Skip to main content

Home/ Globaltech/ Group items tagged backup

Rss Feed Group items tagged

anonymous

On Computers » BACKUP, AND THEN WHAT? - 1 views

  •  
    Describe the IT systems. Az nov 22
  •  
    The IT system in this article is software that lets you restore your whole system back on the old or new computer in case your computer dies. But first, you need a "bootable disk". If your computer won't start, insert the bootable disk and the operating system will find it and start up. Second, you need to backup your computer to an external hard drive or DVD before it died. Then, you can use this software called "Acronis True Image Home 2011" that put Windows and all your programs, files and settings, onto a different computer without any hardware conflicts. True Image also comes with a "Try and Decide" mode where you can try any program that is stored on your external hard drive and decide whether you want to keep it on your new computer. Acronis True Image Home also comes with online backup, which is free for 2gb and it makes a bootable disk for you.
anonymous

Corporate computing: Online reputations in the dirt | The Economist - 2 views

  •  
    Explain the issues that are in common with both Amazon and Sony? Explain the reasons that cloud computing will continue to grow? What could have prevented Sony from getting hacked? Describe: Rambo architecture Chaos monkey Explain the reason that data centers for cloud computing need backups? may 9 woo
  • ...1 more comment...
  •  
    incomplete
  •  
    1. Explain the issues that are in common with both Amazon and Sony? Issues that are in common with both Amazon and Sony are their reliability and integrity as well as its security. Amazon has just revealed that its Availability Zone in northern Virginia has failed to accommodate customers that were using their services. Sony's hack incident includes its network protection system to be unreliable. Also the security of Amazon's customer's data along with Sony's online users' data is at risk, as well as sensitive information linked to bank accounts. Both Sony and Amazon suffer a setback on their online reputation. Both companies have their servers down which affect a lot of their customers using their services. They both revived worries about the safety of storing and processing data over the Internet. The two crises have also raised questions about the speed and quality of information provided by tech companies when confronted with systems failures. This further links to the data integrity. Amazon users have said that some data may be corrupted or loss resulting from their sites crashing. Sony's users' accounts data may have been altered by unauthorized people. 2. Explain the reasons that cloud computing will continue to grow? Cloud computing will still continue to grow despite its recent incidents because the benefits users receive outweigh the risks that come with cloud computing. The outage suffered by Amazon has been rare. Also, managing one's own network is hardly a guarantee of reliability; it costs a lot of money and is high maintenance. Cloud computing provides another alternative that can save costs for businesses. Also, the recent incidents have proven that managing one's own network is not as reliable as some think considering protection issues and failure/crashes in the network itself. 3. What could have prevented Sony from getting hacked? Sony could have increased its protection system, as well as create random simulations in orde
  •  
    Tags: 1.1 Reliability and integrity 1.2 Security 3.3 Network
anonymous

Yes, your iPhone is tracking you -- the question's why - Computerworld - 3 views

  •  
    Why are iphones tracking people? april 28' cream
  •  
    Why are iphones tracking people? This is the issue of storing user's location data in unencrypted file. The file, named "consolidated.db," is an unencrypted SQLite database that can be found in the devices' file systems and in the iOS backup files created and updated by iTunes every time an iPhone or 3G iPad is synced. Since, we know that Apple is actually collecting location and some information on iphone that's why iphone is not safe at all. Although the file isn't immediately accessible on the device itself, it can be accessed on a jailbroken device via the iTunes-generated backup file. It also could potentially be accessed using other tools that allow you to explore an iOS device's file system while it's attached to a computer.
anonymous

