Tag

data backup

1 views collected around this technical thread.

Zhihu Tech Column
Zhihu Tech Column
Dec 25, 2024 · Databases

Technical Challenges and Solutions for Migrating Zhihu's Self‑Managed MongoDB Cluster to Alibaba Cloud

The article analyzes the storage, sharding, backup, and operational pain points of Zhihu's self‑operated MongoDB cluster, proposes cloud‑based architectural and procedural solutions, and details a step‑by‑step migration plan that ensures zero‑downtime, improved stability, and cost efficiency.

Alibaba CloudMongoDBOperational Efficiency
0 likes · 11 min read
Technical Challenges and Solutions for Migrating Zhihu's Self‑Managed MongoDB Cluster to Alibaba Cloud
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Nov 3, 2024 · Cloud Native

Leveraging Alibaba Cloud ACK Backup Center for Cross‑Cloud Container Service Migration: Challenges and Solutions

This article outlines the multifaceted challenges of cross‑cloud container service migration—including data security, service interruption, compatibility, and storage complexities—and demonstrates how Alibaba Cloud ACK's Backup Center can address these issues through comprehensive backup, selective restoration, and automated resource adjustments.

AckBackup CenterContainer Services
0 likes · 10 min read
Leveraging Alibaba Cloud ACK Backup Center for Cross‑Cloud Container Service Migration: Challenges and Solutions
IT Services Circle
IT Services Circle
Sep 19, 2024 · Operations

The Decline of Physical Media and the Importance of the 3‑2‑1 Backup Principle

As CDs and tapes fade from the music industry, aging hard drives increasingly fail to preserve valuable audio data, prompting experts to stress the hardware and software causes of drive degradation and to advocate the 3‑2‑1 backup rule for reliable long‑term storage.

3-2-1 principledata backupdigital preservation
0 likes · 5 min read
The Decline of Physical Media and the Importance of the 3‑2‑1 Backup Principle
JD Tech
JD Tech
Aug 22, 2024 · Backend Development

Designing a Disaster‑Recovery Data Backup System for JD’s LBS C‑End SOA Service

This article explores the design and implementation of a disaster‑recovery data‑backup architecture for JD’s LBS C‑end SOA service, covering backup strategies, cost‑reduction techniques, grid‑based indexing with H3, client‑side caching, diff verification, and deployment considerations to balance reliability, performance, and expense.

BackendCost OptimizationLBS
0 likes · 18 min read
Designing a Disaster‑Recovery Data Backup System for JD’s LBS C‑End SOA Service
JD Retail Technology
JD Retail Technology
Aug 21, 2024 · Operations

Designing a Disaster Recovery and Data Backup System for JD 秒送 LBS C‑End SOA Services

This article explores the design of a disaster‑recovery framework for JD’s秒送 LBS C‑end SOA services, detailing data‑backup strategies, cost‑reduction techniques, grid‑based caching using H3, diff validation, client‑side caching, and deployment modules to balance reliability, performance, and expense.

Backend ServicesCost OptimizationLBS
0 likes · 18 min read
Designing a Disaster Recovery and Data Backup System for JD 秒送 LBS C‑End SOA Services
JD Tech Talk
JD Tech Talk
Aug 16, 2024 · Operations

Designing Cost‑Effective Disaster Recovery Data Backup for LBS‑Based SOA Services

This article details a comprehensive disaster‑recovery strategy for LBS‑driven SOA services, covering challenges of massive POI data backup, cost‑reduction via grid indexing (H3), selective caching, compression, diff validation, client‑side fallback, and deployment processes to achieve reliable, low‑cost data availability.

Cost OptimizationLBSdata backup
0 likes · 19 min read
Designing Cost‑Effective Disaster Recovery Data Backup for LBS‑Based SOA Services
Test Development Learning Exchange
Test Development Learning Exchange
Apr 12, 2024 · Operations

Python Data Backup Scripts and Tools Overview

This article introduces various Python-based data backup techniques, covering standard library modules such as shutil, zipfile, and tarfile, as well as database dump tools like pg_dump and mysqldump, and cloud storage options using awscli or boto3, with example code snippets for each method.

DatabasePythoncloud storage
0 likes · 4 min read
Python Data Backup Scripts and Tools Overview
php中文网 Courses
php中文网 Courses
Aug 26, 2023 · Backend Development

Implementing Data Backup and Recovery with PHP

This tutorial demonstrates how to use PHP to create a backup directory, export MySQL tables to text files, and restore them by reading the files and executing INSERT statements, providing complete code examples for both backup and recovery processes.

BackendData RecoveryDatabase
0 likes · 5 min read
Implementing Data Backup and Recovery with PHP
Architects' Tech Alliance
Architects' Tech Alliance
Sep 19, 2022 · Operations

Fundamentals of Data Replication, Backup, and Disaster Recovery

This article explains the core concepts of disaster recovery and data backup—including RTO, RPO, recovery levels, cloud disaster recovery, backup types, copy data management, deduplication, compression, and block/file/database backup—while also noting related commercial offerings.

