RAID-5 General Setup Tips

Size: px
Start display at page:

Download "RAID-5 General Setup Tips"

Transcription

1 RAID-5 General Setup Tips Brian Gill CEO Gillware Inc. Data Recovery Having run one of the world s most successful data recovery labs for almost a decade now, I ve seen thousands of RAID-5 data loss situations that probably could have been avoided by following these simple guidelines. This is not intended to be a comprehensive explanation of what RAID-5 is, but rather tips for somewhat experienced IT folks when setting one up. A RAID-5 setup takes N hard drives, groups them together with physical hardware or software into one big storage array. The total array will have N-1 drives worth of total capacity, because it is sacrificing one drives worth of total capacity and using that amount for redundancy. An example RAID-5 setup would be 3x3TB drives for 6TB of total capacity. Any single drive can fail and the array will still be able to read and write data in a degraded state. At that point you re supposed to notice a drive is dead and replace the drive with a new one and then allow the array to rebuild and restore redundancy. If two drives in the array die the data will be non-accessible and likely gone forever without serious expertise. For a more detailed explanation of RAID-5 and how it works: Use a Variety of Drive Manufacturers Use drives from various manufacturers. This is getting harder as the hard drive manufacturers continue to consolidate. If you can t get different manufacturers, at the very least pick drives with significantly different manufacturing dates, I d recommend at least a month variance. Drives in a RAID live almost identical lives as far as number of shutdowns, startups, runtime, data read and written, environment, etc. If they are the same model and were manufactured the same day they may have very similar life-spans or similar manufacturing defects, or similar reactions to power-surges/sudden loss of power/environmental events. RAID-5 gives you the ability to have one drive worth of redundancy, so we definitely don t want them dying the same day or same week. Using drives that are similar capacity/speed but different make/model will help avoid some dual drive death situations. If you are running Seagate drives and can t figure out when your drives were made: Write Down the RAID Configuration Information When You Set It Up Most RAID cards can be setup in a variety of different ways. You d be surprised how many calls we get from IT folks that send us a box of healthy drives simply because the RAID card exploded. All the configuration lived exclusively on the RAID card and they have absolutely no memory of the setup. Are you running RAID-5, RAID-6, RAID-1? What s the stripe size on your RAID, 64KB, 128KB, 1 sector? What s the rotation? Are there multiple volume groups or just one? If there s more than one, which drives are in which group? Offsets? Which drive is the hot-spare? What firmware version is your RAID card or software RAID running? Page 1 of 5

2 Make Sure the RAID Card Stores the RAID Configuration on the Card and on the Drives. If this is the case and your RAID card dies, there s a decent chance simply ordering another one with the same firmware and plugging the drives back in will allow the array to remount. This is because each drive has some meta-information stored somewhere (usually the first few sectors at the front or back of the drive) that explain its place in the universe. The order in the array, the stripe size, the data offset, what physical group it s in, etc. actually lives on the drives, allowing the new card to re-detect the array settings. Setup Notifications While I ve never seen an official study, I d estimate more than half of the small businesses out there running RAID-5 have not properly setup the RAID controller notifications. When a drive is taken offline by the RAID controller you absolutely must have it you or page/text you so you can promptly replace the failed drive and perform the necessary rebuild to restore redundancy. I d estimate nearly 90% of small businesses/consumers running NAS (Network Attached Storage) RAID-5 units haven t setup any notification. When a drive fails and goes offline, the storage array will continue to function (the whole point of RAID-5) and will emulate data read from and written to the dead drive using parity calculations on all the other drives. You might get lucky and notice a 20-30% slow-down in data access times, and think Gee my NAS is running a little slow, I wonder if I lost a drive?, but honestly most users would never notice this. Someone might wander by the unit and notice a little crimson LED on a drive instead of a green one but chances are they won t know what it means or say anything. So, if you re running one of those NAS units in your small business, go grab the manual, connect to it via the little website it hosts, and configure the notifications. If you re running a small traditional server in your office/home check the RAID BIOS settings next time you boot and peek at the configurations tab. Test the notifications (it should have a simple button to test it) to make sure you get that page/ . I d recommend ing an group and not a single person, and make sure the message isn t eaten by the junk mail filtering. Use Enterprise Class Drives While the guts of most drives are very similar, almost every manufacturer has distinctly different firmware on their enterprise series drives when compared to consumer class drives. For example, a consumer class drive may be setup to do offline scans; it is scanning for sector-level platter defects while the drive is not currently in use. A consumer class drive may actually spin-down the motor and go to sleep to save power when not in use. In a single drive consumer system these may be optimal behavior. However, when the RAID controller attempts to talk to a drive in these conditions, there may be an unacceptable latency in its response. The RAID controller may be configured to take a drive offline after a certain timeout and now you re running degraded even though the offline drive is actually healthy. If 2 or more drives meet this condition you re dead in the water. Enterprise class drives are going to alter their behavior to meet the performance/latency requirements of the average RAID controller. Enterprise class drives also go through a much more comprehensive quality assurance process and use higher quality components during manufacturing. As such, enterprise drives are typically rated for much longer lives in general. Enterprise series drives of course will cost more and can be harder to source (you aren t going to find them at most local consumer electronics stores) but the extra money and time to source the appropriate equipment is money well spent. Page 2 of 5

