Tag

data protection

1 views collected around this technical thread.

Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Mar 31, 2025 · Operations

Using ACK Backup Center for Data Protection and Migration of Kubernetes Persistent Volumes

This guide explains how Alibaba Cloud ACK Backup Center enables data protection, backup, and cross‑cluster migration of Kubernetes Persistent Volumes by leveraging the Data Protection feature, illustrating configuration steps, backup and restore workflows, and practical YAML examples.

AckKubernetesPersistent Volume
0 likes · 10 min read
Using ACK Backup Center for Data Protection and Migration of Kubernetes Persistent Volumes
Architects' Tech Alliance
Architects' Tech Alliance
Dec 28, 2024 · Cloud Computing

Comprehensive Overview of Cloud Disaster Recovery and Backup Technologies

This article provides a detailed explanation of cloud disaster recovery and cloud backup, covering their definitions, primary application scenarios, reference architectures, and essential technologies such as incremental backup, deduplication, multi‑tenant management, and data‑trust assurance, illustrated with diagrams and practical examples.

Cloud Computingcloud backupcloud disaster recovery
0 likes · 13 min read
Comprehensive Overview of Cloud Disaster Recovery and Backup Technologies
Architecture and Beyond
Architecture and Beyond
Aug 30, 2024 · Information Security

Comprehensive Security Strategy for SaaS Startups: External and Internal Measures

This guide outlines a complete security strategy for SaaS startups, covering external threats such as network attacks and data leaks, as well as internal risks like access control, host protection, code safety, log management, and third‑party integration, providing practical solutions and best‑practice recommendations.

External ThreatsInternal ControlsSaaS
0 likes · 20 min read
Comprehensive Security Strategy for SaaS Startups: External and Internal Measures
360 Smart Cloud
360 Smart Cloud
Jul 15, 2024 · Information Security

Web Server Backend Security (Part 2): Logic Security (CSRF/CORS) and Data Security

This article explains backend web security concepts, detailing logical threats such as CSRF and CORS, their mechanisms, and protection strategies, and then discusses data security measures including access control, encryption, backups, monitoring, and software updates to safeguard web applications.

Backend DevelopmentCORSCSRF
0 likes · 12 min read
Web Server Backend Security (Part 2): Logic Security (CSRF/CORS) and Data Security
Wukong Talks Architecture
Wukong Talks Architecture
Jun 6, 2024 · Operations

How to Prevent Accidental Database Deletion: Backup Strategies and Automation

This guide explains why accidental database deletion is a critical risk, outlines permission and audit measures, and provides detailed MySQL and file backup solutions—including encryption, multi‑site storage, cron scheduling, and ready‑to‑run Bash scripts—to ensure data safety and system stability.

DockerMySQLbackup
0 likes · 9 min read
How to Prevent Accidental Database Deletion: Backup Strategies and Automation
Architecture and Beyond
Architecture and Beyond
Jun 1, 2024 · Operations

Comprehensive Guide to Data Backup and Disaster Recovery Strategies

This article examines real-world backup failures, explains why backups are essential, outlines what data and system components should be backed up, describes backup principles, classifications, technologies, and disaster recovery planning, and offers practical guidance for building robust, multi-layered backup strategies.

ComplianceIT Operationsbackup
0 likes · 13 min read
Comprehensive Guide to Data Backup and Disaster Recovery Strategies
Selected Java Interview Questions
Selected Java Interview Questions
Apr 25, 2024 · Information Security

Techniques for Fuzzy Search on Encrypted Data: Approaches, Trade‑offs, and Practical Implementations

The article examines why encrypted sensitive fields such as passwords, phone numbers, and bank details need special handling, categorises three families of fuzzy‑search solutions for encrypted data, evaluates their security, performance and storage costs, and recommends a balanced conventional method for production use.

