Thanks!

Thank you for your interest in Jungle Disk. We will contact you shortly.

Click anywhere to dismiss ...

The Jungle Disk Blog

Featured Post

Backing Up Dropbox To Jungle Disk

by Juan Diaz - Jan 26, 2017


CyberPatriot Program at Business Careers High School - Week 24 of Cyber Talk Radio

CyberPatriot Program at Business Careers High School - Week 24 of Cyber Talk Radio Our guest this week was Juan Guerrero, technology certification instructor at Business Careers High School. Show Summary This past Saturday, March 11, episode ...

by Bret Piatt / Cyber Talk Radio, Thought Leadership / Mar 14, 2017


Behind the Scenes at Jungle Disk - Object-based Storage and the Structure of Objects

This article discusses Jungle Disk’s approach to object naming/structuring and some of the reasons why we chose to approach it this way. What do you mean by “object-based” storage? We use object-based cloud storage for recording customer data an...

by Jonathan Robertson / Behind the Scenes, Product, Technical / Mar 13, 2017


Jungle Disk Blog Digest, February

Over the last month, the Jungle Disk team has been working hard to develop video content to enhance our customers’ user experience. As a part of the new video content series, watch one of the most recent videos on “How to Backup Microsoft OneDrive...

by Christina Weaver / Thought Leadership, Product, Ransomware / Mar 10, 2017


Benefits of Utilizing Jungle Disk Cloud Backup Summaries

At Jungle Disk, backup reporting is a feature that we often see underutilized by some of our customers. By default, the software should have “Report Backup Summaries” chosen in the “Backup Options” sub menu of the configuration window. “Report Bac...

by Jayson Boyce / Encrypted Backup, Product / Mar 9, 2017


Keeping Hackers Out of Your Office Network - Jungle Disk Network Protection

Is online security important to your business? Does the thought of a ransomware infection make you nervous? Interested in keeping hackers out of your office network? How about malware, data leaks, or botnet attacks? If you are like most businesses...

by John Garza / Network Protection, Ransomware / Mar 8, 2017


Developing Youth Cyber Talent - Week 23 of Cyber Talk Radio

Developing Youth Cyber Talent - Week 23 of Cyber Talk Radio Our guest this week was Debi Pfitzenmaier, founder, Youth Code Jam. Show Summary This past Sunday, March 5, episode 23 of Cyber Talk Radio hit the air on 1200 WOAI and iHeartRadio st...

by Bret Piatt / Cyber Talk Radio, Thought Leadership / Mar 7, 2017


Behind the Scenes at Jungle Disk - Non-blocking Pull Requests

NOTE - In this article, Pull Request (PR) refers to the Github Pull Request feature. Mailing list based projects usually prefer patch series to be sent to the list instead of git-request-pull. Code Review Cycle When a branch is ready [1] to be m...

by Jason Kölker / Technical, Behind the Scenes / Mar 6, 2017