Posts Tagged ‘Data Recovery’ Announces Partnership With Acer America

March 12th, 2013 Comments off, a subdivision of the ACE Data Group, LLC announced that they have entered into a partnership with Acer America. The partnership allows all Acer support agents to recommend Data Recovery Services for any media recovery needs their customers may have. This includes drives that are under warranty or out of warranty. It adds a new breadth of services previously unavailable to Acer customers. This will greatly increase the level of overall Acer customer satisfaction and loyalty.

As the authority in the recovery industry, has provided reliable and cost effective solutions serving a global market for over 30 years. Their state-of-the-art facilities are staffed with the finest personnel from engineering to customer service.’ in-house team of Research & Development engineers design and build cutting-edge hardware and software that allows them to recover any types of files from any storage media no matter what the cause of the failure is. By partnering with Data Recovery Services, Acer is now well positioned to offer all-inclusive data recovery services for its entire product line.

Acer has been making high quality products since 1976 and is ranked by Gartner as number 2 for notebook PCs globally. This type of robust mobile technology is allowing customers to store more and more of their critical data on these devices every day. Due to their portable nature mobile PCs become exposed to different environmental factors such as heat, water, and dust, making laptop and notebook computers far more susceptible to data loss than their desktop counterparts.

"Our goal is to continue to forge these significant relationships with the top hardware manufacturers. Acer is a major player in the PC industry and this partnership shows their commitment to continually improving their customers’ experience and providing them the best products and services available." ACE Data Group CEO, Charles Walker, considers the partnership with Acer as a major step in the overall company strategy for the future. is part of ACE Data Group LLC, provider of computer forensic and data recovery services to customers all over the world. Since 1981 Data Recovery Services work with any type of media including HDD, SSD, RAID, SAN, NAS, flash drives, and tapes.


General Data-Loss Prevention Tips

July 17th, 2012 Comments off

data-loss The cost of a data loss event is directly related to the value of the data and the length of time that it is needed, but unavailable. Consider:

  • The cost of continuing without the data
  • The cost of recreating the data
  • The cost of notifying users in the event of a compromise

General Data-Loss Prevention Tips

Software and Hardware

  • Document your systems and archive original copies of your software in a safe place.
  • Backup your files on a regular basis, then test and verify that your backup is a complete copy of the original. External drives are an excellent choice for this task.
  • Never upgrade software or hardware without a complete, verified backup available in case you need to restore data.
  • If you are using Microsoft Windows XP, establish System Restore Points before making any significant changes to your system.
  • Write a contingency plan and practice restoring your data in case of problems. Your contingency plan should require, as a minimum:
    • Locating all available backups, including dates and types of backup.
    • Listing and locating all original software packages, detailing updates since the original installation.
    • Locating and making ready an alternate computer.
  • Deploy firewalls and virus protection.
  • Delete unused files and applications. Use a disc defragmenter, which is a program that is usually part of the operating system utilities.


  1. Ensure proper environmental conditions (stable temperature, humidity and cleanliness) and proper handling to avoid static discharge and accidental dropping.
  2. Physically secure systems from intruders.
  3. Prepare for physical disasters, including use of off-site storage for backup.

The following sections describe types of data recovery and supported formats and manufacturers. RAID data recovery, digital photo recovery, and VMWare workstation data loss are covered in separate articles under “Related Links.”

Laptop Data Recovery

As they are often carried about and exposed to different environmental factors such as heat, water and dust, laptop and notebook computers are far more likely to experience data loss than their office desktop counterparts. Their portability makes these sophisticated and essential in-the-field devices prime candidates for data loss.

Mechanical and electrical failure, software corruption and human error all play a role in data loss. Here are some of the most often noted data loss symptoms and data accessibility problems:

  • Dropped notebook – no longer turns on
  • Inaccessible drives and partitions
  • Applications that are unable to run or load data
  • Corrupted data
  • Virus attacks
  • Hard disk component failure
  • Hard disk crashes
  • Damage due to fire or liquids
  • Media surface contamination and damage
  • Accidental reformatting of partitions
  • Accidental deletion of data

Laptop Disk Drives Supported
You may not know this, but the hard disk drive embedded in your laptop is not necessarily by the same manufacturer as the laptop. Seagate Recovery Services recovers data from all notebook and laptop brands, models and interfaces – that is, from all types of hard disk drives from all manufacturers including Western Digital, Seagate, Toshiba, Fujitsu, Hitachi and Samsung.

