Category Archives: Online Backup

Using “SMART” Goals to Evaluate your Website – Part II

In Part I, we discussed how to evaluate the success of your website using the SMART technique. In this series, we will further discuss the principles of SMART when measuring your marketing goals.

If a website doesn’t get traffic, then it will eventually get out of business. Growing your traffic will require you to create some kind of performance targets.

SEO

A website that is not found when Googled is bound to fail. This means, you must invest in SEOs. Keywords can be found from other high ranking competitive websites. SEO is not a one-time job, rather, you must continue to work on you SEO at all times.

Subscriber

Once visitors find your website, your goal is for a quick conversion if possible or at least for them to come back again. This an be accomplished by creating a subscriber list. List building is much easier if the signup page is placed at a visible location with in the website, and an incentive is given to the visitor to opt-in.

Inbound Link Building

Inbound link building definitely helps you to be SMART. Backlinks boost your SEO and increase traffic while creating great brand awareness. Achieving a huge number of backlinks might be very challenging, but if you put your efforts, you will be able to succeed.

Content Publishing

Search engines love fresh contents as do humans. Even though it might take up to 90 days or more for search engines to fully index your website, publishing high-quality contents and blogs on a regular basis will bring huge benefits. In addition to blogs, you can also publish some additional contents like ebooks, whitepapers, case studies, and surveys.

Measuring Your Marketing Goals

Not everything needs to be measured. In fact, collecting all kinds of information might lead to complications when you evaluate the results. Having said that, here are some of the key metrics that you can focus on:

Total Visits: The total number of website visits is a direct representation of how well it’s performing.

Page Views: Page views help you understand which specific pages of your website are more popular than others.

Unique Visitors: Repeat visitors are not half as contributing to your business as the unique visitors. After all, every unique visitor is a potential customer.

Traffic Sources: It is important to check where most of your traffic is coming from. Are your visitors using desktops or smartphones? Where are they based in? These factors can help you in improving the marketing campaign.

Bounce Rate: Bounce rate is defined by the number of visitors that leave your website almost instantly. If you observe a high bounce rate, then you may want to check your website to see what’s causing it.

Backup Technology Limited (BTL) is always available to help its partners and resellers with their marketing needs. Please contact BTL at https://www.backup-technology.com/about-btl/contact 

 

Influencing the Quality of Services by Focusing on Service Level Agreements 

Service Level Agreements (SLAs) are enterprise life lines on the Internet. CIOs cannot plead ignorance of the clauses. First, the SLA is often written in plain English, and second, the SLA represents the “consensus” reached between the contracting parties. A focus on the SLA is an imperative; a necessity. So, what does one look for in an SLA?

This paper purports to help readers focus on SLAs for Cloud services and understand the what, why and how of it.

 

Table of Contents

  1. Introduction
  2. Definition of Services
  3. Performance Measurements
  4. Problem Management
  5. Customer Duties – Roles and Responsibilities
  6. Warranties and Remedies
  7. Disaster Recovery and Business Continuity
  8. Security
  9. Termination of Agreement
  10. Conclusion
  1. Introduction

CIOs can not plead ignorance of the clauses in the SLA if enterprise data suddenly vanishes into cyberspace! SLAs are often set out in plain English and a focus on the SLA is an imperative; a necessity for the survival of the organization in this digital age. A focus on the SLA, an understanding of the provisions and sections of the document is a must.

Service level agreements are formal, legally binding documents that are drawn up by the contracting parties. They formally set out the level of service that will be provided by the contractor under the terms of the contract. All Cloud services providers include SLAs that detail the level of service that will be provided for the duration of the contract.

A service level agreement is an “agreement”. It signifies consensus between the contracting parties. It assumes that there is a common understanding about services, guarantees and warranties, responsibilities and priorities. It defines levels of serviceability, availability, operation, performance or other attributes of the service, including billing. It details where and when a customer can expect “minimum” service and how it can be measured or what the target value is.

A few contracts may even contain clauses detailing penalties for failure to meet minimum expected levels of service. To get the right level of service, customers must examine the different sections of the service level agreement in detail.

