Secure Backup From and Transfer To Mobile Devices
|
|
- Rudolph Cole
- 8 years ago
- Views:
Transcription
1 Secure Backup From and Transfer To Mobile Devices Nagarajan S nagarajan.s@iiitb.org Neha Bhatia neha.bhatia@iiitb.org Savalia Jay Mansukhbhai jay.savalia@iiitb.org Tejaswini L. Naik tejaswini.naik@iiitb.org Ritika Wadhawan ritika.wadhawan@iiitb.org International Institute of Information Technology - Bangalore Technical Report IIITB-OS A April 2011
2 Abstract Some of our most precious personal data today belongs in the devices that are personal to us, specifically the mobile phone. And one of the hardest challenges in managing a device as precious as a mobile phone is safeguarding it against data loss in the event of an unexpected crash/loss of the device. A thorough system needs to be laid down that can guarantee the least possible amount of personal loss/damage in the unfortunate face of data loss. We present an application that guarantees periodic, uninterrupted and automated backup of your mobile device data. The application uses incremental backup to save your data onto a server dedicated for this purpose. Incremental backup means lesser data transferred per backup, and lower battery consumption. It also means that backup can be taken more frequently, since each incremental backup only uses a fraction of the space occupied by the actual data. Furthermore, the application allows the user to put a constraint on the bandwidth usage, if need be, so as to prevent the situation of the application hogging all the available bandwidth. The application guarantees complete restoration of the device data to any date for which the backup is available. Project URL: c 2011 Nagarajan S, Neha Bhatia, Savalia Jay Mansukhbhai, Tejaswini L. Naik, Ritika Wadhawan. This material is available under the Creative Commons Attribution-Noncommercial-Share Alike License. See for details.
3 Acknowledgement Our sincere thanks to Dr. Debabrata Das for his support and encouragement during the course of the project. We express our gratitude to Dr. Shrisha Rao for his guidance and to our advisor Dr. Jaya Sreevalsan Nair. Our sincere thanks to all the teaching-assistants for their support.
4 CONTENTS Contents 1 Introduction Problem Definition Technical Description Gap Analysis Components RSync diff Implementation Backup Process Restore Process Analysis and Results 18 5 Conclusion 20 References 21 A Appendix 23 A.1 Tools Required for development A.2 Deployment of RSync on the mobile device
5 LIST OF FIGURES List of Figures 1 RSync Network Protocol Backup Process Flow (Steps 1-3) at time t k Backup Process Flow (Step 4) at time t k Backup at time t 0 : Full Backup at time t 1 : Incremental Backup at time t 2 : Incremental Backup at time t 3 : Incremental Backup at time t 4 : Incremental Restore Process Flow at time t k Cost savings in incremental backup over full backup
6 1 INTRODUCTION 1 Introduction 1.1 Problem Definition To create a system that automatically takes a periodic backup from a mobile device, and can also be used to create a cloned device easily. 1.2 Technical Description The target platform for our application, the Nokia N810, runs on Maemo OS, an open source flavour of Debian- GNU/Linux. The device already comes shipped with a backup/restore facility, albeit a not-so-elegant one. This utility works by simply taking a complete backup of all of the device data, and that too onto the device itself. Complete backup every time backup is performed would mean redundancy, as copies of the same data are saved multiple times. In fact, performing backup when little or nothing is changed in the device would result in the same dump being created one more time. Also, backup onto the device is pointless if the device were to crash or be lost. Moreover, battery and network bandwidth are unnecessarily consumed for this purpose. Our application was built to overcome these drawbacks. It works on the principle of incremental backup that saves minimal amounts of data per backup, pertaining to only the changed data. If data is relatively unchanged since the last backup, then only metadata is saved, indicating that little or nothing has changed. Incremental backup provides the advantage of frequent backups at least cost, since each backup occupies only a fraction of the space taken up by the actual data. Network bandwidth is conserved as only the differences (delta) of the changed files is needed to synchronize the server copy of the backup to the client s copy. Hence, the backup/restore utility created saves time taken to transfer, space on the server and the battery consumed in the process. The application provides the facility of multiple restore-points, thus empowering the user to roll-back the device to any date for which a backup is available. 1.3 Gap Analysis The current market already provides plenty of solutions for mobile device backup. PC based tools provide backup/sync facilities between the mobile 6
7 2 COMPONENTS device and the PC [1][2][3]. There also exist Web-based services, some that still require a PC to assist synchronizing the mobile device to an online storage [4][5][6], and others that can run from the device itself [7]. These solutions, however, require the user to initiate the service, and perform the backup as required. Our product aims to solve this issue by providing a periodic solution to backup, one that runs at a specified frequency, and most importantly, without the user s intervention. The process is initiated directly from the device, and thus completely avoids the need to have a PC. Data is backed-up to an online server space dedicated for this purpose, providing the convenience of anywhere-anytime backed-up data availability. 2 Components 2.1 RSync RSync is a remote file (or data) synchronization protocol. It allows synchronization of files between two computers. i.e. ensure that both copies of the file are the same. If there are any differences, RSync detects these differences, and sends across the differences, so the client or server can update their copy of the file, to make the copies the same. [8] RSync is capable of synchronizing files without sending the whole file across the network [9]. Only data corresponding to about 2% of the total file size is exchanged, in addition to any new data in the file. New data has to be sent across the wire completely. The functioning of RSync is such that it can also be used as an incremental download/upload protocol, allowing upload or download of a file over many sessions [9]. If the current upload or download fails, it can just be resumed later. RSync is also an executable program on UNIX systems, which implements the RSync protocol. 7
8 2 COMPONENTS Figure 1: RSync Network Protocol Use of RSync in our application Our application uses RSync for synchronizing as well as minimizing file transfers between the mobile device and the backup server. Rsync does transfer only delta differences; however, it merges these differences into the previous backup, resulting in a larger conglomerate. The problem with this approach is that at any point of time, only the latest backup would be available to the user. Our application has been built by adding extra layers around RSync to achieve what is desired incremental backup. This has been detailed in Sec diff diff is the standard UNIX utility that is used to output the difference between two files or two directories. It forms an integral part of our application, and is being used to separate out the files changed since the last backup into a different location, thus providing restore points. More details in Sec. 3. 8
9 3 IMPLEMENTATION 3 Implementation The detailed functioning of the backup-restore model is as follows: For the very first time, the complete data of the mobile device is backed up onto the server. This constitutes the first full backup. Subsequently, every time the backup process is initiated, an incremental backup is performed. Incremental backup works by only saving the changes since the last backup. This includes: Newly added files since the last backup Modifications to files since the last backup Flagging of files deleted since the last backup In case of modified files, only the changes to the file (delta-difference) are transferred over the network, rather than having to send the whole files. The file is then reconstructed at the server side by merging the delta differences with the file in question from the previous backup (ref. Sec. 3.1 for more). The Backup and Restore process can be understood using the following mathematical model: Let X 0 represent the data initially present in the mobile device (client system) at time t 0. If a backup of this data is taken onto the server system, the server will contain a complete copy of X 0. Let X 1 represent the data in the mobile device at time t 1. Therefore, the difference in data generated since time t 0 is given by x 1 = X 1 X 0. Initiating backup at time t 1 would result in only x 1 being transferred over the network connection. At the server side, this x 1 is merged with (added to) X 0 to produce X 1. Generalizing this, at time t k when the system is at state X k, initiating backup would result in transfer of x k amount of data, which represents the data change since the last backup at time t k 1. The server s copy, which at time t k 1 was X k 1, would now be updated to X k as X k 1 + x k = X k. 9
10 3 IMPLEMENTATION 3.1 Backup Process Figure 2: Backup Process Flow (Steps 1-3) at time t k On the server, two copies of the sync folder are maintained, one for time t i (called current sync or simply, sync), and the other for time t i 1 (previous sync; initially empty at time t 0 ). Assume that the backup process is initiated at time t i = t k. Step 1 The device data is synchronized to the server sync location. RSync transfers x k worth of data, thereby bringing up the server sync location from state X k 1 to X k. This data is merged with the existing sync data, and all the files are brought up to date with the current versions of the same files on the client machine. 10
11 3 IMPLEMENTATION Step 2 The diff utility is then used to calculate the difference between the current sync and the previous sync. This gives us all the files that changed since the last backup. This forms the necessary incremental backup. Step 3 The list of files changed since last time, returned by diff, is stored in a separate bin in the Backup-data Store, a location on the server space that houses all the incremental backups. Note that the first such bin, marked X 0, represents the full backup taken at time t 0, while every other bin, taken at time i = 1, 2..k, represents the incremental backup at those times. Figure 3: Backup Process Flow (Step 4) at time t k Step 4 The previous sync location is locally synchronized with the current sync, to prepare it for the next incremental backup, at time t k+1. This 4-step cycle is repeated whenever backup is initiated. 11
