Coping with a Serious Data Loss from your Computer Hard Drive
Data loss is an expensive reality. It's a hard fact that it happens more often then users like to admit. A recent study by the accounting firm McGladrey and Pullen estimates that one out of every 500 data centers will experience a severe computer disaster this year. As a result, almost half of those companies will go out of business. At the very least, a data loss disaster can mean lost income and missed business opportunities.
The other side of data loss is the psychological and emotional turmoil it can cause to IT managers and business owners. Despair, panic, and the knowledge that the whole organization might be at risk are involved. In a sense, that's only fair, since human error is one of the two largest contributing factors in data loss. Together with mechanical failure, it accounts for almost 75 per cent of all incidents. (Software corruption, computer viruses and physical disasters such as fire and water damage make up the rest.)
Disk drives today are typically reliable. Human beings, it turns out, are not. A Strategic Research Corp. study done in 2000 found that approximately 15 per cent of all unplanned downtime occurred due to human error. A significant proportion of that happened because users failed to implement adequate backup procedures, either having trouble with their backups, or having no backup at all.
How does it happen that skilled, high-level users put their systems - and their businesses - at such risk?
In many cases, the problem starts long before the precipitating system error is made, that is, when users place their faith in out-of-box solutions that may not, in fact, fit their organization's needs. Instead of assessing their business and technology requirements, then going to an appropriate engineered solution, even experienced IT professionals at large corporations will often simply buy what they're sold. In this case, faith in technology can be an vice instead of a virtue.
But human intervention itself can sometimes be the straw that breaks the technology's back. When the office of a Venezuelan civil engineering firm was devastated by floods, its owners sent 17 soaked, mud-coated disks from three RAID arrays to us in plastic bags. A tough enough salvage job was made even more complex by the fact that someone had frozen the drives before shipping them. As the disks thawed, yet more damage was done. (After eight weeks of painstaking directory-by-directory recovery, all the data from the remaining fifteen disks was retrieved.)
Sometimes, the underlying cause of a data loss event is simply shoddy housekeeping. The more arduous the required backup routine, the less likely it will be done on a regular basis. A state ambulance monitoring system suffered a serious disk failure, only to discover that its automated backup hadn't run for fourteen months. A tape had jammed in the drive, but no-one had noticed.
When disaster strikes, the normal human reaction is panic. Because the loss of data signifies critical consequences, even the most competent IT staff can jump to conclusions, and take inappropriate action. A blank screen at a critical time can lead to a series of naive decisions, each one compounding the preceding error. Wrong buttons get pushed, and the disaster only gets worse. Sometimes the pressure to correct the system failure speedily can result in an attempt to reconfigure an entire RAID array. IT specialists are typically not equipped to deal with crisis modes or data recovery techniques. Just as a good physician is trained to prolong life, the skilled IT specialist is trained to keep the system running. When a patient dies, the physician turns to others, such as nurses or counselors to manage the situation. When significant data loss occurs, the IT specialist turns to the data recovery professional.
Data recovery specialists are innovative problem solvers. Often, the application of basic common sense, when no-one else is in any condition to apply it, is the beginning of the journey towards data recovery. The data recovery specialist draws on a wealth of experience, married to a "never say die" attitude, and a comprehensive tool kit of problem-solving procedures. Successful recovery outcomes hinge on a combination of innovative logistics, applied problem-solving, and "technology triage," the process of stabilizing an affected system quickly, analyzing and treating its wounds, and preparing it for surgery. The triage process sets priorities, such as targeting which files are needed first or which are absolutely vital to the functioning of the business, and establishes whether files might be recovered in less structured formats (such as text-only), which may be desirable when time is crucial.
The art and science of professional data recovery can spell the difference between a business' success or its failure. Before that level of intervention is required, though, users can take steps to ensure that the probability of a data loss disaster is minimized.
Basic to any business technology plan is a regular fire-drill procedure. Back-up routines may be in place, staff may assigned to specific roles, hardware and software may be configured - but, if the user isn't completely sure that everything works the way it should, a data loss event is inevitable. Having adequate, tested, and current backups in place is critical. A hardware breakdown should not be compounded by human error - if the malfunctioning drive is critical, the task of dealing with it should go to a data recovery professional.
