Remember
Register
TechnoConnect
Home
Blogs
Questions
Unanswered
Tags
Users
Ask a Question
TechnoBind
Events
Most popular tags
storage system
data
security
backup
data protection
cloud
automation
cloud computing
disaster recovery
data management
software encryption
big data
raid
san
database
nas
data risk
cyber security
sans
hadoop
Recent Blogs
AI and Its importance
What is Teamwork?
REST and RESTful API
Predictions for 2019 - Guaranteed to come true!
Risk Associated with using Public Wi-Fi
Commvault : simplified, streamlined, and scalable Software Packaging and Pricing
How you can Secure your Mobile Devices
Cloud vs Hardware
Most viewed questions
Recent
Hot!
Most votes
Most answers
Most views
+1
vote
1
answer
What are the various types of Backup and which one is preferable in various conditions?
posted
May 12, 2016
by
Fay Paul
backup
+2
votes
3
answers
What is the difference between Incremental and Differential Backup Techniques?
posted
May 13, 2016
by
Abhishek Maheshwari
backup
0
votes
2
answers
What is disaster recovery?
posted
Dec 24, 2019
by
Adish Jain
data
+2
votes
1
answer
What is the most critical component in SAN?
posted
May 2, 2016
by
Danial Rotwaski
storage system
0
votes
1
answer
Why is disaster recovery important?
posted
Dec 24, 2019
by
Adish Jain
data
+1
vote
1
answer
What are real-time industry applications of Hadoop?
posted
Sep 13, 2017
by
Abhishek Maheshwari
big data
hadoop
+1
vote
2
answers
What are the Principles of the Data Protection Act (DPA)?
posted
Jul 14, 2016
by
Abhishek Maheshwari
data protection
0
votes
0
answers
What is the difference between application disaster recovery and conventional disaster recover?
posted
Dec 24, 2019
by
Adish Jain
data
0
votes
0
answers
what are the limitations of DAS Technology?
posted
Nov 5, 2016
by
Satendra Jain
storage system
+3
votes
2
answers
What are he primary requirements in a end point backup and recovery solution?
posted
Feb 23, 2016
by
anonymous
backup
disaster recovery
+2
votes
3
answers
Why is 2fa solution an essential component of business security?
posted
Feb 23, 2016
by
anonymous
security
0
votes
0
answers
What are the different Layers of PaaS Architecture?
posted
Sep 8, 2017
by
anonymous
cloud computing
paas
0
votes
1
answer
What is Automation?
posted
Dec 24, 2019
by
Adish Jain
automation
+1
vote
2
answers
What are the pros and cons of de-duplication in a backup implementation?
posted
Feb 23, 2016
by
anonymous
backup
0
votes
1
answer
What are the types of automation?
posted
Dec 24, 2019
by
Adish Jain
automation
0
votes
1
answer
Which are Programming Language are used in Cloud Computing?
posted
Aug 31, 2016
by
anonymous
cloud computing
cloud
programming language
0
votes
1
answer
What is the difference between a Black Hat and a White Hat?
posted
Oct 6, 2017
by
anonymous
data
security
0
votes
1
answer
Why anybody should go for Automation?
posted
Dec 24, 2019
by
Adish Jain
automation
0
votes
1
answer
What is the importance of backing up your data?
posted
Dec 24, 2019
by
Adish Jain
data
0
votes
0
answers
What is difference between synthetic Full & Full Backup & Dash Full?
posted
Jul 3, 2017
by
anonymous
backup
0
votes
1
answer
What is Automation and why it is necessary?
posted
Dec 24, 2019
by
Adish Jain
automation
0
votes
0
answers
What are the platforms used for large scale cloud computing?
posted
Jun 22, 2017
by
Abhishek Maheshwari
cloud computing
0
votes
1
answer
What are the different types of models used for deployment in Cloud Computing?
