Monday, May 19, 2008

How Data Recovery is Performed on Failed RAID 5 Arrays

How Data Recovery is Performed on Failed RAID 5 Arrays
By Andrea Stone

RAID 5 arrays are used for many applications because they are for the most part cost-effective and provide a level of fault tolerance not provided by some other levels of RAID. As with any RAID level, RAID 5 can experience many different types of problems. This article will provide a brief discussion of some of the problems causing RAID 5 failure and how data recovery can work to solve these problems.

Problems That Can Cause RAID 5 Failure

Bad Sectors

A RAID 5 can fail due to bad sectors on any of the disks in the array. This can force the array to go offline.

Corrupt Data

A RAID 5 can suffer from corrupt data due to many reasons including viruses, user error, overwriting files, and scratches on the surface of the disk platters.

Degraded RAID 5

A RAID 5 becomes degraded when there is a loss of one of the member disks. This causes a huge decrease in performance and also removes the fault tolerance of the RAID 5. Operating a degraded RAID 5 is dangerous because the loss of a second disk will cause the entire array to be lost.

Deleted Files

Many times a user will accidentally delete important data in a RAID 5 array. Other times, it is done intentionally by disgruntled employees. In most situations, deleted files can be recovered.

Missing Partitions

In many cases, the partition table can become corrupt or missing causing an entire partition to disappear or become unusable. This makes data recovery necessary. Attempting recovery with software will increase the risk of permanent data loss.

RAID 5 Controller Failure

A Hardware RAID 5 array uses a controller which contains all of the logic and handles the operations of the array. For many reasons, the array can experience a controller failure. This can cause the array to not boot. It could also cause the logical volume to disappear.

RAID 5 Disk Failure/RAID 5 Drive Failure

A RAID 5 is a set of three or more disk drives. Any of these drives can experience failure. A RAID 5 is configured with the ability to withstand the failure of only one disk at a time. In most cases, the RAID can be recovered in a data recovery lab using parity data written to the disks by the array. Even if more than one disk has failed, data recovery is still possible in a recovery lab.

RAID 5 Firmware Failure

Firmware problems can occur in the RAID controller or the member disk drives.

RAID 5 Rebuild Failure

For various reasons, a RAID 5 array can experience a rebuild failure. This may keep member disks offline and render the array unusable.

Server Crash

Many times, the host server experiences problems and can crash. This of course makes the array unaccessible. A data recovery lab can recover the data from the member disks.

How to Ensure RAID 5 Data Recovery is Successful

If you have experienced a RAID 5 failure, it is important that you do not take matters into your own hands. This can cause the parity data to be overwritten. Parity data, which is written to the member disks, is in many cases vital to ensure a successful recovery. The very first thing you should do is power off the RAID server immediately to ensure that no additional writes are performed. Any events describing what may have happened to cause the problem should be noted. If the member disk drives are removed from the server, they should be labeled in the correct order they were removed. The disk order is very important if time is of the essence. This is also important if you have a large number of member disks.

To ensure a successful data recovery, it is important that the failed RAID 5 remain intact. More information can be found by visiting [http://www.rewave.com/raid-5-recovery.htm ]RAID 5 recovery.

This article can be freely published on a website however it must not be modified in any way including the author bylines, and the hyperlink must be made active as shown below.

Andrea Stone is employed with ReWave Hard Drive Recovery, a data recovery company serving clients in cities worldwide including Atlanta, Charlotte, Dallas, Houston, Los Angeles, Memphis, Miami, Nashville, New Orleans, New York City, Orlando, Phoenix, Raleigh, Richmond, San Antonio, San Diego, and Tampa. Visit the [http://www.rewave.com]ReWave Hard Drive Recovery website for more information about RAID recovery and data recovery.

Article Source: http://EzineArticles.com/?expert=Andrea_Stone http://EzineArticles.com/?How-Data-Recovery-is-Performed-on
-Failed-RAID-5-Arrays&id=438410

Tape – Still The Best For Backup And Archiving

Tape is one of the real old die hards in the world of data storage and archiving. (Remember those shots of the Apollo mission when the fate of the astronauts was in the hands of those whirling spools of magnetic tape in mission control?) But with the introduction in recent decades of a slew of more modern media – optical discs, memory cards, and zip drives, for example, does plain old tape still have a role to play?


If you're a traditionalist, you'll be pleased to learn that the answer is an (almost) unqualified 'yes'. Tape's enduring popularity is due to the range of advantages it offers.

For one thing, using magnetic tape for backup is extremely cost effective. You can backup your entire server on one mid-range tape which costs around $20. Plus, magnetic tape can be re-used. So you can copy new information onto tapes from earlier backups. As your data grows and changes, you are always making new copies and are not overwhelmed with countless spools or reels of tape.

Then, there's magnetic tape's long archival stability. Tape is no longer stored on open reels but in hardy cartridge formats which include DLT and LTO. However, the fact remains that tape is a contact medium. So the resulting abrasion will ultimately wear the tape out. Nonetheless, the lifespan of tape compares favourably with other media. And consider this. Drop a tape on the floor from a few feet up, and then do the same with a disk. Which one is more likely to work well afterwards? I think you know the answer. The fact is that any medium can fail. In fact, recent research has revealed that the shelf life of optical media such as DVDs is far less than originally thought. In fact, well under a decade.

What's more, though tape is seen as an old technology, innovation has been going on. For example, the introduction of WORM (Write-Once-Read-Many) tape has provided additional security for data that is being stored for legal and compliance purposes.

Of course tape has its own foibles which need to be handled with care. For one thing, it is a thin plastic medium and so need to be stored in the right environment free from corrosive elements. A dedicated archival room is essential for effective storage.

And with regard to data recovery, you have to remember the following. Essentially, any data that has been overwritten is gone forever. A tape drive will not let you get to older data beyond the overwritten portion. However for tapes damaged by the elements, the scenario is more promising. Ultimately, though, the key to the recovery of tape data is an understanding the data that has been recovered, so the most powerful data recovery tool is the brain.

At the end of the day, every medium has it good and bad points. But magnetic tape's combination of economy, hardiness and re usability give it the edge you need to handle all your data backup needs. Tape for backup and archiving has already clicked up a half-century of solid use and looks set to be with us for another 50 years at least.


About the Author: Mark Sear has been working in the field of Data Recovery since 1984 and later formed Altirium, a company which offers tape recovery and data conversion services for tape, disk and all other computer storage media.

Thursday, May 15, 2008

Tape Backup (part 1)

Given the importance of information and the potential high cost associated with data loss, reliable data protection has become an obligation, but backup and recovery seems very complicated and time consuming to undertake. Don't spend another day without protecting your valuable business data, or without understanding your options and what they mean. 32


Wasabi Storage Builder for iSCSI is a fast, powerful, and cost-effective iSCSI Storage Area Network (SAN) solution. Built on Wasabi's industry-proven storage systems and software technologies, Storage Builder for iSCSI delivers top-notch features and performance at a price that's hard to beat.9

Traditional data protection tech-nologies, such as tape backup and fault-tolerant storage devices, protect business data from failures and human errors that can damage individual devices or buildings. However, corporate data is vulnerable to site- and region-wide disasters even if tape backup and RAID devices are both in place. Network data mirroring complements these traditional backup methods by protecting organizations from events that can destroy fault-tolerant storage devices. If your organization risks losing valuable time or business information due to wide-area disasters, network data mirroring may be a wise technology addition to your disaster recovery program.44

Store one backup tape off site. This will ensure your files are preserved if your site experiences a fire, flood or other disaster. Some companies swap backup tapes with other offices. With some smaller businesses, it often makes sense for one employee to take the backup tape home with him. Another option is using an off-site storage firm that provides fire-protected storage facilities for print and digital media as well as tape.3

Instead of having folks pull tape cartridges for distribution to off-site storage, why not write your second tape copy directly to a remote vault across a network? Services exist, and have been discussed in this column, to facilitate that modus operandi. They will even send the tape electronically to your recovery center, if you prefer.17


Make sure you verify your backups. Most backup software will automatically do a quick "read-after-write" verification and will optionally do a full verification. The latter is more thorough and more time-consuming, roughly doubling the backup time.24