12 3 IMPLEMENTATION Possible scenarios during backup The following scenarios illustrate how the incremental backup process handles the elementary situations of backup when (i) No backup is already present, (ii) A new file is added, (iii) A file is deleted, and (iv)(a),(b) When a file is modified. The purpose of these usecases is to provide an insight into how space saving and efficient incremental backup can be over full backup. Case (i): First time backup Figure 4: Backup at time t 0 : Full Prior to backup, the client and server rsync processes exchange metadata to enable to client to send only the relevant data. This metadata corresponds to about 2% of the total data size, and represents the hash values the data on the client/server used for comparison [9]. The first time, when no backup copy exists on the server, the client must transfer all of the files to the server. This is the only time when incremental backup is slightly more expensive than full backup, given that the 2% overhead is unavoidable. 12
13 3 IMPLEMENTATION Case (ii): New File Added Figure 5: Backup at time t 1 : Incremental Note that the files A,B and C have not changed since time t 0, whereas D has been newly created. Metadata exchanged prior to the start of actual data transfer would indicate to the client that the server already has the latest copies of all the files, except the one newly added (D). Thus, for the incremental backup at time t 1, the client only transfers the complete new file. The server side bin for incremental backup at t 1 simply consists of D, the complete file. 13
14 3 IMPLEMENTATION Case (iii): File Deleted Figure 6: Backup at time t 2 : Incremental In the case where a file has been deleted on the client, the client only infers this after examining the metadata it receives from the server side. Note that the case above is an elementary one, and so we are assuming that no other files have changed. The client now needs to send just metadata back to the server flagging the file for deletion. This information forms the incremental backup at time t 2 on the server side, and as such is used to infer which files are to be excluded from a given restore-point. 14
15 3 IMPLEMENTATION Case (iv)(a): File modified with increase in file size Figure 7: Backup at time t 3 : Incremental In the above case, files A and D have not changed, whereas C has been modified, and is now larger by 20 KB. The metadata exchanged between the server and client would indicate to the client that 20 KB of the file consists of new data, and also the percentage of the other 48 KB that has remained unchanged. The client therefore sends 20 KB pertaining to new data, and the percentage of changed data from the other 48 KB, along with the byte offsets. This exchange forms the delta difference of the file. At the server side, this delta difference is merged with the previous version of the file to form the complete file that is in synchronization with the client s copy. This complete file is stored in the incremental backup bin on the server for time t 3. 15
16 3 IMPLEMENTATION Case (iv)(b): File modified with reduction in file size Figure 8: Backup at time t 4 : Incremental This case is similar to Case 4, except this time the file size (of A) has been reduced by the simple deletion of data. If we are to assume that no part of the existing data was modified, only deleted, then the data transfer from the client to the server would only contain metadata. This metadata contains information such as the offsets of the bytes to be removed. In the same way as in Case 4, the changes indicated in the metadata file are applied on the previous version of the file to create one that is in synchronization with the client s copy. The bin at the server for the incremental backup at time t 4 consists of the complete changed file. 16
17 3 IMPLEMENTATION 3.2 Restore Process Figure 9: Restore Process Flow at time t k Step 1 The user selects a restore point, say X k, to roll back the system to. X k represents the state of the system as it was at time t k. The restore process communicates this restore point to the merger process on the server. Step 2 The merger recreates the state X k by incrementally adding the differences from each of the data bins in the Backup-data Store, starting from X 0, till the restore point is reached, as follows: X 0 + x 1 + x x k = X 0 + k x i = X k 17 i=1
18 4 ANALYSIS AND RESULTS Step 3 The restore-point dump created by the merger is synchronized to the device data dump on the client side, thus bringing the client device upto the desired restore-point. 4 Analysis and Results A comparison of full backup and incremental backup The device used for deploying and testing our application, the Nokia N810, already comes shipped with an inbuilt backup/restore tools, one that performs a full backup of the device data each time, regardless the fact that data backed-up previously is once again copied, leading to redundant copies. The heart of our application is the feature of incremental backup. Our tests show a big margin of savings in costs when performing incremental backup as against full backup each time. By costs, we mean overall smaller data transfer sizes, lesser bandwidth utilization, server-side space saving, and lower battery consumption. The following table and the following chart clearly illustrate the cost savings in incremental backup as against full backup. Time Actual data Data Transferred Data Transferred instant in device (KB) for full backup for incremental backup t t t t t t t t t t t Total
19 4 ANALYSIS AND RESULTS Figure 10: Cost savings in incremental backup over full backup The chart above shows the results of our observations over 10 successive incremental backups after the first full backup. The change of data in the device over the successive intervals can be considered to have resulted from a combination of added, deleted and modified files. Only for the initial run is incremental backup slightly more expensive than full backup. Every subsequent backup then transfers only a fraction of the actual data in the device. Overall, as is clear from the table above, incremental backup resulted in the storage of a mere KB of data, as against a massive KB of data by full backup. This indicates a saving of nearly 80% over just 10 backups. 19