posted
Jul 10, 2017
by
Abhishek Maheshwari
cloud computing
0
votes
0
answers
Is it possible to restore deleted data on an Android phone without backup?
posted
Jan 28, 2019
by
Adish Jain
backup
data
data protection
+1
vote
1
answer
What's the difference between RAID 10 and RAID 0+1?
posted
Apr 28, 2016
by
anonymous
storage system
raid
0
votes
0
answers
What are the best data backup services and why?
posted
Dec 24, 2019
by
Adish Jain
data
+1
vote
2
answers
What is a hyper converged platform?
posted
Feb 23, 2016
by
anonymous
platform
0
votes
0
answers
Is industrial automation nd automation tools are same?
posted
Dec 24, 2019
by
Adish Jain
automation
+1
vote
1
answer
Multiple NTP servers entry in windows Client?
posted
Apr 26, 2016
by
anonymous
storage system
windows ntp
0
votes
0
answers
What are the most important aspects of a cloud security policy?
posted
Oct 4, 2017
by
Abhishek Maheshwari
cloud
security
0
votes
2
answers
What is HSM – Hierarchical Storage Management?
posted
Jul 17, 2017
by
anonymous
storage management
+2
votes
2
answers
What are the best practice for Encrypting Cloud Data?
posted
Apr 25, 2016
by
Danial Rotwaski
software encryption
clouddata
0
votes
1
answer
What are different types of attacks in cyber security and how to prevent it?
posted
Mar 22, 2022
by
Aelina Momin
security
+1
vote
1
answer
What are the risks associated with using public Wi-Fi?
posted
Oct 10, 2017
by
anonymous
data
data risk
0
votes
0
answers
What is Digital Envelope Encryption?
posted
Feb 27, 2019
by
anonymous
software encryption
data protection
security
data
+1
vote
1
answer
What are the protocols used in physical/datalink and network layer of SAN?
posted
May 23, 2016
by
Abhishek Maheshwari
storage system
sans
+2
votes
2
answers
What are the product offerings from technobind?
posted
Mar 15, 2016
by
anonymous
technobind products
0
votes
0
answers
How does traceroute, or tracert under Windows, work and why would it be used?
posted
Jun 28, 2017
by
anonymous
storage system
+2
votes
2
answers
What is the difference between a scale up storage systems via a via scale out storage system?
posted
Feb 23, 2016
by
anonymous
storage system
0
votes
0
answers
What is more important for cyber security professionals to focus on, threats or vulnerabilities?
posted
Sep 12, 2017
by
anonymous
cyber security
+2
votes
1
answer
What is the difference between data protection and data security?
posted
Mar 15, 2016
by
anonymous
data protection
security
0
votes
0
answers
What is the most important in a data backup system?
posted
Dec 24, 2019
by
Adish Jain
data
0
votes
1
answer
What are the benefits of moving from HTTP to HTTPS?
posted
Sep 18, 2017
by
Abhishek Maheshwari
data protection
data management
0
votes
0
answers
What is Salting, and why is it used?
posted
Aug 29, 2017
by
anonymous
data
security
0
votes
1
answer
What are the Risks to Data?
posted
Oct 10, 2017
by
anonymous
data
0
votes
0
answers
Where can I find the best data backup solutions?
posted
Dec 24, 2019
by
Adish Jain
data
0
votes
0
answers
Where does SAN fit into Today’s Networking Environment?
posted
Jul 31, 2017
by
anonymous
storage system
san
+1
vote
0
answers
What are the real time applications of Divergence?
posted
Jan 28, 2019
by
Adish Jain
security
+2
votes
1
answer
What is DoS attack? How can it be prevented?
posted
Jun 26, 2016
by
Satendra Jain
security
+3
votes
1
answer
What are the main two criteria which decides the effectiveness of a DR system and process?
posted
Feb 23, 2016
by
anonymous
disaster recovery
Page:
« prev
1
2
3
4
5
next »
...