Tagged articles
37 articles
Page 1 of 1
Java Tech Enthusiast
Java Tech Enthusiast
Jun 21, 2025 · Information Security

Why Your OneDrive Account Might Get Locked and How to Protect Your Data

A Reddit user’s Microsoft account was abruptly blocked, rendering decades of OneDrive‑stored photos and files inaccessible, which underscores the risks of relying on a single cloud backup and highlights the importance of multi‑point data protection strategies like the 3‑2‑1 rule.

3-2-1 ruleOneDriveaccount lock
0 likes · 4 min read
Why Your OneDrive Account Might Get Locked and How to Protect Your Data
Zhihu Tech Column
Zhihu Tech Column
Dec 25, 2024 · Databases

Technical Challenges and Solutions for Migrating Zhihu's Self‑Managed MongoDB Cluster to Alibaba Cloud

The article analyzes the storage, sharding, backup, and operational pain points of Zhihu's self‑operated MongoDB cluster, proposes cloud‑based architectural and procedural solutions, and details a step‑by‑step migration plan that ensures zero‑downtime, improved stability, and cost efficiency.

Alibaba CloudMongoDBOperational Efficiency
0 likes · 11 min read
Technical Challenges and Solutions for Migrating Zhihu's Self‑Managed MongoDB Cluster to Alibaba Cloud
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Nov 3, 2024 · Cloud Native

Leveraging Alibaba Cloud ACK Backup Center for Cross‑Cloud Container Service Migration: Challenges and Solutions

This article outlines the multifaceted challenges of cross‑cloud container service migration—including data security, service interruption, compatibility, and storage complexities—and demonstrates how Alibaba Cloud ACK's Backup Center can address these issues through comprehensive backup, selective restoration, and automated resource adjustments.

ACKBackup CenterCloud Native
0 likes · 10 min read
Leveraging Alibaba Cloud ACK Backup Center for Cross‑Cloud Container Service Migration: Challenges and Solutions
JD Tech
JD Tech
Aug 22, 2024 · Backend Development

Designing a Disaster‑Recovery Data Backup System for JD’s LBS C‑End SOA Service

This article explores the design and implementation of a disaster‑recovery data‑backup architecture for JD’s LBS C‑end SOA service, covering backup strategies, cost‑reduction techniques, grid‑based indexing with H3, client‑side caching, diff verification, and deployment considerations to balance reliability, performance, and expense.

Cost OptimizationLBSSOA
0 likes · 18 min read
Designing a Disaster‑Recovery Data Backup System for JD’s LBS C‑End SOA Service
JD Retail Technology
JD Retail Technology
Aug 21, 2024 · Operations

Designing a Disaster Recovery and Data Backup System for JD 秒送 LBS C‑End SOA Services

This article explores the design of a disaster‑recovery framework for JD’s秒送 LBS C‑end SOA services, detailing data‑backup strategies, cost‑reduction techniques, grid‑based caching using H3, diff validation, client‑side caching, and deployment modules to balance reliability, performance, and expense.

Cost OptimizationLBSbackend services
0 likes · 18 min read
Designing a Disaster Recovery and Data Backup System for JD 秒送 LBS C‑End SOA Services
JD Tech Talk
JD Tech Talk
Aug 16, 2024 · Operations

Designing Cost‑Effective Disaster Recovery Data Backup for LBS‑Based SOA Services

This article details a comprehensive disaster‑recovery strategy for LBS‑driven SOA services, covering challenges of massive POI data backup, cost‑reduction via grid indexing (H3), selective caching, compression, diff validation, client‑side fallback, and deployment processes to achieve reliable, low‑cost data availability.

Cost OptimizationLBSdata backup
0 likes · 19 min read
Designing Cost‑Effective Disaster Recovery Data Backup for LBS‑Based SOA Services
JD Cloud Developers
JD Cloud Developers
Aug 16, 2024 · Backend Development

How to Slash LBS Disaster‑Recovery Costs by 99% with Smart Grid Backups

This article explores a comprehensive disaster‑recovery strategy for LBS‑driven SOA services, detailing challenges of massive POI data backup, cost‑reduction techniques using grid‑based caching, H3 hexagonal indexing, selective data compression, and a hybrid client‑server fallback mechanism to achieve high availability at dramatically lower expense.

LBSSOAdata backup
0 likes · 21 min read
How to Slash LBS Disaster‑Recovery Costs by 99% with Smart Grid Backups
Test Development Learning Exchange
Test Development Learning Exchange
Apr 12, 2024 · Operations

Python Data Backup Scripts and Tools Overview

This article introduces various Python-based data backup techniques, covering standard library modules such as shutil, zipfile, and tarfile, as well as database dump tools like pg_dump and mysqldump, and cloud storage options using awscli or boto3, with example code snippets for each method.

OperationsPythonScripting
0 likes · 4 min read
Python Data Backup Scripts and Tools Overview
Architects' Tech Alliance
Architects' Tech Alliance
Feb 13, 2024 · Operations

What Makes Enterprise Storage Systems Reliable and Scalable?

As enterprise data volumes surge, modern storage systems must deliver high availability, fault tolerance, multi‑protocol support, backup, snapshot, and cloning capabilities, often through distributed architectures that boost reliability, scalability, and cost efficiency while ensuring rapid data recovery.

Enterprise StorageStorage Systemsdata backup
0 likes · 4 min read
What Makes Enterprise Storage Systems Reliable and Scalable?
php Courses
php Courses
Aug 26, 2023 · Backend Development

Implementing Data Backup and Recovery with PHP

This tutorial demonstrates how to use PHP to create a backup directory, export MySQL tables to text files, and restore them by reading the files and executing INSERT statements, providing complete code examples for both backup and recovery processes.

BackendData RecoveryPHP
0 likes · 5 min read
Implementing Data Backup and Recovery with PHP
Java Backend Technology
Java Backend Technology
Dec 21, 2022 · Databases

Master MySQL: 14 Essential Functions & Commands Every Developer Should Know

This guide walks through fourteen practical MySQL techniques—from aggregating rows with group_concat and measuring string length with char_length, to locating substrings, replacing text, retrieving timestamps, bulk inserting, handling duplicates, using pessimistic locks, inspecting tables, explaining queries, monitoring processes, and exporting data with mysqldump.

SQL functionsdata backupmysql
0 likes · 13 min read
Master MySQL: 14 Essential Functions & Commands Every Developer Should Know
Architects' Tech Alliance
Architects' Tech Alliance
Sep 19, 2022 · Operations

Fundamentals of Data Replication, Backup, and Disaster Recovery

This article explains the core concepts of disaster recovery and data backup—including RTO, RPO, recovery levels, cloud disaster recovery, backup types, copy data management, deduplication, compression, and block/file/database backup—while also noting related commercial offerings.

Copy Data ManagementRPORTO
0 likes · 13 min read
Fundamentals of Data Replication, Backup, and Disaster Recovery
Efficient Ops
Efficient Ops
Jun 12, 2022 · Operations

Why Ops Must Respect Data: Essential Backup and Release Practices

The article emphasizes that operations teams must treat data with reverence, outlining comprehensive backup strategies, routine file‑system maintenance, database and big‑data safeguards, disciplined release processes, and meticulous change‑management practices to mitigate risks and ensure system stability.

data backuprelease-managementrisk management
0 likes · 9 min read
Why Ops Must Respect Data: Essential Backup and Release Practices
IT Services Circle
IT Services Circle
Feb 13, 2022 · Information Security

How to Reset a Forgotten iPhone Lock Screen Password via Remote Erase (iOS 15.2+ and Earlier Versions)

This guide explains how to unlock an iPhone that is locked due to a forgotten or repeatedly mistyped screen password by using the built‑in remote‑erase feature in iOS 15.2 and later, and provides step‑by‑step recovery‑mode instructions for earlier iOS versions, while warning about data loss.

data backupiOSiPhone
0 likes · 5 min read
How to Reset a Forgotten iPhone Lock Screen Password via Remote Erase (iOS 15.2+ and Earlier Versions)
Xianyu Technology
Xianyu Technology
Aug 12, 2021 · Frontend Development