Database Recovery

Mission-critical data is often stored in SQL Server, Oracle, Sybase, Exchange Server, Access and other databases that are maintained on networked fileservers. Relational and object-oriented database management technologies are fundamental to modern IT systems, often underpinning the lifeblood applications run by the entire corporation.

Individual media in database servers suffer from the same failure points as disk drives in personal computers and workstations. Experienced system administrators and database administrators know that a relational or object-oriented database environment is fragile unless supported by a comprehensive and well-tested backup plan.

Unfortunately, it is all too common for devices to become corrupt beyond the scope of routine recovery methods:

  • Backup files not recognizable by database engine
  • Database locked as ‘suspect’ preventing access
  • Deleted or dropped tables
  • Accidentally deleted records
  • Corrupted database files and devices
  • Damaged individual data pages
  • Accidentally overwritten database files and devices

Seagate Recovery Services specializes in making inaccessible data accessible again, recovering data from the most complex database configurations.

Database Types Supported

  • Microsoft SQL Server 6.5, 7.0, 2000, 2005, 2008
  • Oracle Lite, 8.x & 9.x, 10x, 11x
  • Sybase SQL Server
  • Sybase SQL Anywhere
  • Interbase
  • MySQL
  • PostgreSQL Standard Databases
  • Microsoft Access

SRS can also make inaccessible data accessible again for all xbase products such as dBase, FoxPro Productivity Applications Microsoft Office (including all versions of Word, Excel and Powerpoint Mail Server and Client Applications), Microsoft Exchange and Outlook Applications, and email systems conforming to the UNIX mbox format, such as Eudora and Netscape.

Server Data Recovery

Fileservers, application servers, mail servers, web servers, NAS devices and custom-built servers form the backbone of corporations’ business records storage systems. Windows servers–the most popular operating systems for servers today–along with Apple OSX, Solaris, HPUX, IAX, and Linux servers, form a significant portion of servers in businesses.

Naturally, the individual media in servers suffer from the same failure points as do drives in personal computers and workstations. However, the increased complexity of many server operating systems results in additional data loss situations:

  • Server registry configuration lost
  • Intermittent drive failure resulting in configuration corruption
  • Multiple drive failure
  • Accidental replacement of media components

Because servers are often utilized for mission-critical operations, customers need to get their data back quickly and securely. SRS services includes options for on-site data recovery, critical 24/7 options, as well as remote data recovery and special options.

Operating Systems and Platforms Supported
SRS technicians are trained on platform-specific configurations, enabling us to recover data from server hardware spanning the most popular brands, such as IBM, Dell, Hewlett-Packard, Sun and others, including:

  • Intel-based platforms for UNIX Operating systems including
    • Solaris, Linux with ext 2,3,4, xfs, reiserfs & jfs filesystems on standalone & RAID volumes in LVM (Logic Volume Management) configuration or without it
    • BSD-based systems such as FreeBSD, OpenBSD and NetBSD, BSDI
    • Apple Mac OSX
    • Legacy OS like QNX, SCO OpenServer, Xenix, UnixWare, LynxOS and so on
  • Intel-based platforms for Non-Unix Operating systems including:
    • Windows NT, 2000, 2003, 2008 servers
  • UNIX and non-UNIX Platforms such as
    • Solaris on Sun/SPARC equipment, with ufs and Veritas VxFS .zfs filesystems
    • HPUX on Hewlett-Packard workstations with hfs and Veritas
    • VxFS file systems on standalone
    • IRIX on SGI workstations with efs and xfs filesystems
    • Legacy VMS & OpenVMS running on Compaq & DEC equipment using ODS file systems
    • AIX on IBM RS/6000 with jfs file systems on LVM volumes

Tape Data Recovery

Server and personal-computer tape backup systems utilizing mm DAT, Travan, Exabyte 8mm, LTO and the various QIC formats are popular and necessary to safeguard your data. However, when these tapes fail, the situation is normally catastrophic, as these tapes were often the only remaining repository of the data. Quite often customers may no longer posses original tape hardware or software to restore from legacy environments.