20 5 CONCLUSION 5 Conclusion This project is an attempt at overcoming many of the shortfalls of several backup solutions in the market today. It provides the convenience of being able to run the backup directly from the device itself, and avoid the need for a secondary device such as a personal computer. The backup is incremental, which guarantees space savings with every backup, and ensures the affordability of more frequent backups. The process is automated and performed without the user s intervention. Since the backed-up data is not saved on the device itself, but onto a server dedicated for this purpose, it guarantees minimal loss in the unfortunate event of the device crashing/being lost. 20
21 REFERENCES References [1] Novosoft, Handy Backup v Data backup and disaster recovery software for Windows 7/Vista/XP/2000 and 2008/2003 Server, and Linux (under Wine). Retrieved January 18, 2011, from Handy Backup: [2] Avanquest Software, Mobile PhoneTools v4. Complete cell phoneto-pc communications solution. Retrieved January 19, 2011, from Avanquest Software: mobile-phonetools-4-bluetooth-version [3] Susteen, Data Pilot 7. Mobile Phone Data Transfer Solution. Retrieved January 19, 2011, from Data Pilot Home: datapilot.com/. [4] Vodafone, 360. Range of mobile services designed to help make life easier. Retrieved January 18, 2011, from Vodafone International: http: //vodafone360.com/. [5] Bloove Ltd., Bloove. Easy to use web-based mobile phone management system. Retrieved January 20, 2011, from Bloove Home: bloove.com/en/. [6] Anywr Ltd., Anywr. Connecting You. Retrieved January 19, 2011, from Anywr Home: [7] Tactel, Mobilical. Store your essential personal phone data in a secure place. Retrieved January 18, 2011, from Mobilical Home: mobical.net/. [8] Jakob Jenkov, RSync Explanation and Tutorial. Rsync Protocol and Implementation Tutorial. Retrieved February 16, 2011, from Jakob Jenkov s Tips and Tutorials: index.html. [9] Andrew Tridgell and Paul Mackerras, The RSync Algorithm, tech. rep. cs.anu.edu.au/techreports/1996/tr-cs pdf; accessed February 16, [10] Nokia Corporation, Nokia Forum for Maemo SDK Developers. Create PC-style applications for powerful Linux-based mobile devices. Retrieved January 15, 2011, from Nokia Tools 21
22 REFERENCES and Downloads: and_downloads/other/maemo/. [11] Maemo SDK Virtual Image Project, Maemo SDK Downloads and Documentation. Virtual images configured for Maemo applications development. Retrieved January 15, 2011, from Maemo VMWare Garage: [12] Maemo.ORG, Maemo SDK Releases. Global Collaborative for opensource Maemo mobile computing development. Retrieved January 15, 2011, from Maemo Development Community: development/sdks/. [13] Scratchbox.ORG, ScratchBox. A cross-compilation toolkit designed to make embedded Linux application development easier. Retrieved January 15, 2011, from :. [14] Maemo.ORG, ESbox 2nd Edition (final). A multi-platform Eclipse Ganymede-based IDE supporting Maemo development in Scratchbox. Retrieved January 15, 2011, from : org/2nd_edition/. [15] Nokia Corporation, Repositories for Nokia Internet Tablets. A collection of repositories for the Nokia N810. Retrieved February 16, 2011, from The Official Nokia Repository for Maemo OS2008/2007/2006: [16] Maemo.ORG, Maemo SDK Support. Maemo Package Management interface. Retrieved February 16, 2011, from Maemo Development Community: [17] Samba.ORG, RSync Sourcecode Repository. A collection of source code versions of RSync. Retrieved February 16, 2011, from RSync Source Repository: 22
23 A APPENDIX A Appendix Our backup/restore application was developed for and tested on the Nokia N810, an internet tablet. The following sections provide details on the tools required for the development and the process involved in deploying RSync on the mobile device. A.1 Tools Required for development The Nokia N810 runs Maemo OS, a flavour of Debian-GNU/Linux. The following tools will be required for development: Maemo SDK [10] [11], an emulator that runs the Maemo OS on a PC, enabling off-device development Linux OS (Maemo SDK is supported on Ubuntu 10.04) [12] ScratchBox, a cross-compilation toolkit designed to make embedded Linux application development easier. It also provides a full set of tools to integrate and cross-compile an entire Linux distribution. [13] ESBox, a multi-platform Eclipse Ganymede-based IDE supporting Maemo development in Scratchbox. [14] Note: The packages necessary to resolve dependencies created at the time of deployment of the application on the Nokia N810 may be found at [15] and [16]. A.2 Deployment of RSync on the mobile device RSync is used both on the server and the client as a file-synchronizer utility. RSync is readily available as an executable for the Intel i386 architecture. However, since the Nokia N810 uses the Armel architecture, the RSync source needs to be cross-compiled to produce the necessary binary executable file. The following procedure details the steps needed to cross compile RSync for the Arm processor: 23
