DATARECOVERYUNION.COM

The New Movement Of Data Recovery

data recovery From a Global Monthly Search Volume by Google: computer repair 823,000; data recovery, 2,240,000; file recovery, 673,000; recovery software, 368,000; disaster recovery, 301,000.  We can obviously see there are more and more people reverting their attention to data recovery field.

Above numbers of statistics are still increasing and such numbers bring a prosperous employment and development to IT industry. Especially under the pressure of financial crisis, many IT companies are adding some new services of Data recovery. Therefore, many new data recovery companies are set up and even many personal IT engineers are looking for data recovery training to be a qualified data recovery engineer.

This is a great, increasing and potential market full of competition! So, what is the new movement of big data recovery companies?

The new movement of Data recovery Services providers

These companies are mainly providing data recovery services to personal computer users, data related companies, institutes, educational centers, police and even government, depending on their marketing network and skills level. Such data recovery companies usually have many offices in different cities of different countries. They are now managing to provide a wider range of data related services, such as Hard Drive Recovery, Laptop Recovery, Desktop Recovery, Server Recovery, RAID Recovery, Tape Recovery, Mobile Device Recovery and other types of recovery services. These companies are also buying and taking advantages of more of the current best data recovery tools from different manufacturers. These tools contain data recovery software, data recovery equipment (usually hardware and software complex tools) and data recovery hardware. More tools and more services need a big market to digest and then they are taking some measures to expand themselves. For example, on April 13th, Stellar Acquired RSE Data Recovery Services B.V..  “We are delighted about this acquisition, which will further pave the way for our growth in the European market. Stellar would now also be able to serve its MNC customers with European presence more effectively. This acquisition offers us an excellent opportunity to tap into the knowledge and experience of RSE Data Recovery and springboard our growth plans.” informed Sunil Chandna, CEO, Stellar Information Systems Ltd.

“We have been offering data recovery services to European customers for over 10 years. We will be bringing in invaluable market knowledge and expertise. This acquisition will be invaluable to the development & growth of Stellar and will bring in lot of value to the customers of both the companies,” commented Ernst Eder, COO, RSE Data Recovery Services. However, these expansions don’t mean there’s no space for small and middle sized data recovery services providers, big companies charge usually much higher and many end users can not afford to it.

So only if you can provide professional data recovery services with professional data recovery equipment and you are able to have a seat in this great market.

The new movement of Data recovery tools manufacturers

According to a search in Google and other data recovery forums, we can find out some good data recovery equipment providers like ACE laboratory, SalvationDATA, Atola, Stellar Data recovery, Ontrack Data recovery, X-ways software, DeepSpar, etc. Among them, ACE and SalvationDATA are manufacturing some familiar tools for firmware repair and Data extraction, Atola as well. Their tools are usually data recovery equipment mentioned above, hardware and software complex tools. There’s one tool called HD HPE PRO other manufacturers don’t have provided by SalvationDATA to disassemble the disks(Supporting 2.5″ and 3.5″) and remove heads or multiple platters. Other manufacturers are mainly providing data recovery software.

These manufacturers are now working hard to compete and survive with their own advantages. They are now managing to add more disk manufacturers, disk models, more medias supported and more failures to handle, Like SD added spacer solution to HD HPE PRO, HFS+/HFSX and EXT2(3) file systems and RAID recovery supported by Data Compass, flash doctor to be available in July. ACE is going to add RAID soon, to add new Toshiba SATA Hard Disk drives support in PC-3000 UDMA utility. ACE is also cooperating with Deepspar in Canada. Anyway, it’s hard to find data recovery tools manufacturers to combine, with technologies shared. Nobody has all the best data recovery technologies and solutions. That’s why it is necessary if you have the budget to consider more tools from different manufacturers. This does adds to our cost. I hope one day, some of the best can truly be hand in hand and create some universal and friendly data recovery tools for all people to use.

Actually, Data recovery to Data Loss is like Doctors to diseases.

We can keep fit but we cannot dismiss the doctors. It’s the same thing. We can backup all important files but data recovery field is still growing.

Read More

RAID 6 — Do you really like it?

