During re:Invent 2018, Amazon Web Services has announced a number of features and updates for its services. In this article, we have collected and overviewed features, related to Amazon S3 storage and it’s classes. Continue reading
We receive a number of questions about which backup type to choose: an incremental or a differential backup. The answer is - it depends. In this article, we will review the difference between an incremental and a differential backup and provide advice on the usage of both. Continue reading
I work at CloudBerry, but I'm also a CloudBerry user. Like many of you, I need to protect both my work and my personal files, but I have different needs for each when it comes to what I need to be able to restore. What follows are my preferred retention settings for work and personal backups. Continue reading
If you want to make the most of the AWS cloud, then, Amazon EC2 and Amazon S3 are both important services to understand. This article explains what each service does, how you can use them together and which additional AWS services (such as EFS and EBS) you might wish to use in conjunction with EC2 and S3.
In this article, we will cover the topic of how to purge Exchange 2010 logs in “emergency” cases. Topics covered are useful in case you need to free up drive space by deleting Exchange log files, and there is no way to create a full regular backup instead. Continue reading
Exchange Server 2007 supports a broad range of data protection options. In this blog post, we will cover Incremental data backup peculiarities and find out when it suits best. We will also show how to configure this backup type using CloudBerry Backup for MS Exchange.
Sometimes you may want to export certain Exchange mailboxes to PST files - for backup or export needs. In this article, we will review how to bulk export user mailboxes in Exchange 2010. Continue reading
Exchange Server brick-level backup means backing up the smallest available information objects (mailbox items), and there are a few things you should know about these “bricks”.
This is the third article in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we looked at writing identity-based policies to manage access to your S3 resources. In this Part III, we will cover authentication and identity within the context of AWS Identity and Access Management (IAM). Continue reading
This is the second in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In this Part II, we will take a deeper look at managing access to your S3 resources using AWS Identity and Access Management (IAM). Continue reading
We are going to overview the Exchange Circular Logging concept and show how you can enable or disable this feature on Microsoft Exchange Servers editions 2003-2016. Continue reading
SQL backup routine includes various actions you should remember about. And the best way to get it done is by using backup automation. In this article, we will cover built-in tools that help to simplify your daily routine.
We will also show how to do this using CloudBerry software for MS SQL Server backup. Continue reading