Blog

A new small business survey conducted by Seagate Australia has painted a pretty bleak picture of the nation’s backup practices — or lack thereof. According to Seagate’s research, nearly half of small businesses have lost work due to not backing up effectively, resulting in revenue losses of up to 10 percent. The following infographic maps […]

Read More

  Today RBS released the latest RBackup, version 11.10.004. This release contains updates to database agents, some exciting new features, enhancements to the Full Image Backup agent, a new Portal Connector that can back up your RBS Server to the Partner’s Portal, and an enhancement to the RBackup Client software to support Portal’s new Hot […]

Read More

RBackup, in development and distribution since 1987, is the world’s most mature brandable hybrid backup solution, offering fully encrypted, fully compliant backups to secure Online Backup servers while at the same time offering backups to local devices, cloud services, and now including Full Drive Image Backups for Backup and Disaster Recovery (BDR.)

Read More

Amazon has done it again – their 42nd price reduction in six years. Here’s the story… It is always fun to write about price reductions. I enjoy knowing that our customers will find AWS to be an even better value over time as we work on their behalf to make AWS more and more cost-effective […]

Read More

I am seeing a considerable number of articles lately with titles like “Cloud Storage vs. Online Backup,” and “Which is Best: Cloud Storage or Online Backup?” Many of the articles seem to be written by people with a bias toward one or the other, with most written by authors defending the claim that Cloud Storage […]

Read More

Hackers don’t just go after multinationals. Smaller companies are often prime targets for attackers looking to exploit vulnerable security systems, says Kevin B. McDonald, executive vice president of computer network management company Alvaka Networks. Entrepreneurs may also be snagged by hackers who cull through a wide swath of computer IP addresses looking for weaknesses. via […]

Read More