Databasealgorithmdata protection
0 likes · 10 min read
Techniques for Fuzzy Search on Encrypted Data: Approaches, Trade‑offs, and Practical Implementations
DataFunSummit
DataFunSummit
Feb 6, 2024 · Big Data

Exploring ByteDance's EB‑Scale HDFS: Architecture, Multi‑Datacenter Challenges, Tiered Storage, and Data Protection Practices

This article presents an in‑depth overview of ByteDance's EB‑scale HDFS, covering its new features, multi‑datacenter architecture, tiered storage implementation, data management services, capacity and fault‑tolerance strategies, as well as practical data‑protection mechanisms and related Q&A.

Big DataDistributed StorageHDFS
0 likes · 22 min read
Exploring ByteDance's EB‑Scale HDFS: Architecture, Multi‑Datacenter Challenges, Tiered Storage, and Data Protection Practices
Architects' Tech Alliance
Architects' Tech Alliance
Dec 14, 2023 · Fundamentals

Understanding Disk Fault Tolerance and RAID Features

This article explains disk fault tolerance mechanisms, detailing how RAID levels (1, 5, 6, 10, 50, 60) provide redundancy, the concepts of consistency checking, hot‑spare and emergency‑spare, rebuild processes, read/write policies, power‑loss protection, striping, mirroring, external configurations, energy‑saving, and JBOD functionality.

Hot SpareRAIDRebuild
0 likes · 20 min read
Understanding Disk Fault Tolerance and RAID Features
Architects' Tech Alliance
Architects' Tech Alliance
Nov 5, 2023 · Fundamentals

Understanding RAID Fault Tolerance, Consistency Checks, Hot Spare, Rebuild, and Data Protection Features

This article explains RAID fault‑tolerance mechanisms, consistency verification, hot‑spare and emergency backup, rebuild processes, virtual‑disk read/write policies, power‑loss protection, disk striping, mirroring, foreign configurations, power‑saving and pass‑through features, providing a comprehensive overview of modern storage system capabilities.

Disk StripingHot SpareRAID
0 likes · 16 min read
Understanding RAID Fault Tolerance, Consistency Checks, Hot Spare, Rebuild, and Data Protection Features
php中文网 Courses
php中文网 Courses
Oct 24, 2023 · Information Security

Using PHP Encryption Functions for Data Protection

This article explains PHP's built‑in encryption functions—including OpenSSL encryption/decryption, hashing, and password handling—shows how to generate keys, encrypt and decrypt data, and provides best‑practice tips for securely protecting sensitive information in PHP applications.

OpenSSLPHPdata protection
0 likes · 5 min read
Using PHP Encryption Functions for Data Protection
Didi Tech
Didi Tech
Aug 10, 2023 · Information Security

Security Hardening and Architecture of Didi's Elasticsearch Deployment

Didi hardened its massive Elasticsearch deployment—spanning 66 clusters and thousands of nodes—by adding a custom security plugin that authenticates requests at the cluster level, implementing a one‑click toggle and staged rolling upgrades, ultimately enabling authentication across all clusters and dramatically reducing data‑leak risk.

AuthenticationDidiDistributed Systems
0 likes · 12 min read
Security Hardening and Architecture of Didi's Elasticsearch Deployment
Architects' Tech Alliance
Architects' Tech Alliance
Jul 5, 2023 · Fundamentals

Comprehensive Overview of RAID: Concepts, Implementations, and Practical Applications

This article provides a thorough introduction to RAID technology, explaining its definition, various software and hardware implementations, their advantages and disadvantages, and practical guidance for selecting the most suitable RAID solution for different storage scenarios.

RAIDdata protectionhardware RAID
0 likes · 11 min read
Comprehensive Overview of RAID: Concepts, Implementations, and Practical Applications
Architects' Tech Alliance
Architects' Tech Alliance
Jun 18, 2023 · Cloud Computing

Comparison of Three‑Replica and Dual‑RAID Distributed Storage Architectures

The article compares three‑replica and dual‑RAID distributed storage designs, detailing their architectures, bandwidth and latency impacts, failure isolation, “slow‑disk” issues, and overall performance, stability, and reliability advantages of dual‑RAID for modern cloud and hyper‑converged environments.

