Backup data: directly on the system or apply the Cloud model
QuanTriMang - The process of backing up data is extremely important when using or managing any computer system. So far, we often apply basic backup methods such as using external hard drives, RAID, burning data to CD / DVD . And today, the concept of cloud computing - Cloud, born also brings more convenience and choice for users. In the following article, we will review the advantages and disadvantages of these data storage methods.
For direct storage on the system, we will have the following advantages:
- Directly manage data.
- Can bring this data (because it is saved by CD / DVD, USB Flash, portable hard drive)
- Can be accessed at any time, without Internet access.
- Easily copy and paste between different devices.
Disadvantages of this method:
- Need space to store storage devices.
- Hardware failure can occur at any time.
- Cannot use if you forget to bring that device.
- When you are visited by a thief or an accident, disaster such as a house fire, earthquake, flood . then your data will disappear.
If you are a person who often moves and carries little furniture, then using the Cloud model is perfectly appropriate. You may lose your laptop, your hard drive crash . any risks happen, but your data is safe. Some advantages of Cloud backup method can be mentioned as follows:
- No need of support devices such as: CD / DVD, USB Flash, portable hard drive .
- Can access and use data wherever there is an Internet connection.
- No worries about space or storage methods.
- Completely assured of data no matter what happens.
Defect:
- It is not always possible to access and use.
- In case of hardware risks can still occur, but this time for backup service providers.
- Can only be used if there is an Internet connection.
- When that unit needs to maintain or upgrade the system, stop providing services due to financial difficulties or some force majeure circumstances, you will have to find a way to save all data on the internal system. .
- If hackers get past the security unit's security wall, your risk of losing your data is almost 100%.
If you want, you can apply the combination of both methods. You can support each other if there is a problem with one of the two options, furthermore depending on your needs and working goals, choose the appropriate way.
[#Poll (12) #]
You should read it
- Live Mesh and security related
- Cloud computing transforms how to prevent viruses?
- Establish effective cloud security platform with 5 basic steps
- Learn about Amazon EC2 service
- Things to know when storing data on 'cloud'
- The 3 most popular attacks targeting clouds today
- Learn to use lesson computer 14 - Learn about cloud storage
- Learn about Cloud Computing
May be interested
- Beware of phishing emails impersonating Facebookrecently a lot of people received emails sent from facebookmail.com, and these letters look exactly like any facebook notification emails, but this is actually a rather sophisticated scam. of hacker...
- Microsoft blocked IE attacks with smart tacticslast tuesday, microsoft provided users with a 'sub-lining' application - shim - capable of blocking attacks aimed at ie when they exploited a bug discovered last month.
- Microsoft patched a critical vulnerability in Windowsyesterday microsoft patched three vulnerabilities in windows, one of which could be exploited by attacks that trick users into accessing malicious websites.
- VND 100 billion for high-tech crime preventiongeneral nguyen said, in addition to investing heavily, the ministry of public security also established additional functional units to ensure information security.
- Avoid threats from the Internetthe internet is always a threat to everyone who surfs the internet, even for those who know and guard it. therefore, whether a professional or a non-professional in the field of computing ...
- Microsoft provides February patch to terminate 22 errorsyesterday, microsoft released 12 security updates and 22 bugs in windows, internet explorer (ie), office and its internet server software.