Data Backup
This post is an introduction to data backup. Types of Data Backup Types of Data Backup: Full backup means that an exact copy of the original media is done. Differential backup means that only registries that have been modified since…
This post is an introduction to data backup. Types of Data Backup Types of Data Backup: Full backup means that an exact copy of the original media is done. Differential backup means that only registries that have been modified since…
Data mining is a step within KDD whose goal is to find patterns within large volumes of data. It would be a field of statistics and information systems. Some of these patterns are: It combines statistics, artificial intelligence, machine learning…
Data security can be also referred as data protection. This post is about data security platforms. Data governance List of Data Security Platforms Data security platforms featured on this post: Microsoft Purview Microsoft Purview is a proprietary solution to manage…
Data privacy standards featured on this post: ISO/IEC DIS 27701 ISO/IEC 27701 is an extension to ISO/IEC 27001 and 27002 (both about creating and maintaining an ISMS) that focuses on privacy. Version history: ISO/IEC DIS 27018 ISO/IEC DIS 27018 is…
This post is about data science and engineering, that can be considered one of the main fields of information technology. You can read this post about information Technology DIKW Pyramid DIKW ordered from top to bottom: Data Structures Data structure…
This post is an introduction to free and open data licenses. List of Open Data Licenses Open data licenses: Open content licenses like Creative Commons also apply. PPDL Open Data Commons Public Domain Dedication and Licence (PPDL). It is published…
This post lists some mobile phones that are focused on privacy by design and it is its primary goal. Because to ensure privacy you need to rely on the operating system running on the smartphone, smartphones focused on privacy will…
This post gives some hints about how to erase a storage device securely. That means that data that was stored in the past on that device cannot be retrieved by any mean. Deletion Types Erasing is the deletion of files…
This post summarizes some certifications for organizations (and not for individuals or professionals) related somehow to information security or cybersecurity. List of Information Security Certifications for Organizations Information Security Certifications for Organizations featured on this post: ISO/IEC 27001 ISO/IEC 27001…
A data processing center (DPC) or data center is a building, a dedicated space within a building, or a group of buildings used to house computer systems and associated components, such as telecommunications and storage systems. Hyperconvergent Infrastructure (HCI) combines…