Recommended Western Digital External Hard Drives

WD External Hard Drives The main purposes we need an external hard drive:

  • Expand your computer’s storage capacity;
  • Backup your data and share data between computers;
  • Easy to use. Most of the time, you just need to plug it into the computer and use it as an internal hard drive.

Desktop external hard drives are based on the 3.5-inch internal hard drives and laptop (or portable) external hard drives that are based on the 2.5-inch internal hard drives. Generally, external hard drives are connected to a computer using collectively these types of connections: USB 3.0, USB 2.0, FireWire 400, FireWire 800, and eSATA.

Here’s the list of our current favorites.

Western Digital WD Elements 320 GB USB 2.0 Portable External Hard Drive

Original Price: $99.99
Price: $59.99 on Amazon.com
Model: WDBAAR3200ABK

Western Digital WD Elements 500 GB USB 2.0 Portable External Hard Drive

Original Price: $129.99
Price: $74.99 on Amazon.com
Model: WDBAAR5000ABK

Western Digital WD Elements 1 TB USB 2.0 Desktop External Hard Drive

Original Price: $129.99
Price: $74.99 on Amazon.com
Free Standard Shipping
Model: WDBAAU0010HBK

Western Digital WD Elements 1.5 TB USB 2.0 Desktop External Hard Drive

Original Price: $169.99
Price: $106.49 on Amazon.com
Model: WDBAAU0015HBK

Western Digital WD Elements 2 TB USB 2.0 Desktop External Hard Drive

Original Price: $229.99
Price: $129.99 on Amazon.com
Model: WDBAAU0020HBK

Western Digital My Passport Essential SE 1 TB USB 2.0 Portable External Hard Drive

Original Price: $199.99
Price: $139.99 on Amazon.com
Model: WDBABM0010BBK

Western Digital My Book AV DVR Expander 1 TB USB 2.0/eSATA Desktop External Hard Drive

Original Price: $127.60
Price: $119.00 on Amazon.com
Model: WDBABT0010HBK

Western Digital My DVR Expander 1 TB eSATA Desktop External Hard Drive

Original Price: $159.99
Price: $119.00 on Amazon.com
Model: WDG1S10000VN

Western Digital Elements SE 1 TB USB 2.0 Portable External Hard Drive

Original Price: $149.99
Price: $119.99 on Amazon.com
Model: WDBABV0010BBK

Western Digital My Book for Mac 1 TB USB 2.0 Desktop External Hard Drive

Original Price: $129.99
Price: $99.00 on Amazon.com
Model: WDBAAG0010HCH

See my another post: USB 2.0, USB 3.0, or FireWire – What is the recommended solution for data storage.

Read More

2060-701596-001 WD PCB Circuit Board

HDD Printed circuit board (PCB) with board number 2060-701596-001 is usually used on these Western Digital hard disk drives: WD1600AAJB-00J3A0, DCM EGRNHTJAEN, Western Digital 160GB IDE 3.5 Hard Drive; WD800AAJB-00J3A0, DCM HBNCHT2AHN, Western Digital 80GB IDE 3.5 Hard Drive; WD5000AAKB-00H8A0, DCM DANNHV2MGB, Western Digital 500GB IDE 3.5 Hard Drive; WD1600AAJB-00J3A0, DCM HBRCHTJCHN, Western Digital 160GB…

Read More

5 Popular Data Backup Freewares

Data Backup Freewares The post consists of programs for making duplicate copies of your computer files, digital photos, music, movies, or anything else on your hard drive or portable device that you’d like to duplicate in case of accident or catastrophe.

1. Paragon Backup & Recovery Free Edition (32 bit)
Back up and restore your Windows system.

Paragon Backup & Recovery 10.2 Free Edition – a disaster recovery tool for stand-alone Windows-based PCs. Combining all the existing backup techniques and exclusive recovery environments, this latest edition satisfies the needs of even the most demanding user and is simply the most powerful free backup tool available today.

Paragon launches 2 versions of Backup & Recovery 10.2. 32-bit provides support for 32-bit systems. And 64-bit for 64-bit Operating Systems. Paragon Backup & Recovery 10.2 Free Edition allows you to take complete control of your PC’s safety. Based on solid commercial backup and recovery software from Paragon, it has a rich set of features that you can trust. Simple to install and easy to use.

2. Macrium Reflect Free
Create, burn, and back up disk images.

Macrium Reflect Free Edition. An award winning disk imaging solution for free. A complete disaster recovery solution for your home and office. Protect your personal documents, photos, music and e-mails. Upgrade your hard disk or try new operating systems in the safe knowledge that everything is securely saved in an easily recovered backup file. Macrium Reflect supports backup to local, network and USB drives as well as burning to all DVD formats. This version is for non-commercial home use.

What’s new in this version:
Version 4.2 build 2733 may include unspecified updates, enhancements, or bug fixes.

3. Easeus Todo Backup
Back up and restore data on your system, partition, or hard disk.

EASEUS Todo Backup is a backup and restore solution for a good reason: with detailed instruction wizards, your computer will be in a safe condition within minutes without the help of an IT specialist to backup your system state, partition and disk. EASEUS Todo Backup can backup your system partition to quickly get the system up and running in the event of a system crash or hardware failure. It allows you to backup and restore disk or partition after viruses attack, unstable software download, hard drive failure. Meanwhile, EASEUS Todo Backup is useful if you want to upgrade the older smaller hard disk without reinstalling the operating system and applications once again.

4. Second Backup Free Edition
Easy-to-use file backup and folder sync tool.

Second Backup is an easy-to-use file backup and sync tool, it can archive multiple versions backed up copies for different time (for example, the first copy for Monday is ‘Backup_1’, the second copy for Tuesday is ‘Backup_2’). Automatically backup your important data (includes opening/using files and folders) to external hard drive, USB disk, network, and other storage device. Intuitive interface makes it easy to use, simply tell it which file or folder to backup, where and when to archive them, then it works reliably in the background and uses very little system resources. The backup task can be directed only copy the new or modified files, it monitors the source files and automatically backups the new or changed file to the destination. Automatic scheduling includes specific days of the week, days of the month, hours of the day, or any desired time intervals. E-mail notification lets you know the file backup status anytime and anywhere.

Note: It says it’s “free” and even has “Free Edition” in it’s name but it’s a 30 day evaluation copy which says after 30 days you must buy it.

5. FBackup
Protect your files/folders from data loss.

FBackup is freeware backup program for Windows. FBackup protects your important files and folders from partial or total loss by automating backup tasks, password protecting and compressing it to save storage space. Using FBackup you can easily backup to any local or network drive or to external drives (such as USB drives). FBackup can backup open/locked files and it can perform full and mirror backups (backup type that does not compress the files).

When defining a backup you can also set file filters and schedule the backup for automatic execution. You can run predefined backups, such as My Documents, My Pictures, or Outlook Express and load backup plug-ins that will back up the settings and data of specific applications. FBackup has ZIP64 support (can create backups over 2GB) and creates standard ZIP files, meaning that you can access it with any zip compatible utility.

Read More

Data camera CF card data recovery case

Case:Customer warranty storage medium’s underlying data structure is chaotic, the directory structure is incomplete and there are garbled code, all data cannot be accessed normally, and the customer requires restoration of wedding recording videos and photos. Solution:After the engineer detected the customer’s fault storage medium, the conclusion concluded that the customer warranty fault storage medium…

Read More

Data Backup Glossary (Letter D)

Dark archive
A data archive that cannot be accessed by any user. Access to the data is either limited to a set of few individuals or completely restricted to all. The purpose of a dark archive is to function as a repository for information that can be used as a failsafe during disaster recovery.

Data at rest
All data in storage excluding any data that frequently traverses the network or that resides in temporary memory. Data at rest includes, but is not limited to, archived data; data which is not accessed or changed frequently; files stored on hard drives; USB thumb drives; files stored on backup tape and disks; and files stored offsite or on a storage area network (SAN).

Data at rest protection
Security protection measures such as password protection, data encryption, or a combination of both that protect data at rest from hackers and other malicious threats. The measures prevent this data from being accessed, modified, or stolen.