3 6 Drives Max I d recommend a maximum of 6 drives in a RAID-5. I ve seen setups where folks have used significantly more than 10 but this is to be avoided. Simple math says the more drives you run the higher the probability of a double-failure which is what we re obviously always trying to avoid. If you re building a RAID for huge capacity needs, I d highly recommend running RAID-6 and probably having at least one hot-spare. Beware the Convenience of the RAID-5 NAS Device. As I mentioned previously RAID-5 NAS devices are typically not configured to notify anyone when they have a drive failure. This is because people remove them from the box in the networking closet, plug them in, switch them on, and everyone in the office magically sees a new logical volume on the local network. Then the victorious installer pats themselves on the back and gets on with their day, sometimes discarding the box and manual in the trash. As convenient as these devices are, I d say they are roughly 3-5 times more failure prone than a legitimate RAID-5 in a big boy server. Most of these NAS units are shipped with whatever drives were cheapest that morning, regardless of manufacturer. Usually the drives will be one serial number apart, built within seconds of each other. They certainly aren t going to put expensive enterprise class drives in popular consumer NAS devices; they are competing primarily on price. They are portable and easily stolen. They don t have anywhere near the independent fan power as a real server. They probably live in a closet and not in a server room. One more important failure point compared to a big boy server: A NAS device must boot its own proprietary device operating system (again usually one-off Linux) in order to mount the data up to the network. On a big boy server you ll be running a real version of Linux or Windows that you have the disks for and understand how to troubleshoot. When a NAS takes a dirt nap it may allow you to attempt to repair the operating system, flash the firmware, but these options may or may not involve the annihilation of all your data, scary stuff. When a NAS does take a dirt nap there s a very high probability you ll be sending it to Gillware or one of our competitors for data recovery if you didn t have a solid backup. All data recovery software needs the access to the logical array containing the data in order to scan for file signatures/inodes/directory structure, etc. When a RAID-5 NAS is a brick it s truly a brick, there s nothing to mount. Even if you can figure out how to properly access the data volume, you may not like what you find with data recovery software. These devices typically run a proprietary flavor of Linux, sometimes with a fairly standard Linux file-system like XFS, but sometimes the file system will be fully proprietary (there isn t any data recovery software for proprietary file systems, useless the person who wrote the file system was kind enough to write one or publish the spec). We ve seen some NAS device manufacturers that use standard file systems but actually encrypt the data (whether or not the consumer asked for it), we ve seen others that reverse the bit order on a sector level and we had to write software to untwist it. Essentially, as long as a NAS mounts a network file system up on the network they can and will do whatever they want under the covers. It typically will not explain how it operates under the covers on their website or in the manual as the manufacturers are trying to protect their intellectual property. One of the un-anticipated side-effects of how easy a NAS is to get up and running, is that most consumers don t educate themselves on how to use the administrative consoles. If you don t properly set up event notification and put some thought into the security settings, you may be regretting it in the future. Page 3 of 5

4 Auto-Rebuild Auto-Force Awareness Some RAID cards will have a configuration setting for enabling automatic rebuilds. Some may have settings on whether or not it is ever allowed to force a drive that has fallen out of the array back online if it meets a certain health standard. It is very important to read the documentation for your card and understand how it s going to behave if you are going to be enabling any of these types of automated features. We ve seen multiple instances over the years where the card behaved in a manner inconsistent with what you d expect. For instance, upon failed drive replacement the card would rescan the entire array, force a stale drive online, and start rebuilding from that stale drive, destroying all the data since that stale epoch. We ve seen cases where the array would notice a drive is offline, automatically force it online and rebuild to it. If a drive is flaky and falling offline, it s best to actually replace it, not just jam it back into the array and hope it holds up this time. We ve also seen rare cases where a technician replaced a failed drive with a new blank drive, and the array kicked off a rebuild from the array with the blank drive included to another drive in the set, essentially blowing away all the data. I won t go as far as to say you should never have automatic rebuild enabled, especially if your array has a hot-spare you actually want it to engage the spare and rebuild to it automatically in the situation where a member of the set is taken out of the array because it is unhealthy. I would never personally enable these features on any array without a hot-spare that I was responsible for. If your game-plan is to replace multiple drives in a RAID-6 or a RAID-5 with a hot-spare, you wouldn t want the rebuild process to start until you ve replaced both of them. In my opinion, the operator replacing the failed or flaky drive(s) should be making the decision on when to start that rebuild process, and should have the opportunity to verify that the rebuild target(s) are correct. Having said that, understanding what your card is capable of and what features you decide to enable is the critical thing here. A RAID-5 is Not a Backup Many an IT professional has become unemployed when a storage array configuration that should have been routine went sideways on them. These are not always related to RAID; operating system patches, virtualization of a server, database or server upgrades, etc. all may have some associated risks. Always make sure to verify the most critical data has a recent and functional backup before doing any configuration modifications to an important storage array. A RAID-5, or any RAID for that matter, is still subject to numerous failures that will lead to data loss. A RAID-5 will not protect your data from fires, floods, thefts, virus attacks, human error, malicious employee behavior or multiple drive failure. It only protects you from data loss from a single-hard drive failure when a technician is paying attention and can replace it promptly. Running a RAID-5, coupled with a cloud-backup for critical data, is a very solid and cost-effective solution for most small businesses. Shameless plug: Gillware remote backup is our solution and you can quickly and easily configure it to automatically encrypt and transmit your critical data up to your slice of our cloud. For a small fee we ll actually continuously monitor the account to make sure all critical data is being transmitted on a routine basis and that all critical data has been properly configured to get moved up to the cloud. Have Replacement Drives On-hand When a drive dies in a RAID-5, it can sometimes be a struggle to order similar capacity/performance drives to replace it. If a second drive fails while you are awaiting that shipment you could be in a world of hurt. It s a good idea to order a spare drive when you are setting up the RAID in the first place. Even if you are setting up a hot-spare you may want to order another just so you have a cold-spare lying around when you need it.. Page 4 of 5