RAID 6For several years now RAID 5 has been one of the most popular RAID implementations. Just about every vendor that supplies storage to enterprise data centers offers it, and in many cases it has become — deservedly – a well-trusted tool. RAID 5 stripes parity and blocks of data across all disks in the RAID set. Even though users now must devote about 20% of their disk space to the parity stripe, and even though read performance for large blocks may be somewhat diminished and writes may be slower due to the calculations associated with the parity data, few managers have questioned RAID 5’s usefulness.

There are however, two major drawbacks associated with using RAID 5. First, while it offers good data protection because it stripes parity information across all the discs within the RAID set, it also suffers hugely from the fact that should a single disc within the RAID set fail for any reason, the entire array becomes vulnerable — lose a second disc before the first has been repaired and you lose all your data, irretrievably.

This leads directly to the second problem. Because RAID 5 offers no protection whatsoever once the first disc has died, IT managers using that technology have faced a classic Hobson’s choice when they lose a disc in their array. The choices are these. Do they take the system off-line, making the data unavailable to the processes that require it? Do they rebuild the faulty drive while the disc is still online, imposing a painful performance hit on the processes that access it? Or, do they take a chance, hold their breath, and leave the drive in production until things slow down during the third shift when they can bring the system down and rebuild it without impacting too many users?

This choice, however, is not the problem, but the problem’s symptom.

The parity calculations for RAID 5 are quite sophisticated and time consuming, and they must be completely redone when a disk is rebuilt. But it’s not the sophistication of all that math that drags out the process, but the fact that when the disk is rebuilt, parity calculations must be made for every block on the disk, whether or not those blocks actually contained data before the problem occurred. In every sense, the disk is rebuilt from scratch.

An unfortunate and very dirty fact of life about RAID 5 is that if a RAID set contains, say, a billion sectors spread over the array, the demise of even a single sector means the whole array must be rebuilt. This wasn’t much of a problem when disks were a few gigabytes in size. Obviously though, as disks get bigger more blocks must be accounted for and more calculations will be required. Unfortunately, using present technology RAID recovery speed is going to be constant irrespective of drive size, which means that rebuilds will get slower as drives get larger. Already that problem is becoming acute. With half-terabyte disks becoming increasingly common in the data center, and with the expected general availability of terabyte-sized disks this fall, the dilemma will only get worse.

The solution offered by most vendors is RAID 6.

The vendors would have you believe that RAID 6 is like RAID 5 on steroids: it eliminates RAID 5’s major drawback – the inability to survive a second disk failure – by providing a second parity stripe. Using steroids of course comes with its own set of problems.

RAID 6 gives us a second parity stripe. The purpose of doing all of the extra math to support this dual parity is that the second parity stripe operates as a “redundancy” or high availability calculation, ensuring that even if the parity data on the bad disk is lost, the second parity stripe will be there to ensure the integrity of the RAID set. There can be no question that this works. Buyers should, however, question whether or not this added safety is worth the price.

Consider three issues. RAID 6 offers significant added protection, but let’s also understand how it does what it does, and what the consequences are. RAID 6’s parity calculations are entirely separate from the ones done for the RAID 5 stripe, and go on simultaneously with the RAID 5 parity calculations. This calculation does not protect the original parity stripe, but rather, creates a new one. It does nothing to protect against first disk failure.

Because calculations for this RAID 6 parity stripe are more complicated than are those for RAID 5, the workload for the processor on the RAID controller is actually somewhat more than double. How much of a problem that turns out to be will depend on the site and performance demands of the application being supported. In some cases the performance hit will be something sites will live with, however grudgingly. In other cases, the tolerance for slower write operations will be a lot lower. Buyers must balance the increased protection against the penalty of decreased performance.

Issue two has to do with the nature of RAID 5 and RAID 6 failures.

The most frequent cause of a RAID 5 failure is that a second disk in the RAID set fails during reconstruction of a failed drive. Most typically this will be due to either media error, device error, or operator error during the reconstruction – should that happen, the entire reconstruction fails. With RAID 6, after the first device fails the device is running as a RAID 5, deferring but not removing the problems associated with RAID 5. When it is time to do the rebuild, all the RAID 5 choices and rebuild penalties remain. While RAID 6 adds protection, it does nothing to alleviate the performance penalty imposed during those rebuilds.

Need a more concrete reason not to accept RAID 6 at face value as the panacea your vendor says it is?  Try this.