Fire, smoke, water and even dropping the tape cartridge may damage the media, resulting in data loss. Internal mechanism failure and exposure to extreme temperatures, as well as logical read/write errors on a tape’s file may also result in data loss. Due to the nature of the tape solution, they are designed to withstand time to store archives. Some media if stored incorrectly or stored longer than the life span of the media may degrade causing data loss.

Here are some typical causes of tape failure:

  • Tape drive failure has corrupted tape headers
  • Tape media stretched or snapped
  • Fire & water damage Media surface contamination and damage
  • Accidental reformatting or erasure of tape
  • Accidental overwriting of headers
  • Tape backup software corruption
  • Media degradation due to the age or improper storage
  • Legacy tapes where tape drive or software no longer available

Formats and Manufacturers Supported
Popular backup software–such as EMC, Networker, CA BrightStore (ArcServe) plus the UNIX tar and cpio utilities (and many more)–all use different internal formats. SRS programmers are expertly trained to understand and extract data any type of tape media, regardless of format. SRS recovers data from these tape media formats and manufacturers, among others:

  • DLT III, DLT IV, DLT-1, VS80, VS160 and Super DLT tape
  • LTO 1, 2 , 3, 4, 5
  • 4mm DAT format DDS, DDS-2, DDS-3 and DDS- DAT-72, DAT-160, DAT-320
  • Exabyte 8mm 112m and 160m tapes & Mammoth 1 (Exabyte 8900), Mammoth 2
  • Sony IT and AIT-2, AIT-3 AIT-4, AIT-5 and SAIT
  • Travan TR-1, TR-3, TR-4 and TR-5 tapes
  • QIC tapes
  • QIC Mini-Cartridges
  • Tandberg SLR tapes
  • ADR and ADR2 tapes
  • 9 track 800/1600/6250 bpi
  • Next track
  • IBM 3480/3490/3592 tapes

Tape Backup and File Formats

  • Microsoft Tape Format (MTF) applications such as NT Backup and Symantec (Seagate/Veritas), BackupExec for Window, Backup Exec for NetWare
  • System Independent Data Format (SIDF) applications such as Novell’s Sbackup and Palindrome’s Backup Director
  • IBM Tivoli TSM
  • Computer Associates, Brightstore (Arcserve)
  • Previos/Stac Replica Backup for NT, NetWare
  • EMC (Legato) NetWorker (all platforms)
  • Symantec (Veritas) NetBackup, unix tar, cpio, fbackup, fsdump and ufsdump archives
  • Compaq/DEC VMS Backup
  • Commvault Galaxy/Simpana

For more information, please go to Seagate Recovery Services

Data Loss Risk Will Grow in 2012

January 5th, 2012 Comments off

“70% of businesses that suffer a major data loss are out of business within 18 months” – DTI

Data recovery and security need to become priorities but there are still significant risks that are largely being ignored.

Writing for Forbes, Kevin West, chief executive officer of Klogix, suggested that data loss is reaching levels so high and costing companies so much that it could start to impact the economy.

While he cites the US as an example, the importance of intellectual property protection and adequate security training are the same for businesses around the world.

Untrustworthy offshore outsourcers, malicious cyber attacks from organisations and governments, a lack of training and the rise of Bring Your Own Policies at work will all make the risk of data loss grow in 2012.

Data Loss,Data recovery,Data Security

Causes of Data Loss: Hardware Failure,Human Errors,Virus Attack,Software Malfunction, Natural Disaster and Power Crisis…

“There is little formal training offered in the subject of cyber security. As a result we rely on self-taught hackers to fill these jobs, people who choose to use their talents to do good work with corporations, but could just as easily turn to cyber crime,” Mr West added, warning that without investment in training, the issue could get worse.