5 Ensure You Have a Complete Backup before Adding Storage or Flashing Firmware A lot of data loss can happen when doing routine maintenance on an array. If the meta-information about the array (drive order/rotation, stripe-size, offline drives, hot-spares, physical volume grouping) is lost during a flash you ll be dead in the water. Perhaps the array is full and you want to add more drives and a new volume group. Perhaps there s new firmware for your device that you think will add features or increase performance. It s always a good idea to ensure your backups are current and 100% complete before doing this type of maintenance. Many an IT professional has been fired for doing routine maintenance without verification of the backup first. Summary A properly setup and continuously monitored RAID-5 array will protect you from single-drive failure costing you all your data. If improperly setup or not monitored at all, RAID-5 can give you a false sense of security and you ll probably be sending the array to us for data recovery someday. A RAID-5 in and of itself is not a backup. A solo RAID-5 array in a single physical location will never protect you from fires, floods, thefts, power surges, malicious employees, multiple drive failures, human error or virus attacks. About Brian Gill CEO Gillware Inc. Data Recovery Connect with Brian on After a successful IT consulting career I founded Gillware Inc. in Madison, WI to provide data recovery services from failed electronic media. Gillware is now one of the world's most successful data recovery labs, currently recommended by Dell and Western Digital. Connect with Gillware on Page 5 of 5

RAID HARDWARE. On board SATA RAID controller. RAID drive caddy (hot swappable) SATA RAID controller card. Anne Watson 1

RAID HARDWARE. On board SATA RAID controller. RAID drive caddy (hot swappable) SATA RAID controller card. Anne Watson 1 RAID HARDWARE On board SATA RAID controller SATA RAID controller card RAID drive caddy (hot swappable) Anne Watson 1 RAID The word redundant means an unnecessary repetition. The word array means a lineup.

More information

Availability and Disaster Recovery: Basic Principles

Availability and Disaster Recovery: Basic Principles Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer

More information

Disaster Recovery Planning Save Your Business

Disaster Recovery Planning Save Your Business Disaster Recovery Planning Save Your Business Your business at risk! Your company is at risk for failure in the event of disaster Your data is at risk for costly loss Your revenue is at risk with lack

More information

Cloud Attached Storage

Cloud Attached Storage CTERA Appliance Disaster Recovery Guide Cloud Attached Storage June 2013 Version 3.2 1 Introduction This document is intended for CTERA Portal administrators. It describes how to replace CTERA appliances

More information

Digital Fortress DigitaLifeline Business Continuity Services Digital Fortress, Inc. 14080 Nacogdoches Rd Suite 275 San Antonio, TX 78247

Digital Fortress DigitaLifeline Business Continuity Services Digital Fortress, Inc. 14080 Nacogdoches Rd Suite 275 San Antonio, TX 78247 Digital Fortress DigitaLifeline Business Continuity Services Digital Fortress, Inc. 14080 Nacogdoches Rd Suite 275 San Antonio, TX 78247 Phone 866-932-2587 Fax 866-261-3598 Outside of U.S. call 1-210-857-5298

More information

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 1 Introduction As small and mid-sized companies rely more heavily on their computer networks to

More information

Backups and Maintenance

Backups and Maintenance Backups and Maintenance Backups and Maintenance Objectives Learn how to create a backup strategy to suit your needs. Learn how to back up a database. Learn how to restore from a backup. Use the Database

More information

What Are Certificates?

What Are Certificates? The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form

More information

REMOTE OFFICE BACKUP

REMOTE OFFICE BACKUP REMOTE OFFICE BACKUP Remote offices present IT managers with a number of technical challenges. Often businesses use remote offices to expand into either new markets, or into new geographical areas. Many

More information

RAID Utility User Guide. Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card

RAID Utility User Guide. Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card RAID Utility User Guide Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card Contents 3 RAID Utility User Guide 3 The RAID Utility Window 4 Running RAID Utility

More information

RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card.

RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card. RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card. 1 Contents 3 RAID Utility User s Guide 3 Installing the RAID Software 4 Running

More information

Data Integrity: Backups and RAID

Data Integrity: Backups and RAID Data Integrity: Backups and RAID Introduction Keeping your data safe and reliable TM Backups Types of backups Strategy Tools RAID (Redundant Array of Independent Disks) Types of RAID What type to Use Disk

More information

RAID EzAssist Configuration Utility Quick Configuration Guide

RAID EzAssist Configuration Utility Quick Configuration Guide RAID EzAssist Configuration Utility Quick Configuration Guide DB15-000277-00 First Edition 08P5520 Proprietary Rights Notice This document contains proprietary information of LSI Logic Corporation. The

More information

Distribution One Server Requirements

Distribution One Server Requirements Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and

More information

Areas Covered. Chapter 1 Features (Overview/Note) Chapter 2 How to Use WebBIOS. Chapter 3 Installing Global Array Manager (GAM)

Areas Covered. Chapter 1 Features (Overview/Note) Chapter 2 How to Use WebBIOS. Chapter 3 Installing Global Array Manager (GAM) PRIMERGY RX300 S2 Onboard SCSI RAID User s Guide Areas Covered Chapter 1 Features (Overview/Note) This chapter explains the overview of the disk array and features of the SCSI array controller. Chapter

More information

Introduction to Microsoft Small Business Server

Introduction to Microsoft Small Business Server Summary The aim of this article is to present some basic information about Small Business Server 2003 and how it can fit in with your business. Topics What is Small Business Server? (also known as SBS)

More information

Read this guide and you ll discover:

Read this guide and you ll discover: BUSINESS ADVISOR REPORT Provided as an educational service by: Rick Reynolds, General Manager Read this guide and you ll discover: What remote, offsite, or managed backups are, and why EVERY business should

More information

VERY IMPORTANT NOTE! - RAID

VERY IMPORTANT NOTE! - RAID Disk drives are an integral part of any computing system. Disk drives are usually where the operating system and all of an enterprise or individual s data are stored. They are also one of the weakest links

More information

Backup & Disaster Recovery Options

Backup & Disaster Recovery Options Backup & Disaster Recovery Options Since businesses have become more dependent on their internal computing capability, they are increasingly concerned about recovering from equipment failure, human error,

More information

12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service

12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service 12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service If your data is important to your business and you cannot afford

More information

BACKING UP YOUR PC. Ed Schwartz January 2012

BACKING UP YOUR PC. Ed Schwartz January 2012 BACKING UP YOUR PC Ed Schwartz January 2012 Why should you back up? Do you have any data that can t be easily recreated? If you PC crashes do you want to be back online in minutes instead of hours? It

More information

Your guide to choosing an IT support provider

Your guide to choosing an IT support provider Your guide to choosing an IT support provider T: 08452 41 41 55 Contents Introduction 3 IT and business continuity 4 About managed services 5 Modular vs packaged support 6 Checklist of supplier questions

More information

Availability Digest. www.availabilitydigest.com. Backup Is More Than Backing Up May 2009

Availability Digest. www.availabilitydigest.com. Backup Is More Than Backing Up May 2009 the Availability Digest Backup Is More Than Backing Up May 2009 So you think that your corporate data is safe? Your company s data is its lifeblood. Lose it without the chance of recovery, and your company

More information

The Essential Guide for Protecting Your Legal Practice From IT Downtime

The Essential Guide for Protecting Your Legal Practice From IT Downtime The Essential Guide for Protecting Your Legal Practice From IT Downtime www.axcient.com Introduction: Technology in the Legal Practice In the professional services industry, the key deliverable of a project

More information

Intel RAID Controllers

Intel RAID Controllers Intel RAID Controllers Best Practices White Paper April, 2008 Enterprise Platforms and Services Division - Marketing Revision History Date Revision Number April, 2008 1.0 Initial release. Modifications

More information

ZCorum s Ask a Broadband Expert Series:

ZCorum s Ask a Broadband Expert Series: s Ask a Broadband Expert Series: The Advantages of Network Virtualization An Interview with Peter Olivia, Director of Systems Engineering ZCorum 1.800.909.9441 4501 North Point Parkway, Suite 125 Alpharetta,

More information

Sponsored by: Speaker: Brian Madden, Independent Industry Analyst and Blogger

Sponsored by: Speaker: Brian Madden, Independent Industry Analyst and Blogger THIN CLIENT OPTIONS Sponsored by: Speaker: Brian Madden, Independent Industry Analyst and Blogger Brian Madden: Hello. My name is Brian Madden, and welcome to Part 2 of our threepart video series about

More information

Service on ThunderLT with AMI MegaRAID Controller

Service on ThunderLT with AMI MegaRAID Controller Service on ThunderLT with AMI MegaRAID Controller Familiarity with the hardware and software discussed in troubleshooting and repairing this array is found at the end of this document, under the heading

More information

Contents. Introduction. What is the Cloud? How does it work? Types of Cloud Service. Cloud Service Providers. Summary

Contents. Introduction. What is the Cloud? How does it work? Types of Cloud Service. Cloud Service Providers. Summary Contents Introduction What is the Cloud? How does it work? Types of Cloud Service Cloud Service Providers Summary Introduction The CLOUD! It seems to be everywhere these days; you can t get away from it!

