IT ServicesDisaster Recovery

Data Failure

Picture this scenario

You walk into work one morning and your server installation has been corrupted and/or none of your computers will boot.

Imagine you walk into work one morning and your server has actually caught fire.

All of your data is gone. Are you prepared?

Backup Management

Backups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required.

EMC-300x173Though backups popularly represent a simple form of disaster recovery, and should be part of a disaster recovery plan, by themselves, backups should not alone be considered disaster recovery. One reason for this is that not all backup systems or backup applications are able to reconstitute a computer system or other complex configurations such as a computer cluster, active directory servers, or a database server, by restoring only data from a backup.

Since a backup system contains at least one copy of all data worth saving, the data storage requirements can be significant. Organizing this storage space and managing the backup process can be complicated undertaking. A data repository model can be used to provide structure to the storage. Nowadays, there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.

Before data is sent to its storage location, it is selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Every backup scheme should include dry runs that validate the reliability of the data being backed up. It is important to recognize the limitations and human factors involved in any backup scheme.

Before one of these scenarios happen to you, allow us to come into your establishment and help you get the best redundant system for your business and budget so you do not have to worry about these scenarios and you can have peace of mind every night when you’re not at the office that your data will be there for years to come.

We are a proud user of and recommend EMC products to our customers.

We are a proud user of and recommend EMC products to our customers.