Distributed StorageRAIDcloud storage
0 likes · 7 min read
Comparison of Three‑Replica and Dual‑RAID Distributed Storage Architectures
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Dec 9, 2022 · Operations

Factors Affecting Storage System Reliability and Related Technologies

Storage system reliability depends on both hardware and software availability and on preserving data integrity against media degradation, bit flips, external corruption, and firmware bugs, while techniques such as parity/ECC/CRC verification, RAID levels, snapshot methods, backups, continuous data protection, and specialized mechanisms like WAFL checksums and flash‑level error recovery collectively mitigate these risks.

ECCRAIDSnapshots
0 likes · 13 min read
Factors Affecting Storage System Reliability and Related Technologies
IT Services Circle
IT Services Circle
Nov 19, 2022 · Information Security

New Internet Comment Service Management Regulations Effective December 15, 2022

The National Internet Information Office's revised Internet Comment Service Management Regulations, effective December 15, 2022, mandate real‑name authentication, user tiering, blacklist of serious defaulters, stringent personal data protection, pre‑review of news comments, and comprehensive security measures for online comment platforms.

Comment ManagementInternet RegulationUser Authentication
0 likes · 6 min read
New Internet Comment Service Management Regulations Effective December 15, 2022
Java Architect Essentials
Java Architect Essentials
Oct 23, 2022 · Information Security

Dutch Employee Wins €75,000 Compensation After Being Fired for Refusing Webcam Monitoring

A Dutch employee was awarded €75,000 (≈ ¥520,000) after a Dutch court ruled that his dismissal for refusing to keep his webcam on during remote work violated his privacy rights, highlighting legal limits on employer surveillance and prompting broader debate on remote‑work monitoring practices.

data protectionemployee monitoringlegal case
0 likes · 7 min read
Dutch Employee Wins €75,000 Compensation After Being Fired for Refusing Webcam Monitoring
Architects Research Society
Architects Research Society
Aug 22, 2022 · Operations

Backup Strategies: Full, Incremental, and Differential Backups

This article explains the three main backup methods—full, incremental, and differential—detailing their processes, advantages, disadvantages, and suitable use cases for organizations of different sizes, helping readers choose the most appropriate backup strategy for their business needs.

Full BackupIT OperationsIncremental backup
0 likes · 7 min read
Backup Strategies: Full, Incremental, and Differential Backups
AntTech
AntTech
Jul 8, 2022 · Information Security

Ant Group mPaaS Full‑Chain Mobile Security Solution: Overview and Practical Insights

This article reviews Ant Group's award‑winning mPaaS mobile security solution, detailing the current mobile app security landscape, regulatory pressures, and the four‑layer full‑chain protection architecture—including data security, privacy control, biometric authentication, and app hardening—along with practical compliance and risk‑mitigation practices.

Ant GroupMobile Securityapplication security
0 likes · 8 min read
Ant Group mPaaS Full‑Chain Mobile Security Solution: Overview and Practical Insights
Airbnb Technology Team
Airbnb Technology Team
May 12, 2022 · Information Security

Airbnb Data Privacy and Security Engineering – Data Protection Platform (DPP) Overview and Madoka Metadata System

Airbnb’s Data Protection Platform (DPP) combines automated discovery, classification, encryption and privacy‑orchestration services—Inspekt, Angmar, Cipher, Obliviate, Minister, and the Madoka metadata system—to continuously inventory petabyte‑scale MySQL, Hive and S3 assets, track ownership and security attributes, and enforce GDPR, PIPL and CCPA compliance.

AirbnbAutomationMetadata Management
0 likes · 15 min read
Airbnb Data Privacy and Security Engineering – Data Protection Platform (DPP) Overview and Madoka Metadata System