When writing a second parity stripe, we of course lose about the same amount of disk space as we did when writing the first (assuming the same number of disks are in each RAID group). This means that when implementing RAID 6, we are voluntarily reducing disk storage space to about 60% of purchased capacity (as opposed to 80% with RAID 5). The result: in order to meet anticipated data growth, in a RAID 6 environment we must always buy added hardware.

This is the point at which many readers will sit back in their chairs and say to themselves, “So what?  Disks are cheap!” And so they are — which naturally is one of the reasons storage administrators like them so much. But what if my reader is not in storage administrator? What if the reader is a data center manager, or an MIS director, or a CIO, or a CFO? In other words, what if my reader is as interested in operational expenditures as in the CAPEX?

In this case, the story becomes significantly different. Nobody knows exactly what the relationship between CAPEX and OPEX is in IT, but a rule of thumb seems to be that when it comes to storage hardware the OPEX will be 4-8 times the cost of the equipment itself. As a result, everybody has an eye on the OPEX. And these days we all know that a significant part of operational expenditures derives from the line items associated with data center power and cooling.

Because of the increasing expense of electricity, such sites are on notice that they will have to make do with what they already have when it comes to power consumption. Want to add some new hardware?  Fine, but make sure it is more efficient than whatever it replaces.

When it comes to storage, I’m quite sure that we will see a new metric take hold. In addition to existing metrics for throughput and dollars-per-gigabyte, watts-per-gigabyte is something on which buyers will place increased emphasis. That figure, and not the cost of the disk, will be a repetitive expense that managers will have to live with for the life of whatever hardware they buy.

If you’re thinking of adding RAID 6 to your data protection mix, consider the down-stream costs as well as the product costs.

Does RAID 6 cure some problems? Sure, but it also creates others, and there are alternatives worth considering. One possibility is a multilevel RAID combining RAID 1 (mirroring) and RAID 0 (striped parity), usually called either RAID 10 or RAID 1+0. Another is the “non-traditional” RAID approach offered by vendors who build devices that protect data rather than disks. In such cases, RAID 5 and 6 would have no need for all those recalculations required for the unused parts of the disk during a rebuild.

Read More

The advantages and disadvantages of RAID 5EE

RAID 5EE is very similar to RAID 5E with one key difference — the hot spare’s capacity is integrated into the stripe set. In contrast, under RAID 5E, all of the empty space is housed at the end of the array. As a result of interleaving empty space throughout the array, RAID 5EE enjoys a faster rebuild time than is possible under RAID 5E.

RAID 5EE has all of the same pros as RAID 5E but enjoys a faster rebuild time than either RAID 5 or RAID 5E. On the cons side, RAID 5EE has the same cons as RAID 5E, with the main negative point being that not a lot of controllers support the RAID level yet. I suspect that this will change over time, though.

As is the case with RAID 5E, RAID 5EE requires a minimum of four drives and supports up to eight or 16 drives in an array, depending on the controller. Figure C shows a sample of a RAID 5EE array with the hot spare space interleaved throughout the array.

 

A RAID 5EE array with five drives A RAID 5EE array with five drives

When a drive fails, as shown in Figure D, the empty slots are filled up with data from the failed drive.

empty slots are filled up with data from the failed drive.

Read More

Hard Drive Firmware Update/Recover by Yourself

firmware update We know that up to 60% of hard disk drive failures are caused by firmware corruption. Just a little damage is enough to render a hard drive totally unusable. In such cases hard drive becomes inaccessible and sometimes can completely disappear from the system.

“For example, a hard drive can lose its parameters such as device model number and capacity. When it happens, there is no access to partitions and files. In most cases the problem is caused by firmware damage.”

What is firmware?
Firmware is software which is embedded in a piece of hardware. You can think of firmware simply as “software for hardware”.

Where the firmware stores?
Modern disks normally have their firmware codes located on data platters and also the PCB board.

Why firmware is so important?
Without the firmware, no communication will be possible between the PC system and the hard disk. If the firmware area is corrupted, the drive will appear to have failed even all the electrical and mechanical components are still fully functional.