24 A APPENDIX Steps to cross-compile RSync 1. Install Maemo SDK. This provides ScratchBox, the cross-compiler necessary to produce binaries for the ARM Architecture. 2. Download source code of Rsync (available as a.tar.gz file at [17]). 3. Extract the compressed archive. 4. On the PC, open the terminal and navigate to the folder created by uncompressing the RSync archive. 5. Run the following command to cross compile the source code of RSync:./configure CC=/scratchbox/compilers/cs2007q3-glibc2.5-arm7 /bin/arm-none-linux-gnueabi-gcc --host=armel 6. Transfer the binary produced from the compiled code to device. 7. On the device, open the terminal and run rsync using the command:./rsync <server-location> <client-location> 24
Web-Based Data Backup Solutions
"IMAGINE LOSING ALL YOUR IMPORTANT FILES, IS NOT OF WHAT FILES YOU LOSS BUT THE LOSS IN TIME, MONEY AND EFFORT YOU ARE INVESTED IN" The fact Based on statistics gathered from various sources: 1. 6% of
More informationREMOTE BACKUP-WHY SO VITAL?
REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote
More informationBACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER
Training course 2007 BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER Nicolas FUNKE PS2 ID : 45722 This document represents my internships technical report. I worked for the Biarritz's Town Hall during
More informationVembu NetworkBackup v3.1.1 GA
Vembu NetworkBackup v3.1.1 GA VEMBU TECHNOLOGIES www.vembu.com TRUSTED BY OVER 25,000 BUSINESSES Vembu NetworkBackup v3.1.1 GA - Release Notes With enhanced features and fixes boosting stability and performance,
More informationA block based storage model for remote online backups in a trust no one environment
A block based storage model for remote online backups in a trust no one environment http://www.duplicati.com/ Kenneth Skovhede (author, kenneth@duplicati.com) René Stach (editor, rene@duplicati.com) Abstract
More informationMore Efficient Virtualization Management: Templates
White Paper More Efficient Virtualization Management: Templates Learn more at www.swsoft.com/virtuozzo Published: November 2006 Revised: November 2006 Table of Contents Table of Contents... 2 OS, Middleware
More informationNAS 259 Protecting Your Data with Remote Sync (Rsync)
NAS 259 Protecting Your Data with Remote Sync (Rsync) Create and execute an Rsync backup job A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Having
More informationBusiness Continuity: Choosing the Right Technology Solution
Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail
More informationFileCruiser Backup & Restoring Guide
FileCruiser Backup & Restoring Guide Version: 0.3 FileCruiser Model: VA2600/VR2600 with SR1 Date: JAN 27, 2015 1 Index Index... 2 Introduction... 3 Backup Requirements... 6 Backup Set up... 7 Backup the
More informationMulti-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
More informationOnline Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
More informationRecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationCrashPlan PRO Enterprise Backup
CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for
More informationTalk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE
One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE Prevent Data Loss with Remote Online Backup Service The U.S. National Archives & Records Administration states that
More informationOnline Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
More informationOnline Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationProduct Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES
Product Brief DC-Protect Content based backup and recovery solution By DATACENTERTECHNOLOGIES 2002 DATACENTERTECHNOLOGIES N.V. All rights reserved. This document contains information proprietary and confidential
More informationVMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
More informationWhite Paper. CCRM Services on Cloud Benefits of Private Cloud for CCRM Services. Abstract. - Krishna Vaddadi
White Paper CCRM Services on Cloud Benefits of Private Cloud for CCRM Services - Krishna Vaddadi Abstract Configuration, Change and Release Management (CCRM) activities are the primary deliverables in
More informationOffloading file search operation for performance improvement of smart phones
Offloading file search operation for performance improvement of smart phones Ashutosh Jain mcs112566@cse.iitd.ac.in Vigya Sharma mcs112564@cse.iitd.ac.in Shehbaz Jaffer mcs112578@cse.iitd.ac.in Kolin Paul
More informationGetting Started Guide
Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server
More informationHitachi Content Platform (HCP)
Copyright 2014 A*STAR Version 1.0 Hitachi Content Platform (HCP) HCP and HCP Anywhere Features Evaluation THIS DOCUMENT AND THE INFORMATION CONTAINED HEREIN IS PROVIDED ON AN "AS IS" BASIS WITHOUT ANY
More informationCloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH
Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH CONTENTS Introduction... 4 System Components... 4 OpenNebula Cloud Management Toolkit... 4 VMware
More informationIntroduction. Summary of Functionality. Assured Restore On-line Remote Backup Service Description
Introduction. Over the past 10 years, digital content has grown exponentially. Not only that, but the reliance organisations place on crucial electronic data has grown commensurately with the volume growth,
More informationBootstrap guide for the File Station
Bootstrap guide for the File Station Introduction Through the File Server it is possible to store files and create automated backups on a reliable, redundant storage system. NOTE: this guide considers
More informationTABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2
Last modified on 08.11.2011 TABLE OF CONTENTS Introduction... 4 Features... 5 General Features... 5 Backup Features... 5 Restore Features... 6 Link for Application Download... 6 Install IBackup for Mac...
