Or how about my favorite story of the woman who just completed her own Master's Thesis which she stored on a thumb drive? To celebrate she went for a run in the park. When she returned to her car she found her car vandalized and her purse stolen - containing the thumb drive! After some frantic calls to police, etc. she returned home and checked transactions on her debit card. She saw a withdrawal from an ATM in a neighbouring county, drove to the shopping center where the ATM was located, spied a dumpster nearby and dove in to retrieve her purse and the thumb drive!
One can only hope that the couple who have reported their Mac stolen from their car in this story have a similar happy ending. http://www.news9.com/Global/story.asp?S=13833909
The researchers into a cure for prostate cancer at Oklahoma University had stopped at a Panera in Oklahoma City. When they returned to their car they found the windows broken and their Macbook gone.
"Unfortunately, most of the data was never backed up, a mistake Shin said could be a major setback in the fight against cancer."
Do not let this happen to you. Sure, there are automated back up and recovery systems that you should be using. But in the meantime follow these practices as well to save you time and minimize the impact of data loss. This is what I do when I am writing a book or white paper.
1. As soon as you complete any amount of work on a document or project that you would not want to do over save a copy to a thumb drive.
2. Send yourself a copy using web based email. Google and Yahoo allow you to store gigabytes of information this way.
3. At least weekly backup everything to a hard drive.
In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more
Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more
For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more
With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more