The earth is divided into several regions, each of which has special characteristics of language, culture, race, and natural conditions. Basically, natural conditions can be positive and can also be negative. For example, has a cold climate, but is prone to earthquakes. Besides , there are also several countries in the Southeast Asia region which are located in the Ring of Fire region or the area surrounded by mountains — active volcanoes. So from that certainly all these countries have their own strategies in the event of a disaster, especially those that cause their important data to be lost.
In this case there are several methods offered by Stonefly. Which method will be very useful if implemented in the Databloc operating system. As a company or platform that has been very experienced in this matter, Stonefly has always been required to respond to various disasters that cannot be predicted when it will occur. Some of these methods are implemented in various forms of features, including:
- Offsite backup and replication with veamcloud connect
- Please backup the cloud to connect to Microsoft Azure
- Veem cloud connects back up to Amazon web services
- Backup backup for Microsoft office 365
- CDR 365 disaster recovery cloud
It should be noted that the disasters in the world are divided into two, namely predictable disasters and disasters that are totally unpredictable. Very often we hear attacks — attacks on online data carried out by a number of cyber or irresponsible parties. This can be overcome by the platform side by integrating various sophisticated technological components that are compatible with the platform’s performance system. This is like what was done by Veil. Which is to prevent data leakage, Veil collaborates with Zerocoin technology components known as coin privacy and the Dandelion protocol that is used as the last layer of protection. But for types of disasters that cannot be predicted, Databloc and Stonefly will not be able to predict when the natural disaster will occur. Because natural disasters can occur anywhere, without seeing the background of a region previously safe or not. Until now there has been no natural disaster that can be predicted concretely. Although the analyzer is a person who is an expert in his field. Therefore, this is what is called a natural disaster that cannot be predicted.
Usually before this happens, the data storage party will the data using the georedudance technique. Georedudance technique is storage technique in different locations. For example storage techniques for non-profit companies (NGOs) under the auspices of the United Nations which usually establish companies in conflict areas, researchers who conduct research in vulnerable areas with limited means of communication. Usually for storing and protecting the data, they will carry out georedudance storage techniques. Another storage technique that is often used is by encrypting the data. This technique can be executed by hiding or randomizing the message (data) so that it becomes very different from the original text. This can only be done by users who have key descriptions and integrated components of the encryption algorithm technology. The data encryption capabilities are also applied by Stonefly in the process of archiving or data backup. Of course this can also be applied by Databloc.
It is important to know that the recovery process to repair the storage system that has been damaged is not easy. Because the recovery process is not only focused on the data stored, but will be focused first on repairing virtual machines and physical machines that become the main container. If this container can be synchronized and repaired automatically various types of documents stored in it can also be saved.
Although natural disasters cannot be predicted, there is no harm if the construction of data centers, both physical and virtual, must also meet security standards. Because actually the security and rescue system was built not to eliminate various problems, but to minimize the risk. Therefore, the Databloc expert team continues to work together to gather all kinds of security methods, both those adopted from Stonefly and self-created ones.
For More Information:
| | | |
Published at Tue, 07 May 2019 04:05:56 +0000