Tutorials
Tutorials
-
How to restore a Kubernetes cluster from an etcd snapshot
In case of an event that leads to the loss of a Kubernetes cluster, it's important to be restore-ready. Here's how to restore a cluster from an etcd snapshot with commands. Continue Reading
-
Choose the right remote site backup approach
Remote office backup is mission-critical for organizations that have employees working outside of the main office. Explore options for this type of data protection. Continue Reading
-
Backup testing: A step-by-step tutorial
Testing backups is a key piece of the data protection puzzle. Explore the different approaches and frequencies you can use to make sure your backups work. Continue Reading
-
6 best practices for choosing a cloud backup provider
Learn six criteria for choosing the best cloud backup vendor for your organization. Key among these is knowing your unique needs. Continue Reading
-
Inline deduplication vs. post-processing: Data dedupe best practices
Will inline or post-processing deduplication work better for your data protection platform? There are several products on the market that offer these capabilities. Continue Reading
-
Tape backup encryption best practices
Tape backup encryption is being used for many organizations, but figuring out how to implement it can be challenging. Learn about tape encryption best practices in this article. Continue Reading
-
VMware backup software and a vSphere backup solution checklist
In this tutorial, we look at the questions you'll face when choosing VMware backup software. Then, you can download our free VMware backup solution checklist. Continue Reading
-
Snapshot backup software vs. traditional data backup software
In this tutorial on snapshot backup software, learn about near-CDP and snapshots, redirect-on-write snapshots, and how to restore snapshot data. Continue Reading
-
Data backup software and cloud-based backup working together
Learn about how your data backup software can utilize cloud services to facilitate a better backup and recovery process for your organization. Continue Reading
-
Data archiving methods and best practices for small businesses
Improper data archiving methods or improper use of archiving software can lead to legal problems in your business. Find out how to avoid data archiving problems with these top six articles on data archiving. Continue Reading
-
Quest vRanger Pro 4.5 backup and recovery tutorial
Quest recently released vRanger Pro 4.5. This tutorial will review the new version and provide some tips and other helpful information for using vRanger Pro 4.5. Continue Reading
-
An off-site tape storage tutorial: Tape backup and recovery best practices
Tape still fills the role of media for choice for off-site vaulting, but organizations have other options such as the cloud and replication for securing data for disaster recovery. Continue Reading
-
Data deduping explained: Deduplication in data backup environments tutorial
Learn everything you wanted to know about data deduping in our tutorial on data deduplication and data backup. Continue Reading
-
Secure data backup strategies for the enterprise: A backup security tutorial
In this tutorial on secure data backup strategies, learn about encryption key management, encryption appliances, tape and disk encryption, cloud backup security, and secure data destruction. Continue Reading
-
Virtual tape libraries: A tutorial on managing VTL technology
In this tutorial on virtual tape library technology, learn about buying and managing a VTL, VTLs and data deduplication, and virtual tape library vendors and products. Continue Reading
-
Data backup and recovery software best practices: A tutorial
Learn about data backup and recovery software best practices in our collection of tutorials. Learn EMC NetWorker, Symantec Veritas NetBackup and Backup Exec, IBM Tivoli Storage Manager, Linux, and open-source data backup best practices. Continue Reading
-
Data backup and recovery technology tutorials
Learn about the latest data backup and recovery technology trends in our technology tutorials. Continue Reading
-
A step-by-step guide to implementing data deduplication
The best way to select, implement and integrate data deduplication can vary depending on how the deduplication is performed. Learn some general principles that you can follow to select the right data deduplication approach and then integrate it into... Continue Reading
-
Backup software product specifications
Backup and replication software are powerful tools used to protect data against loss due to hardware failure, natural disasters, and other problems. Features like encryption, key management, compression, data de-duplication, WAN support and content ... Continue Reading