Data Replay Services

Computer Crime / Digital Discovery / CCTV Image Recovery / Computer Forensics

Archive for the ‘computer’ tag

Developments in Data Centre Hard Drive TCO

without comments

Total Cost of Ownership Graph

The main TCO factors for data centre design

Since social media, data warehousing, online retailing and banking businesses create the most demanding cloud support infrastructures with thousands and thousands of hosts managing petabytes of data, they all understand the significance of crafting an end-to-end storage strategy which appears beyond one time capital cost for the crux of the actual prices – the operating costs related to Total Cost of Ownership (TCO). Cloud architects are creating new guidelines that illustrate the bottom-line value of having a systems wide approach to storage. Usually based on components and software, they deploy drives optimized for special applications that demand efficient power utilization, density and dependability. The important thing: Cloud data centre choices are actually based on value instead of pricing and TCO is how value has been measured.

Embracing the best storage scheme for public, private, and on premise data center infrastructures could make a huge difference in your capacity to significantly lower TCO costs. The key to successfully affecting TCO goes well beyond the price of the drives themselves or measuring effectiveness when it comes to cost per gigabyte only.

Understand the dependability of the hard drives in the data centre. The more dependable the drive, the less time plus price spent keeping it. Drives rated at HGST’s business’s leading standard of 2 million hours Mean-time Between Failure (MTBF) will encounter 40% fewer failures during the five-year life of the drive over these rated at 1.2 million hours.

Raise the density of the present data center footprint with higher-capacity drives. In addition, new up-and-coming helium filled platforms are capable of supporting seven platters per normal 3.5inch HDD, 2 more platters or disks compared to present airfilled five-platter drives.

Power Utilization Efficiency or PUE denotes the proportion of the entire number of power used by a data centre to the power sent or consumed by its own gear. PUE makes it possible to quantify such variables such cooling, electricity distribution and light. The perfect PUE ratio is 1.

Best-in-group data centres like Google and eBay have reported ratios only 1.14 and 1.35, respectively, however an average data centre has a ratio of 2.5. This implies that a typical data centre uses 2-and-a-half times more electricity compared to the amount required to operate the equipment.

Written by Betty

December 3rd, 2013 at 12:33 pm

USA / Germany in Row Over Phone Hacking

without comments

obama-merkelGermany has summoned the US ambassador in Berlin around claims the US monitored German Chancellor Angela Merkel’s mobile phone.

Foreign Minister Guido Westerwelle will meet US envoy John Emerson after in what is viewed as an unusual measure between close friends.

However, it left open the question of whether calls were listened to formerly.

French President Francois Hollande had already called for the issue to be put in the plan of the summit, where EU leaders are expected to discuss Europe’s digital economy, economic recovery and immigration.

‘Completely unacceptable’
The German government hasn’t said how it received the trick about the alleged US spying. But news magazine Der Spiegel, which has printed stories predicated on content from former CIA contractor Edward Snowden, said the advice had come from its investigations.
Continue reading the story
Press review

Germany’s Berliner Zeitung regrets that “just now does the government appear to actually understand what it is occurring”

The New York Times worries that there is mounting damage to “core American relationships”

Press aghast at latest US spying claims
State-observation of phone calls has a special resonance in Germany – Mrs Merkel herself grew up in East Germany, where phone-tap was pervasive.

Her spokesman said the German leader “views such practices… as entirely unacceptable” and had demanded a “complete and comprehensive explanation”.

“Among close friends in addition to partners, while the Federal Republic of Germany and additionally the US have been for decades, there ought to be no such observation of the communications of the head of government,” said Steffen Seibert in a statement.

White House spokesman Jay Carney said the US “is not tracking and will not trail the communications of the chancellor”.

German ministers’ phones have purportedly been protected using technology from security company Secusmart since 2009. Secusmart said in March that German government officials could be issued with new, highlysecured technology made for Blackberry mobile phones.

A German information technology master told the BBC that security services for lots of countries could have intercepted the chancellor’s calls before she had complete encryption.

Numerous US friends have expressed fury over the Snowden-based spying allegations.

Veteran French European Commissioner Michel Barnier told the BBC on Thursday that “enough is enough”, and that trust within the US was shaken.

‘No business as usual’
Germany’s press echoed a feeling of indignation, with a frontpage comments Sueddeutscher Zeitung – 1 of the country’s most respected newspapers – referring to the “greatest potential affront”.

German Defence Minister Thomas de Maiziere said it would be impossible to come back to business as usual. That is much more than a tiff that’ll blow over easily, the BBC’s Stephen Evans reports from Berlin.

President Obama had assured Chancellor Merkel in June that German citizens were not being usually spied upon.

Written by Betty

October 24th, 2013 at 1:20 pm

PRISM and YOUR data security

without comments

PRISM

Picture of Edward Snowdenhttp://data-recovery-tips.co.uk/data-security-prism/

Have you heard of PRISM lately? Do you know what it is ?

Edward Snowden… Have you heard of him ?

Something to do with whistle-blowing about data security right? Yep….

If you’re anything like me there so much information about these days that you just selectively filter what you take notice of. Sometimes the important things go un-noticed. I suggest that to a large part of the UK population one of those things is PRISM.

What is it? In two words it’s a snooper’s charter. It gives license to involved parties to look through your data, if it’s held in the US.

Now perhaps you think you don’t have any data stored in America? Well… what about the online cloud backup you have that keeps your valuable data safe should your computer crash?? If that cloud data is stored anywhere with US jurisdiction then your data can be looked through legally…

Now what about the companies who you deal with.. Where is their data stored? Is it in the US? If it is then same thing… your data can be read thought about.. Legally.