At a minimum, a typical Cloud service level agreement includes the following sections:

  • Definition of services
  • Performance Measurements
  • Problem Management
  • Customer Duties
  • Warranties
  • Disaster Recovery and Business Continuity
  • Termination of Agreement
  1. Definition of Services

Cloud Service SLAs, like all utility service SLAs are output based. By this, we mean that the level of service that will be provided to the customer is defined in measurable terms. The service provider demonstrates value to the customer by expounding how knowledge, capability, and ingenuity are innovatively organized to deliver the requisite output or service to the customer. This emphasis on the delivery mechanism shifts the risk to the service provider.

The definition of services under the SLA may vary according to the type of service, the type of organization and the needs of the organization. A corporate level SLA may provide generic services to all parts of the enterprise. Multi-level SLAs may split services so that the service provider can cater to the specific service needs of different parts of the organization. Customer level SLAs may provision for services relevant to a particular industry. Service level SLAs may cover specific service requirements of specific service groups.

SLAs may offer layered services. The service provider may define the basic package(s), that will be made available at different prices. Customers can select from a list of “add-ons” (at pre-defined costs) or other specific features that they would like to include in their package. For instance, the basic package may offer the customer 2 GB of space for storage. The customer may choose to “add-on” additional storage by signing up for 20GB of space. The service user may also opt for an email system for the entire organization in addition to the other services being offered as part of the regular package.

All terminology proposed to be used in the SLA are also set out and explained in this section of the document.

  1. Performance Measures

That which is not monitored is not done. SLAs are drawn up to ensure that Cloud service delivery performance can be measured and the customer has the ability to monitor the performance of the service provider on the basis of a pre-defined set of standards and norms. The service provider also commits to a minimum level of service under this section of the SLA and has the opportunity to define the standards and norms that are to be used to evaluate the performance of the service delivery. For instance, “latency” is a term that describes the time taken for data to be recovered to the client machine from the storage server in the Cloud. “Uptime” is a measure that helps both the customer and the service provider understand whether the services are being delivered as promised. Uptime is usually expressed in 9s. As a client, one needs to think thoroughly on the level of uptime. Uptime can be incorporated with much accuracy by determining the number of 9s in the SLA. For example, the table below shows the co-relation between the number of 9s a client might target and the duration of downtime, which may vary from 5 minutes to over 36 days in a given year.

If your availability target is a mere 90%, there will be 36.5 days of downtime in a year (i.e. 10% of 365 days). If, however, your availability target is 99.999% (dubbed as five nines), then you will only have about 5 minutes of downtime in the entire year!

Availability Target Downtime Per Year (Approx.)
90 percent 36.5 days
99 percent 3.65 days
99.9 percent 8.8 hours
99.99 percent 52.6 minutes
99.999 percent 5.3 minutes

Table: Comparison of Downtime Vs Availability Target, using “one to five nines”

  1. Problem Management

This section of the SLA focuses attention on problem-handling systems integrated into the service. The purpose is to minimize the impact of events, incidents, and problems on the customer’s business. For instance, the Cloud vendor may provision for alerts to be generated whenever a backup or recovery fails or unauthorized entities attempt to access the data. The SLA may detail error handling procedures and set out escalation protocols for handling unexpected problems. Time frames for the resolution may be specified. Stipulations may include activation of audit trails and maintenance of logs and records for all types of incidents that may cause failures in delivery of service.

  1. Customer Duties – Roles and Responsibilities

The SLA is not a one-way street. The Cloud vendor has some expectations from customers. The service will work effectively only if the organization collaborates regularly with the vendor for technical and support contract issues. The organization must clearly indicate and designate the license administrator. The administrator is responsible for receiving and administrating the software product licenses, updates and upgrades and payment of all bills due or assigning rights and permissions to other users, who are authorized to access the online storage account. Though they may appoint secondary administrators in multi-level contracts, all secondary administrators must report to the primary administrator, who must remain a single point of contact for the Cloud vendor.

  1. Warranties and Remedies

The Cloud vendor provides the user details of any warranties and remedies under this section of the SLA. This is perhaps one of the most important sections for the customer. The warranties may cover service quality, indemnities, third party claims, remedies for breaches, exclusions and force majeure.

  1. Disaster Recovery and Business Continuity

Recovery is the raison d’etre for online Cloud backup and storage. The Cloud vendor describes in this section, the disaster management protocols that have been put in place by the company to safeguard against disaster.

