Watch Your IT Equipment – This Flooding Is No Laughing Matter

The existing bad weather and flooding we’re now seeing is having a remarkable impact on several regions of the United Kingdom. The Environment Agency has issued warnings to companies and individuals across southern England to be ready for more wet climate and flooding in the forthcoming days.

Regaining data from flooding and water harm is not an easy procedure. You may be thinking it’s only a case of permitting the gear to dry out extensively before re-starting it, but in the example of hard disk drives, this is one among the worst ideas imaginable. If water has permeated the HDD then this signifies the water has come connected with all the hdd’s steel surfaces. Now everyone understand that once metal comes into contact with the atmosphere and water it starts to corrode, therefore permitting a damp hard drive to dry out must be averted as this will cause the drive to start corroding, and once this happens there will be little chance of any successful data recovery attempt.

We’ve personally seen several hard drives lately where the harm is caused by flooding as well as water connected events come in to us for recovery. They reached work to save their gear just to find they were very late and a number of these hosts and computers were previously soaked or submerged.

The most important thing regarding a disk that’s been involved in flooding is to permit all extra water to drain from this – just rest it within an upright posture for 20 approximately minutes, then stick it in a sealed air-tight carton. This eliminates all extra water from your hard disc, prevents the hard drive drying out any more and stops any corrosion. It also stabilises the drive’s state and can enable us to recoup the data from this using a means of ours specifically made for handling data recovery problems from hdd which were involved in floods and similar occurrences.

Using Servers As Central Data Stores

IBM logo

For businesses and individuals with large amounts of data, often the simplest way to store and access this data is using some sort of RAID or server setup. When it’s important that multiple individuals have access to a document, the server’s centralised sharing facilities permit many users to get into files and folders at the same time. Most businesses use servers configured in a RAID 0, RAID 1, or RAID 5 arrangement to save their data. A setup like this facilitates good data transfer speeds and frequently a level of data redundancy, when disk drive troubles are encountered. I recently completed a virtual volume setup on a new IBM server installation – details here. It will always be an excellent idea to not rely too heavily on the safety of data on a RAID server. This protection isn’t absolute, even though there is a degree of protection from hard disk drive failure and multiple hard drive crashes will still cause a loss of data.

Often the very first task if your hard drive fails to-do is to look on the net. Type the fault symptoms of the drive and you’ll see that many other people have seen the same problem at some point. You might be lucky and discover a solution to your own problem which one may carry out yourself, or perhaps you find some recommendations about reputable data recovery companies. Please be cautious as often completing the wrong task will utterly destroy any possibility of recovery if you’re trying to recover the important data. If you are considering using a file retrieval company you need to manage to acquire an idea of how capable a business is by reading their reviews.

Once you store important info on the disk drive, you take the possibility of losing that info because hard drives can break for an assortment of various reasons. Losing folders on a hard drive might be tough because you do not know how to proceed to recover your data, if you are not computer-literate. Fortunately, there are businesses that can help you to get that lost data back and this goes for the data I’ve saved on the IBM server I installed above too. These are known as data recovery companies and they can retrieve lost data from virtually any kind of HDD in just about any type of state. Then when you end up in a situation where you’ve lost valuable folders you definitely should not assume this missing data can not be retrieved.

Whenever there exists some type of data loss, data recovery services are required. When the lost data isn’t of any value then there is not much purpose in using a data recovery specialist. When the lost data is precious and is required a specialist supplying data recovery services can be contacted who can be able to recover the missing data. These experts specialise in fixing broken hard disk drives and recovering the files and folders from them. Of course, when the information you might have is backed up somewhere this minimises the possibility of data loss and also the requirement to work with a data recovery support company. Ideally though, if you are having problems it’s a good idea to call me first !

Useful post re SSD and budgeting

For those of who feel the sometimes overwhelming expectations to keep our IT infrastructures up to date and current comes this useful report about SSD’s. Now I know that many staff keep asking us to install them on their systems – it think they think that having one makes them look flash? So, finding the above report suggests to me that SSD’s are not the next big thing and perhaps (knowing the amount of data that some of our staff keep) we’d be better sticking to HDD technology.

The one big thing about HDD hard disk drives is that they’re cheaper than SSDs as we all know. But now we wont have to argue on cost basis alone – we now have storage capacity on our side and the industry belief that SSD is just for high end systems.