Amazon Malfunction Raises Doubts About Cloud Computing - NYTimes.com - 2 views

  •  
    Describe the two issues that came up from the technical problems that interrupted computer services provided by Amazon. Why is the cloud model gaining popularity? List the problems that companies reported. april 28 az
  •  
    1) Describe the two issues that came up from the technical problems that interrupted computer services provided by Amazon. One of the issues is that Amazon need to reconsider the contracts that cover cloud services such as how much to pay for backup and recovery services, including paying extra for data centers in different locations. The reason for this is because small businesses are less apt to pay for extensive backup and recovery services. The second issue would be many companies are relying too much on remote computers that are beyond their control. So they need to reconsider that also. The technical problem that interrupted computer services provided by Amazon told its customers and users that there may be a reliability problem with Amazon's service in online computing in the cloud. Companies and businesses operation network now revolves a lot around these remote network systems, so this also affects how companies will reconsider their use of exporting their files and data as opposed to keeping them within the company walls. 2) Why is the cloud model gaining popularity? Because owning a data center is high maintenance and therefore expensive. By using the cloud model, companies are avoiding the costs and headaches of running their own data centers. They just simply tap in, over the Web, to computer processing and storage without owning the actual machines or operating software. Businesses can also save their time by outsourcing to the cloud to save having to keep track of running their own data centers. 3) List the problems that companies reported. ( Unable to access data Service interruptions Sites being shut down
anonymous

Bangkok Post : The cloud has been around for a while - 0 views

  •  
    summary about the cloud soo nov 22
  •  
    1. The cloud has been around for a while  Summary about the cloud Many people are doing their own business everywhere around the world and they need something that can communicate with their customers, workers, and many other people. We call these communicating systems as Clouding. For example, currently there is phone call, emails and messaging systems are examples of clouding system. When people are using clouding system, they have to care about backup system to protect their files from losing. To have good clouding system, people need connection of Internet to send or receive their emails with cell phones or laptops. Then people should have their free email accounts like G-mail or Yahoo. Theses free email accounts allow large attachments and people can access theses emails everywhere. Unfortunately, business user who has Google or Yahoo accounts with their company name should pay a small annual fee. These systems are all cloud. People are using clouding computing already.
anonymous

How Google Chromebook Will Feel for Music Fans | Epicenter | Wired.com - 2 views

  •  
    What are the problems with doing everything on the cloud? may 19 az
  •  
    Doing everything on the cloud is efficient in a way that we can work on from anywhere anytime as long as we have internet connection. However, when we don't have good internet connection, there is nothing we can do since everything we have done is stored on the cloud. . Internet data storing plans might also be an obstacle while operating on the cloud because the costs increase as more data is wanted to be stored on the cloud. Moreover, The cloud is not invincible to attacks so your data is not 100% safe. Having a backup saved on a physical hard drive is a must, cause you can't rely too much in the cloud (look what happen to Amazon and Sony).
anonymous

Remove Malware from Your Computer Video - 5min.com - 7 views

  •  
    Describe the steps for removing malware. All September 2 Champ
  •  
    - First, you must know that your computer is really having malware. If your computer slow down, maybe it just doesn't have enough RAM. You can check by using system cleaning tool called CCleaner, it is a best known for cleaning out files, cookies, and also can clean your hard drive. After using CCleaner, you should restart your computer. - run the Anti-Virus scan and try to restore your system. By doing so, you will need system backup, to save your important documents. If you did not back up, you can use Malwarebyte's Anti- Malware and try deep scan. If the scan still doen't work, you might have to spend sometime uninstalling things that you doesn't want but it is not so affective because most of them are not able to uninstall. It is more effective to use free virus scan. - Use Virus Scanning Tools 1. Kaspersky- it will tell you the infection. It takes about two hour depending on your software. 2. Norton Power Eraser- It will scan and clean your computer for free. 3.Trend Micro HijackThis- It can generate log and you can post these log in forum such as Bleepingcomputer.com or Geekstogo.com where experts can view your post and they might give you some advices you.
anonymous

iPhone Tracking Only Tip Of Security Iceberg -- InformationWeek - 1 views

  •  
    Explain what the following means: Miriam Wugmeister, chair of the global privacy practice at law firm Morrison & Foerster, echoes that assessment and stresses than employers should make it clear to employees that they can't expect privacy using corporate devices. While she observes that allowing employees to backup personal devices containing corporate data on a home computer could pose an e-discovery problem in the event of litigation, she also says there are good technical solutions that allow corporate IT administrators to create sandboxes that segregate personal and corporate communications. april 28 woo
  •  
    incomplete
1 - 8 of 8
Showing 20 items per page