High AvailabilityRPORTO
0 likes · 13 min read
Fundamentals of Data Replication, Backup, and Disaster Recovery
Efficient Ops
Efficient Ops
Jun 12, 2022 · Operations

Why Ops Must Respect Data: Essential Backup and Release Practices

The article emphasizes that operations teams must treat data with reverence, outlining comprehensive backup strategies, routine file‑system maintenance, database and big‑data safeguards, disciplined release processes, and meticulous change‑management practices to mitigate risks and ensure system stability.

DevOpsRelease ManagementSystem Administration
0 likes · 9 min read
Why Ops Must Respect Data: Essential Backup and Release Practices
IT Services Circle
IT Services Circle
Feb 13, 2022 · Information Security

How to Reset a Forgotten iPhone Lock Screen Password via Remote Erase (iOS 15.2+ and Earlier Versions)

This guide explains how to unlock an iPhone that is locked due to a forgotten or repeatedly mistyped screen password by using the built‑in remote‑erase feature in iOS 15.2 and later, and provides step‑by‑step recovery‑mode instructions for earlier iOS versions, while warning about data loss.

Password Resetdata backupiOS
0 likes · 5 min read
How to Reset a Forgotten iPhone Lock Screen Password via Remote Erase (iOS 15.2+ and Earlier Versions)
Xianyu Technology
Xianyu Technology
Aug 12, 2021 · Frontend Development

Automatic Front-end Disaster Recovery Solution Overview

The automatic front‑end disaster‑recovery solution packages an npm tool and visual backend that generates on‑demand API fallback data, uses a whitelist and static parameters to target backups, syncs results to developers, and after deployment raised coverage from ~30% to ~70%, automating 80% of backups.

automationdata backupdisaster recovery
0 likes · 6 min read
Automatic Front-end Disaster Recovery Solution Overview
New Oriental Technology
New Oriental Technology
Jun 4, 2021 · Cloud Native

Overview of XDF Local Storage Service (xlss) Architecture, Components, and Disaster Recovery Workflow

The article introduces xlss, a high‑performance, highly‑available Kubernetes local storage solution, details its core components, application scenarios, custom scheduler design, backup and recovery processes, and provides code snippets and CRD examples for implementing resilient stateful workloads.

KubernetesLocal StorageScheduler
0 likes · 14 min read
Overview of XDF Local Storage Service (xlss) Architecture, Components, and Disaster Recovery Workflow
Sohu Tech Products
Sohu Tech Products
Mar 18, 2020 · Cloud Native

Docker Data Management: Volumes and Bind Mounts – Theory and Practice

This tutorial explains Docker's data management techniques, covering the concepts and hands‑on steps for using volumes and bind mounts, how to back up logs and MongoDB data, and how to restore them, providing a complete guide for reliable container data handling.

Bind MountsContainersDevOps
0 likes · 27 min read
Docker Data Management: Volumes and Bind Mounts – Theory and Practice
Youzan Coder
Youzan Coder
Feb 27, 2020 · Information Security

System Stability and Security Measures in SaaS: Yazan's Approach

Yazan’s SaaS platform maintains 99.99% uptime through robust IaaS infrastructure, dedicated DBA and network teams, while defending against DDoS attacks and data breaches with ISO‑27001 and CSA C*STAR‑aligned security controls, employing multi‑cloud real‑time and cold backups and offering compensation for outage‑related business impacts.

Business ContinuityDDoS protectionSaaS
0 likes · 17 min read
System Stability and Security Measures in SaaS: Yazan's Approach
Architects' Tech Alliance
Architects' Tech Alliance
Dec 13, 2019 · Fundamentals

An Overview of Snapshot Technology and Its Applications

This article provides a comprehensive overview of snapshot technology, explaining its definition, the backup challenges it addresses, the creation process, various implementations across file systems, LVM, NAS, disk arrays, virtualization, databases, and different snapshot types such as COW, ROW, incremental and continuous data protection, as well as consistency issues and solutions.

LVMNASVirtualization
0 likes · 19 min read
An Overview of Snapshot Technology and Its Applications
Architects' Tech Alliance
Architects' Tech Alliance
Jul 2, 2019 · Information Security

Data Backup and Replication Technologies: Methods, Architectures, and Best Practices

This article provides a comprehensive overview of data backup and replication technologies, covering file‑level and block‑level backup, remote copy methods, snapshot mechanisms, CoFW vs RoFW approaches, backup destinations, data paths, and strategies such as full, incremental, and differential backups.

backup strategiesdata backupinformation security
0 likes · 25 min read
Data Backup and Replication Technologies: Methods, Architectures, and Best Practices
Efficient Ops
Efficient Ops
Sep 24, 2017 · Information Security

Essential IT Security Practices: From Network to Web Application Protection

This article shares practical IT security insights covering network, host, application, data backup, and web security measures, illustrating how comprehensive protection goes far beyond simple password changes and port tweaks.

Network SecurityWeb Securityapplication security
0 likes · 9 min read
Essential IT Security Practices: From Network to Web Application Protection