Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Backup and Recovery Community Blog
Showing posts in English
madisonwalker | 28 Jun 2010 | 3 comments

Is your Time Machine backup locked after you repair your Mac OS X computer? Are you unable to access data from Time Machine volume? Does you Mac OS X computer starts creating fresh backup automatically when you connect your external Time Machine drive to system? This behavior usually occurs due to permission issues in Macintosh machine. The permissions are either damaged or missing. At this point, you need to format your hard drive to fix the problem. However, it removes all the data from hard drive and cause serious data loss situations. In order to recover your valuable data, you must opt for Mac recovery solutions.

When you backup volume gets locked, the Time Machine icon is replaced with simple volume icon with a small lock on it. In such cases, the volume can not be mounted and you can not access data stored on it. In case the volume is mountable and you attach it to a newly installed Mac computer, the same problem occurs with this computer as well. Your system drives...

Katie Beck | 22 Jun 2010 | 2 comments

Earlier this month, Symantec Backup Exec 2010 was recognized as the Best of Tech·Ed 2010 award winner by Penton Media’s Windows IT Pro and SQL Server Magazine at the Microsoft Tech·Ed North America 2010 IT Pro Conference in New Orleans.  Backup Exec 2010 was awarded the top honor in the backup and recovery category based on its innovation, strategic importance to the market, competitive advantage and exceptional value to customers.  
 
Backup Exec 2010 (BE 2010) is the latest update to Symantec’s industry leading Backup Exec product and became generally available earlier this year.  BE 2010 helps mid-sized businesses save time and money by protecting more data and utilize less storage through fully integrated data deduplication and archiving technologies.  It also helps organizations eliminate duplicate data with a simple three-step process that does not require an additional point product.  With Backup Exec...

mariapeter12 | 21 Jun 2010 | 0 comments

The ext4 file system in Linux systems is the successor of the ext3 file system. As ext3 was extensively used for quite a long period, the ext4 file system is loaded with lot of new changes to overcome the limitations of ext3 file system. Few important data structures have been added in the ext4 file system to make it provide improved performance, new features, and reliability along with a better design. One such feature is the delayed allocation feature, which does not write any new data as soon as it is entered. Because of this, the processor waits till the time it is really necessary to write the data to the disk as it optimizes the write processes.

However, sometimes the delayed allocation feature results in severe data loss. You should use appropriate methods to resolve the situation. If you are not able to restore the lost data, then you should use a third-party Linux data recovery software to perform ext4 recovery.

Consider a scenario wherein you are using...

madisonwalker | 18 Jun 2010 | 0 comments

Mac OS X hard drive is divided into various partitions, called volume, for effective management of your precious data stored on it. Every Mac computer has a boot volume, which contains critical system files that are required for your Mac OS X operating system-based computer to boot up. These files are pretty important for booting up your system. In case the boot partition gets damaged or deleted, your system become totally unbootable and unusable. It leads to severe data loss and require Mac drive recovery solutions to fix the problem, if there is no backup in place.

The boot volume of your Mac OS X operating system contains the following files:

Mac OS X operating system.

MBR (Master Boot Record).

BootX, Mac OS X boot loader.

Operating system kernel.

Binary files that are required for multiple kernel extensions.

Mach/BSD data structures.

Input/Output Kit.

Init, Mach bootstrap (service naming) daemon.

The boot...

Swathi Turlapaty | 15 Jun 2010 | 0 comments

Backup Exec 2010 has been announced as the winner of the Best of Tech.Ed awards for the backup and recovery category along with Symantec Endpoint Protection SBE 12 for the security category. Congratulations to the Symantec product teams for the big win!

The Small and Medium Business Products were chosen on the Basis of Innovation, Strategic Importance to the Market, Competitive Advantage and Exceptional Value to Customers.

The Best Of Tech Ed judging panel noted the following in their announcement:

Symantec—Backup Exec 2010
Symantec’s industry-standard Backup Exec 2010 backup-and-recovery solution wins this award thanks to the exciting new energy poured into version 2010 (the fastest-adopted version of the tool ever). With new integrated...

Elspeth Magoria | 15 Jun 2010 | 1 comment

Join Symantec and CDW for a free technical seminar and learn how your growing business can easily protect more information while storing less data and reducing costs. Get answers to data backup challenges, common to smaller organizations, such as:
--Reducing your backup storage requirements
--Reducing your network bandwidth connection
--Reducing your data footprint
--Reducing business downtime and managing costs

Join our technical experts as they share solutions that will help you protect more, store less, and save more! Plus you will have the opportunity to enjoy great food, beverages and fun with your peers. Space is limited so register today for an event near you.

Attend and win! All registered attendees will receive a $20 Amazon.com Gift Card* and a free copy of Norton 360 at the end of the evening, plus you will have a chance to win a 32 GB iPad! (Must be present to win. Registered attendees only.)

...

Swathi Turlapaty | 02 Jun 2010 | 0 comments

Symantec today announced that Backup Exec 2010 was named as a Finalist in the Best of Tech·Ed 2010 awards program in the Backup and Recovery category by Penton Media’s Windows IT Pro® andSQL Server Magazine®

The Best of Tech·Ed 2010 awards recognize companies that offer innovative products to the industry. The judging panel reviewed 298 products and services submitted for the contest and chose 35 finalists to be interviewed at the Microsoft Tech·Ed North America 2010 IT pro conference in New Orleans, Louisiana.  Winners will be determined at the show, then announced at an invitation-only evening reception at the Hard Rock Café on June 9th.  Winners will also be announced on the Tech Ed exhibitor’s floor on June 10th at 1:00 pm,...

Swathi Turlapaty | 17 May 2010 | 2 comments

We recently added to the Backup and Archiving community, a big list of Topic tags for Backup Exec. So, for any content posted on the community pertaining to the product, please make sure to tag the discussion with the respective backup topics as displayed in the screenshot below. This would help our product teams to resurrect the product issues in a more compelling manner.

Please stay tuned for the topic list updates for the rest of Backup products. Thanks!

Dev T | 08 May 2010 | 2 comments

The simplest way to understand the granular restore functionality is to go through a simple step-by-step description of the way this works in each case. The primary differences to take note of are the differences between the backup-to-disk method and the backup-to-tape method.

Backup to Disk of an Exchange Information Store database with GRT enabled goes through the following steps:

1. GRT backup requests backup data from Exchange server
2. BE Media Server Creates IMG folders in B2d location
3. Data is sent from Exchange server to BE Media Server (unless local)
4. Media Server also requests current ESE.dll version from Exchange Server and writes this to the IMG folder
5. Finally, a test is run against the database using the VFF (virtual file filter EDBProv.dll)
6. The VFF uses ESE.dll to read the Exchange database to make sure it is consistent and that we can recover data from it
7. Backup reports...

pkh | 07 May 2010 | 0 comments

Attached is a whitepaper on how hardware encryption is done for LTO4 tapes.  Hardware encryption is part of the specs for LTO4 tapes.  Thus it is not available for LTO3 tapes although LTO4 tape drives can write to LTO3 tapes.

The part that I find particularly interesting is how an encrypted LTO4 is protected against low level copying.