Proliferation of the edge, containers, & how to protect them (Restore it All Podcast #63)

Gina Rosenthal (@gminks) joins us on this week’s podcast to talk about the edge, Kubernetes, and how to protect it all. Good conversation that also includes som Texas Brisket talk!

We also mention the Women in Tech conference that will go live on October 13. Here’s what they have to say about themselves:

When the girls get coding!. Join us on your screens, Oct 13, for the live@Manning “Women in Tech” conference to celebrate the rising movement of women in technology. http://mng.bz/7GZm

We still have a long way to go to achieve diversity, inclusion and equality in technology. Our contribution is the live@Manning “Women in Tech” online conference, Oct 13, starring the women rocking the tech boat! http://mng.bz/7GZm

Cloud navigators and serverless gurus; algorithm sorceresses and community advocates; we proudly bring you the women creating the tech world we live in. Oct 13, live@manning “Women in Tech” Twitch conference!

#womenintech #womenwhocode

----- Signature and Disclaimer -----

Written by W. Curtis Preston (@wcpreston). For those of you unfamiliar with my work, I've specialized in backup & recovery since 1993. I've written the O'Reilly books on backup and have worked with a number of native and commercial tools. I am now Chief Technical Evangelist at Druva, the leading provider of cloud-based data protection and data management tools for endpoints, infrastructure, and cloud applications. These posts reflect my own opinion and are not necessarily the opinion of my employer.

9 Tips for Disaster Recovery (Restore it All Podcast #62)

Prasanna and Curtis discuss their opinion of an ITPro article called Nine Tips to Improve your Disaster Recovery Strategy. In case you’re curious, they are:
1. Have full documentation
2. Assess the risks
3. Drill for disaster
4. Prepare for disasters of different levels
5. Consider the cloud
6. Prioritize resilience
7. Evaluate security practices
8. Revise and Revisit
9. Build a critical response team

----- Signature and Disclaimer -----

Written by W. Curtis Preston (@wcpreston). For those of you unfamiliar with my work, I've specialized in backup & recovery since 1993. I've written the O'Reilly books on backup and have worked with a number of native and commercial tools. I am now Chief Technical Evangelist at Druva, the leading provider of cloud-based data protection and data management tools for endpoints, infrastructure, and cloud applications. These posts reflect my own opinion and are not necessarily the opinion of my employer.

What can we learn from the twitter hack (Restore it All Podcast #61)

Scott Lowe (@otherscottlowe) joins us on the podcast to discuss the recent major hack of Twitter, where hundreds of accounts were compromised using backdoor access gained via a Twitter employee.

----- Signature and Disclaimer -----

Written by W. Curtis Preston (@wcpreston). For those of you unfamiliar with my work, I've specialized in backup & recovery since 1993. I've written the O'Reilly books on backup and have worked with a number of native and commercial tools. I am now Chief Technical Evangelist at Druva, the leading provider of cloud-based data protection and data management tools for endpoints, infrastructure, and cloud applications. These posts reflect my own opinion and are not necessarily the opinion of my employer.

How to backup a NAS filer? (Restore it All Podcast #60)

W. Curtis Preston and Prasanna Malaiyandi discuss the pros and cons of the various ways to backup a NAS filer.

----- Signature and Disclaimer -----

Written by W. Curtis Preston (@wcpreston). For those of you unfamiliar with my work, I've specialized in backup & recovery since 1993. I've written the O'Reilly books on backup and have worked with a number of native and commercial tools. I am now Chief Technical Evangelist at Druva, the leading provider of cloud-based data protection and data management tools for endpoints, infrastructure, and cloud applications. These posts reflect my own opinion and are not necessarily the opinion of my employer.

One big problem with the Right to be Forgotten and backups (Restore it All Podcast #59)

Curtis and Prasanna discuss the very difficult problem of “forgetting” someone using a backup system that is fundamentally designed to remember. This is a direct conflict between GDPR/CCPA and backup.  It’s one thing to delete a single file that relates to a subject; how do you delete records within a database within a database backup. Set aside how fundamentally difficult it is – you’re messing with the fundamental purpose of backups.

----- Signature and Disclaimer -----

Written by W. Curtis Preston (@wcpreston). For those of you unfamiliar with my work, I've specialized in backup & recovery since 1993. I've written the O'Reilly books on backup and have worked with a number of native and commercial tools. I am now Chief Technical Evangelist at Druva, the leading provider of cloud-based data protection and data management tools for endpoints, infrastructure, and cloud applications. These posts reflect my own opinion and are not necessarily the opinion of my employer.