macintosh (macOS).* A PC is often used for work, education and hobbies.

  • QNAP – QNAP Systems Inc. is a Taiwanese corporation that specialises in providing networked solutions for file sharing, virtualization, storage management and surveillance applications to address corporate, SMB, SOHO and home user needs. QNAP's main products include Network-Attached Storage (NAS), Network Video Recorders (NVR) and Digital Signage (DS.) The company’s product line-up and services include Turbo NAS, VioStor NVR, digital signage players and video wall controllers.*

  • Ransomware – is computer malware that installs covertly on a victim's device (e.g., computer, Smartphone, wearable device) and that either mounts the cryptoviral extortion attack from cryptovirology that holds the victim's data hostage, or mounts a cryptovirology leakware attack that threatens to publish the victim's data, until a ransom is paid. Simple ransomware may lock the system in a way that is not difficult for a knowledgeable person to reverse, and display a message requesting payment to unlock it. More advanced malware encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. The ransomware may also encrypt the computer's Master File Table (MFT) or the entire hard drive. Thus, ransomware is a denial-of-access attack that prevents computer users from accessing files since it is difficult to decrypt the files without the decryption key. Ransomware attacks are typically carried out using a Trojan that has a payload disguised as a legitimate file.*
    Paying the ransome does often not help to decrypt your files. The Dutch government warns for it on the website www.nomoreransom.org.

  • Redundancy – In a computer’s main memory, auxiliary storage and computer buses, data redundancy is the existence of data that is additional to the actual data and permits correction of errors in stored or transmitted data. The additional data can simply be a complete copy of the actual data, or only select pieces of data that allow detection of errors and reconstruction of lost or damaged data up to a certain level.*

  • Replication - Computer scientists talk about active and passive replication in systems that replicate data or services:

    • active replication is performed by processing the same request at every replica

    • passive replication involves processing each single request on a single replica and then transferring its resultant state to the other replicas

If at any time one master replica is designated to process all the requests, then we are talking about the primary-backup scheme (master-slave scheme) predominant in high-availability clusters. On the other side, if any replica processes a request and then distributes a new state, then this is a multi-primary scheme (called multi-master in the database field). In the multi-primary scheme, some form of distributed concurrency control must be used, such as distributed lock manager.*

  • Restore – retrieving data from a backup

  • Retention – the retention period of information is an aspect of records and information management (RIM) and the records life cycle. It identifies the duration of time for which the information should be maintained or "retained", irrespective of format (paper, electronic, or other). Retention periods vary on different types of information, based on content and a variety of other factors including: internal organisational needs, regulatory requirements for inspection or audit, legal statutes of limitation, involvement in litigation, taxation and financial reporting needs, as well as other factors as defined by local, regional, state, national and/or international governing entities.*

  • Server - a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.*

  • SQL – SQL (Structured Query Language) is a domain-specific language used in programming and designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS).
    SQL became a standard of the American National Standards Institute (ANSI) in 1986, and of the International Organization for Standardization (ISO) in 1987. Since then, the standard has been revised to include a larger set of features. Despite the existence of such standards, most SQL code is not completely portable among different database systems without adjustments.*

  • Synology – Synology Inc. is a Taiwanese corporation that specialises in network attached storage (NAS) appliances. Synology’s line of NAS are known as the DiskStation for desktop models, and RackStation for rack-mount models. Synology's products are distributed worldwide and localised in several languages. Synology's headquarters are located in Taipei, Taiwan with subsidiaries located around the World.*

  • TB – Terrabyte (1024GB)

  • Tape-streamer – is a data storage device that reads and writes data on a magnetic tape. Magnetic tape data storage is typically used for offline, archival data storage. Tape media generally has a favourable unit cost and a long archival stability

A tape drive provides sequential access storage, unlike a hard disk drive, which provides direct access storage. A disk drive can move to any position on the disk in a few milliseconds, but a tape drive must physically wind tape between reels to read any one particular piece of data. As a result, tape drives have very slow average seek times for data. However, tape drives can stream data very quickly off a tape when the required position has been reached. For example, as of 2010 Linear Tape-Open (LTO) supported continuous data transfer rates of up to 140 MB/s, comparable to hard disk drives.

  • Ubuntu – is a Debian-based Linux operating system for personal computers, tablets and smartphones, where Ubuntu Touch edition is used; and also runs network servers, usually with the Ubuntu Server edition, either on physical or virtual servers (such as on mainframes) or with containers, that is with enterprise-class features; runs on the most popular architectures, including server-class ARM-based.
    Ubuntu is published by Canonical Ltd, who offer commercial support. It is based on free software and named after the Southern African philosophy of ubuntu (literally, 'human-ness'), which Canonical Ltd. suggests can be loosely translated as "humanity to others" or "I am what I am because of who we all are". It uses Unity as its default user interface for the desktop.

Ubuntu is the most popular operating system running in hosted environments, so–called "clouds", as it is the most popular server Linux distribution.

Development of Ubuntu is led by UK-based Canonical Ltd., a company of South African entrepreneur Mark Shuttleworth. Canonical generates revenue through the sale of technical support and other services related to Ubuntu. The Ubuntu project is publicly committed to the principles of open-source software development; people are encouraged to use free software, study how it works, improve upon it, and distribute it.*

  • USB – Universal Serial Bus, is an industry standard initially developed in the mid-1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices. It is currently developed by the USB Implementers Forum (USB IF).*
  • VMware - VMware, Inc. is a subsidiary of Dell Technologies that provides cloud and virtualisation software and services and claims to be the first to successfully virtualise the x86 architecture commercially. Founded in 1998, VMware is based in Palo Alto, California. In 2004, it was acquired by and became a subsidiary of EMC Corporation, then on August 14, 2007, EMC sold 15% of the company in a New York Stock Exchange IPO. The company trades under the symbol VMW.

VMware's desktop software runs on Microsoft Windows, Linux, and macOS, while its enterprise software hypervisors for servers, VMware ESX and VMware ESXi, are bare-metal hypervisors that run directly on server hardware without requiring an additional underlying operating system.*

  • Windows - is a metafamily of graphical operating systems developed, marketed, and sold by Microsoft. It consists of several families of operating systems, each of which cater to a certain sector of the computing industry with the OS typically associated with IBM PC compatible architecture. Active Windows families include Windows NT, Windows Embedded and Windows Phone; these may encompass subfamilies, e.g. Windows Embedded Compact (Windows CE) or Windows Server. Defunct Windows families include Windows 9x; Windows 10 Mobile is an active product, unrelated to the defunct family Windows Mobile.*

*(a part of) this information was found on Wikipedia

Specific information is to be found in the Mindtime Knowledge base


Information requestInformation requestFree demo accountFree demo account

Directly order one of our backup solutions?

Call +31 570 56 23 43 or leave your phone number and we call you back within 2 hours!

Login

(customers) (partners)