Latest posts

incremental backup vs differential backup illustration

Incremental vs Differential Backup: Difference Explained

Incremental vs Differential Backup: Difference Explained

We receive a number of questions about which backup type to choose: an incremental or a differential backup. The answer is - it depends. In this article, we will review the difference between an incremental and a differential backup and provide advice on the usage of both. Continue reading

My Retention Settings for File Backups

My Retention Settings for File Backups

I work at CloudBerry, but I'm also a CloudBerry user. Like many of you, I need to protect both my work and my personal files, but I have different needs for each when it comes to what I need to be able to restore.  What follows are my preferred retention settings for work and personal backups. Continue reading

Amazon EC2 vs Amazon S3: Difference and Use-Cases

Amazon EC2 vs Amazon S3: Difference and Use-Cases

If you want to make the most of the AWS cloud, then, Amazon EC2 and Amazon S3 are both important services to understand. This article explains what each service does, how you can use them together and which additional AWS services (such as EFS and EBS) you might wish to use in conjunction with EC2 and S3.
Continue reading

How to Truncate Logs on Exchange 2010 Without Running a Backup

How to Truncate Logs on Exchange 2010 Without Running a Backup

In this article, we will cover the topic of how to purge Exchange 2010 logs in “emergency” cases. Topics covered are useful in case you need to free up drive space by deleting Exchange log files, and there is no way to create a full regular backup instead. Continue reading

Brick-Level Mailbox Backup Explained

Brick-Level Mailbox Backup Explained

Exchange Server brick-level backup means backing up the smallest available information objects (mailbox items), and there are a few things you should know about these “bricks”.

In this article, we are going to explain the different Exchange backup approaches and show you how to perform a granular restore using CloudBerry software for MS Exchange backup. Continue reading

Amazon S3 Security Part 3: IAM Identities

Amazon S3 Security Part 3: IAM Identities

This is the third article in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we looked at writing identity-based policies to manage access to your S3 resources. In this Part III, we will cover authentication and identity within the context of AWS Identity and Access Management (IAM). Continue reading

Amazon S3 Security Part 2: Basics of IAM Policies

Amazon S3 Security Part 2: Basics of IAM Policies

This is the second in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In this Part II, we will take a deeper look at managing access to your S3 resources using AWS Identity and Access Management (IAM). Continue reading

MS SQL Server Backup Automation

MS SQL Server Backup Automation

SQL backup routine includes various actions you should remember about. And the best way to get it done is by using backup automation. In this article, we will cover built-in tools that help to simplify your daily routine.

We will also show how to do this using CloudBerry software for MS SQL Server backup. Continue reading