Just as data loss disasters are rooted in a combination of mechanical failure and human error, so, too, the data recovery solution lies in a creative marriage of the technological and the human. The underlying philosophy of successful data recovery is that technology is something to be used by human beings, not something that uses us.
Name: Darryl Peddle
This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news
Virginia hardware store at center of Boy Scout controversy fires employee accused of making anti-gay slur - Washington Post
Be Like the Big Guys: Optimizing Hardware in the Software-Defined Data Center - Data Center Knowledge
TiVo: An Introduction for the Few Who Dont Know Yet
TiVo will change your life..
Do You Have Dead Pixels?
Take a good look at your notebook computer screen. Do you find some tiny dark spots? You could have dead pixels.
Review: Implementing the Google Search Appliance in an Intranet environment
Our corporate intranet is a non-framed environment with both Lotus Domino and IIS (.Net and classic ASP) applications and content.
Printer Ink Cartridges - The History
You are working at your computer and trying to print out important documents and all at once you find you are out of ink. Years ago that would have presented a big problem.
Flash Memory Part 2: MMC and SD
MMC and SDFlash memory is available in so many formats that it can be difficult to know what will work with any particular device. Devices such as MP3 players, PDAs, mobile phones, digital cameras, and personal computers can take advantage of flash memory to bolster their storage capacity, but selecting the right format may be easier said than done.
Trouble-shooting Hard Drive Problems - Part 1
It is extremely important not to make or write any changes to data on the hard drive without first verifying the hard drive configuration. Therefore, the first priority when unable to access information on a hard drive is to verify all of the configuration information dealing with the suspect hard drive.
HIPPA Goes Mobile and Wireless for Hospitals and First Responders
It appears we need to further streamline health care and HIPPA now in effect is quite a nightmare trying to comply with and implement without making a mistake and possibly being sued as the trial lawyers testing the law. The Malpractice insurance rates may go up again.
Wireless Networking, Part 2: Setup and Security
The first installment in this two-part series of Tech Tips provided an introduction to the basic capabilities and hardware involved in wireless networking. In the final installment of this two-part series, we will look at some of the basic setup and security considerations that should be addressed.
What is EEPROM ?
EEPROM stands for Electrical Erasable Programmable Read Only Memory and also referred to as E≤PROM. As the name suggest, an EEPROM can be both erased and programmed with electrical pulses.
How To Choose a Computer Mouse
Computer MiceEvery computer user can hopefully identify their mouse and the importance it plays in the daily operation of their computer. Mice are nothing new and for the most part are nothing overly complex, but the average user may not be familiar with all of the options and technologies that may go into these little devices.
Facing DVD Software Dilemma? Its Brainlessly Simple
1. Pocket DVD Wizard http://www.
How to Save Money With Cheap Computers
We all know that computers change more then any other type of technology. There constant changing can also leave are wallets completely empty.
Computer Components for Idiots
There are many fancy add-ons for computers, but the basic components of the computer are simple and universal. If 1 of these main components is missing, it's not a computer.
How To Format A Hard Drive
Here's how to format a hard drive (Legal Stuff: We are not responsible for any damages, lost data, or anything of the sort)..
How to Solve Multiple Paper Loading Problem in HP5L and HP6L Laser Printer
Have you ever encountered before the problem of having multiple paper loading in your HP LaserJet 5L and 6L? Do you know that this is caused by a defective separation pad where it's rubber has worn out.The function of separation pad is to control or allow paper to go through it, one at a time.
Correctional Institution Preventive Maintenance Software
There is a great need for preventive maintenance in correctional institutions. The public would be at risk if penal facilities waited to solve problems until after they manifested themselves.
A Guide to Refurbished IBM Laptops
IBM boasts a very large array of older and newer refurbished laptops on their website ibm.com.
Building A PC
Many people simply go to the retail store and get sold to when it comes to computing equipment. You would be very surprised how easily you can pick up all the core components and assemble yourself or get a friend or family member in the know to do it for you.
Routing, Routed, and Non-Routable Protocols
ROUTING PROTOCOLSA generic term that refers to a formula, or protocol, used by a router to determine the appropriate path over which data is transmitted. The routing protocol also specifies how routers in a network share information with each other and report changes.
The Printer Cartridge Game
Think you got a great deal on a printer? Like the rest of us, you probably paid $50 to $75 for a decent Epson or Lexmark printer. What's the catch, you might have asked? Most salesmen would say there is no catch.
|home | site map|