Others
Synology Photos
Behind the Scenes of Synology Photos: A Precision Task Pipeline Built for Scale
When you effortlessly scroll through tens of thousands of photos in Synology Photos or share project images with team members, the experience feels seamless. But have you ever wondered how the backend system works to deliver such smooth performance? Think of Synology Photos' backend as a sophisticated factory, with its core being an efficient pipeline called the "Task Center." Every second, thousands of tasks flow through this pipeline: phone backups, photo similarity calculations, file information processing, thumbnail generation, face and object recognition, geographic location updates, and more. In such a busy and complex system, how does Synology Photos ensure precise
MailPlus
Behind the Uptime: Resilience Engineering of MailPlus High Availability
At Synology, we rely on MailPlus to support over 1,500 employees and handle more than 170,000 emails each day. We closely monitor its uptime to ensure it delivers the reliability we demand in a production environment. Over time, MailPlus has consistently delivered 99.99% service uptime. For comparison, a typical SLA of 99.9% allows for up to 43 minutes of downtime per month, while 99.99% reduces that to about 4 minutes per month, or less than 1 minute per week. This level of availability is the result of deliberate engineering decisions, especially the implementation of MailPlus High Availability (HA). Unlike traditional
Synology Photos
Just the Right Touch: How Synology Photos Stacks Your Similar Photos, Letting Algorithms Help Organize Your Collection
To capture your child's brightest smile, you might press the shutter ten times in a row. To achieve the perfect sunset tone, you may save five filtered versions. While modern photography allows us to record beautiful moments, it also makes our photo albums cluttered and hard to manage. This scenario is familiar to us all. But an interesting question follows: when we talk about "organizing similar photos," what exactly defines "similar"? Is it a series of sunset shots from the same scene with slightly different sun positions? Is it the same composition with one person added or removed? Or is
Data Protection
How Encryption Works and How it Protects Your Data
Encryption has a storied history, from simple substitution ciphers during the warring eras of Ancient Rome, to Mary, Queen of Scots' ill-fated Babington Plot, and the unbreakable Navajo code that helped secure Allied communications in World War II. These pivotal moments demonstrate the enduring importance of secure communication across eras. What is Encryption? As the Grecian roots of the word suggest—where "en" means "in" and "kyrptos" stands for "secret"—encryption aims to secure data against unauthorized parties by turning messages unreadable and undecipherable. It is one of the oldest and most common forms of data protection. While the underlying principles remain
Synology Photos
How the Synology Photos app empowers users to safeguard and manage their photos
Smartphones have revolutionized photography, offering an accessible and convenient option for capturing life’s moments. However, the ease of smartphone photography has presented an ongoing challenge - the effective management of albums and storage. Thus, it is paramount for users to find a reliable solution for consistent organization and maintenance of photo albums. Synology Photos is an on-premise photo management solution designed to accommodate the needs of smartphone users, making it easy for them to store and organize their memories while their personal data remains fully private. However, on-premise photo management solutions often grapple with challenges such as power outages or
SDLSecurity
The efforts Synology made in pursuit of data security
Software vulnerabilities are among the most commonly exploited breaches by cybercriminals, from the SolarWinds attack impacting over 18,000 organizations to the Log4j vulnerability affecting over 48.3 percent of organizations globally. Vendors’ security risk management abilities are being challenged now more than ever before. When it comes to security risk management, incident response is usually the first thing that comes to mind. While it is crucial to have an incident response plan in place to address the aftermath of a breach, it is equally important to prioritize software security at the development stage to prevent such incidents from occurring in the
Network SecurityNetworkingSRMSynology RoutersWeb Privacy
How to secure your smart home with Synology Routers
Hundreds of thousands of users fall victim to cyberattacks and the situation is only going to get more complex, especially with the seemingly unstoppable rise of smart devices in our homes. With this in mind, we have put significant care into equipping Synology Router Manager (SRM) — the operating system that powers every Synology Router — with advanced network functionality that makes it simple to secure any type of network. In this article, we will explain how to protect your home network and the importance of network segmentation. The unseen risks Smart devices bring unprecedented convenience to households but may
Data ProtectionActive InsightBackupHyper BackupSecure SignInSecurity
Try these new tools to protect your IT this holiday
This post was updated on July 7, 2025 Work pressure and irregular staffing make any holiday or travel season the perfect occasion for threat actors. Besides direct attacks on your infrastructure, phishing and other scams targeting employees become more successful through exploiting communication and staffing gaps. Routine maintenance also becomes more difficult with fewer (qualified) hands to do the job. And if there are any remote or hybrid employees in the mix, it looks like you (sysadmin, tech consultant, designated IT person) will be the go-to person, even if you’re technically away on the beach somewhere along the equator. But
Data PrivacyEncryptionWeb Privacy
Data Privacy Day: one resolution for 2021
When it comes to keeping your personal information secure, don’t take anyone at their word — use encryption. Since the first Data Privacy Day back in 2007, online privacy threats have multiplied. On top of more traditional threats like phishing — which has been around since at least the early 1990s — users today face more sophisticated risks, including those linked to the widespread adoption of the Internet of Things (IoT). However, “older” threats remain highly relevant, as evidenced by a recent wave of ransomware attacks that not only lock user data but now have evolved to also threaten to leak