More informationBackupAssist Common Usage Scenarios
WHITEPAPER BackupAssist Version 5 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Table of Contents Introduction... 3 Disaster recovery for 2008, SBS2008 & EBS 2008... 4 Scenario 1: Daily backups with
More informationTertiary Backup objective is automated offsite backup of critical data
Tertiary Backups Entire System Including Windows Installation Data Files, Emails, Databases, Documents Not Important Important Critical Ultra Critical Tertiary Backup Tertiary Backup objective is automated
More informationDisk-to-Disk-to-Offsite Backups for SMBs with Retrospect
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use
More informationBacking Up Your System With rsnapshot
Roberto C. Sánchez Dayton Linux Users Group InstallFest Saturday, March 1, 2014 Overview About the Presenter About and Alternatives Installing Options in Configuring Other Operating Systems (e.g., Windows,
More informationLogMeIn Backup. User Guide
LogMeIn Backup User Guide Contents About LogMeIn Backup...4 Getting Started with LogMeIn Backup...5 How does LogMeIn Backup Work, at-a-glance?...5 About Security in LogMeIn Backup...5 LogMeIn Backup System
More informationHow To Backup A Database In Navision
Making Database Backups in Microsoft Business Solutions Navision MAKING DATABASE BACKUPS IN MICROSOFT BUSINESS SOLUTIONS NAVISION DISCLAIMER This material is for informational purposes only. Microsoft
More information1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
More informationIntroweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
More informationSuccessfully managing geographically distributed development
IBM Rational SCM solutions for distributed development August 2004 Successfully managing geographically distributed development Karen Wade SCM Product Marketing Manager IBM Software Group Page 2 Contents
More informationOnline Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
More informationRsync Internet Backup Whitepaper
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Important notice about terminology... 3 Rsync: An overview... 3 Performance... 4 Summary...
More informationOnline Backup Plus Frequently Asked Questions
Online Backup Plus Frequently Asked Questions 1 INSTALLATION 1.1 Who installs the Redstor Online Backup Plus service? 1.2 How does the installed client connect to Redstor s Cloud Platform? 1.3 On which
More informationVMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
More informationLog files management. Katarzyna KAPUSTA
Log files management Katarzyna KAPUSTA CERN openlab 07 September 2012 CERN openlab otn-2012-01 openlab Summer Student Report Log files management Katarzyna KAPUSTA Giacomo TENAGLIA 07 September 2012 Version
More informationBest Practices for Deploying and Managing Linux with Red Hat Network
Best Practices for Deploying and Managing Linux with Red Hat Network Abstract This technical whitepaper provides a best practices overview for companies deploying and managing their open source environment
More informationTandberg Data AccuVault RDX
Tandberg Data AccuVault RDX Binary Testing conducts an independent evaluation and performance test of Tandberg Data s latest small business backup appliance. Data backup is essential to their survival
More informationYiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1
EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction
More informationHow To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
More informationInstallation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
More informationFile Protection using rsync. Setup guide
File Protection using rsync Setup guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Rsync technology... 3 Terminology... 3 Implementation... 3 3. Rsync data hosts...