The symptoms of firmware corruption:
1. Drive powers up, but is not recognized /defected by the computer
2. Drive powers up, but is recognized wrongly, sometimes with nonsensical characters, manufacture alias (Such as N40p for Maxtor 6Y and etc ;);
3. Drive freezes during booting up;
4. Drive detect in wrong Capacity, such as 80 GB detected as 1Mb;
5. S.M.A.R.T error;
6. Drive is locked by human error; such as Hitachi hard drive by a drop; it is a self protection method of HDD design;
7. Drive clicking ;( it can be caused by firmware too, the heads try to read the SA on platters and can not positing)

How to update/recover hard drive firmware by yourself?

In fact, in many drives the firmware can be updated under software control, very much the same way that a flash BIOS works. Unlike the system BIOS, this is only very rarely done, when a particular sort of problem exists with the firmware logic that can be fixed without requiring a physical hardware change. You can check the drive manufacturer’s web site for more details. For Example: Seagate Barracuda 7200.11 Command Queuing

If you don’t want to spend a lot of money on the expensive data recovery tools, such as PC3000 or HD Doctor Suite, how do you recover hard drive firmware corruption? Here are some free firmware recover tools , hope them can help you:

A-FF Repair Station

  • Diagnoses the Firmware Area and hard drive mechanics and displays a short summary of hard drive’s health;
  • Reads the Firmware Area;
  • Extracts and analyzes all firmware structures;
  • Rebuilds damaged parts and writes the firmware back to the drive.

All the operation is absolutely safe to the data (partitions and files) and takes no more than 20 minutes.

Maxtor Firmware Repair 2.0
Aiming at solution for typical firmware malfunction of Maxtor 541DX (2B020H1 2B010H1), which may manifest itself as follows:

  • HDD is not identified or identified by its factory alias “Maxtor Athena”;
  • HDD starts the motor and then hangs.

Seagate Firmware Repair 5.0
Aiming at one-key solution towards typical firmware malfunction of Seagate Barracuda VII drives, which may manifest itself as follows:

  • HDD is not identified or identified incorrectly;
  • HDD starts the motor and then hangs.

Please share your ideas here!

Read More

the advantages and disadvantages of RAID 5E

RAID 5E with an E that stands for Enhanced, RAID 5E is a RAID 5 array with a hot spare drive that is actively used in the array operations. In a traditional RAID 5 configuration with a hot spare, the hot spare drive sits next to the array waiting for a drive to fail, at which point the hot spare is made available and the array rebuilds the data set with the new hardware. There are some advantages to this operational method:

  • You know for a fact that the drive that would have been used as a hot spare is in working order.
  • There is an additional drive included in the array, thus further distributing the array’s I/O load. More spindles equals better performance in most cases. RAID 5E can perform better than typical RAID 5.

There are a few disadvantages associated with RAID 5E as well:

  • There is not wide controller support for RAID 5E.
  • A hot spare drive cannot be shared between arrays.
  • Rebuilds can be slow.

The capacity of a RAID 5E array is exactly the same as the capacity of a RAID 5 array that contains a hot spare. In such a scenario, you would “lose” two disks’ worth of capacity — one disk’s worth for parity and another for the hot spare. Due to this fact, RAID 5E requires that you use a minimum of four drives, and up to eight or 16 drives can be supported in a single array, depending on the controller. The main difference between RAID 5 and RAID 5E is that the drive that would have been used as a hot spare in RAID 5 cannot be shared with another RAID 5 array; so that could affect the total amount of storage overhead if you have multiple RAID 5 arrays on your system. Figure A gives you a look at a RAID 5E array consisting of five drives. Take note that the “Empty” space in this figure is shown at the end of the array.

A RAID 5E array with five drives

A RAID 5E array with five drives

When a drive in a RAID 5E array fails, the data that was on the failed drive is rebuilt into the empty space at the end of the array, as shown in Figure B. When the failed drive is replaced, the array is once again expanded to return the array to the original state.

 

Fig_B_Lowe052307

A RAID 5E array that has been rebuilt into the hot spare space

Read More

Western Digital Enters Solid State Drive Market

western digital Western Digital, a world leader in hard drive storage for computing and consumer electronics applications, announced that it has completed a $65 million cash acquisition of SiliconSystems, Inc., Aliso Viejo, Calif., a leading supplier of solid state drives for the embedded systems market.

