Key Differences Between Server And Desktop Online Storage

Key Differences Between Server and Desktop Online Storage

Many people are saying that 2013 will be the “break-out”  year for cloud storage. A number of factors are pushing online data storage offerings – including file sharing, backup, archiving and more – beyond the consumer and small business market and into big business datacenters.

Below, I’d like to highlight some of the key differences which set server and desktop/laptop online backup and storage services apart, in hopes that this might give you some insight into how the space has developed and evolved over the years.

Desktop Online Backup

In the past, most work was done inside of the office, on company-owned PCs. But in recent years, there has been a dramatic shift where employees are permitted or even encouraged to perform work remotely. The new “digital natives” generation has also entered the workforce with new ways of working, and companies must be flexible in offering collaboration tools in order to attract, retain and maximize the productivity of top talent.

Online backup in both private and public cloud flavors –  helps solve the governance problems associated with having many remote workers. Online backup allows all of the critical business documents which are created outside of the office to be protected and monitored through a centralized system. Gone are the days when employees would wait until they came into the office before transferring their files to the mapped network drive. Proper governance demands that this process be automated and tightly controlled. If someone gets their laptop stolen, at least you’ll still retain your corporate knowledge assets.

Online file sharing is also important for eliminating many of the logistical headaches which came from forwarding email attachments back and forth. Now, everyone knows which document revisions are up-to-date, and mailboxes no longer get filled with duplicate copies of redundant files. Another advantage of online file sharing is that very large files or documents can be shared in a way that would’ve been impractical with email attachments.

Whether you like it or not, employees are going to use online file sharing services. Companies need to be proactive in providing these tools to employees in order to prevent corporate data from ending up on undocumented or improvised file sharing accounts which are outside of the IT department’s control. These kinds of arrangements can raise issues for compliance, security and privacy.

Server Online Backup

In the datacenter, data protection priorities are somewhat different. Servers never leave the office, and their administration is tightly controlled. Here is where the largest and most sensitive data stores reside.

However, manual tape-based backup processes are vulnerable to procedural mistakes and media failure. In the age of rapid data growth, automation is absolutely essential for eliminating risk and reducing backup costs.

Globalization has also caused a shift in the way datacenters are managed. Previously, offices operated on a 9-5 schedule. It was perfectly acceptable to take servers offline at 7 in order to perform a few hours of backup and standard maintenance. But today, the business world runs around the clock. Long backup windows are out of the question.

Additionally, this 24-hour schedule has greatly reduced the tolerance for unplanned downtime amongst companies. A 5 hour window to rebuild a critical server is highly undesirable.

Modern server online backup solutions tend to be more focused on reduction of backup recovery times. This is accomplished through several different means. Sometimes, you may have the option of hosting an appliance for fast on-site recoveries, and other options can even replicate your servers to a public cloud datacenter for on-demand emergency failover capacity.

Another category of server online backup may be more similar to their desktop counterparts, but with server-specific features. For example, you may require special recovery options for email accounts or database tables. Also, the use of hypervisors and virtual machines are creating new backup challenges which server online backup services are particularly well-suited to address.

Finally, cloud storage is perfect for tackling tough compliance challenges. Performing electronic discovery on format-neutral cloud storage is much more convenient than manually sorting through archival storage devices… and the on-demand computing capacity offered by the cloud also makes these discovery searches much more cost-effective.

As you can see, server and desktop online backup options have evolved a lot over the years… and both have grown to become distinct and suited to their own specialized sets of challenges.

By Paul Rudo,

Paul Rudo is the editor at Enterprise Features, a leading IT blog covering many aspects of cloud computing, big data and emerging technology.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

A Setback For Internet Privacy On Monday the Third U.S. Circuit Court of Appeals (a federal appeals court) unanimously dismissed a class action lawsuit by parents of children under the age of 13 who had used Nickelodeon’s websites against Google and Viacom (which owns the Nickelodeon websites). This was a result of litigation beginning in…

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

5 Predictions For Education Technology

5 Predictions For Education Technology

Education Technology Although technology has fast influenced most sectors of our world, education is an area that’s lagged behind. Many classrooms still employ the one-to-many lecturing model wherein the average student is catered for while a few are left behind, and others bored. Recently, there’s been a drive to uncover how to use technology successfully…

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills Cloud technology has completely changed the infrastructure and internal landscape of both small businesses and large corporations alike. No professionals in any industry understand this better than IT pros. In a cutthroat field like IT, candidates have to be multi-faceted and well-versed in the cloud universe. Employers want to know that…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies Clinics, hospitals, and other healthcare facilities are embracing new mobile technologies in order to be more efficient in their daily tasks. With faster communication and better collaboration, clinicians can spend much less time handling medical devices and more time administering care to their patients. Industry experts are stating that mobile connected technologies…

Are Women Discriminated Against In The Tech Sector?

Are Women Discriminated Against In The Tech Sector?

Women Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women. Yet the irony is twofold. Firstly, there is an enormous demand for employees with skills…