There are a number of enterprise tape backup solutions, such as Sun StorEdge Enterprise Backup Software, VERITAS NetBackup, and LEGATO NetWorker, geared toward larger corporations. Many sites, especially smaller ones, don't wish to pay the license fees that some of these solutions command.9

Store your tapes properly. With backup tapes on site, keep them stored in a stable environment, without extreme temperatures, humidity or electromagnetism. Do not, for instance, store the tapes in a safe on the opposite side of the wall from a large generator, whose electrical fields can wreck havoc with the data on them.3

Tape backup involves the uses of tape drives that store data on magnetic tapes. The number of tapes required will depend on the capacity of the tapes as well as the amount of data stored on the computers that need to be backed up.55

You also should consider having an authorized maintenance person from the manufacturer of the tape backup drive or from a third-party repair firm check the alignment of the drive every 12 to 18 months. Most businesses just send the drive back to the manufacturer when it begins to have problems, but if a drive has problems, so can the backup tapes.24

Companies can backup stored tape data across low-cost and readily available IP connections, using both newer native Fibre Channel tape drives as well as older SCSI drives. In addition, open systems servers such as UNIX and NT can be incorporated into remote tape strategies.56

VXA is a revolutionary tape backup technology that uses digital packets to store data rather than traditional, linear-based methods. VXA's zero tolerance for error makes it very appealing to IT professionals who demand reliable tape backups. VXA technology offers fast, reliable computer tape backup options for companies of all sizes.55

Computer tape backup has become the industry standard for backing up data in most companies around the world. Tape backup offers several advantages over other backup options. One of the advantages of tape backup is the ability to easily store the backup tapes off site, in a secure location. This protects the data from harm that could occur if some kind of natural disaster strikes. It also protects against fire, theft, or any other potential harm that could occur if the data were simply stored on site.55

Email has become the number one method of business communication, exceeding even the telephone in importance within an organization. It is a key application in corporate data centers and email servers contain an increasing percentage of corporate data assets. As a result, email has become the mission critical application for enterprises. With this growth in importance comes an increasingly daunting challenge for IT administrators--ensuring that in the event of errors or failures, email can be recovered and restored as soon as possible.66

Businesses are now open for longer hours and support a global community of customers which drives requirements for round-the-clock operation. The two backup options are available including hot and cold backups. Cold backup relates to the scenario where application data is tied up for the duration of the backup. However, a hot backup relates to the scenario where a system is performing the backup while applications are updating data.59

Current implementations of backup processes are manual, labor intensive, and inundated with problems caused by human errors. Backups that failcan often go undetected leading to potential data loss following a failure. Tapes must be manually inserted, rotated, and removed for off-site transportation to ensure recoverability. Due to the high expenses associated with manual administration, a case for automation can be made where robots are used to improve tape management. Centralized backups group tapes together by pools whereby a number of backups can be multiplexed onto a tape. As a tape is filled the backup continues using another free tape within the pool which significantly enhances manageability. A reduction in the number of tape drives to be managed leads to cost reductions.59

For the home system owner nervous about tape backup and put off by having to install the SCSI connector that tape systems need to operate, the Rev plugs into a USB 2.0 port or can connect internally as a standard ATAPI hard drive. Once connected to the host computer, it appears as a regular drive with a letter designation, just as CD and floppy drives do. For businesses looking to back up servers, SCSI and S-ATA Rev drives are planned.60

With the odd/even system, you use one tape on one day, a second tape the next day, reuse the first tape on day three, and so on. With the five-day rotation system, you use a different tape for each day of the week.47

Make sure you have more than one copy of a backup tape. Instead of using the same tape time after time, use multiple tapes, rotating through them.47

Periodically test the backup tapes and restore procedures. You can, for instance, restore the data on them to a different server or to a different partition or folder on the same server where the original information is stored.3

One last thing worth mentioning is your constantly shrinking window for backup. Each day your servers contain more data than the day before. But so many companies are turning into 24/7 operations that administrators are often being asked to back up huge amounts of data during a tiny window of time each night.10

In the case of tape backup, label the tapes A-H and use the same order to rotate tapes through a tape drive, each day putting a complete backup on the tape. The Towers of Hanoi backup strategy is often used because it creates the longest possible data retention period (the length of time archived data is kept around) with the minimum number of tapes. For example, using the Towers of Hanoi backup strategy with a set of 10 tapes allows for retrieval of data up to 1023 days old.62

The fastest – and most expensive – backup option. If a primary system fails, a fail-over automatically switches to a standby database, server, or network. A fail-over site redirects requests from the failed system to the backup system. Websites are big users of fail-over.41

This flag requires the -f device flag. This flag causes lssavevg to display information such as volume group, date and time backup was made, uname output from backed up system, oslevel, recommended maintenance or technology level, backup size in megabytes, and backup shrink size in megabytes. The shrink size is the size of the data on all filesystems. The full size is the total size of each filesystem (unused + data). The -l flag also displays the logical volume and filesystem information of the backed up volume group, equivalent to running "lsvg -l vgname".21

Verifies the physical block size of the tape backup, as specified by the -b block flag. You may need to alter the block size if necessary to read the backup. The -a flag is valid only when a tape backup is used.21

If the filesystem is from a machine named netapp (the number is unimportant and just distinguishes between multiple NetApp machines), then disk backups are available. If the filesystem is not from a netapp, only offsite backup is available.5

This flag will display the past 256 backups (roughly). The log is in alog format and is kept in /var/adm/ras/vgbackuplog. Each line of the log is a semicolon-separated list of the file or device name, the command used to make backup, date, shrink size, full size of the backup, and recommended maintenance or technology level (if any).21

Analysts also advise that other types of information be available within hours of a manmade or natural disaster. The most cost effective way to meet both needs is to use the same network infrastructure and remote facilities for both synchronous disk backup (for business information essential to continuous operations) and for asynchronous tape backup (for less time-critical but still important data).56

Specifies the number of 512-byte blocks to read in a single input operation, as defined by the blocks parameter. If the blocks parameter is not specified, the number of blocks read will default to 100.21

Tape Backup (part 2)

Sure, the initial backup can take quite a while to complete and it consumes as much disk space as you would expect it to. But as files that have been previously backed up are modified, the file is not re-copied to the DPM server; only the bytes in the file that have changed since the last backup are copied. This saves disk space on the DPM server and network bandwidth as well.10

The backup server may back up files on the mirrored servers every day, every hour, or at other defined intervals. Files on the backup server move to offline optical disk storage and eventually to tape storage, which is carried offsite. In the event that corrupted information is written to the mirrored servers, users can fall back to the backup server. If corrupted files are not detected and are written to the backup server, the most recent good file can be obtained from the optical disk or tape archives. This system can be totally automated and run continuously so that the most recent uncorrupted copy of a file can be traced back through the backup server to the archive, as necessary.46

To recover, you might need to go to the most recent offline backup set.46

The Real-Time Backup Edition contains everything you need to maintain a real-time backup of your mission-critical data. It includes a DataExchange license for two Pervasive PSQL database engines (for the primary and the backup) as well as a one-user count database license (for the backup). The DataExchange engines are restricted to one-way replication, and the replication network is restricted to two databases.52

When you deploy DPM, you designate which volumes or shares on your network should be protected. At that time, Data Protection Manager makes a full backup of all of the files in the protected share or volume. In fact, you can even configure DPM to run backups hourly.10

If you have more than one local hard disk, copying your data to the other disk provides a certain amount of security. This protects you from a disk failure or and accidental erasure, but leaves you vulnerable if the computer itself is lost, stolen or badly damaged.89

Network data mirroring duplicates the full or partial contents of a disk from one system to a disk on another system by sending data over a local- or wide-area network as the data changes. Comprehensive network data mirroring products, such as Qualix DataStar and Octopus DataStar from the Qualix Group, mirror user files, application files and database information for UNIX and Windows NT servers, respectively. Updates to all databases and files are copied as they are output to the source system disk, regardless of whether or not the files are open and in use on client machines. By continuously mirroring data to target systems at remote sites, network data mirroring accomplishes three important objectives.44

Designate only trusted people as backup operators, and make sure their rights are limited to only those files and directories they need to back up. As an added precaution, you should make sure that an auditing system tracks and logs all activities of the backup operator.46