Database
A system intended to organize, store, and retrieve large amounts of data easily. It consists of an organized collection of data for one or more uses, typically in digital form.

Data center
A facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (for example, air conditioning or fire suppression), and security devices.

Data center tiers
A four-tier system that provides a simple and effective means for identifying different data center site infrastructure design topologies. The Uptime Institute’s tiered classification system is an industry standard approach to site infrastructure functionality that addresses common benchmarking standard needs. The four tiers, as classified by The Uptime Institute, include the following:

  • Tier I: Composed of a single path for power and cooling distribution, without redundant components, providing 99.671 percent availability.
  • Tier II: Composed of a single path for power and cooling distribution, with redundant components, providing 99.741 percent availability.
  • Tier III: Composed of multiple active power and cooling distribution paths, but only one path active, has redundant components, and is concurrently maintainable, providing 99.982 percent availability.
  • Tier IV: Composed of multiple active power and cooling distribution paths, has redundant components, and is fault tolerant, providing 99.995 percent availability.

Data cleansing
Also referred to as data scrubbing, the act of detecting and removing and/or correcting a database’s dirty data (data that is incorrect, out-of-date, redundant, incomplete, or formatted incorrectly). The goal of data cleansing is not just to clean up the data in a database, but also to bring consistency to different sets of data that have been merged from separate databases. Sophisticated software applications are available to clean a database’s data using algorithms, rules, and look-up tables. This task was once done manually and was therefore still subject to human error.

  • In a RAID system, the act of correcting parity bit errors so that drives remain synchronized.

Data deduplication
The elimination of redundant data. In the deduplication process, duplicate data is deleted, leaving only one copy of the data to be stored. However, indexing of all data is still retained should that data ever be required. Deduplication reduces the required storage capacity since only the unique data is stored.

Data dictionary
In database management systems, a file that defines the basic organization of a database. A data dictionary contains a list of all files in the database, the number of records in each file, and the names and types of each field. Most database management systems keep the data dictionary hidden from users to prevent them from accidentally destroying its contents. Data dictionaries do not contain any actual data from the database, only book keeping information for managing it. Without a data dictionary, however, a database management system cannot access data from the database.

Data infrastructure hygiene
Practices that promote or preserve the shape of an entire data infrastructure (for example, network, servers, databases, storage, and software). These practices include any activity that reduces the stress of information growth on the data infrastructure and enables the efficient access, movement, and protection of data while reducing overall infrastructure and maintenance costs. Such practices include active archiving of relational databases, e-mail archiving, and document archiving.

Data mirroring
The act of copying data from one location to a storage device in real time. Because the data is copied in real time, the information stored from the original location is always an exact copy of the data from the production device. Data mirroring is useful in the speedy recovery of critical data after a disaster. Data mirroring can be implemented locally or offsite at a completely different location.

Data protection
Assurance that data is not corrupted, is accessible for authorized purposes only, and is in compliance with applicable requirements.

Data recovery
The salvaging of data stored on damaged media, such as magnetic disks and tapes. Many software products help recover data damaged by a disk crash or virus. In addition, many companies specialize in data recovery. Although not all data is recoverable, data recovery specialists can often restore a surprisingly high percentage of the data on damaged media.

Data retention policy
The policy of persistent data and records management for meeting legal and business data archival requirements. A data retention policy weighs legal and privacy concerns against economics and need to know concerns to determine retention time, archival rules, data formats, and the permissible means of storage, access, and encryption.

Data space transfer protocol
Data space transfer protocol (DSTP) is a protocol used to index and categorize data using an XML -based catalogue. Data, no matter how it is stored, has corresponding XML files which contain UCK (universal correlation key) tags that act as identification keys. Data is retrieved when a user connects to DSTP servers with a DSTP client and asks for specific information. Data is found and retrieved based on the labels contained in the UCK tags.

Data vaulting
The process of sending data from its primary source, where it can be protected from hardware failures, theft, and other threats. Several companies now provide web backup services that compress, encrypt, and periodically transmit a customer’s data to a remote vault. In most cases the vaults will feature auxiliary power supplies, powerful computers, and manned security.

