For IT PROs

Latest posts

incremental backup vs differential backup illustration

Incremental vs Differential Backup: Difference Explained

Incremental vs Differential Backup: Difference Explained

We receive a number of questions about which backup type to choose: an incremental or a differential backup. The answer is - it depends. In this article, we will review the difference between an incremental and a differential backup and provide advice on the usage of both. Continue reading

My Retention Settings for File Backups

My Retention Settings for File Backups

I work at CloudBerry, but I'm also a CloudBerry user. Like many of you, I need to protect both my work and my personal files, but I have different needs for each when it comes to what I need to be able to restore.  What follows are my preferred retention settings for work and personal backups. Continue reading

Amazon EC2 vs Amazon S3: Difference and Use-Cases

Amazon EC2 vs Amazon S3: Difference and Use-Cases

If you want to make the most of the AWS cloud, then, Amazon EC2 and Amazon S3 are both important services to understand. This article explains what each service does, how you can use them together and which additional AWS services (such as EFS and EBS) you might wish to use in conjunction with EC2 and S3.
Continue reading

Brick-Level Mailbox Backup Explained

Brick-Level Mailbox Backup Explained

Exchange Server brick-level backup means backing up the smallest available information objects (mailbox items), and there are a few things you should know about these “bricks”.

In this article, we are going to explain the different Exchange backup approaches and show you how to perform a granular restore using CloudBerry software for MS Exchange backup. Continue reading

Amazon S3 Security Part 3: IAM Identities

Amazon S3 Security Part 3: IAM Identities

This is the third article in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we looked at writing identity-based policies to manage access to your S3 resources. In this Part III, we will cover authentication and identity within the context of AWS Identity and Access Management (IAM). Continue reading