More informationDiagram 1: Islands of storage across a digital broadcast workflow
XOR MEDIA CLOUD AQUA Big Data and Traditional Storage The era of big data imposes new challenges on the storage technology industry. As companies accumulate massive amounts of data from video, sound, database,
More informationNETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationHERO-DefendeRx & Secure-Cloud Overview
Failback/Restore-Should a failure occur, HEROware manages the Failback and Restore process for you. Please contact HEROware technical support to schedule your restoration process. HEROware s goal is simple,
More informationOverview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
More informationIn order to upload a VM you need to have a VM image in one of the following formats:
What is VM Upload? 1. VM Upload allows you to import your own VM and add it to your environment running on CloudShare. This provides a convenient way to upload VMs and appliances which were already built.
More informationEvolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016
Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission
More informationSymantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
More informationHigh Level Design Distributed Network Traffic Controller
High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction
More informationtechsafe Features Technology Partners - 2955 20th Street - Vero Beach, FL 32960 - www.techpart.net - (772) 299-5178 Page 1/9 0910080-01
techsafe Features Page 1/9 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 5 Security File Compression Encryption Transmission
More informationIBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
More informationVirtualization Techniques for Cross Platform Automated Software Builds, Tests and Deployment
Virtualization Techniques for Cross Platform Automated Software Builds, Tests and Deployment Thomas Müller and Alois Knoll Robotics and Embedded Systems Technische Universität München Blotzmannstr. 3,
More informationCROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION
1 E N D U R A D A T A EDpCloud: A File Synchronization, Data Replication and Wide Area Data Distribution Solution CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION 2 Resilient
More informationROADMAP TO DEFINE A BACKUP STRATEGY FOR SAP APPLICATIONS Helps you to analyze and define a robust backup strategy
A BasisOnDemand.com White Paper ROADMAP TO DEFINE A BACKUP STRATEGY FOR SAP APPLICATIONS Helps you to analyze and define a robust backup strategy by Prakash Palani (Prakash.Palani@basisondemand.com) Table
More informationLogMeIn Backup User Guide
LogMeIn Backup User Guide Contents About LogMeIn Backup...4 Getting Started with LogMeIn Backup...5 How does LogMeIn Backup Work, at-a-glance?...5 About Security in LogMeIn Backup...5 LogMeIn Backup System
More informationWorkflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
More informationCentralized Disaster Recovery using RDS
Centralized Disaster Recovery using RDS RDS is a cross-platform, scheduled replication application. Using RDS s replication and scheduling capabilities, a Centralized Disaster Recovery model may be used
More informationBackup and Recovery in Laserfiche 8. White Paper
Backup and Recovery in Laserfiche 8 White Paper July 2008 The information contained in this document represents the current view of Compulink Management Center, Inc on the issues discussed as of the date
More informationSMART Solutions for Active Directory Migrations
SMART Solutions for Active Directory Migrations Challenges of Active Directory Migrations Types of Active Directory Migrations Intra- Forest Migration between Domains in the Same Forest Separate a Forest
More informationMake life simple and make more money the easy way.
Technical factsheet Make life simple and make more money the easy way. MAX Backup - fast, reliable, automatic, offsite, secure backup and disaster recovery to make your life easier! No more worrying about
More informationBackupPC. Network Startup Resource Center www.nsrc.org
BackupPC Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationWHITE PAPER. Altiris Recovery Products for DELL Customers. Produced By Product Management Altiris. August 6, 2003.
Altiris Recovery Products for DELL Customers Produced By Product Management Altiris August 6, 2003 By Todd Mitchell 2003 Altiris, Inc. All Rights Reserved Altiris Recovery Solution 5.7 Page 2 Notice The
More informationBackups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete
Backups User Guide for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot
More informationCA ARCserve Family r15
CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing
More informationProduct Brief. it s Backed Up
Product Brief it s Backed Up IT Authorities, Inc. 1/11/2010 Table of Contents Contents Table of Contents... 2 it s Backed Up... 3 Backup... 3 Backup, Continued... 4 Backup, Continued... 5 Application Aware
More informationStorage Guardian Remote Backup Restore and Archive Services
Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,
More informationPerforce Backup Strategy & Disaster Recovery at National Instruments
Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir National Instruments Perforce User Conference April 2005-1 - Contents 1. Introduction 2. Development Environment 3. Architecture
More informationInfortrend EonNAS 3000 and 5000: Key System Features
Infortrend EonNAS 3000 and 5000: Key System Features White paper Abstract This document introduces Infortrend s EonNAS 3000 and 5000 systems and analyzes key features available on these systems. Table
More informationGLOSSARY OF TECHNICAL TERMS
This glossary contains explanations of certain terms, definitions and abbreviations used in this document in connection with our Group and our business. The terms and their meanings may not correspond