Of course, we also all know how to use HDDs so there won’t be any retraining options either.

A footnote is that I’ll be at the UK LEA conference on Friday so if anyone has any questions on this please ask me then.

Another footnote: I’ve added a new category called ‘LEA authority’ to my posts from here on in – it should make it easier to sort through posts.

RAID 5 Data Solutions

For those of you thinking about using a RAID server system to store school / college data here’s an article I just found. Best, Jan.

For most of companies of all sizes, access and data storage is quite critical for the progress of the organization. Each year, the number of data being processed by companies is greatly growing making it more and more crucial to have systems set up to manage those data loads. A Redundant Array of Independent Disks (RAID) is a perfect option for several businesses that process lots of data and data, however there are lots of kinds of RAID to select from. This article will concentrate on the uses and advantages of RAID 5, and can also highlight possible scenarios for failure.

What’s RAID?
Essentially a RAID is really a software and hardware system which enables computer data to be written to multiple hard-drives.

The most typical terms used for every degree’s perform are “striping” and “mirroring”, with both executing different capabilities. Striping however is the purpose of creating one file to multiple hard-drives in little bits. In case you had 2 drives within the array, a file could be created for both drives and split in two. This allows for extremely fast write speed, however in its fundamental form doesn’t provide protection against redundancy.

What’s RAID 5?
This special kind uses striping to enhance read operation but also provides redundancy and fault-tolerance in the event of the disk failure. This is accomplished with parity data stored across the disks within the array; if one disc fails it can be reconstructed with the data stored in the other-devices. A RAID 5 system will optimize using storage space, since there isn’t any big number of data reflected across multiple devices, which has significant advantages.

Benefits Of RAID 5 For A School / College
1) Quick read speed
2) Protection against disk failure

The quick read speed makes this technique perfect for data archiving methods and any business place that accesses particular info on a quite regular basis. Nevertheless, write speed because the additional parity data must be created, is decreased when compared with other RAIDs also because the data. Nevertheless, you really need to be mindful of potential system failures.

RAID 5 Failures
The machine switches into a crucial mode where writing and reading remains achievable, but in a greatly diminished rate if one drive in the array fails then. It is rather crucial that prompt action is taken to reconstruct the array and replace a drive. If more than one drive within the array should fail failure to fix the system could result in damaging problems. At that phase you’d be looking at considerable costs in an attempt to regain a number of the data, with-there being potential for loss of data. It is significant to notice that while RAID 5 does supply a particular degree of redundancy it’s no replacement for back-up systems. For failures on these type of system it’s necessary to get outside assistance as our internal IT people don’t want to touch these. Recommended link here.

Then RAID 5 is likely among the top options and also the speed of having the ability to get that data is crucial to the progress of the business if your own business processes lots of data you’ll be able to choose. It’s some degree of built-in protection as explained above, and you’ll find a considerable rise in the pace at which information can be accessed by your systems.

Data Security and Privacy

Following on from my mention of the dom-i-nate web site I’ve found another new one that looks like it may have interesting comment and analysis on all matters data security and privacy related. Its, and although there’s only been 1 post so far, it’s about CCTV and DVR video technology and suveillance. It’s suggesting that in this day and age it’s more and more difficult to do anything in a public place without it being recorded (and monitored?) somewhere. Infact we all know that what we type and send across the internet gets intercepted and trawled for various keywords and phrases that might suggest a terror plot of some sort. Just by typing in words like assassinate and bomb increase the possibilities of a post like this being red flagged and interrogated further… So hello to everyone at the NSA and GCHQ who may be reading this.


Data PrivacyHere’s an up to date web site that takes a look at the erosion of personal privacy:

With all the fall out from the Edward Snowden affair it seems that our personal data is far from personal. Infact, I’d be willing to bet that the internet airwaves are being monitored for appearances of the name “Edward Snowden” by security forces around the world…. So if you’re a security service employee and you’re reading this now – Hello There !

In today’s world of e-crime I suggest that we no longer know who the bad guys are. Be careful what you put out on the net… And as for cloud based services, why would you ever use them?

Here’s an interesting article from the same site discussing what Snowden did and his motives for doing them: