Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Iron mountain also provides services like source code escrow.

With 2 parties involved in the data, you may want to impose additional restrictions regarding how and when it can be replicated. The party requesting escrow clearly has interest in the source being as durable as possible, but the party providing the source may not want it to be made available across an array of dropbox-style online/networked systems just to accommodate an unlikely black swan event.

A compromise could be to require that the source reside on the original backup media with multiple copies and media types available.



Not for a little while now. The escrow business was sold to NCC: https://www.nccgroup.com/us/newsroom/ncc-group-launches-esco...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: