Remember
Register
TechnoConnect
Home
Blogs
Questions
Unanswered
Tags
Users
Ask a Question
TechnoBind
Events
Most popular tags
storage system
data
security
backup
data protection
cloud
automation
cloud computing
disaster recovery
data management
software encryption
big data
raid
san
database
nas
data risk
cyber security
sans
hadoop
Recent Blogs
AI and Its importance
What is Teamwork?
REST and RESTful API
Predictions for 2019 - Guaranteed to come true!
Risk Associated with using Public Wi-Fi
Commvault : simplified, streamlined, and scalable Software Packaging and Pricing
How you can Secure your Mobile Devices
Cloud vs Hardware
Recent questions without a selected answer
No answer
No selected answer
No upvoted answer
0
votes
1
answer
What is encryption key management?
posted
Feb 27, 2019
by
anonymous
data
security
software encryption
0
votes
0
answers
What is Digital Envelope Encryption?
posted
Feb 27, 2019
by
anonymous
software encryption
data protection
security
data
0
votes
0
answers
Is it possible to restore deleted data on an Android phone without backup?
posted
Jan 28, 2019
by
Adish Jain
backup
data
data protection
+1
vote
1
answer
What is the importance of data backup?
posted
Jan 28, 2019
by
Adish Jain
data protection
backup
data
+1
vote
0
answers
What are the real time applications of Divergence?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of asynchronous machines?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of curl?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are real time applications of synchronous machines?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of different programming languages?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of hashing?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of Roopa?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of JFET?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of AES Algorithm?
posted
Jan 28, 2019
by
Adish Jain
security
0
votes
0
answers
What does the "Fi" in Wi-Fi mean?
posted
Jan 22, 2019
by
Adish Jain
data
0
votes
1
answer
What is SOAP and WSDL?
posted
Oct 11, 2017
by
Abhishek Maheshwari
data
security
0
votes
1
answer
What is SSL connection and an SSL session?
posted
Oct 11, 2017
by
Abhishek Maheshwari
data
security
+1
vote
1
answer
What are the risks associated with using public Wi-Fi?
posted
Oct 10, 2017
by
anonymous
data
data risk
0
votes
1
answer
What are the Risks to Data?
posted
Oct 10, 2017
by
anonymous
data
0
votes
0
answers
What is data protection in transit vs data protection at rest?
posted
Oct 6, 2017
by
anonymous
data protection
0
votes
1
answer
What is the difference between a Black Hat and a White Hat?
posted
Oct 6, 2017
by
anonymous
data
security
0
votes
0
answers
Does cloud encryption single handedly protect data?
posted
Oct 4, 2017
by
Abhishek Maheshwari
cloud
data encryption
0
votes
0
answers
What are the most important aspects of a cloud security policy?
posted
Oct 4, 2017
by
Abhishek Maheshwari
cloud
security
0
votes
0
answers
Is there a difference in the various providers security?
posted
Sep 20, 2017
by
anonymous
data
security
0
votes
0
answers
Is cloud computing mostly for larger or smaller organizations?
posted
Sep 20, 2017
by
anonymous
cloud computing
0
votes
1
answer
What are the benefits of moving from HTTP to HTTPS?
posted
Sep 18, 2017
by
Abhishek Maheshwari
data protection
data management
0
votes
0
answers
What are the business advantage of offering data security?
posted
Sep 15, 2017
by
anonymous
data protection
business
0
votes
0
answers
How is Hadoop different from other parallel computing systems?
posted
Sep 13, 2017
by
Abhishek Maheshwari
big data
hadoop
+1
vote
1
answer
What are real-time industry applications of Hadoop?
posted
Sep 13, 2017
by
Abhishek Maheshwari
big data
hadoop
0
votes
1
answer
What are your first three steps when securing a server?
posted
Sep 12, 2017
by
anonymous
data
security
0
votes
0
answers
What is more important for cyber security professionals to focus on, threats or vulnerabilities?
posted
Sep 12, 2017
by
anonymous
cyber security
0
votes
0
answers
What are the different Layers of PaaS Architecture?
posted
Sep 8, 2017
by
anonymous
cloud computing
paas
0
votes
0
answers
What is the Reliability and Availability of Cloud Computing?
posted
Sep 8, 2017
by
anonymous
cloud computing
0
votes
0
answers
What are the segmentation of Data Protection as a Service (DPaaS) market?
posted
Sep 4, 2017
by
Abhishek Maheshwari
data protection
0
votes
0
answers
What is the legal difference between Data Protection and Data Privacy?
posted
Sep 4, 2017
by
Abhishek Maheshwari
data protection
data
0
votes
0
answers
What constitutes personal information that we have to protect and how do businesses protect this information?
posted
Aug 31, 2017
by
anonymous
data protection
0
votes
0
answers
What do the 8 data protection principles in the DPA cover?
posted
Aug 30, 2017
by
anonymous
data protection
0
votes
0
answers
Who polices Data Protection and what are the penalties for getting it wrong?
posted
Aug 30, 2017
by
anonymous
data protection
+1
vote
0
answers
If we had to both encrypt and compress data during transmission, which could we do first, and why?
posted
Aug 29, 2017
by
Abhishek Maheshwari
data
security
0
votes
0
answers
What is Salting, and why is it used?
posted
Aug 29, 2017
by
anonymous
data
security
0
votes
1
answer
What are the three ways to authenticate a person?
posted
Aug 28, 2017
by
anonymous
data protection
data
0
votes
1
answer
What is SSL and why is it not enough when it comes to encryption?
posted
Aug 28, 2017
by
anonymous
data
security
0
votes
0
answers
How does data quality need to be configured in MDM?
posted
Aug 24, 2017
by
Abhishek Maheshwari
data quality
mdm
0
votes
0
answers
How does Memory Channel Storage help in virtualized environments?
posted
Aug 23, 2017
by
Abhishek Maheshwari
storage system
0
votes
0
answers
How does Memory Channel Storage integrate with VMware VSAN?
posted
Aug 23, 2017
by
Abhishek Maheshwari
storage system
0
votes
0
answers
What is the meaning of IOPS? Where it plays important role?
posted
Aug 23, 2017
by
Abhishek Maheshwari
storage system
0
votes
0
answers
Where does SAN fit into Today’s Networking Environment?
posted
Jul 31, 2017
by
anonymous
storage system
san
0
votes
1
answer
What is the “Fabric” in a Switched Fabric Topology?
posted
Jul 31, 2017
by
Abhishek Maheshwari
storage system
0
votes
2
answers
What is HSM – Hierarchical Storage Management?
posted
Jul 17, 2017
by
anonymous
storage management
0
votes
1
answer
What are the different types of models used for deployment in Cloud Computing?
posted
Jul 10, 2017
by
Abhishek Maheshwari
cloud computing
0
votes
0
answers
What are the differences occurred in Distributed operations?
posted
Jul 10, 2017
by
Abhishek Maheshwari
storage system
distributed systems
Page:
« prev
1
2
3
4
5
next »
...