Backup

RAID 1
RAID 1
  • Security

Hardly a storage concept embodies the RAID principle (Redundant Arrays of Independent Disks) as well as RAID 1 in which two or more hard disks are linked to save copies of data for access in case of system failure. Find out more about RAID 1 and why mirroring makes this network so special.

RAID 1
Best Android cloud apps
The 9 best Android cloud apps – securing your smartphone data
  • Tools

As Android smartphone users will know, a complete backup of the operating system can only be created with the internal backup function that leaves a lot to be desired. The solution? Using a cloud storage solution like Google Drive. However, if you don’t feel comfortable handing all your data over to Google, you will have to search for another online Android storage option to back-up your personal...

The 9 best Android cloud apps – securing your smartphone data
How does data backup work for databases?
How to backup databases
  • Security

Backing up your data is a popular option for securing your database. In order to create backup copies, you need additional hardware and to install a suitable backup structure. How do you secure your own network and web server against attacks and proceed to protect your databases?

How to backup databases
DRaaS
Disaster Recovery as a Service (DRaaS)
  • Security

Throughout the course of digitization, employees and employers became aware of the importance of backups. The 3-2-1 rule was considered the golden rule - where two redundant copies of each file are kept. As technology continues to evolve, cloud-based solutions are becoming more popular. Thus, Disaster Recovery as a Service has established itself as an important cloud service.

Disaster Recovery as a Service (DRaaS)
Backing up data
How to back up data
  • Security

Whether important documents or holiday photos: regular data backups on your PC or smartphone should be part of your digital routine. A regular back up of data is crucial for all companies, especially since more and more processes are being digitalized. Find out what’s important when backing up data, how to perform a data back up, and what the pros and cons of various storage media are.

How to back up data
3-2-1 backup rule
What is the 3-2-1 backup rule?
  • Security

In our digital age data is more important than ever before. This also means that the risks of partial or complete data loss are high. Luckily, there are plenty of options to back up your data. The 3-2-1 backup rule is one such formula. Find out what it means and how private individuals and companies can make the best use of the 3-2-1 backup.

What is the 3-2-1 backup rule?
SSD life span
How long is a SSD lifespan?
  • Security

SSD life span is an important factor in data security and efficient backup strategies. Are electronic flash memories as reliable as classic hard drives with magnetic storage? When does their service life end, and are there any indications of an imminent failure? What should you do in the event of an emergency? Is data recovery possible, and is it even worth it?

How long is a SSD lifespan?
RAID 10
What is RAID 10?
  • Security

RAIDs are a good solution for improving the performance of hard drives. The individual standardized levels provide different approaches to boost reliability or the throughput rate of system networks. RAID 10 relies on complete data redundancy. Data is stored in a distributed manner and can be read quickly. Find out what’s behind the RAID level!

What is RAID 10?
What is a backup?
What is a Backup?
  • Security

Technical issues, hacker attacks, and malware can lead to costly and serious data loss at any time. To minimize the risks, it is recommended that you perform regular comprehensive backups. It is important to have a suitable backup strategy that properly meets your specific requirements.

What is a Backup?
Securing servers with Fail2ban
How to Setup Fail2Ban
  • Security

For server operators, security is of the utmost importance. Only those who have developed and set up a foolproof defense strategy are ready for drastic situations. As well as regular protection mechanisms, like security software, backups, and encryption, there are also some useful tools and frameworks that may come in handy in the fight against intruders. We have laid out essential details on the...

How to Setup Fail2Ban