DDP

  • Acronym for disk-based data protection, where a disk or RAID system is used as a data backup and archival system in place of tape.
  • Acronym for distributed data protection, a managed (or hosted) service that provides customers with online, scheduled, automated computer system data backup and self-serve restoration.
  • Acronym for development data platform, a web-based platform for data analysis, presentation, and dissemination. 
  • Acronym for distributed data processing, a data processing network in which some functions are performed in different places on different computers and are connected by transmission facilities.

Delta Backup
The backup of all data files that have been modified since the last incremental backup or archival backup. Also known as differential incremental backup.

DeltaPro
Patented EVault technology that performs delta backup and compresses the data before sending it over the wire.

Digital asset management
Digital asset management (DAM) is a system that creates a centralized repository for digital files that allows the content to be archived, searched, and retrieved. The digital content is stored in databases called asset repositories. Metadata—such as photo captions, article key words, advertiser names, contact names, file names, or low-resolution thumbnail images—is stored in separate databases called media catalogs and points to the original items. Digital asset management also is known as enterprise digital asset management, media asset management, or digital asset warehousing.

Digital footprint
The trail, traces, or "footprints" that people leave online. A digital footprint includes information transmitted online, such as forum registration, e-mails and attachments, uploaded videos or digital images, and any other form of transmission of information. All of this activity leaves traces of personal information about yourself that is available to others online.

Direct access file system
Direct access file system (DAFS) is a file-access sharing protocol that uses memory-to-memory interconnect architectures, such as VI and InfiniBand. DAFS is designed for storage area networks (SANs) to provide bulk data transfer directly between the application buffers of two machines without having to packetize the data. With DAFS, an application can transfer data to and from application buffers without using the operating system, which frees up the processor and operating system for other processes and allows files to be accessed by servers using several different operating systems.

Direct-attached storage
Direct-attached storage (DAS) is non-networked storage in which the hardware is connected to an individual server. Although more than one server can be present, storage for each server is managed separately and cannot be shared.

Disaster recovery
The process, policies, and procedures related to preparing for the recovery or continuation of a business-critical technology infrastructure after a natural or human-induced disaster. Disaster recovery is a subset of business continuity. While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions.

Disaster recovery plan
A plan for business continuity in the event of a disaster that destroys part or all of a business’s resources, including IT equipment, data records, and the physical space of an organization. The goal of a disaster recovery plan is to resume normal computing capabilities in as little time as possible. A typical disaster recovery plan has several stages:

  1. Understanding an organization’s activities and how all of its resources are interconnected
  2. Assessing an organization’s vulnerability in all areas, including operating procedures, physical space and equipment, data integrity, and contingency planning
  3. Understanding how all levels of the organization would be affected in the event of a disaster
  4. Developing a short-term recovery plan
  5. Developing a long-term recovery plan, including how to return to normal business operations and prioritizing the order of functions that are resumed
  6. Testing and consistently maintaining and updating the plan as the business changes A key to a successful disaster recovery plan is taking steps to prevent the likelihood of disasters from occurring, such as using a hot site or cold site to back up data archives.
  7. Disk array
    A linked group of one or more physical independent hard disk drives generally used to replace larger, single disk drive systems. The most common disk arrays are in daisy chain configuration or implement RAID (Redundant Array of Independent Disks) technology. A disk array may contain several disk drive trays and is structured to improve speed and increase protection against loss of data. Disk arrays organize their data storage into Logical Units (LUs), which appear as linear block paces to their clients. Disk arrays are an integral part of high-performance storage systems.

Disk-to-disk
Disk-to-disk (D2D) is a type of data storage backup in which the data is copied from one disk (typically a hard disk) to another disk (such as another hard disk or other disk storage medium). In a D2D system, the disk that the data is being copied from typically is referred to as the primary disk and the disk that the data is copied to typically is called the secondary or backup disk.

Disk-to-disk-to-tape
Disk-to-disk-to-tape (D2D2T) is a type of data storage backup in which data is first backed up on a disk system, but then is spooled to a tape or an optical storage system. A D2D2T backup system can help eliminate data loss issues due to tape drive or tape failure. In a D2D2T system, a copy of the data is kept onsite for faster retrieval and tape copies are kept offsite for disaster recovery purposes. D2D2T devices may be appliances, virtual tape, or disk libraries.