Now, let's go back to the bigwig who deleted that file he needed for that afternoon's meeting. If Microsoft System Center Data Protection Manager runs hourly backups, the file will have been backed up -- even though it was only created recently. Not only that, there is even a user interface that allows users to perform their own restores without having to call you, the admin! Since the backup is disk-based, you don't even have to load a tape.10

If you want to back up an entire drive or drives, click to select the check boxes next to the drives you want to back up. If you want to back up specific files or folders on a drive, double-click the drive to expand it. Then continue to expand folders until the files or folders you want to back up are displayed. Next, click to select the check box next to each file and folder you want to back up. If you then want to select files on another drive, click Drives on the Window menu, and then expand the drive and click to select the check box next to each file and folder you want to back up. When you have finished selecting files and folders to be backed up, click Backup.19

Windows NT Backup backs up the selected data. When the backup is complete, click OK in the Backup Status dialog box. Quit Windows NT Backup to complete the process of making a backup on your Windows NT 4.0-based computer.19

In the Description box, type a description of the backup. Select the backup type you want to use, and then select the backup options you want to use for this backup.19

To access a snapshot, go to the directory where the file or directory you need to restore is (or was). Then change to the .snapshot directory. This directory is a special directory which is hidden most of the time. It will not show up when you run ls, but it IS there.5

To actually restore the files, change directory to the appropriate snapshot and then copy the file back to it's original location (or to an alternate location if desired) using standard unix commands.5

Magnetic tape is the workhorse of short-term backup. The media is relatively inexpensive, so it is reasonable to preform frequent indiscriminate backup of entire servers. The tape backup is a crucial first line of defense against a total disk failure, since the entire volume can be restored at once. Since data is accessed sequentially, it can take a considerable amount of time just to locate the file. The downside is that tape is not as reliable as other media and it has a considerably shorter shelf life, making it inappropriate for archival storage.89

The traditional tape backup takes time, money and resources to schedule and manage backups, change disks and tapes, and transport them to a secure facility. To ensure your data is actually restorable, you must test all of your backup media to verify that they are labeled and cataloged properly, un-corrupted and free from physical damage. Most businesses that do their own tape backup, know that data restoration from tape is not reliable.79

You never really realize how much is lost until you fire up that key program and it does not work the way it used to. Worse you may have lost that key program and its files.92

If you run a small business, chances are you're saving important files to a server.But what happens when disaster strikes? Many people fail to realize that the loss of files could cripple their business. You can insure your office and equipment, but you can't insure files. Ipso facto, they are lost!97

Another problem with traditional backups: In most cases, files that are open are not backed up. Shadow copy has made it possible to back up open files, but many backup applications, especially older ones, do not take advantage of shadow copy. But since DPM is fully shadow-copy-compliant, it can back up files whether they are open or not.10

Real-time backups take place at any time and must have a procedure for handling files that are open during backup.46

Shah used data points showing that tape backups were becoming too time-intensive as data stores grew, plus an explanation that the company's distributed environment required separate tape drives for various systems, to convince the CEO to authorize a move to IBM's Tivoli Storage Manager (TSM) in 2003. Today, Mouser uses TSM to back up a multitude of applications and data, including IBM's UniVerse relational database management system, which houses the company's order entry and financial data, as well as its warehouse control system, graphics servers and file servers.42

Automated backup systems include dedicated backup servers that automatically back up data to magnetic disk, jukebox tape libraries, and jukebox optical disk systems. They may provide hierarchical storage management functions as well. A typical automated system will run 24 hours a day and provide backup services for a number of clients (clients in this case are file and application servers that use the backup services). It provides centralized backup administration, data compression, security, and a number of other features specific to the clients it supports. The Arback and Boole & Babbage products also support remote vaulting. A list of vendors that make backup products is presented on the related entries page.46

If a large number of mailboxes are active it is easy to confuse mailboxes and delete one by mistake. The Exchange Backup API supports full Exchange database backup only and does not support mailbox restore; therefore, some interesting methods have been developed to recover a lost mailbox.66

Read this white paper if you are responsible for developing a disaster recovery plan for your higher education campus or computer lab. The paper provides information about how to efficiently use tape backup technology in a world rich with Apple workstations and servers.9

As always, it is important to choose an option that suits your business and financial situation, but it is imperative that your business has an effective and efficient data recovery plan that covers all possible situations. Offsite storage should be part of that recovery plan.71

New factors and increased focus in BC/DR planning: BC/DR strategies are affected by the increasing amount of business data being pushed into the mission-critical category, requiring continuous availability. Businesses are also aware that the dangers to their mission-critical data are greater than ever before. Not so long ago businesses had to plan for human error, technical glitches and, of course, natural disasters. Post 9/11, businesses must also plan for terrorist attacks that, as a November 2002 report from Illuminata put it, could "take out more than just a couple of floors of one data center."56

Many companies are already backing up their main and branch office systems to tape, but what they don't understand is just how vulnerable their data and their business remains. This whitepaper explores the high cost, complexity and potentially dangerous shortcomings of a strategy based only on tape backup.9

CBL and other companies like it want your business, and they try to be helpful in multiple ways. Here's how you can minimize the chances of a tape backup failing in the first place, according to Doug Owens, managing director of CBL's San Diego laboratory and resident tape expert. Many of these same precautions apply to other backup systems as well.47

Picture this: The air conditioners in your office malfunction over the weekend and your business servers overheat. Eventually, a fire starts and your computers, drives, and tape backup that were stored in the same location are unsalvageable due to the extreme heat, even by professional recovery services. Irreplaceable data is lost and there is nothing that can be done to retrieve it. An event such as this is completely unforeseen, but its consequence - data loss, is very much preventable. The solution is offsite data storage.71

A surprising majority of small businesses do not have a reliable backup system. Whether it be due to budget constraints of implementing an in-house backup server or just being unsure of how to implement backups to avoid disaster, many business owners don't realize that they are placing their own livelihood in jeopardy every day by not having a secure backup system. Unfortunately, some learn the hard way and only after a disaster understand the importance of safeguarding their business data. Why wait for disaster and pay thousands of dollars for an attempt to recover the data from a failed hard disk when you can protect yourself for as little as a dollar a day?82

Enhanced Windows Backup uses Windows' built in backup engine called Windows Backup (ntbackup.exe) which provides state-of-the-art core backup technology. Enhanced Windows Backup substantially extends the capabilities of NTBackup, providing an effective integrated backup solution that can take on leading edge but expensive solutions like Backup Exec and Retrospect from companies like Veritas, Symantec and Dantz.43

An integrated LAN attach storage device can provide a complete solution without any IT expertise or advanced knowledge. The HP StorageWorks Media Vault Pro mv2040 is an ideal solution for small businesses, because it combines data protection with simple file serving and secure offsite storage for a total answer to the problem of backup and recovery.32

But why would you want to back up your system to tape anyway? It's true that only a few years ago hard disk storage cost ten or even twenty times the price of tape drive cartridges for comparable amounts of storage. But now you can buy a 750 MB SATA drive for around $300, and that means tape is now only about half the cost of disk storage.64

There are two sizes of Zip disk available, 100 MB and 250 MB. A Zip drive that supports the 250 MB disk size will also support disks of the 100 MB size; 100 MB Zip drives support only 100 MB disks. While the 100 MB disks and Zip drives cost less, you should consider the possibility that some day your data may not fit on a 100 MB Zip disk.73

The lowest level of disaster is a server crash of some sort. This has a very high likelihood of happening some time within a 5-10 year period. It can be either physical (the server dies) or inflicted from the outside, by a virus or disgruntled employee. Your goal in this case is to recover your data rapidly. The most common protection is a tape backup. However, there are several caveats you need to be aware of.74

Disasters that affect entire sites or regions � including earthquakes, floods, hurricanes or extended power outages � can render traditional backup technologies useless, even if fault-tolerant devices are employed. Any disaster event that reaches beyond the single building level threatens to destroy not only the primary, operational system, but also the redundant hardware and its backup data. By maintaining a copy of mission-critical data on a target server geographically removed from the source server, network data mirroring eliminates the risk that a site- or region-wide disaster will damage both original and backup data and systems.44

