Security

Cloud disaster recovery
Cloud Disaster Recovery: well-prepared for worst case scenario
  • Security

One of the biggest tasks for IT managers is to ensure the long-term security of data, software, and hardware. Where issues arise, a rapid recovery is essential. Cloud Disaster Recovery (Cloud DR) is a concept that is ideally suited for these purposes. But what exactly distinguishes cloud protection and how does it differ from conventional backup solutions?

Cloud Disaster Recovery: well-prepared for worst case scenario
Data sovereignty
Data sovereignty: an explanation
  • Security

What happens to digital data after a company stores contacts, emails, and files in the cloud? Businesses that work with third-party providers need to know who retains data sovereignty over business and customer data when it is stored on external servers. Read on to find out how data sovereignty is legally regulated.

Data sovereignty: an explanation
RAID 10
RAID 10: Mirroring and striping combined
  • Security

RAIDs are a good solution for improving the performance of hard drives. The individual standardized levels provide different approaches to boost reliability or the throughput rate of system networks. RAID 10 relies on complete data redundancy. Data is stored in a distributed manner and can be read quickly. Find out what’s behind the RAID level!

RAID 10: Mirroring and striping combined
RAID 6
RAID 6: Storage technology to minimize data loss
  • Security

Combining hard drives to form a RAID is an attractive solution to optimize the performance and security of individual drives. One such approach that’s been hailed for its high safety factor is the RAID 6 technology. As an extension to the popular RAID 5 level, this network protects from data loss when two hard drives fail – all without having to duplicate your data manually.

RAID 6: Storage technology to minimize data loss
RAID 5
RAID 5: What you need to know about the RAID level
  • Security

A Redundant Array of Independent Disks (RAID) can be used to improve data security or the performance of storage solutions. The specific advantages of a network depend on the selected RAID level. Find out how RAID 5 – a system of three or more hard drives – can improve security and throughput rate.

RAID 5: What you need to know about the RAID level
RAID 1
RAID 1: understanding the hard disk compound
  • Security

Hardly a storage concept embodies the RAID principle (Redundant Arrays of Independent Disks) as well as RAID 1 in which two or more hard disks are linked to save copies of data for access in case of system failure. Find out more about RAID 1 and why mirroring makes this network so special.

RAID 1: understanding the hard disk compound
RAID 0
RAID 0: what’s behind the RAID level?
  • Security

A Redundant Array of Independent Disks, or RAID for short, is a combination of several hard disks to form a single logical drive. Systems like these typically follows a redundant storage concept for higher security. The standard RAID 0 is an exception because it only seeks to optimize the data throughput by coupling several hard drives.

RAID 0: what’s behind the RAID level?
RAID
What is RAID (Redundant Array of Independent Disks)?
  • Security

When the RAID concept was first introduced in the late 1980s, it was primarily intended as an alternative to high cost hard drives on mainframes. While the issue of cost has shifted somewhat into the background, RAID storage systems are still in demand because of their high reliability in a server environment. What’s behind the technology and what are the various RAID levels?

What is RAID (Redundant Array of Independent Disks)?
What is metadata?
What is metadata?
  • Web development

Metadata is generated by many applications in the digital world. If this data is collected and analyzed en masse, it poses a serious risk to privacy. But metadata doesn’t have to be dangerous. The term is broad and encompasses a lot of useful techniques. In this article we’ll explore the meaning of metadata with some examples.

What is metadata?
Encryption methods: An overview
Encryption methods: An overview
  • Security

E-mail, instant messaging, or voice-over IP: If you want to communicate over the internet, you should make sure that the data transfer process can be trusted. The same goes for the World Wide Web. With online banking and digital shopping, money transactions are increasingly being carried out online. Popular encryption methods like DES, AES, or RSA should guarantee the security of passwords, credit...

Encryption methods: An overview