The disaster recovery and business continuity guarantees may broadly include:

  • Provisioning of geographically dispersed servers for safeguarding against natural disasters such as Tsunamis, earthquakes or tornados
  • Continuous data replication or data mirroring to ensure high availability of information at all times
  • Seamless failover systems
  • Simultaneous creation of local copies of data using the Cloud vendor’s proprietary application even as data is being streamed to the online server over the Internet
  • Provisioning for bare-metal restores to any part of the world
  • Provisioning for data security with impregnable cryptographic modules, both during transmission and storage
  1. Security

This section of the SLA elaborates upon the security systems that the Cloud vendor promises to use. Any certifications obtained by the company for its cryptographic module or the type of encryption that is used (bank grade/military grade) is generally specified here. The encryption protocol may be used only for data in transition and not in storage or for both. If the vendor permits the customization of the encryption key, the fact will find a mention here with suitable warnings that the loss of the key could well mean the loss of data as the vendor does not retain copies of the customized keys.

Further, the vendor urges the customer to ensure that the user management systems provided is exploited to ensure that only authenticated and authorized personnel has access to data and enterprise policies are being adequately implemented through the interface settings.

  1. Termination of the Agreement

The last section naturally talks of when and how the contract can be terminated. The rights and responsibilities of the vendor and the customer are generally detailed in this section. Termination can occur at the end of the initial term, for convenience, and/or for a cause. However, whatever the type of termination, the vendor must undertake to delete all customer information from all primary and secondary servers in which the data has been stored. Some vendors even specify what they will do with the information that is stored by them in their archives and disaster recovery sites. Wherever interoperability of services is possible, the vendor may agree to transfer all customer data and applications to the new Cloud service provider.

  1. Conclusion

It must be reiterated that the SLA is a binding legal document. Both parties to the contract can enforce it and hence, it must be drawn up after both parties are satisfied that they have clarity on promises and expectations. Imperfect understanding on any side can lead to confusion, dissatisfaction and probable loss of business. Therefore, both parties must negotiate the different clauses before signing on the dotted lines and committing themselves to the contract.

In some cases, despite your due diligence, SLAs might not be met; and you won’t discover this until the unexpected happens and disaster strikes. Therefore, it is highly advisable that you understand and get comfortable with the SLA and that you anticipate disasters and plan accordingly. Sometimes, disasters are not fully understood; and administrators might define them vaguely. For instance, disasters that are defined as small instances may have just as big of an impact as the larger, less likely ones.

 

Using File Versioning to Recover Lost Files

When it comes to making sure that your company’s data remains safe and secure, there is no better solution than cloud data backup. Thanks to this increasingly popular and important IT service, businesses of all sizes can now enjoy the peace of mind of knowing that their data is constantly being backed up and preserved for later retrieval whenever the need should arise.

However, the simple backing up of saved files is just the beginning of the myriad advantages that cloud data storage has to offer, with many cloud backup service providers now granting enterprises the amazing ability to go virtually “back in time” in order to retrieve and recover previously saved versions of files that have long ago been deleted from their local systems! Indeed, through a process called “file versioning”, cloud storage providers are now commonly implementing yet another crucial layer of data security, protecting their clients from incorrectly saved files.

With our fast-paced work environments and present-day fondness for digital multi-tasking, accidentally “saving over” a previous version of a file that one may have needed is, unfortunately, is far from a completely rare occurrence. And, in the not-so-distant past, accidentally “saving over” a file meant that you were stuck with the newer version, no matter what. However, by taking advantage of cloud backup and storage services with file versioning feature capability, businesses can now retrieve these lost files from their service provider’s servers with ease!

Through the use of advanced versioning methods, massive amounts of previous file history information is compressed so that disk space on the cloud backup server can be conserved and backup and restore data transmission times minimised. Under this system, each file that is transferred to the cloud backup company’s servers is given a unique name and time stamp, with the first version of the file that is backed up being called (not surprisingly) the “primary file”. Then, the cloud backup company’s software automatically scans to see if this file exists in exactly the same state at any other location on your company’s backup cache and, if so, replaces these duplicate files with a “pointer” toward the original, effectively making it so that one file can virtually exist in two or more places at the same time.

In addition to this, every time a new version of a file with the same name is saved to the cloud backup cache, it is compared to the original, and if they differ in any way, the older one is retained and the newer one is also, of course, saved and given a version name and corresponding time stamp. However, using special algorithms, this newer version of the file only contains the information that has been changed in comparison to the older version, and embedded digital pointers reference the older version for all the information that has not been changed. Although versioned files like these are technically split up in order to save storage space and enable previously saved versions of files to be retrieved when being accessed remotely by the end user, the referenced sections of the files are automatically replaced by the actual information from the original so that all files are intact.

