Backup and Recovery Blog
What is Continuous Data Protection? CDP Backup Advantages & Drawbacks. Continuous Data Protection is a method of disaster protection that constantly updates every little detail that changes in a user’s database or file set. In other words, it automatically saves a copy of every change of that data, essentially recording each version of the data…
RedHat OpenShift enables users to provision, instantiate, run, and manage a modular bundle comprising a computing platform and a number of applications, significantly reducing the complexity of building and maintaining the infrastructure that would likely be associated with developing and launching the applications and services needed. OpenShift represents a specific approach to how virtual machines,…
Bacula Systems is proud to announce Bacula Enterprise Version 16. New features also include low cost Google Workspace, M365 and Azure VM backup to eliminate capacity-based licensing, helping users to consolidate diverse IT estates and drive costs down. Andrue Netcher, BIT Engineering Manager at Warner Bros Discovery, said “Bacula gives us the higher security backup…
Congratulations to NASA for the successful launch of Artemis. That’s a lot of incoming data to backup and protect! Bacula is a proud supplier of advanced backup and recovery advanced technology to NASA. NASA’s Artemis mission is a perfect example of the needs of many of Bacula’s government-vertical customers. Security and scalability continue to be…
In the digital world, regular backups are an absolute must and unavoidable. There is nothing worse than the sudden loss of your documents, photos or videos. NAS backups allow you to back up data using the so-called 3-2-1 method. This method consists of three different copies of data: two internal media and one external backup….
Introduction to Nutanix Nutanix is a hybrid software platform with a focus on scalability. This kind of scalability is possible because of HCI – Hyper-Converged Infrastructure, which is a system of individual server instances that can act as a unified single system with the help of the aforementioned software platform. Each individual server is called…
Introduction to Sybase and SAP IQ Sybase Inc. was a software company providing software for enterprises with the main purpose of managing information in relational databases, with their efforts mostly focused on a product with a similar name – Sybase IQ (Intelligent Query). The Sybase company was acquired by SAP in 2010, and SAP ceased…
Introduction to RHEV RHEV stands for Red Hat Enterprise Virtualization (often called RHV). It is a virtualization platform from Red Hat that combines RHEL server OS (Red Hat Enterprise Linux) with the KVM hypervisor (Kernel-based Virtualization Machine) and works with both desktop and server environments. At its core, RHV provides a centralized VM management server…
Introduction Generally speaking, there is an argument to say that backup and recovery has been somewhat neglected by some IT departments over time. In some instances, it is not uncommon for an organization to give the topic the priority it deserves and start thinking about backing up their data correctly only after some sort of…
If you run an organization, you will know it is critical to protect your data. Losing information or having your system suddenly go down is costly, as unplanned outages can affect your productivity and severely impact your business reputation. This is why many businesses rely on hybrid and multi-cloud environments to keep their systems and…
What is PostgreSQL and why does it need to be backed up? PostgreSQL is a plugin designed to simplify backup and restore procedures. There are many reasons why your databases might be at risk. For example, device failure (which can lead to all instances becoming unavailable), data corruption (which can also spread across replicas), software…
VMware backup solutions Data backup is an important, if not often critical solution, to nearly all problems that may cause or result in data loss – be it because of hardware failure, ransomware attacks, natural disasters, internal tampering or any other similar reasons. This applies in exactly the same way to other types of systems…