This view was echoed by Mark Dampster Centre for Cyber Security who warned that the cost of data loss is “vast”.

Is your data asset getting out of sight? Kroll Ontrack has a complete data management solution to ensure your data availability from production to archiving.

Posted by Edward Clark on

Data Backup Glossary (Letter D)

July 27th, 2011 Comments off

Dark archive
A data archive that cannot be accessed by any user. Access to the data is either limited to a set of few individuals or completely restricted to all. The purpose of a dark archive is to function as a repository for information that can be used as a failsafe during disaster recovery.

Data at rest
All data in storage excluding any data that frequently traverses the network or that resides in temporary memory. Data at rest includes, but is not limited to, archived data; data which is not accessed or changed frequently; files stored on hard drives; USB thumb drives; files stored on backup tape and disks; and files stored offsite or on a storage area network (SAN).

Data at rest protection
Security protection measures such as password protection, data encryption, or a combination of both that protect data at rest from hackers and other malicious threats. The measures prevent this data from being accessed, modified, or stolen.

A system intended to organize, store, and retrieve large amounts of data easily. It consists of an organized collection of data for one or more uses, typically in digital form.

Data center
A facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (for example, air conditioning or fire suppression), and security devices.

Data center tiers
A four-tier system that provides a simple and effective means for identifying different data center site infrastructure design topologies. The Uptime Institute’s tiered classification system is an industry standard approach to site infrastructure functionality that addresses common benchmarking standard needs. The four tiers, as classified by The Uptime Institute, include the following:

  • Tier I: Composed of a single path for power and cooling distribution, without redundant components, providing 99.671 percent availability.
  • Tier II: Composed of a single path for power and cooling distribution, with redundant components, providing 99.741 percent availability.
  • Tier III: Composed of multiple active power and cooling distribution paths, but only one path active, has redundant components, and is concurrently maintainable, providing 99.982 percent availability.
  • Tier IV: Composed of multiple active power and cooling distribution paths, has redundant components, and is fault tolerant, providing 99.995 percent availability.

Data cleansing
Also referred to as data scrubbing, the act of detecting and removing and/or correcting a database’s dirty data (data that is incorrect, out-of-date, redundant, incomplete, or formatted incorrectly). The goal of data cleansing is not just to clean up the data in a database, but also to bring consistency to different sets of data that have been merged from separate databases. Sophisticated software applications are available to clean a database’s data using algorithms, rules, and look-up tables. This task was once done manually and was therefore still subject to human error.

  • In a RAID system, the act of correcting parity bit errors so that drives remain synchronized.

Data deduplication
The elimination of redundant data. In the deduplication process, duplicate data is deleted, leaving only one copy of the data to be stored. However, indexing of all data is still retained should that data ever be required. Deduplication reduces the required storage capacity since only the unique data is stored.

Data dictionary
In database management systems, a file that defines the basic organization of a database. A data dictionary contains a list of all files in the database, the number of records in each file, and the names and types of each field. Most database management systems keep the data dictionary hidden from users to prevent them from accidentally destroying its contents. Data dictionaries do not contain any actual data from the database, only book keeping information for managing it. Without a data dictionary, however, a database management system cannot access data from the database.

Data infrastructure hygiene
Practices that promote or preserve the shape of an entire data infrastructure (for example, network, servers, databases, storage, and software). These practices include any activity that reduces the stress of information growth on the data infrastructure and enables the efficient access, movement, and protection of data while reducing overall infrastructure and maintenance costs. Such practices include active archiving of relational databases, e-mail archiving, and document archiving.

Data mirroring
The act of copying data from one location to a storage device in real time. Because the data is copied in real time, the information stored from the original location is always an exact copy of the data from the production device. Data mirroring is useful in the speedy recovery of critical data after a disaster. Data mirroring can be implemented locally or offsite at a completely different location.

Data protection
Assurance that data is not corrupted, is accessible for authorized purposes only, and is in compliance with applicable requirements.