Automatic Front-end Disaster Recovery Solution Overview

The automatic front‑end disaster‑recovery solution packages an npm tool and visual backend that generates on‑demand API fallback data, uses a whitelist and static parameters to target backups, syncs results to developers, and after deployment raised coverage from ~30% to ~70%, automating 80% of backups.

automationdata backupdisaster recovery
0 likes · 6 min read
Automatic Front-end Disaster Recovery Solution Overview
New Oriental Technology
New Oriental Technology
Jun 4, 2021 · Cloud Native

Overview of XDF Local Storage Service (xlss) Architecture, Components, and Disaster Recovery Workflow

The article introduces xlss, a high‑performance, highly‑available Kubernetes local storage solution, details its core components, application scenarios, custom scheduler design, backup and recovery processes, and provides code snippets and CRD examples for implementing resilient stateful workloads.

Cloud NativeKubernetesScheduler
0 likes · 14 min read
Overview of XDF Local Storage Service (xlss) Architecture, Components, and Disaster Recovery Workflow
Programmer DD
Programmer DD
Apr 2, 2021 · Operations

Why a Data Center Fire Can Sink Your Startup: Disaster Recovery Lessons

The article uses the OVH data‑center fire as a stark reminder that startups must design robust data disaster‑recovery strategies, explaining why backups, off‑site storage, and proper architectural planning are essential to prevent catastrophic data loss and potential business collapse.

OperationsSystem Architecturedata backup
0 likes · 8 min read
Why a Data Center Fire Can Sink Your Startup: Disaster Recovery Lessons
21CTO
21CTO
Feb 4, 2021 · Cloud Computing

Top 10 Free Cloud Storage Services for Developers: Pros, Cons, and Security

Explore ten free cloud storage options, each detailed with advantages, drawbacks, and security considerations, helping developers choose the most suitable platform without spending money, while comparing bandwidth limits, file size restrictions, and cross‑device compatibility to find the best fit for personal or project needs.

cloud storagedata backupdeveloper tools
0 likes · 9 min read
Top 10 Free Cloud Storage Services for Developers: Pros, Cons, and Security
JD Cloud Developers
JD Cloud Developers
Dec 9, 2020 · Information Security

Secure Your Cloud After Ransomware: Backup, Encryption & Access‑Control Guide

Following a massive ransomware breach that encrypted thousands of servers and stole sensitive data, this guide outlines four essential self‑check steps—data backup, encryption, server permission management, and platform user access control—along with JD Cloud’s concrete best‑practice actions to harden your infrastructure.

access controlcloud securitydata backup
0 likes · 7 min read
Secure Your Cloud After Ransomware: Backup, Encryption & Access‑Control Guide
ITPUB
ITPUB
Apr 28, 2020 · Information Security

How a Bilibili Creator’s NAS Was Crippled by Buran Ransomware – Key Security Lessons

A popular Bilibili video creator’s privately built NAS was hijacked by the Windows‑targeting Buran ransomware, encrypting hundreds of gigabytes of video assets, prompting a ransom demand and exposing the critical need for robust NAS security, data backup, and awareness of ransomware tactics.

BuranNAS securitydata backup
0 likes · 13 min read
How a Bilibili Creator’s NAS Was Crippled by Buran Ransomware – Key Security Lessons
Youzan Coder
Youzan Coder
Feb 27, 2020 · Information Security

System Stability and Security Measures in SaaS: Yazan's Approach

Yazan’s SaaS platform maintains 99.99% uptime through robust IaaS infrastructure, dedicated DBA and network teams, while defending against DDoS attacks and data breaches with ISO‑27001 and CSA C*STAR‑aligned security controls, employing multi‑cloud real‑time and cold backups and offering compensation for outage‑related business impacts.

DDoS protectionSaaSbusiness continuity
0 likes · 17 min read
System Stability and Security Measures in SaaS: Yazan's Approach
MaGe Linux Operations
MaGe Linux Operations
Feb 25, 2020 · Operations

What Weimob’s Data Sabotage Teaches About Robust Ops and Security

On February 25, Weimob disclosed that a core operations employee maliciously destroyed SaaS business data, prompting police involvement and a rapid recovery effort, and the incident underscores the need for comprehensive backup, cloud redundancy, strict access controls, automated deployment, and proactive risk planning.