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or

More information

Seagate Business Storage 1-Bay, 2-Bay, and 4-Bay NAS User Guide

Seagate Business Storage 1-Bay, 2-Bay, and 4-Bay NAS User Guide Seagate Business Storage 1-Bay, 2-Bay, and 4-Bay NAS User Guide Seagate Business Storage NAS User Guide 2013 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and

More information

Webrecs IT infrastructure. The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you

Webrecs IT infrastructure. The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you Webrecs IT infrastructure The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you Sunday, April 21, 2013 Contents Introduction... 3 Data storage... 3 Data Centres...

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information

Dell DR4000 Disk Backup System. Introduction to the Dell DR4000 Restore Manager A primer for creating and using a Restore Manager USB flash drive

Dell DR4000 Disk Backup System. Introduction to the Dell DR4000 Restore Manager A primer for creating and using a Restore Manager USB flash drive Dell DR4000 Disk Backup System Introduction to the Dell DR4000 Restore Manager A primer for creating and using a Restore Manager USB flash drive Storage Engineering Dell Product Group February 2012 THIS

More information

The 10 Disaster Planning Essentials For A Small Business Network

The 10 Disaster Planning Essentials For A Small Business Network The 10 Disaster Planning Essentials For A Small Business Network If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or

More information

Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service

Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service If your data is important to your business and you cannot afford

More information

16 Common Backup Problems & Mistakes

16 Common Backup Problems & Mistakes 16 Common Backup Problems & Mistakes 1. Tape errors, Tape Drive failures. Probably the number one backup problem is simply caused by the unreliability of tape. Tape drives have a higher failure rate than

More information

Maintenance Best Practices for Adaptec RAID Solutions

Maintenance Best Practices for Adaptec RAID Solutions Maintenance Best Practices for Adaptec RAID Solutions Note: This document is intended to provide insight into the best practices for routine maintenance of Adaptec RAID systems. These maintenance best

More information

Should You Outsource Your Email?

Should You Outsource Your Email? Should You Outsource Your Email? By: Brien M. Posey According to a recent study by Symantec and Gartner (http://www.itworld.com /Webcasts /bytopic/3/index.html), most companies consider email to be a mission

More information

Desktop Solutions SolutioWhitepaper

Desktop Solutions SolutioWhitepaper Author: Mike Herrmann With organizations looking for new ways to cut costs and increase productivity, the use of cloud computing has grown. The most common form of cloud computing is for vendors making

More information

EVault for Data Protection Manager. Course 401 EDPM Troubleshooting Basics

EVault for Data Protection Manager. Course 401 EDPM Troubleshooting Basics EVault for Data Protection Manager Course 401 EDPM Troubleshooting Basics Table of Contents Objectives... 3 Scenario... 3 Level 1 Support Expectations Rules of Engagement... 4 Online Resources... 5 i365

More information

10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning

10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning 10 Things Your Data Center Backup Solution Should Do Reliable, fast and easy backup is only the beginning Table of Contents Ten Things Your Data Center Backup Should Do 1 #1: Reduce Hours Spent on Backup

More information

Technology Solutions That Make Business Sense. The 10 Disaster Planning Essentials For A Small Business Network

Technology Solutions That Make Business Sense. The 10 Disaster Planning Essentials For A Small Business Network Technology Solutions That Make Business Sense. The 10 Disaster Planning Essentials For A Small Business Network If your data is important to your business and you cannot afford to have your operations

More information

USER GUIDE. PageScope Enterprise Suite. Backup and Recovery

USER GUIDE. PageScope Enterprise Suite. Backup and Recovery PageScope Enterprise Suite Backup and Recovery USER GUIDE Date : 07/31/2008 Written by: Tony Gliatta, Vartkes Tashjian and Rob Posenato Location: CEC Lab, HQ Ramsey, NJ Table of Content Chapter 1 PageScope

More information

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Leveraging Virtualization for Disaster Recovery in Your Growing Business Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster

More information

LSI MegaRAID User s Manual

LSI MegaRAID User s Manual LSI MegaRAID User s Manual Q2143 August 2005 Copyright Information No part of this manual, including the products and software described in it,may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Offsite Backup with Fast Recovery

Offsite Backup with Fast Recovery SMALL BUSINESS ESSENTIAL TECHNOLOGY INTRODUCTION Offsite Backup with Fast Recovery How not to be stranded, pulling your hair out, waiting a couple of weeks for your server to be rebuilt. STOP USING TAPE

More information

MaxAttach NAS 4000 Series OS 2.2 Hard Disk Drive Replacement

MaxAttach NAS 4000 Series OS 2.2 Hard Disk Drive Replacement MaxAttach NAS 4000 Series MaxAttach NAS 4000 Series OS 2.2 Hard Disk Drive Replacement DOCUMENT OVERVIEW Who Should Use This Instruction Set This MaxAttach NAS 4000 Series by Maxtor HDD Replacement Instruction

