Backup data: directly on the system or apply the Cloud model
QuanTriMang - The process of backing up data is extremely important when using or managing any computer system. So far, we often apply basic backup methods such as using external hard drives, RAID, burning data to CD / DVD . And today, the concept of cloud computing - Cloud, born also brings more convenience and choice for users. In the following article, we will review the advantages and disadvantages of these data storage methods.
For direct storage on the system, we will have the following advantages:
- Directly manage data.
- Can bring this data (because it is saved by CD / DVD, USB Flash, portable hard drive)
- Can be accessed at any time, without Internet access.
- Easily copy and paste between different devices.
Disadvantages of this method:
- Need space to store storage devices.
- Hardware failure can occur at any time.
- Cannot use if you forget to bring that device.
- When you are visited by a thief or an accident, disaster such as a house fire, earthquake, flood . then your data will disappear.
If you are a person who often moves and carries little furniture, then using the Cloud model is perfectly appropriate. You may lose your laptop, your hard drive crash . any risks happen, but your data is safe. Some advantages of Cloud backup method can be mentioned as follows:
- No need of support devices such as: CD / DVD, USB Flash, portable hard drive .
- Can access and use data wherever there is an Internet connection.
- No worries about space or storage methods.
- Completely assured of data no matter what happens.
Defect:
- It is not always possible to access and use.
- In case of hardware risks can still occur, but this time for backup service providers.
- Can only be used if there is an Internet connection.
- When that unit needs to maintain or upgrade the system, stop providing services due to financial difficulties or some force majeure circumstances, you will have to find a way to save all data on the internal system. .
- If hackers get past the security unit's security wall, your risk of losing your data is almost 100%.
If you want, you can apply the combination of both methods. You can support each other if there is a problem with one of the two options, furthermore depending on your needs and working goals, choose the appropriate way.
[#Poll (12) #]
You should read it
- The NSA identifies 4 'critical' security vulnerabilities of cloud systems
- Cloud computing can develop in a relatively different direction in the next few years
- Live Mesh and security related
- Cloud computing transforms how to prevent viruses?
- Establish effective cloud security platform with 5 basic steps
- Learn about Amazon EC2 service
- Things to know when storing data on 'cloud'
- The 3 most popular attacks targeting clouds today
- Learn to use lesson computer 14 - Learn about cloud storage
- Learn about Cloud Computing
- Learn about Public Cloud, Private Cloud and Hybrid Cloud
- New weapons against malicious code are 'cloud' computing.
Maybe you are interested
How to get data from web into Excel
What information does a VPN hide? How does it protect your data?
How to transfer data between 2 Google Drive accounts
6 Data Collecting Apps You Need to Delete for Better Privacy
How to master numerical data in Google Sheets with the AVERAGE function
How to delete white space in a table in Word - Appears right below the data