Data recovery
The salvaging of data stored on damaged media, such as magnetic disks and tapes. Many software products help recover data damaged by a disk crash or virus. In addition, many companies specialize in data recovery. Although not all data is recoverable, data recovery specialists can often restore a surprisingly high percentage of the data on damaged media.

Data retention policy
The policy of persistent data and records management for meeting legal and business data archival requirements. A data retention policy weighs legal and privacy concerns against economics and need to know concerns to determine retention time, archival rules, data formats, and the permissible means of storage, access, and encryption.

Data space transfer protocol
Data space transfer protocol (DSTP) is a protocol used to index and categorize data using an XML -based catalogue. Data, no matter how it is stored, has corresponding XML files which contain UCK (universal correlation key) tags that act as identification keys. Data is retrieved when a user connects to DSTP servers with a DSTP client and asks for specific information. Data is found and retrieved based on the labels contained in the UCK tags.

Data vaulting
The process of sending data from its primary source, where it can be protected from hardware failures, theft, and other threats. Several companies now provide web backup services that compress, encrypt, and periodically transmit a customer’s data to a remote vault. In most cases the vaults will feature auxiliary power supplies, powerful computers, and manned security.


  • Acronym for disk-based data protection, where a disk or RAID system is used as a data backup and archival system in place of tape.
  • Acronym for distributed data protection, a managed (or hosted) service that provides customers with online, scheduled, automated computer system data backup and self-serve restoration.
  • Acronym for development data platform, a web-based platform for data analysis, presentation, and dissemination.
  • Acronym for distributed data processing, a data processing network in which some functions are performed in different places on different computers and are connected by transmission facilities.

Delta Backup
The backup of all data files that have been modified since the last incremental backup or archival backup. Also known as differential incremental backup.

Patented EVault technology that performs delta backup and compresses the data before sending it over the wire.

Digital asset management
Digital asset management (DAM) is a system that creates a centralized repository for digital files that allows the content to be archived, searched, and retrieved. The digital content is stored in databases called asset repositories. Metadata—such as photo captions, article key words, advertiser names, contact names, file names, or low-resolution thumbnail images—is stored in separate databases called media catalogs and points to the original items. Digital asset management also is known as enterprise digital asset management, media asset management, or digital asset warehousing.

Digital footprint
The trail, traces, or “footprints” that people leave online. A digital footprint includes information transmitted online, such as forum registration, e-mails and attachments, uploaded videos or digital images, and any other form of transmission of information. All of this activity leaves traces of personal information about yourself that is available to others online.

Direct access file system
Direct access file system (DAFS) is a file-access sharing protocol that uses memory-to-memory interconnect architectures, such as VI and InfiniBand. DAFS is designed for storage area networks (SANs) to provide bulk data transfer directly between the application buffers of two machines without having to packetize the data. With DAFS, an application can transfer data to and from application buffers without using the operating system, which frees up the processor and operating system for other processes and allows files to be accessed by servers using several different operating systems.

Direct-attached storage
Direct-attached storage (DAS) is non-networked storage in which the hardware is connected to an individual server. Although more than one server can be present, storage for each server is managed separately and cannot be shared.

Disaster recovery
The process, policies, and procedures related to preparing for the recovery or continuation of a business-critical technology infrastructure after a natural or human-induced disaster. Disaster recovery is a subset of business continuity. While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions.

Disaster recovery plan
A plan for business continuity in the event of a disaster that destroys part or all of a business’s resources, including IT equipment, data records, and the physical space of an organization. The goal of a disaster recovery plan is to resume normal computing capabilities in as little time as possible. A typical disaster recovery plan has several stages:

    1. Understanding an organization’s activities and how all of its resources are interconnected
    2. Assessing an organization’s vulnerability in all areas, including operating procedures, physical space and equipment, data integrity, and contingency planning
    3. Understanding how all levels of the organization would be affected in the event of a disaster
    4. Developing a short-term recovery plan
    5. Developing a long-term recovery plan, including how to return to normal business operations and prioritizing the order of functions that are resumed
    6. Testing and consistently maintaining and updating the plan as the business changes A key to a successful disaster recovery plan is taking steps to prevent the likelihood of disasters from occurring, such as using a hot site or cold site to back up data archives.