More information

The Best Way to Backup Your Genealogy Files

The Best Way to Backup Your Genealogy Files Barbara J Starmans, PLCGS Richmond Hill, ON, Canada p) 647-401-1519 e) barb@bjstarmans.com Word Count 1700 Keep Your Genealogy Research Safe by Barbara J Starmans It can happen to anyone: a hard drive

More information

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result

More information

Chapter 12 Network Administration and Support

Chapter 12 Network Administration and Support Chapter 12 Network Administration and Support Objectives Manage networked accounts Monitor network performance Protect your servers from data loss Guide to Networking Essentials, Fifth Edition 2 Managing

More information

Debunking Five Myths About Tape Storage. Tech Brief. an Internet.com Tech Brief. 2011, Internet.com, a division of QuinStreet, Inc.

Debunking Five Myths About Tape Storage. Tech Brief. an Internet.com Tech Brief. 2011, Internet.com, a division of QuinStreet, Inc. Debunking Five Myths About Tape Storage Tech Brief an Technological change is part of life, and that s true whether you re in your living room or in the data center at the office. Machines and devices

More information

Key Elements of a Successful Disaster Recovery Strategy: Virtual and Physical by Greg Shields, MS MVP & VMware vexpert

Key Elements of a Successful Disaster Recovery Strategy: Virtual and Physical by Greg Shields, MS MVP & VMware vexpert ebook Key Elements of a Successful Disaster Recovery Strategy: Virtual and Physical by Greg Shields, MS MVP & VMware vexpert Greg Shields MS MVP & VMware vexpert Greg Shields is a Senior Partner with Concentrated

More information

5 Group Policy Management Capabilities You re Missing

5 Group Policy Management Capabilities You re Missing 5 Group Policy Management Capabilities You re Missing Don Jones 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the

More information

High Density RocketRAID 2711 + Rocket EJ220 Device Board Data RAID Installation Guide

High Density RocketRAID 2711 + Rocket EJ220 Device Board Data RAID Installation Guide High Density RocketRAID 2711 + Rocket EJ220 Device Board Data RAID Installation Guide Introduction The HighPoint High Density Storage Solutions hammer down high density storage cost over a single mini-

More information

Symantec Drive Encryption for Windows

Symantec Drive Encryption for Windows Symantec Drive Encryption for Windows Technical Note 10.3 Released January 2014. Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo,

More information

NEC ESMPRO Manager RAID System Management Guide for VMware ESXi 5 or later

NEC ESMPRO Manager RAID System Management Guide for VMware ESXi 5 or later NEC ESMPRO Manager RAID System Management Guide for VMware ESXi 5 or later 856-127900-613-G 7th Edition Jun. 2015 Copyright NEC Corporation 2015. Trademarks NEC EXPRESSBUILDER is trademarks of NEC Corporation.

More information

Intel RAID Volume Recovery Procedures

Intel RAID Volume Recovery Procedures Intel RAID Volume Recovery Procedures Revision 1.0 12/20/01 Revision History Date Revision Number 12/20/01 1.0 Release Modifications Disclaimers Information in this document is provided in connection with

More information

A guide from Chiltern Business Computing Ltd

A guide from Chiltern Business Computing Ltd Backing IT Up A guide from Chiltern Business Computing Ltd Every business depends on its computer systems to some degree or other. For many, systems are vital to business survival and success. This brief

More information

Active Directory Recovery: What It Is, and What It Isn t

Active Directory Recovery: What It Is, and What It Isn t Active Directory Recovery: What It Is, and What It Isn t Abstract Does your Active Directory recovery plan address all of the most common failure scenarios? This white paper explains how to handle each

More information

IT Decisions for Small Business

IT Decisions for Small Business IT Decisions for Small Business The most frequently asked questions and answers By Keith Powell and Chris Brandow, Invision Partners Computing technology has become a necessary business tool, and there

More information

Whitepaper: Cloud Computing for Credit Unions

Whitepaper: Cloud Computing for Credit Unions Whitepaper: Cloud Computing for Credit Unions A new twist on an old strategy MYCU SERVICES December 29, 2011 Authored by: Lingle, Linda Table of Contents Introduction... 2 Cloud Providers... 3 Cloud Components...

