Remember
Register
TechnoConnect
Home
Blogs
Questions
Unanswered
Tags
Users
Ask a Question
TechnoBind
Events
Most popular tags
storage system
data
security
backup
data protection
cloud
automation
cloud computing
disaster recovery
data management
software encryption
big data
raid
san
database
nas
data risk
cyber security
sans
hadoop
Recent Blogs
AI and Its importance
What is Teamwork?
REST and RESTful API
Predictions for 2019 - Guaranteed to come true!
Risk Associated with using Public Wi-Fi
Commvault : simplified, streamlined, and scalable Software Packaging and Pricing
How you can Secure your Mobile Devices
Cloud vs Hardware
Most answered questions
Recent
Hot!
Most votes
Most answers
Most views
0
votes
3
answers
What is the difference between backup & disaster recovery?
posted
Dec 24, 2019
by
Adish Jain
data
backup
+2
votes
3
answers
What is the difference between Incremental and Differential Backup Techniques?
posted
May 13, 2016
by
Abhishek Maheshwari
backup
+2
votes
3
answers
Why is 2fa solution an essential component of business security?
posted
Feb 23, 2016
by
anonymous
security
+1
vote
3
answers
What is the primary difference between backup and archival?
posted
Feb 23, 2016
by
anonymous
backup
+2
votes
3
answers
Which is better, backup to disk or to tape and why?
posted
Feb 23, 2016
by
anonymous
backup
0
votes
2
answers
What is the role of an intrusion detection system (IDS) in a security posture?
posted
Jun 6, 2023
by
Abhishek A. Patil - Bangalore
security
0
votes
2
answers
What is SNMP Monitoring & how its work?
posted
Mar 22, 2022
by
Akash Deshbhratar
security
0
votes
2
answers
What is disaster recovery?
posted
Dec 24, 2019
by
Adish Jain
data
0
votes
2
answers
What is “data backup”?
posted
Dec 24, 2019
by
Adish Jain
backup
data
data protection
0
votes
2
answers
What is RPA (Robotic Process Automation)?
posted
Dec 24, 2019
by
Adish Jain
automation
0
votes
2
answers
What is difference between Tokenization and Encryption?
posted
Feb 27, 2019
by
Adish Jain
security
software encryption
data
0
votes
2
answers
What is HSM – Hierarchical Storage Management?
posted
Jul 17, 2017
by
anonymous
storage management
0
votes
2
answers
Is NAS the best storage option for SMBs?
posted
Oct 3, 2016
by
Édwige Guerin
nas
storage system
+1
vote
2
answers
What are the Principles of the Data Protection Act (DPA)?
posted
Jul 14, 2016
by
Abhishek Maheshwari
data protection
+2
votes
2
answers
What is sequential access storage device?
posted
Apr 27, 2016
by
anonymous
storage system
+2
votes
2
answers
What are the best practice for Encrypting Cloud Data?
posted
Apr 25, 2016
by
Danial Rotwaski
software encryption
clouddata
+2
votes
2
answers
What are the product offerings from technobind?
posted
Mar 15, 2016
by
anonymous
technobind products
+3
votes
2
answers
What are he primary requirements in a end point backup and recovery solution?
posted
Feb 23, 2016
by
anonymous
backup
disaster recovery
+1
vote
2
answers
What is a hyper converged platform?
posted
Feb 23, 2016
by
anonymous
platform
+1
vote
2
answers
What are the pros and cons of de-duplication in a backup implementation?
posted
Feb 23, 2016
by
anonymous
backup
+2
votes
2
answers
What is the difference between a scale up storage systems via a via scale out storage system?
posted
Feb 23, 2016
by
anonymous
storage system
+3
votes
2
answers
What is the difference between a unified storage and NAS based storage system?
posted
Feb 23, 2016
by
anonymous
storage system
0
votes
1
answer
What is Certificate Management?
posted
Jul 17, 2023
by
Akash Deshbhratar
enccryption
0
votes
1
answer
What are the risks associated with IAM, PAM,EPM solutions?
posted
Jun 12, 2023
by
Jasraj Santoshrao Deshpande
security
data risk
0
votes
1
answer
What are firewall evasion techniques?
posted
Jun 9, 2023
by
Jasraj Santoshrao Deshpande
security
0
votes
1
answer
Which topology is best suited for medium sized enterprise.
posted
Jun 6, 2023
by
anonymous
storage system
data
0
votes
1
answer
Which 3 statements describe differences between Storage Area Network (SAN) and Network Attached Storage (NAS) solutions
posted
Jun 6, 2023
by
anonymous
storage system
data
+1
vote
1
answer
What is the role of encryption in maintaining a strong security posture?
posted
Jun 6, 2023
by
Soumyadeep
security
+1
vote
1
answer
What is the difference between High availability solution from third party & windows cluster?
posted
Mar 24, 2022
by
Abhishek Patil
data
0
votes
1
answer
What are different types of attacks in cyber security and how to prevent it?
posted
Mar 22, 2022
by
Aelina Momin
security
0
votes
1
answer
What is included in a disaster recovery plan for businesses?
posted
Dec 24, 2019
by
Adish Jain
data
0
votes
1
answer
Why is disaster recovery important?
posted
Dec 24, 2019
by
Adish Jain
data
0
votes
1
answer
What is the difference between business continuity and disaster recovery?
posted
Dec 24, 2019
by
Adish Jain
data
0
votes
1
answer
What is the importance of backing up your data?
posted
Dec 24, 2019
by
Adish Jain
data
0
votes
1
answer
What is data management?
posted
Dec 24, 2019
by
Adish Jain
data
0
votes
1
answer
What are the types of automation?
posted
Dec 24, 2019
by
Adish Jain
automation
0
votes
1
answer
What is Automation and why it is necessary?
posted
Dec 24, 2019
by
Adish Jain
automation
0
votes
1
answer
Why anybody should go for Automation?
posted
Dec 24, 2019
by
Adish Jain
automation
0
votes
1
answer
What is difference between Software based Automation and an Actual Robotic Automation?
posted
Dec 24, 2019
by
Adish Jain
automation
0
votes
1
answer
What is Automation?
posted
Dec 24, 2019
by
Adish Jain
automation
0
votes
1
answer
How do I secure my cloud data?
posted
Feb 27, 2019
by
anonymous
cloud
backup
data protection
0
votes
1
answer
What is encryption key management?
posted
Feb 27, 2019
by
anonymous
data
security
software encryption
+1
vote
1
answer
What is the importance of data backup?
posted
Jan 28, 2019
by
Adish Jain
data protection
backup
data
0
votes
1
answer
What is SOAP and WSDL?
posted
Oct 11, 2017
by
Abhishek Maheshwari
data
security
0
votes
1
answer
What is SSL connection and an SSL session?
posted
Oct 11, 2017
by
Abhishek Maheshwari
data
security
+1
vote
1
answer
What are the risks associated with using public Wi-Fi?
posted
Oct 10, 2017
by
anonymous
data
data risk
0
votes
1
answer
What are the Risks to Data?
posted
Oct 10, 2017
by
anonymous
data
0
votes
1
answer
What is the difference between a Black Hat and a White Hat?
posted
Oct 6, 2017
by
anonymous
data
security
0
votes
1
answer
What are the benefits of moving from HTTP to HTTPS?
posted
Sep 18, 2017
by
Abhishek Maheshwari
data protection
data management
+1
vote
1
answer
What are real-time industry applications of Hadoop?
posted
Sep 13, 2017
by
Abhishek Maheshwari
big data
hadoop
Page:
1
2
3
4
...
next »
...