Since its inception in 2002, SiliconSystems has sold millions of SiliconDrive® products to meet the high performance, industrial, embedded-computing, medical, military and aerospace markets. These markets accounted for approximately one third of worldwide solid-state drive revenues in 2008. SiliconSystems’ product portfolio includes solid-state drives with SATA, EIDE, PC Card, USB and CF interfaces in 2.5-inch, 1.8-inch, CF and other form factors. SiliconSystems has developed extensive intellectual property to address the stringent embedded systems market requirements to ensure data integrity, eliminate unscheduled downtime, protect application data and software and provide for data security and protection through its patented and patent-pending PowerArmor®, SiSMART®, SolidStor® and SiSecure™ technologies.

WD’s storage industry leadership, worldwide infrastructure, and technical and financial resources will enable further growth in SiliconSystems’ existing markets and customer relationships. SiliconSystems’ intellectual property and technical expertise will provide additional building blocks for future products to address emerging opportunities in WD’s existing markets.

“We are delighted to have the SiliconSystems team join WD,” said John Coyne, president and CEO of WD. “The combination will be modestly accretive to revenue and margins as a result of SiliconSystems’ existing position as a trusted supplier to the well-established $400 million market for embedded solid-state drives. SiliconSystems’ intellectual property and technical expertise will significantly accelerate WD’s solid-state drive development programs for the netbook, client and enterprise markets, providing greater choice for our customers to satisfy all their storage requirements.”

Integration into WD begins immediately, with SiliconSystems now becoming known as the WD Solid-State Storage business unit, complementing WD’s existing Branded Products, Client Storage, Consumer Storage and Enterprise Storage business units.

Read More

Raid Data Recovery Software: Getway Raid Recovery

Getway Raid Recovery File Name: Getway Raid Recovery
Version: 2.0
Publisher: Getway Recovery Ltd
Raid Supported: RAID 0, RAID 5, Raid 5E, Raid 5EE, Raid 6
Analyze Mode: Smart Mode,Manual Mode, User-defined Mode
Price: US $179.00

What can Getway Raid Recovery Do?
Getway Raid Recovery Software can help you recover data due to the following possible data loss situations: File Deletion; Accidental Array Format; MBR damage/ loss/ excursion; DBR damage; One or two RAID hard disk damage, etc. Getway Raid Recovery Software support “Smart Mode”, “Manual Mode” and ” User-defined Mode ” working modes.

Download:http://www.getwayrecovery.com/downloads/GetwayRaidRecovery.zip
Buy: http://www.getwayrecovery.com/purchase.html

Related Links:

  • Raid 5 Recovery Case Study
  • Raid 5EE Recovery Case Study
  • Find Out Raid Disk Order By 3 Steps
  • Screenshots Of Getway Raid Recovery Software
  • Online Manual Of Getway Raid Recovery Software
Read More

Avoiding the assignment of duplicate MAC addresses to network interface devices (Part 2)

8. The method according to claim 7, further comprising the copy step of controlling to copy data stored in the temporary MAC address file to the MAC address file when an abnormality is determined to occur in the MAC address file.

9. An MAC address management method applied to an MAC address management apparatus having storage means for storing an MAC address file comprising a plurality of MAC addresses, comprising: the transmission step of controlling to read out one MAC address from the MAC address file and transmit the MAC address to a network interface device in order to assign an MAC address to the network interface device to be connected to a network; the reception step of controlling to receive an MAC address write completion notification indicating that the transmitted MAC address has been assigned to the network interface device; the rewrite step of controlling to rewrite MAC addresses of the MAC address file except for the transmitted MAC address, in a temporary MAC address file stored in an external storage device connected to the MAC address management apparatus, when said reception step receives the MAC address write completion notification; and the delete step of controlling to delete the transmitted MAC address from the MAC address file after said rewrite step rewrites the MAC addresses in the temporary MAC address file.

10. The method according to claim 9, further comprising the copy step of copying data stored in the temporary MAC address file of the external storage device to the MAC address file when an abnormality is determined to occur in the MAC address file.