More information

C&G FLUX MARKET Internet Safety

C&G FLUX MARKET Internet Safety Internet Safety Introduction Email has become an essential tool for communicating, which is why it is so popular with scammers, cybercriminals, and advertising companies. In order to protect ourselves

More information

AMD SP5100 Dot Hill SATA RAID Users Manual V100

AMD SP5100 Dot Hill SATA RAID Users Manual V100 AMD SP5100 Dot Hill SATA RAID Users Manual V100 1 Table of Contents Section 1 Dot Hill Firmware Overview Firmware Overview Page 3 Firmware Option Rom/Firmware Overview Page 3 Firmware Menus Page 4 Initialize

More information

Storage Technologies for Video Surveillance

Storage Technologies for Video Surveillance The surveillance industry continues to transition from analog to digital. This transition is taking place on two fronts how the images are captured and how they are stored. The way surveillance images

More information

CREATING A BETTER BACKUP PLAN

CREATING A BETTER BACKUP PLAN eguide CREATING A BETTER BACKUP PLAN Copyright 2015 Gallery Systems. All rights reserved. CONTENTS Backing Up is Hard To Do...3 The Front Line of the Backup Plan...4 Holes in the Backup Plan...5 Solving

More information

The 10 Disaster Planning Essentials For A Small Business Network

The 10 Disaster Planning Essentials For A Small Business Network The 10 Disaster Planning Essentials For A Small Business Network If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or

More information

Backup and Recovery Plan For Small Businesses

Backup and Recovery Plan For Small Businesses Backup and Recovery Plan For Small Businesses Disclaimer: This article is intended to serve as an informational reference source. While the information is based on sound principles for backup and recovery,

More information

Data Protection Simple. Compliant. Secure. CONTACT US Call: 020 3397 9026 Email: Support@jms-securedata.co.uk Visit: www.jms-securedata.co.

Data Protection Simple. Compliant. Secure. CONTACT US Call: 020 3397 9026 Email: Support@jms-securedata.co.uk Visit: www.jms-securedata.co. Data Protection Simple. Compliant. Secure CONTACT US Call: 020 3397 9026 Email: Support@jms-securedata.co.uk Visit: www.jms-securedata.co.uk COMPLEX CHALLENGES SIMPLE SOLUTIONS Backups Tricky but necessary

More information

Which Backup Option is Best?

Which Backup Option is Best? Which Backup Option is Best? Which Backup Option is Best? Why Protect Your Data? Data loss disasters happen more frequently than you would think, for many different reasons: Human error and accidental

More information

The Vital IT Protection- V.I.P. Network Support Program Overview Vital Voice & Data 888-558-8855 ext 301

The Vital IT Protection- V.I.P. Network Support Program Overview Vital Voice & Data 888-558-8855 ext 301 The Vital IT Protection- V.I.P. Network Support Program Overview Vital Voice & Data 888-558-8855 ext 301 mlongo@vitalvoiceanddata.com www.vitalvoiceanddata.com Table of Contents Proprietary Notice & Non-Disclosure

More information

Computer Backup Strategies

Computer Backup Strategies Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and

More information

Introducing the Credit Card

Introducing the Credit Card Introducing the Credit Card This program was designed with high school students in mind. It goes over everything you need to know before you get your first credit card so you can manage it wisely.» Key

More information

Data Backup Options for SME s

Data Backup Options for SME s Data Backup Options for SME s As an IT Solutions company, Alchemy are often asked what is the best backup solution? The answer has changed over the years and depends a lot on your situation. We recognize

More information

SCHEDULE A DEMO BACKUP AND RECOVERY. deliver true Business Continuity in one, powerful, integrated system.

SCHEDULE A DEMO BACKUP AND RECOVERY. deliver true Business Continuity in one, powerful, integrated system. deliver true Business Continuity in one, powerful, integrated system. Protect Your Business: instantly restore entire systems, email boxes, databases in minutes Backups Verified: each backup is verified

More information

Making Endpoint Encryption Work in the Real World

Making Endpoint Encryption Work in the Real World Endpoint Data Encryption That Actually Works The Essentials Series Making Endpoint Encryption Work in the Real World sponsored by Ma king Endpoint Encryption Work in the Real World... 1 Th e Key: Policy

More information

All can damage or destroy your company s computers along with the data and applications you rely on to run your business.

All can damage or destroy your company s computers along with the data and applications you rely on to run your business. All can damage or destroy your company s computers along with the data and applications you rely on to run your business. Losing your computers doesn t have to disrupt your business if you take advantage

More information

Designing Apps for Amazon Web Services

Designing Apps for Amazon Web Services Designing Apps for Amazon Web Services Mathias Meyer, GOTO Aarhus 2011 Montag, 10. Oktober 11 Montag, 10. Oktober 11 Me infrastructure code databases @roidrage www.paperplanes.de Montag, 10. Oktober 11

More information

Remote PC Guide Series - Volume 2a

Remote PC Guide Series - Volume 2a Document Version: 2013-03-04 This guide provides hardware model-specific guidance in server configuration, with BIOS and RAID configuration instructions for the Dell R710. This guide is part of a multi-volume

More information

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity task is resuming business critical operations. Having

More information

DF-7506 1-to-2 SATA II RAID Box

DF-7506 1-to-2 SATA II RAID Box DF-7506 1-to-2 SATA II RAID Box Version 1.0 Table of Contents Chapter 1 Product Introduction...3 1.1 Features...3 1.1.1 Shipping Package Content...3 1.2 Front View...4 1.3 Rear View...6 1.4 Disk Drive

More information

InterWorx Clustering Guide. by InterWorx LLC

InterWorx Clustering Guide. by InterWorx LLC InterWorx Clustering Guide by InterWorx LLC Contents 1 What Is Clustering? 3 1.1 What Does Clustering Do? What Doesn t It Do?............................ 3 1.2 Why Cluster?...............................................

More information

CLOUD IN MOTION QUESTIONS EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD. FRANK JACQUETTE, JACQUETTE CONSULTING, INC.

CLOUD IN MOTION QUESTIONS EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD. FRANK JACQUETTE, JACQUETTE CONSULTING, INC. CLOUD IN MOTION QUESTIONS EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD. FRANK JACQUETTE, JACQUETTE CONSULTING, INC. S EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD.

More information

Open Source and License Source Information

Open Source and License Source Information BlackArmor NAS 220 BlackArmor NAS 220 User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks of Seagate

More information

This user guide describes features that are common to most models. Some features may not be available on your computer.

This user guide describes features that are common to most models. Some features may not be available on your computer. RAID User Guide Copyright 2011 Hewlett-Packard Development Company, L.P. Intel is a trademark of Intel Corporation in the U.S. and other countries. Microsoft and Windows are U.S. registered trademarks

More information

RAID Level Descriptions. RAID 0 (Striping)

RAID Level Descriptions. RAID 0 (Striping) RAID Level Descriptions RAID 0 (Striping) Offers low cost and maximum performance, but offers no fault tolerance; a single disk failure results in TOTAL data loss. Businesses use RAID 0 mainly for tasks

More information

How To Back Up Your Computer With A Hard Drive On A Usb Or Usb 2 (For Small Businesses)

How To Back Up Your Computer With A Hard Drive On A Usb Or Usb 2 (For Small Businesses) The Real Cost of Do-It-Yourself Backups and Why Online Backup is Better This white paper discloses the real costs to a small business for performing proper data backups in-house using portable hard drives,

More information

Perforce Backup Strategy & Disaster Recovery at National Instruments

Perforce Backup Strategy & Disaster Recovery at National Instruments Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir National Instruments Perforce User Conference April 2005-1 - Contents 1. Introduction 2. Development Environment 3. Architecture

More information

NSS Volume Data Recovery

NSS Volume Data Recovery NSS Volume Data Recovery Preliminary Document September 8, 2010 Version 1.0 Copyright 2000-2010 Portlock Corporation Copyright 2000-2010 Portlock Corporation Page 1 of 20 The Portlock storage management

More information

How to recover a failed Storage Spaces

How to recover a failed Storage Spaces www.storage-spaces-recovery.com How to recover a failed Storage Spaces ReclaiMe Storage Spaces Recovery User Manual 2013 www.storage-spaces-recovery.com Contents Overview... 4 Storage Spaces concepts and

More information

2» 10» 18» 26» PD3 34 00 42»

2» 10» 18» 26» PD3 34 00 42» » STARDOM Safe Capsule Series User Manual... 2» STARDOM Safe Capsule Serie Bedienungsanleitung... 10» Série STARDOM Safe Capsule Manuel de l utilisateur... 18 26 PD3500 34» Manual de usuario de STARDOM

More information

How to Plan for Disaster Recovery

How to Plan for Disaster Recovery ImproMed LLC How to Plan for Disaster Recovery Revised January 27, 2015 2015 ImproMed, LLC. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

BlackArmor NAS 440/420 User Guide

BlackArmor NAS 440/420 User Guide BlackArmor NAS 440/420 User Guide BlackArmor NAS 440/420 User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered

More information

Mike: Alright welcome to episode three of Server Talk, I m here with Alexey. I m Mike. Alexey, how are things been going, man?

Mike: Alright welcome to episode three of Server Talk, I m here with Alexey. I m Mike. Alexey, how are things been going, man? Mike: Alright welcome to episode three of Server Talk, I m here with Alexey. I m Mike. Alexey, how are things been going, man? Alexey: They re doing pretty good. Yeah, I don t know, we ve launched two

More information

How To Restore A Server From Backup To Backup

How To Restore A Server From Backup To Backup H Catalyst ivault Backup System Details and Pricing Model Catalyst ivault Backup System Catalyst Network Solutions Official Document Catalyst ivault Secure Backup System Details and Pricing 1 of 11 Revision

More information

data recovery specialists

data recovery specialists data recovery specialists Last year we helped thousands of clients to recover data from media including hard disk drives, RAID, USB drives, tapes and even mobile phones. This is why clients such as MITIE,

More information

Countering and reducing ICT security risks 1. Physical and environmental risks

Countering and reducing ICT security risks 1. Physical and environmental risks Countering and reducing ICT security risks 1. Physical and environmental risks 1. Physical and environmental risks Theft of equipment from staff areas and Theft of equipment from public areas Theft of

More information

How to Keep Your Computer Network Up, Running, and Problem FREE

How to Keep Your Computer Network Up, Running, and Problem FREE How to Keep Your Computer Network Up, Running, and Problem FREE Are you frustrated with on-going computer problems - slow computer, error messages, viruses, spyware, printers not working, applications

More information

Business Virtualization

Business Virtualization Business Virtualization Why should I consider server virtualization? Save money. Often servers are dedicated to just one or two applications. As a result servers in many organizations are only using 15

More information