136:
218:
454:
321:
213:
115:
439:
223:
396:
444:
240:
362:
203:
51:
449:
193:
384:
95:
71:
408:
304:
8:
272:
267:
299:
208:
287:
262:
420:
379:
333:
119:
75:
55:
17:
99:
433:
374:
350:
282:
277:
257:
198:
316:
235:
181:
48:
35:
This category has the following 4 subcategories, out of 4 total.
148:
135:
The following 35 pages are in this category, out of 35 total.
92:
22:
252:
345:
168:
161:
219:Business continuity and disaster recovery auditing
431:
322:Key Management Interoperability Protocol
137:This list may not reflect recent changes
214:Buffalo network-attached storage series
432:
30:
13:
141:
37:
29:
14:
466:
455:Fault-tolerant computer systems
1:
224:Business continuity planning
130:
7:
397:Snapshot (computer storage)
10:
471:
241:Continuous data protection
132:Pages in category "Backup"
16:The main article for this
15:
363:Off-site data protection
204:Glossary of backup terms
194:Backup rotation scheme
116:Online backup services
440:Computer data storage
385:Remote backup service
409:Virtual tape library
305:IT disaster recovery
273:Differential backup
268:Defensive computing
300:Incremental backup
209:Bare-metal restore
445:Disaster recovery
288:Disk-based backup
263:Data preservation
462:
421:World Backup Day
380:Recovery Toolbox
171:
164:
121:
101:
94:
77:
57:
50:
470:
469:
465:
464:
463:
461:
460:
459:
430:
429:
428:
427:
426:
425:
413:
401:
389:
367:
355:
338:
334:LAN-free backup
326:
309:
292:
245:
228:
186:
174:
167:
160:
153:
129:
128:
127:
126:
123:
122:
106:
103:
102:
91:
82:
79:
78:
62:
59:
58:
52:Backup software
47:
28:
27:
12:
11:
5:
468:
458:
457:
452:
447:
442:
424:
423:
417:
414:
412:
411:
405:
402:
400:
399:
393:
390:
388:
387:
382:
377:
371:
368:
366:
365:
359:
356:
354:
353:
348:
342:
339:
337:
336:
330:
327:
325:
324:
319:
313:
310:
308:
307:
302:
296:
293:
291:
290:
285:
280:
275:
270:
265:
260:
255:
249:
246:
244:
243:
238:
232:
229:
227:
226:
221:
216:
211:
206:
201:
196:
190:
187:
185:
184:
178:
175:
173:
172:
165:
157:
154:
152:
151:
145:
143:
142:
133:
125:
124:
114:
113:
110:
107:
105:
104:
90:
89:
86:
83:
81:
80:
70:
69:
66:
63:
61:
60:
46:
45:
42:
39:
38:
33:
9:
6:
4:
3:
2:
467:
456:
453:
451:
450:Data security
448:
446:
443:
441:
438:
437:
435:
422:
419:
418:
415:
410:
407:
406:
403:
398:
395:
394:
391:
386:
383:
381:
378:
376:
375:Data recovery
373:
372:
369:
364:
361:
360:
357:
352:
351:NEC HYDRAstor
349:
347:
344:
343:
340:
335:
332:
331:
328:
323:
320:
318:
315:
314:
311:
306:
303:
301:
298:
297:
294:
289:
286:
284:
281:
279:
276:
274:
271:
269:
266:
264:
261:
259:
256:
254:
251:
250:
247:
242:
239:
237:
234:
233:
230:
225:
222:
220:
217:
215:
212:
210:
207:
205:
202:
200:
197:
195:
192:
191:
188:
183:
180:
179:
176:
170:
166:
163:
159:
158:
155:
150:
147:
146:
144:
140:
138:
131:
117:
112:
111:
108:
97:
93:
88:
87:
84:
73:
68:
67:
64:
53:
49:
44:
43:
40:
36:
32:Subcategories
31:
25:
24:
19:
283:Disk staging
278:Disk cloning
258:Data embassy
134:
96:System image
72:Disk cloning
34:
21:
199:Backup site
56:(5 C, 60 P)
434:Categories
100:(3 C, 1 P)
317:KeepVault
236:Cold data
182:Autosave
18:category
149:Backup
120:(35 P)
76:(16 P)
23:Backup
253:D/CAS
346:NDMP
169:.xlk
162:.wbk
20:is
436::
139:.
118:
98:
74:
54:
416:W
404:V
392:S
370:R
358:O
341:N
329:L
312:K
295:I
248:D
231:C
189:B
177:A
156:.
109:O
85:I
65:D
41:B
26:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.