Did you get the implication about DVD's? One DVD-R/RW may be able to backup everything on your hard drive. DVD-RW's could be marked for each day week (Monday, Tuesday and so forth) and rotated.92

Tape backup is also a nice option for backup because you are able to backup as much data as you choose without having to purchase additional hardware. All that is required is the purchase of additional tape cartridges to backup more and more data. If you were to back up your data on secondary hard drives, you would have to continually purchase new hard drives as the size of your data grows. Also, hard drives are subject to hardware failures that could render the data unrecoverable. Tape backup is a good option because with it, you're not reliant on any single piece of hardware. The data is stored on a backup tape that can be used in a different tape drive if necessary to restore your data.55

Fibre Channel SANs encompass the connection between storage and servers, as seen in Figure1. SANs service a limited number of servers that distribute data to a large number of users over an Internet Protocol (IP) network such as Ethernet. The close-knit Fibre Channel network, known as a fabric, is optimized for large data transfers with low overhead, low-latency switching, and minimal interruptions to the flow of data. A typical user would not have a direct connection to the SAN but would access the data stored in the SAN via a server on the IP network. Fibre Channel increases the performance of data transfers to levels that are unmatched by any other technology.87

87

Data can be moved from one storage device to another to optimize configurations. As Figure3 shows, reconfiguring data can free up entire storage devices for other applications. Storage in SANs is independent of servers, so it can be logically consolidated yet remain physically separated.87

Friday, April 25, 2008

Tips for ‘green’ storage

By Alex Young

The storage industry has received a lot of the “green” limelight recently. Hard disk drives use power to run and to cool down, and maximising their use is important. With organisations around the world generating extremely large volumes of data every day, the need to store, access, and protect this information is paramount. So how can you ensure data is suitably stored without unnecessarily harming the environment?

The efficiency of the product is the invisible, yet key, factor, as poor efficiency leads to higher power usage. If you improve the efficiency of your storage infrastructure, then your data centre will become greener and your TCO lower.

Although some vendors focus on the power consumption of storage products when they are idle, much higher savings can be realised by reducing the power requirements of those products when they are operational (which is most of the time).

Following are some considerations that will help put IT managers on the right path to greener data centres.


When should disks be idle?

Disk arrays are often deployed in 24×7 environments such as database transactions for online retailers, Websites, e-mail servers, etc. In these cases, the drives provide round-the-clock services and rarely have a chance to stop spinning. Also, most users require the full performance from the array, non-stop, which makes some heavily hyped power-saving features—such as idle disks—disappointing in real-life applications.

One of the instances when arrays are often idle is when they are part of the backup solution, where the drives are written once and only occasionally accessed. In some disk-to-disk or disk-to-disk-to-tape backup configurations, data is written to the array just a few hours a day and is rarely read. In such circumstances, power-saving features such as idle disks are practical and effective.


Boost efficiency

Efficiency is closely linked to maximisation of resources. Scheduled backups and other maintenance tasks should take place outside of the peak working hours, and they should use the scheduler function available on disk arrays to avoid affecting the service performance. In addition, analysis of the applications’ time patterns and scheduling automated tasks enable arrays to be used around the clock in a more efficient manner.

Another way to ensure the infrastructure is more efficient is to use the “snapshot backup” function in RAID arrays to minimise the backup window, rather than host software. The data transfer is performed without the host software intervening, thus avoiding unnecessary host CPU utilisation and bandwidth. As a result, disk backups require seconds rather than hours. Moreover, the frequency of full backups and archiving can be decreased via the use of snapshot-based backups, which saves energy because the devices can be turned off when not in use.


Sharing storage

In a typical office with 50 users, each PC has a built-in disk drive and many store important data, which needs to be backed up. It doesn’t make sense to give each user a USB disk for backup; if each USB disk has 300GB of capacity and uses 60W of power, this corresponds to ~15TB of capacity and 3,000W of power requirements. Besides the management issue, some users may need more capacity, while others may only need to back up small amounts of data.

By backing up to a central disk array over the network, all the unused storage is consolidated and the array can serve more users, while making better use of available capacity. If 50 users share a 15TB, 500W disk array, then the individual power consumption is just 10W.


Different apps and needs

Some RAID arrays are purpose-built for data archiving, some are designed for 24×7 high-availability environments, and others can be tuned for use in different application environments. These arrays offer different levels of availability, security, performance, and capacity. Due to the different types of drives used in high-availability (as opposed to archiving) arrays, configurations and power requirements differ. Putting them side-by-side to compare their environmental impact can lead to misleading results.

For example, demanding environments such as database applications should rely on drives with a high spindle speed (10,000rpm or higher) and high-density arrays so that more transactions per second can be performed. With the help of the RAID controller’s cache, the RAID system can process vast amounts of small transactions. On the other hand, disk drives used in data archiving systems need to offer high capacity and low cost. The performance requirement here is not high, thanks to the snapshot backup functionality, and reliability is not critical for data archiving because most of the drives are in idle mode.

This is why you cannot use a RAID system designed or configured for data archiving in a high-availability environment. Can you imagine an online banking user having to wait for 30 seconds for the drives to “wake up” before being able to access their account details? When random transactions keep coming, all the drives are active, so the ability to have idle disks holds no appeal.


Alex Young is director of technical marketing for Infortrend Europe (www.infor trend.com).

InfoStor Europe March, 2008
Author(s) : Alex Young

Wednesday, March 26, 2008

Simple Ways to Protect Computers From Data Loss for Internet Marketing Newbies

Simple Ways to Protect Computers From Data Loss for Internet Marketing Newbies
By Nathalie Fiset

As an internet marketer, the data found in your computer is extremely precious. Data could be anything - original copies of content for your website, applications and software that run your computer and everything else that is important for your internet marketing business. Data is where the very essence of your business lies and as an internet marketing newbie, it's important that you keep it secure. Here are ways you can protect your computer from data loss:

Data protection for newbies

It's important to understand that electronic data is very sensitive. Once the original copy is erased, you'll find it very difficult to try to restore it completely. So as always, remember that the best way to protect your computer is by prevention. You can do this six ways:

1. Create backup copies of important files.

2. Use anti-virus and firewall software to prevent data corruption.

3. Use passwords.

4. Prevent computer theft.

5. Encrypt your precious data.

6. Keep your computer clean.

Backing it up

If there's one mantra you should live by as an internet marketing newbie, it's backup, backup, backup. A backup is merely a copy so you have something to use in case something goes wrong with the original file.

Creating a backup on your PC is quite easy, actually. On the Accessories tab, go to System Tools, click on Backup and then select the files and/or settings you want. Simply specify which documents or folders you want to backup and then type the Destination or location you want to store the copies in. This could be a floppy disk, a CD or DVD or on your hard disk.

It's recommended that you create a backup copy that is physically separate from your computer. You can also schedule an automatic backup to ensure that you never forget and that copies of new files are created. The principle here is simple: if you have a backup, you have something to use in case something goes wrong.

Using an anti-virus and firewall

An anti-virus software will prevent corruption of data while a firewall will help minimize the possibility that malicious files enter your system. Install a reliable anti-virus application in your computer and upgrade it often to ensure that you prevent and destroy malicious viruses that might affect your system. A firewall, on the other hand, keeps your system protected while you browse the Internet.

Using passwords

Although passwords will not protect your data from corruption, it will be a deterrent against theft or misuse by others. Use a password to prevent anyone from using your computer or if you're sharing it with another person, create two separate accounts that may be accessed only through a password.

Preventing theft

Data loss may also be experienced through theft - both physical and electronic. Protect your computer by keeping it in a safe area or if you will be traveling or moving around with it, make sure to keep it within sight or at least lock the door if you leave. A practical means is to use a lock or security cable that attaches to your laptop and keeps it fixed to a nearby stationary object. Do this if you must leave a mobile PC alone.

Data loss can also occur electronically, when hackers enter your system and scoop up data without your permission. Spyware, for example, can act as a mole in your system and inform others about the content of your computer. Prevent this by installing an anti-spyware and adware application. This help ensure that your data is yours alone.