Disk array
A linked group of one or more physical independent hard disk drives generally used to replace larger, single disk drive systems. The most common disk arrays are in daisy chain configuration or implement RAID (Redundant Array of Independent Disks) technology. A disk array may contain several disk drive trays and is structured to improve speed and increase protection against loss of data. Disk arrays organize their data storage into Logical Units (LUs), which appear as linear block paces to their clients. Disk arrays are an integral part of high-performance storage systems.

Disk-to-disk (D2D) is a type of data storage backup in which the data is copied from one disk (typically a hard disk) to another disk (such as another hard disk or other disk storage medium). In a D2D system, the disk that the data is being copied from typically is referred to as the primary disk and the disk that the data is copied to typically is called the secondary or backup disk.

Disk-to-disk-to-tape (D2D2T) is a type of data storage backup in which data is first backed up on a disk system, but then is spooled to a tape or an optical storage system. A D2D2T backup system can help eliminate data loss issues due to tape drive or tape failure. In a D2D2T system, a copy of the data is kept onsite for faster retrieval and tape copies are kept offsite for disaster recovery purposes. D2D2T devices may be appliances, virtual tape, or disk libraries.

Disk-to-tape (D2T) is a type of data storage backup in which the data is copied from a disk (typically a hard disk) to a magnetic tape. D2T systems are used widely in enterprises that require the safe storage of vital information in the case of disaster recovery.

How to Make Use of the Internet for Effective Data Recovery

June 28th, 2011 Comments off

backupIf you’ve been reading HD Doctor for some time now you would have come across an article or two on how important backing up your data regularly is and how to do it. I have once played with backing up important data on my computer before and I had to pay dearly for it, I have now learned my lessons and I’ll be talking about that in this post.

It is also very important for you to realize that you shouldn’t just depend on backing up your files on a DVD or an external hard disk, because even though these are great options a place more secure for you to backup your files is the internet and this article will be talking about how to make use of the internet to backup your files.

The Importance of Online Backup
Before I go into how to back up your data online I’ll first be explaining some of the major reasons why you need to consider backing up your files online below.

It is Secure: The number one reason why I prefer to be backing up my files online compared to backing it up on external devices is because it is secure. You can easily worry about your CD being infected by a virus or about anything going wrong with your hard disk but with online backup you don’t have to worry about any external drive corrupting – it is the most secure form of backup system I have seen.

It is Free: The next great thing about online backup is that it is free. There are various online backup services and most of them give you gigabytes of disk space which is enough to store your basic and most important files. If you need more space you can easily go for a premium package. This isn’t the case with online backup also because you don’t have to buy anything. Just set up the right software on your computer and you’re ready to go.

It is Reliable: Online backup systems can be trusted and relied upon in hard times. You don’t have to worry about disks getting lost or files suddenly getting erased. The only thing you need is a strong password you can easily remember and you’re good to go.

It is Flexible: The major thing I love the most about online backup systems is the flexibility it has. There are thousands of backup service providers fighting for your attention and you can easily choose your favorite and the one you think is best for you.

Top Online Backup Services
Once you’ve made up your mind to start backing up your files online there are a few services that can help you get started. Two of my favorite and most used services are listed below:

1. Dropbox: I personally use dropbox and I trust and recommend it. All you need to do is create a free account and you will be allotted a 2.5GB disk space for you to store anything and you can easily earn more space by referring others. You only need to install the dropbox software that will create a folder on your computer. You can easily copy any file you want to backup to your dropbox online account to this folder and it will be transferred there instantly.

2. Mozy Backup: Mozy backup is also another great option and even though it isn’t as popular and sophisticated as dropbox it is also a great option. All you need to do is create an account and install the mozy client – with this you can easily backup your files anytime and also schedule it to backup anytime you want.

This guest post is written by Paul who helps you choose the best Comcast cable internet