More informationCobian9 Backup Program - Amanita
The problem with backup software Cobian9 Backup Program - Amanita Due to the quixotic nature of Windows computers, viruses and possibility of hardware failure many programs are available for backing up
More informationCTERA Agent for Linux
User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationService Overview CloudCare Online Backup
Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
More informationPRESENTS... Reasons to Switch from SourceSafe: How to Make Your Life Easier with SourceAnywhere Standalone
Standalone PRESENTS... Reasons to Switch from SourceSafe: How to Make Your Life Easier with SourceAnywhere Standalone Most developers are familiar with Visual SourceSafe. It's a popular version control
More informationTwo-Level Metadata Management for Data Deduplication System
Two-Level Metadata Management for Data Deduplication System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3.,Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea { kongjs,
More informationVolume SYNAMETRICS TECHNOLOGIES. A Division of IndusSoft Technologies, Inc. DeltaCopy User s Guide
Volume 1 SYNAMETRICS TECHNOLOGIES A Division of IndusSoft Technologies, Inc DeltaCopy User s Guide SYNAMETRICS TECHNOLOGIES DeltaCopy User s Guide Synametrics Technologies 27 Sand Hill Ct., Jamesburg,
More informationXopero Centrally managed backup solution. User Manual
Centrally managed backup solution User Manual Contents Desktop application...2 Requirements...2 The installation process...3 Logging in to the application...6 First logging in to the application...7 First
More informationIDrive, is a service offered by Pro Softnet Corporation, an ASP and Internet Solutions Provider, based in Woodland Hills, CA.
www.idrive.com Backup Review Rating (4 stars out of possible 5) Reviewed on July 27, 2008 Summary IDrive, is a service offered by Pro Softnet Corporation, an ASP and Internet Solutions Provider, based
More informationM Y S E C U R E B A C K U P. p r o d u c t o v e r v i e w O N L I N E B U S I N E S S B A C K U P
O N L I N E B U S I N E S S B A C K U P Protect your company s files against loss, theft, viruses, and natural disasters. Share business data securely and privately in the office or across the globe. Sync
More informationFAQ. Hosted Data Disaster Protection
Hosted Data Disaster Protection Flexiion is based in the UK and delivers Infrastructure as a Service (IaaS) solutions, making the advantages of the Cloud and IaaS more accessible to mid-size, professional
More informationGLOSSARY OF TECHNICAL TERMS
This glossary contains explanations of certain terms, definitions and abbreviations used in this prospectus in connection with our Group and our business. The terms and their meanings may not correspond
More informationOrixcloud Backup Client. Frequently Asked Questions
Frequently Asked Questions Version 1.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means. No rights
More informationCUBRID Backup & Restore Part I (Backup)
CUBRID Backup & Restore Part I (Backup) January 2011 The scope of this tutorial is to introduce the CUBRID capabilities for database backup & restore. The tutorial is split into two parts: - Part I: Backup
More informationinforouter Version 8.0 Administrator s Backup, Restore & Disaster Recovery Guide
inforouter Version 8.0 Administrator s Backup, Restore & Disaster Recovery Guide Active Innovations, Inc. Names of all products herein are used for identification purposes only and are trademarks and/or
More informationCloud Sync White Paper. Based on DSM 6.0
Cloud Sync White Paper Based on DSM 6.0 1 Table of Contents Introduction 3 Product Features 4 Synchronization 5 Architecture File System Monitor (Local change notification) Event/List Monitor (Remote change
More informationBackup and Recovery for Microsoft Hyper-V Using Best Practices Planning. Brien M. Posey
Backup and Recovery for Microsoft Hyper-V Using Best Practices Planning Brien M. Posey Introduction There usually isn t anything overly complicated about backing up a physical datacenter. While it s true
More informationModule 5 Introduction to Processes and Controls
IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development
More informationTable of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation
User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended
More informationTotal Backup Recovery 7
7 TM 7 Automat backup and restore management for all networked laptops & workstations from a centralized administrating console 7 Advanced Workstation assures that critical business information is well
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More informationSeagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts
Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide 2 Purpose of this guide Experience the most common use cases for the product, learn about
More informationBackup with synchronization/ replication
Backup with synchronization/ replication Peer-to-peer synchronization and replication software can augment and simplify existing data backup and retrieval systems. BY PAUL MARSALA May, 2001 According to
More informationPeer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
More informationVMware vsphere Data Protection 6.1
VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data
More informationEnterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
More informationXpresstransfer Online Backup Manager General Technical FAQ
Xpresstransfer Online Backup Manager General Technical FAQ 1. General..... 2 1.1. Can you explain the concept briefly on how the Xpresstransfer software works?... 2 2. Xpresstransfer Online Backup Manager
More information