Encrypting data

Data encryption isn't the realm of spies alone. These days, it's mandatory for many computer users. It helps discourage and prevent anyone from viewing or using the information found in your computer. Data encryption translates your data into unintelligible material, essentially rendering it useless to others. If you prefer, you can even use an anti-theft device that has an alarm.

Keeping a clean computer

A clean computer is a well-organized computer. The more streamlined it is, the less likely it will crash and thus result to the loss of data pertaining to your internet marketing business. Install only programs that you truly need. If you must install an application, check that it is reliable and useful. Beta versions, for example, are best used for PCs that don't contain your important data. If the application is unfamiliar, treat it with suspicion. These days, whether you're a newbie or an experienced player in the internet marketing business, the best way to protect your computer from data loss is to be wary. To trust too much can be detrimental to your computer's health.

For more information on internet marketing for beginners please visit: http://www.thebiginternetmarketinggame.com/yourcomputerandyourcomputerskills.html http://www.thebiginternetmarketinggame.com http://www.drnathaliefiset.com

Article Source: http://EzineArticles.com/?expert=Nathalie_Fiset http://EzineArticles.com/?Simple-Ways-to-Protect-Computers-From-Data-Loss-for-Internet-Marketing-Newbies&id=1062666

Data Loss and the Financial Impact of It

Data Loss and the Financial Impact of It
By Victoria M. Brown

Companies have always focused on protecting their data from outside threats. They have focused on everything from intrusion protection systems to vulnerability management. However, it is now time for companies to focus on data loss from another angle : data loss from the inside.

The Internet has created a hole in the security system and has provided a way for businesses and individuals to communicate with each other freely. Electronic communications can now go outside the company almost completely unmonitored through emails, instant messaging, file transfers, or links on websites. This free flow of information makes it very easy for important data to fall into the wrong hands.

The loss of data can happen either accidentally or deliberately and can include a number of different leaks of information ranging from the exposure of a customer's confidential information to thousands of a company's files being sent to their competitor. Regardless of the importance of it, data loss occurs any time employees, consultants, or other insiders release information that is supposed to be kept confidential.

According to a 2006 survey, approximately 49 percent of companies had experienced an internal security breach in the prior year. Of those companies, 31 percent had a worm or virus incident, 28 percent experienced insider fraud, and 18 percent of the companies experienced data leakage. The FBI has estimated that the total amount of data loss in 2006 has cost companies a total of $62.7 billion. Experts have furthered estimated that for a major company or corporation, one leakage will cost approximately $4.8 million.

There have been a number of high-profile incidents of data loss. Some examples are, when AOL posted information about its members in the search engine, a DuPont employee leaked $400 million worth of intellectual property, and a Ceridian employee accidentally posted the bank account information of 150 clients.

Data loss has the potential to compromise intellectual property and cause a company to violate their regulations. In fact, it is likely to be a threat to everything that a company has built. Companies cannot afford to ignore the serious threat that is posed by a loss of confidential information. In order for a company to protect the investment that it has placed in its brand, products, partnerships, and employees, they must address the issue of data loss and take proper precautions.

North Star Networks : Network Security Services

( http://www.northstarli.com)

NorthStar Networks, Inc. is an Information Technology Consulting company that specializes in providing technology solutions to meet the needs of any sized business. We focus on installing and maintaining networks. Network support not only includes highly efficient network design, support and integration, but the core of our vision is Proactive Network Support. We succeed at maintaining the networks we build and work on, so they don't go down outside of uncontrollable events like weather, fire, earthquakes or power outages.

Our goal is for your network and related hardware and software to run at its best. We have a commitment to providing excellent service and support for your local and wide-area networks. We keep your business running, so you can do what you do best.

Visit our Blog to read more, comment, and/or ask questions about Network Security at
( http://northstarli.wordpress.com/)

Submitted by Victoria at NewSunSEO.com

Article Source: http://EzineArticles.com/?expert=Victoria_M._Brown http://EzineArticles.com/?Data-Loss-and-the-Financial-Impact-of-It&id=1046484

Sunday, February 17, 2008

Data Recovery - Why Should You Have a Data Center Disaster Recovery Plan?

Data Recovery - Why Should You Have a Data Center Disaster Recovery Plan?
By W.Michael Anderson

The changing paradigms of business have left many established businesses at a loss. Often businesses do not even consider establishing a data center disaster recovery plan. For both new and old businesses, it is not just an optional convenience, a computer backup system is a necessity. To demonstrate both the convenience and the need for a data recovery plan, let us discuss several of 'today's' business perspectives: Security, Confidence, Efficiency and Profitability.

1) Security:

The computer age is not only upon us, it is dominating every business. All businesses store data. It could be something as simple as the accounting records. It could be complex sub-routines which control robotic manufacturing. From a security viewpoint there are three main concerns: loss from a system crash, virus corruption, and theft. Theft is outside the scope of this topic. However, an online computer backup system certainly addresses the first two concerns. The ability to replace data and programming after either a crash or virus attack is very important. But the ability to replace it simply from your own computer backup system, that is priceless.

2) Confidence:

A business strives to instill confidence in two groups: customers and employees. When the threat of data and programming loss is eliminating because a company has a data center disaster recovery plan in place, then employees can operate in a much less stressful environment. The knowledge that human error is now a minor inconvenience instead of a potential disaster makes for a more productive workplace. Furthermore, customer confidence will soar when the additional benefit to them is revealed: their customer records and data will be stored in a secure computer backup system. This allows for uninterrupted customer service in spite of main system disruption from a disaster, viruses or human error. Another aspect of a disaster recovery plan is the confidence it instills in both clients and employees as it demonstrates the desire of the corporation to plan ahead putting priorities on security and efficiency.

3) Efficiency:

Disruption of the normal business activities results in significant losses in efficiency. When data and programming can be restored quickly and fully, this potential loss is minimized. Attacks by viruses are common in today's marketplace either through purposeful attacks or pranks. Human error can crash systems. To avoid the major time delays required to clean and/or restore a system (if possible), computer backup not only is necessary but also becomes a major factor in an efficient business operation. Something as simple as a misplaced file can cause major production delays, now it can be retrieved simply and quickly.

4. Profitability:

There are many ways that computer issues can effect the profitability of a business. Most of these issues can be resolved by using a computer backup system.

-file corruption - efficient replacement from backup, eliminating slow operation due to corruption

-loss files due to misnaming or misfiling - efficient replacement from backup

-minor problems no longer cause significant delays as file restoration is simple and efficient

-employee productivity - working in a less stressful environment

-client confidence - 100% continuity without significant delay or disruption

-total loss due to disaster - restore all files from backup

When considering virus corruption and slow downs due to human error and file corruption, what is the balance between losses and the expense of data centre disaster recovery plan? When considering the likelihood of a complete computer disaster, how much would a company pay for complete system restoration? What is the cost of rebuilding the computer system from zero?

With a data center disaster recovery plan in place, you can rest assured that your business will keep running smoothly - no matter what.

Set up your data center disaster recovery plan today!

Go get more information on at: http://rbm-data-center-disaster-recovery.blogspot.com -Data Center Disaster Recovery Plan now.

Article Source: http://EzineArticles.com/?expert=W.Michael_Anderson http://EzineArticles.com/?Data-Recovery---Why-Should-You-Have-a-Data-Center-Disaster-Recovery-Plan?&id=783584

6 Important Reasons Why You Need A Data Center Disaster Recovery Plan

6 Important Reasons Why You Need A Data Center Disaster Recovery Plan
By Randall Christian

More often than not a new business does not think a data center disaster recovery plan is necessary, much less a priority.

They usually think that a disaster won't happen to them or think that since their business doesn't use software as much as other businesses that their isn't any reason to spend the money required of a sound data center disaster recovery plan. But let me tell you why you definitely need it right now:

1. Self-Confidence: Employees and customers both will be grateful for the peace of mind that comes with protection against any sort of disaster. They can rest easy when the corporation they are devoted to knows how to think ahead and plan for unforeseen events. When the company makes certain that it is prepared for any crisis that may come its way, people defiantly feel secure and this brings on loyalty. It also acts as a major selling point to potential clients, helping build a strong customer base that is crucial in every business.

2. Records: Data center disaster recovery plans always include computer backup systems so businesses enjoy the proper documentation that is included in the system. This is just one fringe benefit any business can enjoy. An extremely useful feature of some systems is the capability of sorting and organizing backup data easily in case there is a need to refer and restore original files and programs that have been deleted or misplaced as a result of human error.

