How to Set Up Zetta Two Factor Authentication
Zetta two factor authentication uses standards-compliant, time-based authentication for customers that have enabled two factor authentication.
Why VHD Recovery is Best Recovery
We’ve been talking about how the new direct-to-cloud server image function in Version 4.5 makes for better backups, and it does! But as anyone who’s ever had to restore a server after a major incident can tell you, backup is only half the battle.
BMR: Broken Servers, Broken Promises, Broken Hearts
Nobody was expecting a truck-shaped hole in your office when you came in to work this morning. But there it is, minus the truck that failed to negotiate a turn (but succeeded at using your primary server as a speed bump).
EU Raises Stakes Around Data Privacy Compliance in the Cloud
With the European Union poised to enact new legislation around data privacy and data protection, compliance will become a major consideration for U.S.
Five Best Practices for Offsite Backup
Most people know that it’s not enough to just back up your data – you need to also keep copies of it in a different location, in case something happens to your facility. For most organizations, the two main ways of getting backups offsite are through tape and cloud.
Data Retention Best Practices and Policies
It is not enough to just back up your data. For the best results, each data retention policy must be set just right.
One Smart Cookie: History of the Web 1.0
Silicon Valley is packed with entrepreneurs with impressive resumes and intriguing pasts. But when you’re credited with inventing a core piece of the Internet and were once named People Magazine’s sexiest Internet mogul, you have some serious street cred for standing out in the crowd.