KubernetesOperations Managementcloud security
0 likes · 4 min read
What Weimob’s Data Sabotage Teaches About Robust Ops and Security
Open Source Linux
Open Source Linux
Feb 7, 2020 · Operations

How to Set Up Real-Time Data Sync with Sersync and Rsync on CentOS

This guide walks through configuring two CentOS 7.7 hosts for real-time data synchronization using Sersync and Rsync, covering environment preparation, service deployment, configuration file editing, manual testing, daemon startup, and automatic startup via rc.local.

CentOSLinuxSystem Administration
0 likes · 8 min read
How to Set Up Real-Time Data Sync with Sersync and Rsync on CentOS
Architects' Tech Alliance
Architects' Tech Alliance
Dec 13, 2019 · Fundamentals

An Overview of Snapshot Technology and Its Applications

This article provides a comprehensive overview of snapshot technology, explaining its definition, the backup challenges it addresses, the creation process, various implementations across file systems, LVM, NAS, disk arrays, virtualization, databases, and different snapshot types such as COW, ROW, incremental and continuous data protection, as well as consistency issues and solutions.

ConsistencyLVMNAS
0 likes · 19 min read
An Overview of Snapshot Technology and Its Applications
21CTO
21CTO
Jul 27, 2019 · Information Security

How US Sanctions Are Silencing GitHub Users Worldwide

The article examines how recent U.S. sanctions have led GitHub to restrict private repositories and access for developers in regions such as Crimea and Iran, detailing specific limitations, personal accounts affected, community workarounds, and the broader implications for open‑source collaboration.

GeopoliticsGitHubaccount restrictions
0 likes · 8 min read
How US Sanctions Are Silencing GitHub Users Worldwide
Architects' Tech Alliance
Architects' Tech Alliance
Jul 2, 2019 · Information Security

Data Backup and Replication Technologies: Methods, Architectures, and Best Practices

This article provides a comprehensive overview of data backup and replication technologies, covering file‑level and block‑level backup, remote copy methods, snapshot mechanisms, CoFW vs RoFW approaches, backup destinations, data paths, and strategies such as full, incremental, and differential backups.

Backup Strategiesdata backupinformation security
0 likes · 25 min read
Data Backup and Replication Technologies: Methods, Architectures, and Best Practices
Architects' Tech Alliance
Architects' Tech Alliance
Sep 25, 2018 · Operations

How Snapshots Revolutionize Data Backup and Recovery: A Deep Dive

This article provides a comprehensive overview of snapshot technology, explaining its creation process, various implementations across file systems, LVM, NAS, disk arrays, virtualization, and databases, and detailing mechanisms like COW, ROW, incremental and continuous protection while addressing consistency challenges.

Data ProtectionLVMNAS
0 likes · 20 min read
How Snapshots Revolutionize Data Backup and Recovery: A Deep Dive
MaGe Linux Operations
MaGe Linux Operations
Jan 28, 2018 · Information Security

Essential IT Security Practices Every Ops Engineer Should Master

This article shares a seasoned ops engineer's evolving understanding of IT security, covering network, host, application, data, and web security measures, practical tools like ELK and OSSEC, and actionable recommendations to strengthen system protection against attacks and breaches.

Application SecurityELKIT security
0 likes · 10 min read
Essential IT Security Practices Every Ops Engineer Should Master
UCloud Tech
UCloud Tech
Jun 28, 2017 · Information Security

How the Petya Ransomware Exploits CVE-2017-0199 and MS17-010 – Prevention Tips

The Petya ransomware, spreading across Europe and affecting over 80 companies in Russia and Ukraine, leverages the CVE‑2017‑0199 RTF vulnerability for phishing and the MS17‑010 SMB flaw for internal propagation, encrypts the MFT to render systems unbootable, and can be mitigated by applying Windows patches, using strong passwords, and backing up data.

CVE-2017-0199MS17-010Petya
0 likes · 2 min read
How the Petya Ransomware Exploits CVE-2017-0199 and MS17-010 – Prevention Tips