3. Safekeeping Files: The risk of data destruction is extremely high with all of the worms and viruses threatening computer systems on a daily basis. These malicious programs could wreak devastation on a data center, bringing the business to a complete stop. When you have a computer backup system you can fix this chaos quickly by replacing the corrupted files. Then it is back to business to usual at its normal speed.

4. Effectiveness: Computer backup systems support work efficiency by restoring damaged or deleted files, so the work stoppage is just a small blip of the chart instead of a major downtrend in production that a major delay would cause. You have to realize that data center disaster recovery plans are useful in minor problems or accidents as well as a full-blown disaster.

5. Investments: A data center disaster recovery plan saves the business a ton of money the first time it needs to be used. You are saving money in the long run by preventing any type of software problem, no matter what the size from affecting and slowing down business.

6. Worst Circumstance: If you are struck with any type of disaster and your valuable data is completely wiped out, not to worry; all you have to do is go to your online computer backups that can restore all the data that was lost. You can be sure that any businesses without any online computer backups will be wishing they had a serious data center disaster recovery plan in place when they are trying to remember what they lost!

You need a total system and data protection solution that combines ease-of-use with robust performance. It allows you to perform fast backup and recovery jobs reliably, and protects all MS Windows based desktops, laptops, and networked systems against various types of threats such as system failure, human error, and disaster. Go to my Blog to learn about a FREE trial of the program. Go to http://data-disaster-recovery-plan.blogspot.com

Article Source: http://EzineArticles.com/?expert=Randall_Christian http://EzineArticles.com/?6-Important-Reasons-Why-You-Need-A-Data-Center-Disaster-Recovery-Plan&id=793620

How to Define A Business Emergency Strategy Before It Is Too Late

How to Define A Business Emergency Strategy Before It Is Too Late
By Bruce A. Tucker

We all remember how New Orleans, LA looked after it was ravaged by hurricane Katrina. How can anyone forget? The sites of homes flooded up to the rooftops, people sitting by the Superdome with what seemed like no hope in sight.

Take into account the many businesses that were up and running before Katrina hit, and how many have disappeared because of it.

Imagine for a moment you are building your business. You sell widgets, you are buying, selling, tracking orders, doing account, and the many other facets of tasks that go into your business`s daily operation. In a moment`s notice, your business is wiped out. Not by bad financial planning, not by some bad accountant you hired or a lost account, but because of a natural disaster.

Is your business prepared to rebuild after a disaster? Is ready to pick up where it left off, as if nothing happened? If you answered no to both those questions then you need to get an emergency plan in place.

Backup your data. Believe it or not, even in today`s high tech world, a lot of businesses do not back up data properly. Some do it once a night and then the backup is in the same location as their main data centers. This makes no sense. If your building is wiped out, all of your data and all of your backup data is in the same place. You need to separate the two. You should do a backup of your system every night. There are many services out there that offer this at a nominal cost. When compared to what the cost will be when you lose all that data, hiring a firm that specializes in data backup and recovery will be well worth it.

Team organization. Even if you are able to rebuild your data center from your backups, if you and your team, meaning your employees, are not on the same page, and have no idea what the next steps are, or what their roles in the recovery are, you and your team will look like a bunch of chickens with their heads cut off. You should have a written plan in place as to what the efforts of each team member will be after a disaster occurs. Keeping everyone involved, and informed as to what they are responsible for, will make a transition to getting your business up and running again, a smooth one. This plan must be updated periodically, especially as employees come and go.

Write it all down. Finally, get the entire plan in writing. This plan, must be a detailed outline of steps and procedures as to exactly how to get the business up and running. It should also outline what each person is responsible for, how to get the data backup and running, who handles acquiring a temporary space to run the business and so on. This document, will be the most important item of your emergency plan, because it is the actual plan. Make sure each employee has a copy, as well as a saved version on your computer system so it gets backed up with all of your other data. Since you now have a separate vendor handling backup and recovery, your plan is safe. You may want to consider using document version control software such as Documentum. This type of software versions your plan with the ability of people making the changes of checking the document in and out, just the way a library works. When someone has it checked out, no one can make changes to it until they check it back in.

Get your emergency plan in place. You never know when a natural disaster is going to hit, and for that reason, you do not want to be unprepared when it does.

By: Bruce A. Tucker

About the Author:

Bruce A. Tucker is the Associate Director of http://www.Indocquent.com, an online resource for individuals and businesses to post their products and services for sale and hire. You can follow Bruce on Twitter at http://twitter.com/indocquent

Article Source: http://EzineArticles.com/?expert=Bruce_A._Tucker http://EzineArticles.com/?How-to-Define-A-Business-Emergency-Strategy-Before-It-Is-Too-Late&id=961506

Online Document Imaging Mitigates Corporate Disaster and Data Loss - Pay Attention!

Online Document Imaging Mitigates Corporate Disaster and Data Loss - Pay Attention!
By Alani Kuye

You are better off decommissioning and destroying your records than having it and not being able to find it. Thats the bottom line of compliance regulatory requirements. While some companies have found themselves in the uncomfortable position overable data, others have to deal with staff spending half the workday looking for information. Research has shown that employees spend at least 40% of the work day looking for information relating directly or indirectly to their jobs. From Google, to the windows search (under Program Files), some have even downloading the Google desktop search facility.

While this may be a stop gap approach, having a compliant, fully configured document management and work flow solution is key to ensuring the security, auditability, availability, and manageability of records. Including documents and email.

Notwithstanding, most companies are very hesitant to shell out $200,000 for a new enterprise class system. Those who do spend $200,000 or more usually put the vendors through a frustratingly long sales cycle, validation process, procurement process and final approval process before the project is even undertaken. Once the project commences, turnover, staff departure, layoffs, project implementation snags usually further convolute the process.

In comes Saas (software as a Service)! For a fraction of the cost, any company can implement an enterprise class version of an ECM / Workflow / Document management system at a fraction of the cost. This is the same software, but now over a secure internet connection, and usually browser based. That is the difference between financing a $200,000 system upfront, and paying $2,000 monthly for the very same product, same SLA (service level agreement), better support infrastructure, automatic upgrades and additional value added services.

This is where companies can really negotiate their SLA (service Level Agreement). Most companies tend to forget that thick enterprise class systems installed on site come with a "checklist" of SLA options, but in the Saas world, you can really negotiate the language of the SLA.

A web based system will ensure auditability and tight user access controls over a reliable connection. This is because the Vendors, fully understanding the implications of loosing clients data will utilize the best, most secure and advanced data centers, coupled with Department of Defense grade security and backups.

This automatically eliminates the pressure on the client to maintain, staff, upgrade, train, retrain and manage an in - house system. Which usually runs at an additional 85% of the system cost itself, plus overhead.

Alani Kuye is Managing President of Phantom Data Systems Inc.

A Connecticut based Online Document Imaging, Management, Data Recovery, Data Storage and E Mail Security Solutions Provider. He has consulted and designed enterprise data storage, recovery, records management and security solutions for large corporations, government agencies and small businesses alike. Featured in CRN, Infoweek, and various publications alike.

He resides in Connecticut and can be reached at 1-203-809-2465 or [mailto:alani@phantomdatasystems.com]alani@phantomdatasystems.com
Online document imaging - Phantom Data systems Inc.
Norwalk, CT.

Article Source: http://EzineArticles.com/?expert=Alani_Kuye [http://ezinearticles.com/?Online-Document-Imaging-Mitigates-Corporate-Disaster-and-Data-Loss---Pay-Attention!&id=968877 ]http://EzineArticles.com/?Online-Document-Imaging-Mitigates-Corporate-Disaster-and-Data-Loss---Pay-Attention!&id=968877

Offsite Data Backup Plan - What Online Backup Services Vendors Must Have

Offsite Data Backup Plan - What Online Backup Services Vendors Must Have
By Mike Blough

Having an offsite data backup plan is a necessity to support your business continuity and disaster recovery needs. To support these objectives, you may also have ascertained that using an online backup services provider to be viable but find it a challenge to identify suitable vendors.