11. A computer-readable storage medium which stores an MAC address management program for controlling an MAC address management apparatus having storage means for storing an MAC address file storing a plurality of MAC addresses and a temporary MAC address file, comprising codes of: the transmission step of controlling to read out one MAC address from the MAC address file and transmit the MAC address to a network interface device in order to assign an MAC address to the network interface device to be connected to a network; the reception step of controlling to receive an MAC address write completion notification indicating that the transmitted MAC address has been assigned to the network interface device; the rewrite step of controlling to rewrite, in the temporary MAC address file, MAC addresses of the MAC address file except for the transmitted MAC address, when said reception step receives the MAC address write completion notification; and the delete step of controlling to delete the transmitted MAC address from the MAC address file after said rewrite step rewrites the MAC addresses in the temporary MAC address file.

12. The medium according to claim 11, further comprising a code of the copy step of controlling to copy data stored in the temporary MAC address file to the MAC address file when an abnormality is determined to occur in the MAC address file.

13. A computer-readable storage medium which stores an MAC address management program for controlling an MAC address management apparatus having storage means for storing an MAC address file comprising a plurality of MAC addresses, comprising codes of: the transmission step of controlling to read out one MAC address from the MAC address file and transmit the MAC address to a network interface device in order to assign an MAC address to the network interface device to be connected to a network; the reception step of controlling to receive an MAC address write completion notification indicating that the transmitted MAC address has been assigned to the network interface device; the rewrite step of controlling to rewrite MAC addresses of the MAC address file except for the transmitted MAC address, in a temporary MAC address file stored in an external storage device connected to the MAC address management apparatus, when said reception step receives the MAC address write completion notification; and the delete step of controlling to delete the transmitted MAC address from the MAC address file after said rewrite step controls to rewrite the MAC addresses in the temporary MAC address file.

14. The medium according to claim 13, further comprising a code of the copy step of copying data stored in the temporary MAC address file of the external storage device to the MAC address file when an abnormality is determined to occur in the MAC address file.

Read More

Backup VS Data Safety

data backup

Entry-level RAID controllers allow administrators to create secure multi-drive storage arrays to host a server’s operation system and vital data.

Many people don’t appreciate the value of backups and data safety until they experience what it means to lose data. Whether it is music, videos or photos at home or project files, customer data or other digital assets in the office, people don’t think of data safety – until it’s too late.

Imagine how you would feel if your vacation photos or videos of your wedding and daughter’s birth were destroyed? Such scenarios can lead to divorce court when your better half finds out. Or how would your boss react if his or her email and project files were lost due to a faulty hard drive? Your life might be spared, but you could still get fired.

No warranty in the world protects you from such an incident. Make no mistake about it: these things happen every day! If it’s your data, it’s your responsibility to protect it. And even if you’ve got a boss who eventually is responsible, he or she might still blame the loss of data on you. In the end, you can do no wrong by developing awareness of threats and paying attention to data safety.

Backup Vs. Data Safety

At this point we have to differentiate between a backup and basic data safety. Both mean something different and every business should rely on both regular backups and a safe data repository.

Performing a backup means copying files or complete system images from your hard drive onto another storage device, where the data is safe from hardware malfunction, viruses or accidental modification. If anything happens to your primary data, you can access the backup “snapshot” and restore whatever you need.

Any type of drive can be used for backups, but you should pay attention to data safety offered by the solution you pick. A hard drive, for example, cannot be considered a safe medium, as it uses mechanical components that may fail. A perfect backup is performed frequently, is written onto alternating media that are partially stored off-site and should be written onto media that is widely available.

When we talk about data safety, we specifically address the issue that every computer stores all key data on hard drives, and that every hard drive will eventually fail. The challenge is to create a storage subsystem that is unsusceptible to hard drive failures. This is where the five RAID storage controllers come into play.

AMCC, Areca, HighPoint, LSI Logic and Promise Technology offer PCI Express add-on cards that run up to four hard drives to create fast and secure storage array.

Read More

Raid Data Recovery Software: RAID Reconstructor

RAID Reconstructor File Name: RAID Reconstructor
Version: 4.0
Publisher: Runtime Software
Raid Supported: RAID 0, RAID 5
Analyze Mode: Automatic mode
Price: US $99.00

What can DiskInternals Raid Recovery Do?
Even if you do not know the RAID parameters, such as start sector, drive order, block size and direction of rotation, RAID Reconstructor will analyze your drives and determine the correct values. You will then be able to create a copy of the reconstructed RAID in a virtual image (.vim), an image file (.img) or on a physical drive.

Download: http://www.runtime.org/raid.zip
Buy: http://www.runtime.org/buy_now.htm

Read More