Sound complicated? Well, one of the biggest advantages of leaving your backup and IT concerns to an online cloud storage service provider is that they will keep track of all these details so that you don’t have to, and we here at Backup Technology Limited (BTL) take pride in lifting this burden from the shoulders of all the enterprises whose data we make it our duty to protect. We’ve integrated a robust file versioning system into all of our data storage and recovery solutions, and our powerful backup service, powered by Asigra, constantly monitors your company’s computers for changes made to files and automatically saves these changes for you! In addition to this, BTL uses its latest technology to backup incrementally all unsaved files that are left open for longer periods of time.

BTL believes that file versioning is here to stay for a long-term. Therefore, BTL has assembled the most cutting edge suite of cloud computing tools in its cloud services. With top of the line data protection practises like bank-grade encryption, FIPS, de-depulication, and advanced password security protocols, clients never have to worry about anyone accessing their data, except authorised users on the account.

By backing up your company’s data with BTL, you’ll never have to worry about incorrectly saving a file again. Please stop by our website today to download our free, no-obligation trial software, and see what the BTL advantage is all about! Remember that file versioning is just one of the myriads of advantages that BTL can bring to your SMB. So, speaking of not having to take any risks on the file versioning; why not visit BTL’s website and test-drive today? www.backup-technology.com/cloud-backup

Why Cloud Collaboration is Very Important – Part II

In Part I, we discussed the definition of cloud collaboration; why some organisations are hesitant to adopt cloud collaboration, but rather opt in for emails, citing familiarity and simplicity; and how ill-informed security concerns keep some from adopting cloud collaboration despite the fact that security has been thoroughly addressed by cloud vendors.

Indeed, cloud backup and cloud computing companies are well aware of the potential for mobile data to be vulnerable to hackers, eavesdroppers and other malicious agents, so advanced security procedures like high-level data encryption and varying access privileges for all of the different collaborators make it so that files remain exclusively available only to those in the collaboration group.

Yet another unfortunate factor keeping some businesses from utilising cloud services for collaboration is that they fear that it would be cost prohibitive. After all, since using email is basically free, why pay to collaborate online? Well, it is important to keep in mind that cloud services are often now leveraged in a pay-as-you-go fashion, so businesses only have to pay for the services that they actually use. In addition to this, cloud computing services are now commonly bundled with online data backup packages and other utilities that businesses are already paying for in the first place! Also, cloud collaboration can be thought to wring more value out of hardware that businesses and employees have already invested in like smartphones, laptops and iPads. When you combine these factors with the collaboration-ready aspects of social networks like LinkedIn and Facebook, the potential result is a highly fluid and dynamic work environment in which employees can communicate and collaborate freely regardless of their physical locations, granting business owners and CEOs the peace of mind of knowing that they are getting the maximum return on their enterprise’s investment.

Of course, we here at Backup Technology Limited (BTL) don’t just see cloud collaboration as the way of the future; we think it should be the way of the present as well! For this reason, we have assembled the most cutting edge suite of cloud computing tools in our cloud services. And, with top of the line data protection practises like bank-grade encryption and advanced password security protocols, you’ll never have to worry about anyone except who you deem fit getting their hands on your precious data. So, speaking of not having to take any risks; why not visit our website and try our free trial today? We think that you’ll find that cloud collaboration is just one of the myriad advantages that BTL can bring to your SMB. Visit our website here: www.backup-technology.com/cloud-backup

Why Cloud Collaboration is Very Important – Part I

Wikipedia defines “Cloud Collaboration” as “a way of sharing and co-authoring computer files through the use of cloud computing, whereby documents are uploaded to a central “cloud” for storage, where they can then be accessed by others. Cloud collaboration technologies allow users to upload, comment and collaborate on documents and even amend the document itself, evolving the document.

The increased ease with which employees can now collaborate online is one of the most important and revolutionary of all of the advantages that the Internet itself has brought to the table for businesses of all sizes. However, although online collaboration (both over LANs and the cloud) has been readily available through a variety of different means to businesses for some time now, many enterprises are still somehow hesitant to take advantage of these valuable tools, often opting instead for basic email exchanges as their go-to collaboration method. With all the myriad advantages of utilising the cloud for collaboration, why are these enterprises still holding on to doing things the old fashioned way?

First off, some companies that have yet to harness the power of the cloud may try to point toward the relative familiarity and simplicity of using email for collaboration versus cutting edge cloud tools. However, this can be seen as somewhat ironic when one considers the fact that, when compared to the streamlined process of collaboration in the cloud, group projects through email can often become suddenly very complicated at a moment’s notice, with potential mis-saves to storage servers being a constant risk, not to mention the confusion that can result as to which collaborator has the most recent version of the collaborative project in question. In addition to this, the very simplicity of this one-way communication style often also serves to inhibit creativity by forcing the participants to create a rigid, preconceived hierarchical structure so as to avoid the above-mentioned confusions, delays and accidents that can be so common to collaborative email threads.

Another factor that often leaves businesses afraid to take advantage of the cloud for collaboration are ill-informed concerns over security. While being cautious about security is an understandable, nay, advisable stance for people to take (especially when beginning to use a new technology), it is important to keep in mind that, once again, cloud collaboration has been around for some time now, and thus potential security issues have been thoroughly addressed by cloud vendors. In fact, files being shared and accessed in the cloud oftentimes end up being more secure than ones passed around through email as simple unencrypted attachments!

In Part II, we will further discuss further the importance of cloud collaboration.

Cloud Backup for the Distributed Enterprise Made Easy by BTL

What if you could get all your data into a well-organised repository by installing software that automates it all for you? What if the process took just a few hours and not the thousands of man-hours you thought it would take to complete the task? What if all this could happen continuously (even as you slept or worked on other mission-critical projects) and you wouldn’t have to worry about missing backups? Backup Technology Limited (BTL) has answers to all these questions!

BTL’s solution is designed with people like you in mind. This private cloud solution is equipped with local and remote management features, which allow users to seamlessly perform local backups to their private cloud infrastructure, or perform offsite backups to a public cloud. Even better, users can carry out such backups while they’re away from the office, or choose to manage remote backups from once central location, as BTL permits one to manage all distributed backup jobs via a web-based browser interface.

To address the challenge of backing up distributed data, BTL comes equipped with a web-based management tool, called the Central Management Console (CMC). The CMC enables an IT administrator to handle and maintain all backup and restore processes on distributed employee laptops, PCs, and servers from one centralised location. The data can then be backed up to a single repository in the cloud or to their private cloud infrastructure via the Internet. If need be, the employee may also be given access to the management console, and if so desired, they can manage their own backups and restores.

The CMC is innovative as it allows users to share data or collaborate on backup processes and restores without moving an inch from wherever they are located. They can easily schedule automatic backups and/or continuous backups of information and then relax with confidence that the backups are successfully taking place even if they are engaged elsewhere.

BTL gives your enterprise complete control over its data. The administrator, operating from the CMC, can set up user accounts for all members of the enterprise whether they use a PC, laptop, or are working from a remote location. Authorised and authenticated users can then back up their data over the Internet and store this data on the enterprises private cloud infrastructure or to an online storage repository. If need be, this stored data can also be restored to any machine via the software’s web-based browser and a WAN connection.

Even more appealing, BTL can handle huge data loads and does not need constant monitoring, thus leaving your local computing resources free to be redeployed for other business activities. Data access can be orchestrated independent of available bandwidth from anywhere in the world, and databases can be reconstructed flexibly and quickly on local machines (existing or new) using the data restore wizard provided with the software.

BTL’s cloud backup and disaster recovery solution has recently released with a number of new feature add-ons. For further information on the latest BTL software version, please visit http://www.backup-technology.com/

Our Customers

  • ATOS
  • Age UK
  • Alliance Pharma
  • Liverpool Football Club
  • CSC
  • Centrica
  • Citizens Advice
  • City of London
  • Fujitsu
  • Government Offices
  • HCL
  • LK Bennett
  • Lambretta Clothing
  • Leicester City
  • Lloyds Register
  • Logica
  • Meadowvale
  • National Farmers Union
  • Network Rail
  • PKR

Sales question? Need support? Start a chat session with one of our experts!

For support, call the 24-hour hotline:

UK: 0800 999 3600
US: 800-220-7013

Or, if you've been given a screen sharing code:

Existing customer?

Click below to login to our secure enterprise Portal and view the real-time status of your data protection.

Login to Portal