If so, here's a two-stage methodology that can make life easier for you:

- Stage 1: We will use an initial set of criteria is used to identify a short list of candidates that are able to provide a minimum standard of service for immediate and longer term.

- Stage 2: We will determine your provider of choice by assessing the short-listed candidates against a final set of criteria.

Today, we will discuss the details of Stage 1 and outline key requirements that must be fulfilled by all short listed candidates.

I. Established operations

In the past, many impressive start-ups have gone bust. Based on experience, vendors who have been in business for 5 years or more are more likely to be able to support in the long haul.

II. Large customer base comprising of business clients

A sizeable business clientele usually co-relate with the vendor's proven ability to provide a satisfactory level of service for business requirements that are usually more stringent by nature.

III. Premise that is secured

As a rule of thumb, consider candidates who use world class data centres for their operations. This is because data centres often have good physical security equipment and measures to prevent unauthorised access. Data centres also have built-in protective measures against natural disasters that include earthquake and fire.

IV. Scalable offerings

Data storage requirements will increase along with the growth of your business. While your immediate need is the priority, the short-listed vendors must have expandable data backup plan offerings to accommodate additional storage when the need arises.

V. Affordable plans

Vendors who offer "too good to be true" free storage for life are hard pressed to survive in the long run and therefore should be excluded from the short list. Instead, identify candidates who can provide the required service at prices that are affordable, based on a budgeted price range.

By evaluating using the five criteria above, you will have a short list of candidates that can offer the minimum level of online backup services to support your offsite data backup plan objectives.

If you are looking for a top rated offsite data backup plan provider, please go to Mike Blough's blog at: http://allondatabackups.uni.cc/top-rated-online-backup-services-provider-for-offsite-backup/

Article Source: http://EzineArticles.com/?expert=Mike_Blough http://EzineArticles.com/?Offsite-Data-Backup-Plan---What-Online-Backup-Services-Vendors-Must-Have&id=978564

Sunday, February 3, 2008

Backing Up Your Computer Verses Archiving

Backing Up Your Computer Verses Archiving
By Stephen Richards

The concepts of backing up a computer and archiving documents often get confused.

To clarify the difference, let's start with what a backup is. Generally, a backup is a short-term retention copy of a file or record that is made in case the original is lost or damaged beyond repair. Making a backup of your files is meant to create a snapshot of something so that you can restore your data back to a certain point.

Therefore, you're really not concerned that you're going to be backing up the same data over and over and over again. All you're really concerned with is, if this application goes down, can I restore the data?

An archive is similar with the difference being its life span. An archive is typically viewed as a means to meet a requirement to retain a record for future reference.

Many companies archive information as a way to retain company records and meet regulatory requirements. The SEC had changed regulation 17A, which has required companies to retain specific electronic records.

An archive is set up so that information can be accessed relatively quickly in the event of an audit. In the old days, when everything was on paper, archiving meant storing numerous files in cabinets with an offsite vendor, for a certain period of years. Electronic archiving is similar. At the end of the retention period, your files can be deleted.

When archiving, it is important to date information so that one knows when the expiration date comes about. In this way, archiving is different from backup information. Traditional backups are usually part of a sequence, which is typically a series of weekly full backups followed by daily incremental backups that are kept for a predetermined amount of time (e.g., 30 days). In order to keep a copy for a longer period than usual, an out-of-sequence copy must be created. This is where the attributes of an archive start to take shape. We can think of an archive as an out of sequence copy; a copy that is not associated with other copies for retention purposes (i.e., full and incremental).

Other attributes that differentiate an archive from a backed up file are:

1. Archives should not be retained simply based on the number of existing copies. Each archive should be a unique object bearing a time stamp, descriptor and a retention parameter.

2. Data is backed up to protect it from being lost or altered and because it must remain readily available; it would therefore go against the rules to delete a file after backing it up. Conversely, data is often archived so it can be deleted from its original location because immediate access is no longer required.

3. Archived data can be extracted from its original context and catalogued or indexed for later retrieval. This is the case for CAS or email archiving products where a message or attachment is taken out of its usual structure and stored elsewhere.

To summarize, if a record is copied for protection, we can probably call it a backup. If the same record is stored on some media with particular concern with immediate access, it's probably safe to call it an archive.

Stephen J. Richards has 25 years experience in Data Management and Information Technology. This information is provided as a public service by Neon Enterprise Software, a leading provider of [http://www.neonesoft.com/ISV.shtm]Compliance Software For more information, please visit neonesoft.

About the Author: Stephen J. Richards has 25 years experience in Data Management and Information Technology. This information is provided as a public service by Neon Enterprise Software, a leading provider of [http://www.neonesoft.com/br.shtm]mainframe disaster recovery and [http://www.neonesoft.com/TAR.shtm]data retention technology.

Article Source: http://EzineArticles.com/?expert=Stephen_Richards http://EzineArticles.com/?Backing-Up-Your-Computer-Verses-Archiving&id=932335

Backup Strategy to Avoid Data Loss & Data Recovery

Backup Strategy to Avoid Data Loss & Data Recovery
By Park Oskar

You must have always come across the phrase “Data Backup” when you talk about data loss. It’s not that we don’t understand its importance completely but just that we pay little less attention to it than required. Each day, we hear about several data loss incidences seeking data recovery software or data recovery services options. If you feel that your data is valuable, then why not keep it safe? Why not have a Backup strategy?

A concrete backup strategy is important to any recovery plan. The following are the main elements to a solid backup strategy:

Define what type of data needs to be backed up.

You create a variety of documents, customer databases, financial records, or employee records. Hence, by defining the order of importance of data, you should decide on what to backup.

Decide the Backup Media

You must know the storage media for backup. You may consider backup data to be stored from a computer to a rewritable CD or DVD, a network server, a USB key, or a ZIP disk.

Define the time limit you have available for backup.

You must know of the product that is reliable enough to perform the backup at the scheduled time. If you are a traveler and usually connect to the network remotely, then you must know of a backup strategy that covers your information accurately.

Decide the level of access to the information.

You must know the security requirements and concerns, and that your backup software ensures 100% data accuracy while restoring. You must also ensure that your backup software prevents unauthorized access to the information, through a password or a variety of encryption algorithms.

Define the schedule of backups

You must set the schedule of backups i.e. the frequency of backups needs to be determined. You must ensure that all the workstations (from where you need to backup the data) are ‘On’ at the time of performing backups. For remote workers, you must develop standard operating procedures.

Define the backup policies

You must decide when to perform a full system backup or incremental system backup. It is recommended to store the backed up data offsite i.e. you can keep your data in two different locations away from each other.

Work on the ease to backup the data

What if you have successfully performed the data backup but it takes time while restoring it? You must work on the set up where you can backup the data with one command. Agreed that it will take little more time and work but will be very useful when the system crashes.

Perform daily backups

You must ensure that there is less time between the two subsequent backups otherwise if there is longer period between backups, you may lose quite a lot of data.

If you do not understand the way to implement a backup strategy, you might have to check with the local expert.

Stellar a data recovery Software & service company provides range of [http://www.stellarinfo.com]data recovery software & data protection software. Stellar has recently launched a data backup software i.e. Stellar InstaBackup is very useful software for backing up and protecting valuable data. This software simplifies the process of data backup and is a powerful solution for both business and personal needs. It can also be used both in a networking environment and on a single machine. Although the software is easy to use, a number of advanced options such as Full / Incremental backups, strong File Encryption, and Zip Compression are also available. The software has a simple graphical user interface, requires no prior knowledge of data backup, and is a comprehensive data protection solution for all Windows File Systems. [http://www.stellarinfo.com]Hard Drive Data Recovery Software

Article Source: http://EzineArticles.com/?expert=Park_Oskar http://EzineArticles.com/?Backup-Strategy-to-Avoid-Data-Loss-and-Data-Recovery&id=293636

Outlook Backup - What Is The Best Way to Do It?

Outlook Backup - What Is The Best Way to Do It?
By Alexander Golishev

Outlook backup is a bare necessity for those who use MS Outlook email client for everyday communication. If you are like most people, who like to start their day with a hot steaming cup of coffee looking through morning mail, you sure can imagine how frustrating it can be to lose your important messages and contacts.