It’s the world we live in.

Written by Betty

October 15th, 2013 at 11:30 am

Don’t Succumb to Online Identity Theft!

without comments

Identity theft is a cyber crimeIt is often been stated that imitation could be the sincerest form of flattery. This can be accurate when talking about clothes, dwellings or vehicles however as it pertains to getting your individuality stolen, it is a quite different narrative.

Safeguarding your own personal information is very significant and there are several things that you are able to do in order to assist in preventing identity theft and cyber criminals from targetting you personally.

Prevent Getting Scammed
You have likely noticed the expression “If something seems too wonderful to be accurate, it probably is.” You’ll find certain people who attempt to wrongly get info from you by suggesting you’ve won a competition and all-they require to deposit your money prize is bank-account number, charge card info and address. You shouldn’t provide these figures to anybody – whether it is within the web or in the phone, and definitely never to anyone you really do not trust. These cyber-criminals will frequently provide lure like money prizes and free vacation as they attempt to catch info about you – in-fact this is the place where the expression “phishing” originates from. They’ll contact you by telephone or e-mail informing you your individual account is going to expire and they want you to really update your info. Don’t take the lure – don’t react to these e-mails or calls, like you do you may probably be providing your particulars to these cyber-criminals.

You ought to promptly forward these phony emails to your own financial institution, lender, and regulators, before removing them. In Addition, ensure you use an excellent antispyware application on your personal computer to shield you from rouge popups, e-mails and malicious software that seek to collect your private info. Ensure that your antivirus and antimalware applications are set to mechanically update so that you get the most recent shielding that stops infections and hackers from accessing your pc.

Hold Your Confidential Files Personal
An excellent notion would be to repeat your entire lawful and private info and save it in both a bank safety-deposit box or perhaps a document at home. Maintain the advice that you take to the very least in case your bag or wallet is taken. Never bring your birth certificate, passport, or driving license on you unless completely needed, and not depart from your bag or wallet inside your car for thieves to grab.

Charge card purchases, bank statements, phone charges and repayment histories must even be shredded.

Place your own credit card bills inside your own wallet rather than inside your shopping tote. Additionally never toss receipts in the trash can. As they seek out methods to take your info robbers will frequently sort through your junk.

Frequently Track Your Credit History
Be conscious of your own credit history and assess it. Discover whether you’ll find any credit or debit cards in your statement that you didn’t authorise. Seek out any unexpected purchases and should you discover any record them all to regulators.

Produce passwords which have figures and characters and also would be challenging for anybody to figure. Don’t take a list beside you in your handbag or wallet. Retain the code words in a secure location at house. Memorise the code words. Your lender too can issue another phrase or password to gain access to your accounts.

Avoidance Is The Crucial Thing!
The likelihood of you getting one are considerably decreased by obeying the recommendations above, though there aren’t any guarantees you won’t be an id theft victim. Permit no-one to take your personal information.

Written by Betty

October 8th, 2013 at 7:28 pm

If your hard disk crashes, is your data covered by the manufacturer’s warranty ?

without comments

(Author’s Update: Data recovery work under warranty is undertaken in the UK by Data Recovery London (http://www.data-recovery-london.net/)

Data recovery warranty http://www.data-recovery-london.netThis was a question that was recently asked on a TV programme. A man’s hard disk crashed and he had lost all his data. Fortunately he was able to get the broken hard disk replaced because of the warranty, but the cost of the data recovery was not included.

To retrieve the data he had sent his hard drive to a data recovery company to get it recovered. The price tag was about £800. But, he also wanted to have that extra cost covered by the same warranty.

Warranties from any hard disk manufacturers don’t include restoration of data. That said, with the long life time and high durability of today’s hard disks perhaps this is something hard disk manufacturers may offer in the future?

Data recovery companies are usually very good at recovering data from most types of conventional hard disk failure – they are not so good at recovering data from drives that have been involved in fires and floods but these are quite rare situations.

Obviously, it’s always worthwhile to backup all your data or at least backup the data that is most important for you. This is the best warranty against data loss.

If you only use your computer for leisure, playing games or surfing the internet you may not need to take any backup at all. But today, more and more people store important information on their computers – documents and family pictures for example. Others store data vital to their professional lives too – this can represent years of work such as an academic thesis legal papers. Most people store at least some important information such as address books, emails, text documents, family pictures, music or company records.

Should you take backup? If so, what type of backup is best for you?

This all depends on the value of the data should it be lost, the time it will take to recreate lost data, and the cost to make the backup in the first place.

In most cases the data you need to backup is limited to specific files or folders. If that is the case you don’t need to backup the complete hard drive and the cost to make backup is reduced. If you only need to backup documents, emails and address books then there are many cheaper alternatives including USB memory sticks, online backup or backup to CD’s/DVD’s.

If you often use important software from the internet then you need to take a full backup of the hard disk at least once every month. This is because nearly all software programs store system related information in the registry, which if lost may mean you are no longer able to run your software.

As an alternative, make sure that you save the installation files and any accompanied software registration keys in one specific folder after you have downloaded the software. If you do this and include the folder in one of your regular smaller backups, then you will not be too badly effected should your hard drive fail.

Another way to deal with system downtime if you have a hard disk crash is to create and keep a disk image. This is a snapshot of the entire hard disk which can be used to restore your computer on your new hard disk. Included in the disk image software is a boot utility. From it you can create boot diskettes or boot CD’s.

Written by Betty

September 17th, 2013 at 12:42 pm