Disk-to-tape
Disk-to-tape (D2T) is a type of data storage backup in which the data is copied from a disk (typically a hard disk) to a magnetic tape. D2T systems are used widely in enterprises that require the safe storage of vital information in the case of disaster recovery.

Read More

Glossary of Hard Disk Drive Terminology (Letter E)

ECC On-the-Fly
A hardware correction technique that corrects errors in the read buffer prior to host transfer without any performance penalties. These error corrections are invisible to the host system because they do not require assistance from the drive’s firmware.

EIDE (Enhanced Integrated Drive Electronics)
The primary interface used by desktop PCs to handle communication between hard drives and the central processing unit. The equivalent interface system in most enterprise systems is SCSI.

Embedded Servo Control
The embedded servo control design generates accurate feedback information to the head position servo system without requiring a full data surface (which is required with a “dedicated” servo control method) because servo control data is stored on every surface.

Encoding
The process of modifying data patterns prior to writing them on the disk surface.

Enterprise
The series of computers employed largely in high-volume and multi-user environments such as servers or networking applications; may include single-user workstations required in demanding design, engineering and audio/visual applications.

Enterprise Storage Group
The Western Digital operation that designs, produces and markets hard drives for the enterprise market.

Error Correction Code (ECC)
A mathematical algorithm that detects and corrects errors in a data field.

Error Log
A record that contains error information.

Error Rate
The number of errors of a given type that occur when reading a specified number of bits.

Extended Partition
You can create multiple partitions on a hard disk, one primary partition and one or more extended partition(s). Operating system files must reside on the primary partition. An extended partition is a partition where non-system files (files other than DOS or operating system files) can be stored on a disk. You can also create logical drives on the extended partition.

Read More

Install Old Boot Hard Drive in New Computer

I have a computer running Vista, with a single hard drive (multiple partitions, one with the operating system, the others for applications, data, etc.). I just bought a new computer, and am going to install Windows 7 on it.

I want to put the OLD drive in the new computer so I can just copy all my files and data over.

In the old days with the IDE drives… if memory serves… I’d have to mess with some jumpers so it’d know the OLD drive was no longer the master drive and to boot off the new Windows7 drive. Do I have to do anything fancy like that when I stick the old drive in the new computer so it knows not to boot off that drive, and to boot off the new Windows 7 drive? If so, what do I do?

install sata hard drive

Install Old SATA Boot Drive

IF your “old” HDD is a SATA unit, there are NO jumpers to adjust. (In fact, although some do have a jumper on them, you should NOT change it unless you know what you’re doing!) A SATA port only allows the connection of ONE unit to it, so there is no need to give its connected device some unique identity. Just plug the old HDD into any available SATA port, and connect power to it also. Just to be sure, when you reboot go into BIOS Setup and check that the HDD is showing up properly on the correct SATA port. Then check where the Boot Priority is set and make sure the old HDD is NOT one of the devices available as a boot device.

Now, IF your “old” HDD is an IDE unit that you must connect to an IDE port on the mobo, then you DO have to set its jumper correctly. ANY IDE port MUST have a Master device on it to be used, and MAY have a Slave device additionally. So if this old HDD is the ONLY drive on an IDE port, it MUST have its jumper set to Master (or to Master with no Slave present, if that is a different option). Then it should be plugged into the END connector on the ribbon cable for it. On the other hand, if this is an IDE HDD and you’re plugging it into an IDE port as the second device on the ribbon cable (on the middle connector), make sure its jumper is set to Slave. BUT in this latter case, IF the first device already on the cable has its jumper set to “CS” (for Cable Select), and not to Master, then the second drive on the cable also must be set to “CS”.

“Master” and “Slave” are settings of jumpers that are related solely to the drive’s function on one IDE port. There is no such thing as a “Master Drive” of the whole machine. You already have a Boot Drive in your machine, and you are just installing a second unit that will be used as a storage device, but NOT as a Boot Drive.

Read More