There are several reasons why you can lose your email. First of all, you can lose your Outlook messages as a result of hardware failure. Secondly, there can be a disaster like flood or fire, which is hard to prevent so it is strongly recommended to back up Outlook/Outlook Express to secure against the temperament of nature.

A far more frustrating occurrence of message loss is an accidental deletion by the owner. There is no way to prevent such things, but there are several ways to make sure you do not lose your data, if you get in any of the above mentioned situations.

One ways is to copy your contacts and messages manually each day and record them to some storage media such as a CD. This is a viable solution and it is the cheapest in terms of money, but not time. It is going to be hard to keep track of all incoming and outcoming messages and not to forget to do Outlook backup regularly.

However, with the simple yet reliable Outlook backup software, you can immensely simplify the task of data protection. In fact, for a reasonable fee of 39 bucks you can get a professional backup program with the backup functionality which allows backing up your important messages on a specified schedule with the options of data compression and encryption.

When choosing your backup software, pay attention to the specific features of a program. Some backup programs offer Outlook backup functionality as a default feature, while others may require installation of special plug-ins for doing target backup of email. Also, make sure that the program can do backup of all versions, including backup of Outlook 2007.

The minimal feature set that you need to do quality [http://www.handybackup.net/outlook-backup.shtml]Outlook backup includes automatic Outlook file search, automated task execution according to a minute accuracy schedule, data compression and encryption and a wide choice of storage media including flash drives, external hard drives, optical disks, FTP and online servers.

Alexander Golishev is a copywriter for [http://www.handybackup.net]Novosoft LLC software developer, with a great deal of expertise in data backup and recovery matters.

Article Source: http://EzineArticles.com/?expert=Alexander_Golishev http://EzineArticles.com/?Outlook-Backup---What-Is-The-Best-Way-to-Do-It?&id=947628

Wednesday, January 16, 2008

A Data Protection Strategy for Today's World

A Data Protection Strategy for Today's World


By Bob Baird

Today's enterprises face new levels of risk to their IT operations. Business services can be disrupted by anything from ordinary operator error to natural disasters and physical corruption. At the same time, evolving legal demands are driving enterprises to address increasingly complex and stringent operational conditions-even as they are tasked with protecting more and more data.

Data protection is paramount to prepare for and recover from a data emergency, which is typically corruption and damage resulting from those operational mishaps or disastrous events. Technologies such as backup, monitoring, and replication contribute to recovery, but they are only part of the solution. A complete data protection solution includes best practices, services, and technology. Data protection is the underlying foundation for disaster recovery and high availability.

Today's Data Protection Challenge

Data protection today faces a different set of challenges than the solutions of the past. At one time, online production operations ran during first shift; batch update and reporting operations ran during second shift; and backup and maintenance operations ran during third shift. However, as more applications share the same body of data for different purposes and from locations scattered across time zones, off-hours is becoming a vestige of the past. Yesterday's data protection approaches can only partially solve today's problems and will not solve tomorrow's problems.

Today's backup window is quickly disappearing, a symptom of a business environment that demands greater data availability. New approaches must be adopted that do not contend with production workloads for resources and are not bound by narrow backup windows.

Furthermore, the volume of data requiring protection continues to grow while recovery demands become more aggressive. Growth in the amount of data requiring protection is driven by two factors: 1. the volume of data continues to grow 30 to 60 percent per year for most large enterprises, and 2. new regulations require companies to retain more data for longer periods of time.

The 'Do Nothing' Option

A comprehensive data protection solution requires planning, and could require staffing and budgetary resources. However, in order to evolve and meet demands, IT cannot ignore these new requirements.

It is true that not all disruptive events have severe, immediate consequences, but frequent small losses and excess IT costs will drain company profits over time. IT administrators can recognize a need for an update data protection solution by looking for a few symptoms that might signal data protection problems, including

· Excessive data recovery incidents caused by operational mishaps
· Excessive time elapses before recovery can begin
· Compounding of data recovery problems due to operational mistakes
· Resolution of data protection problems drag on for weeks to months
· Root-cause analysis takes too long or is not done at all
· Testing of data recovery procedures known or perceived to be a potential disaster
· Patch levels are far out-of-date or data protection products are out-of-date by more than two release levels
· Backup jobs frequently delayed until the next available backup window
· Inadequate or nonexistent recovery for database severs, file servers, and mail servers
· Difficult to recover data protection infrastructure in a disaster

Anatomy of a Comprehensive Data Protection Solution

Data protection has both technical and non-technical aspects and should include people, process, and technology products and services. Although technical aspects are of major importance, people and processes are of equal importance. The technical aspects of data protection refer to solution design, implementation, and operational tasks. People and process refer to planning, best practices, and ongoing testing. A comprehensive data protection solution combines technology and services into a cost-effective solution with the following benefits:

· Reduces the amount of application downtime caused by data emergencies
· Meets recovery objectives that support even the most critical data
· Cost-effectively backs up and retains massive amounts of non-critical data
· Raises backup and recovery success rates well above industry standards
· Mitigates constraints imposed by tight or disappearing backup windows
· Proactively prepares for operational mishaps and disastrous events
· Minimizes the gap between the current environment and a state-of-the-art environment
· Mitigates the attrition/loss of skilled data protection professionals
· Makes the overall cost of disaster recovery and replication more affordable
· Minimizes and manages IT operational risks

The technology goal is to design, implement, and maintain a state-of-the-art data protection environment. There are a number of considerations for administrators who are creating a strategy for comprehensive data protection, including the following:

· Recovery window: Does the solution protect data in a manner that enables recovery within a time window specified by the recovery time objective (RTO) and with no more data loss than specified by the recovery point objective (RPO)? The solution might employ various combinations of replication and backup to this end.
· Comprehensive data support: Does the solution support recovery of all classes of data (e.g., database, flat files, and email)? Recovery should mean restoring data to its normal operational state and verifying success.
· Cost effectiveness for data classes: Does the solution employ the most cost-effective protection methodology for each class of data without compromising recovery objectives? For example, flat files with very relaxed recovery objectives should be handled differently than mission-critical databases.
· Server recovery: Does the solution recover database servers, file servers, and mail servers to an operational state? Recovery is only deemed successful when data can be safely accessed by applications through a data server.
· Automated recovery: Does the strategy include automated recovery, but still leave critical recovery decisions to IT staff? Automation reduces the incidence of operational mishaps and prevents problems from compounding during stressful recovery situations.
· Planning for conflicts: A good data protection plan will take into consideration possible contention with applications for server, network, and storage resources. The potential that backup jobs might disrupt production workloads forces backup operations to be performed during off-hour backup windows. Avoiding or eliminating backup windows increases backup success rates and provides flexibility in backup schedules.
· Tape drive use: Administrators should use tape media and tape drives efficiently to contain costs. Costs associated with tapes are a major factor in a backup solution.
· Effective retrieval: Administrators should implement a strategy to reduce time to retrieve backup media from offline storage. Delays associated with retrieving backup media can add many hours to end-to-end recovery time.
· Network and replication use: IT should use the replication network wisely to contain network costs. Studies and experience have shown that the network is a major cost factor in employing a replication solution.
· Staffing considerations: A good data protection plan will require no more than a skeletal onsite staff for data protection operations. Eliminating the need for a large staff at production locations saves onsite staffing costs, leverages offsite services for multiple production locations, mitigates the impact of a local area disaster, and increases outsourcing opportunities.

Conclusion

There is no single technical approach that delivers both aggressive recovery and meets low cost objectives. Any comprehensive solution must be a combination of a number of strategies-each addressing part of the total data protection problem. When budgeting for a data protection strategy, administrators should note that the cost of the solution should include the people, the technology, as well as the costs imposed by the technology on the underlying IT infrastructure such as servers, storage, and networks.

IT organizations should consider the future of data protection and how they will adapt their current strategy to meet today's data protection demands and tomorrow's requirements. Ignoring data protection problems can have severe consequences for any organization and a comprehensive approach including a combination of people, process, and technology will help any organization prepare for anything from a small incident to a major disaster.

Bob Baird is senior solutions architect with Symantec's Global Services organization. He has 40 years of experience as an architect and consultant with IBM, HP, and Symantec.
www.symantec.com