|By Jamie Brenzel||
|November 26, 2012 08:00 AM EST||
Imagine it as if it's actually happened - your network has crashed and all your organization's critical applications and associated data have vanished. This worst-case scenario is one every business owner fears. Whether it's due to a storm, a break-in or the crash of your hard drive, the loss of your company data can cripple your business, leaving you stranded and holding the proverbial bag.
Business owners often assume that they don't have time to think about data backup procedures, much less the recovery process involved in the event of a system failure. They are focused instead on the business at hand. Unfortunately, what many don't realize is that the stalwart back-up methods of the past such as tape, CD or memory stick have become painfully antiquated in today's data-centric world.
While many small-to-mid-sized businesses (SMBs) think all of their data is being captured and stored in a safe place, the reality is that most SMBs are operating under a false assumption. Your business depends on mission-critical applications and their associated data. The deep dark secret is that many of these programs are not being backed up because, when left open, they are outside the parameters of standard backup procedures.
The question all business owners should ask themselves is simple: "If my computer disappeared tomorrow, could my business survive without past emails, contacts, work schedules and accounting data?" If the answer is no, then it's time to take a closer look at your backup and data recovery procedures.
The Ongoing Dilemma
Many critical non-standard databases, such as Outlook and QuickBooks along with other accounting software and legacy applications, as well as databases such as MS Access and MySQL, are not VSS-aware, meaning they lack the standard that allows files or databases to be backed up when in use. This lack of functionality leaves many IT managers and SMBs empty-handed in the event of a disaster or system failure.
Outlook and QuickBooks user/company data is notorious for being left out of standard backup routine practices. The ongoing dilemma of backing up this critical data continues to be the fact that most of us forget to shut down these programs when we leave for the day. Unless you take special precautions, it is likely that when attempting to restore these critical data files you may find that they are outdated... or worse, corrupted. This is true of many mission-critical programs that keep your business running.
Take Outlook for example; a critical application for businesses of all sizes. If Outlook is not closed, many backup tools are unable to backup the ever-important .PST file, leaving your company open to potential disaster should the program crash. The .PST contains all of your Outlook data, including emails, calendar events, contacts, schedules and notes; and the backup of this file doesn't necessarily happen automatically. Backing up the .PST file is critical for restoring your most recent data.
Additionally, for those of us who are email hoarders, keeping all email correspondence in Outlook over the past year can cause the .PST to reach gigabyte proportions very quickly. These large and unruly files can produce unexpected problems when backing them up. Many backup systems can "time out" or even worse, demand an extra tape or CD to complete the backup routine when your office is closed and employees are gone for the day.
A good starting point is to look for a Microsoft Certified backup vendor that follows the best practices set by Microsoft. Selecting back up software that doesn't conflict with Windows or other low-level drivers, such as antivirus programs and software firewalls, should be a key element in identifying a backup vendor.
When it comes to ranking important data, most people place their financial records near the top of the list. This is especially true for business owners. QuickBooks, the popular accounting software, is another application many SMBs can't do without. The absence of an Application Programming Interface (API) presents additional challenges for protecting corporate financial data. An API allows third-party companies to integrate special functions, such as requests for a data dump for easy backup. Currently, there is no safe method to programmatically dump your QuickBooks data to a safe place for easy backup at the end of the day, and without an API, developers can't create one for QuickBooks.
Intuit recommends scheduling QuickBooks to back up automatically to a specific folder, which allows your data to be verified regularly, and from there, scheduling your third party backup software to back up to that folder. This ensures that QuickBooks is in a good state before your backup software runs. Not following these best practices could lead to a corrupted QuickBooks database file.
Listed below are the QuickBooks files that your company must make sure are backed up:
.QBW = quickbooks Primary Data File
.QBB = quickbooks Backup File
.QBA = quickbooks Accountant's Copy File
(May also be a .AIF [Accountant's Import File])
.QBA.TLG = Transaction log file (for the accountant's review copy)
.QBM = quickbooks Portable Company File (for version 2006 and above).
.QBI = quickbooks Crash Roll Back File
.QBX = quickbooks Accountant Transfer File
.QDT = quickbooks United Kingdom Accountant Data File
The backup challenges of these programs are unique, so take the time to consider alternatives that address this lack of functionality. Some data backup companies provide solutions that include the ability to continuously back up your programs and data, no matter where that device is located and even while the programs are open and in use.
How Confident Are You? - Not Sure? Test It!
Not sure if your data is secure? Just like a fire drill, the best way to make sure is to put your backup method to the test. If possible, locate a spare computer, wipe the drive and attempt to do a complete restore of your company applications and associated data. Then ask yourself the following questions:
- Are you able to restore your backup files in one simple step?
- Do you need to re-install all of your applications individually?
- Do you have easy access to those applications and have you kept track of the associated upgrades?
- Does your Outlook, QuickBooks and other proprietary data install easily?
- Do you end up with the most current data when you have completed the restoration?
Most important, keep track of the time it takes you to complete the restoration from beginning to end, then multiply that by the number of computers you have within your organization. Many SMBs are unaware that the "dirty little secret" of data recovery is the time it takes to restore data, which is governed by your company's bandwidth restrictions. When your computers are down, every minute counts.
Data backup should be as important to your business as an insurance policy. Computers can be replaced if lost in a disaster, or stolen during a break-in. But if you don't have a reliable, secure method of restoring your data, all the money in the world isn't going to bring back those missing files. It is crucial to find a method that protects every level of your data.
In a perfect world, there would be no need to back up your company's data; computers and hard drives would last forever, outside threats like malicious hackers and natural disasters would be non-existent and employees would never forget to save a file, or close a program. Unfortunately this perfect world does not exist. For this reason, businesses of all types and sizes know that keeping their data backed up and protected at all times must be of the utmost priority if they wish to remain in business after the fact.
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
Oct. 8, 2015 12:15 PM EDT Reads: 210
NHK, Japan Broadcasting, will feature the upcoming @ThingsExpo Silicon Valley in a special 'Internet of Things' and smart technology documentary that will be filmed on the expo floor between November 3 to 5, 2015, in Santa Clara. NHK is the sole public TV network in Japan equivalent to the BBC in the UK and the largest in Asia with many award-winning science and technology programs. Japanese TV is producing a documentary about IoT and Smart technology and will be covering @ThingsExpo Silicon Val...
Oct. 8, 2015 12:00 PM EDT Reads: 252
For almost two decades, businesses have discovered great opportunities to engage with customers and even expand revenue through digital systems, including web and mobile applications. Yet, even now, the conversation between the business and the technologists that deliver these systems is strained, in large part due to misaligned objectives. In his session at DevOps Summit, James Urquhart, Senior Vice President of Performance Analytics at SOASTA, Inc., will discuss how measuring user outcomes –...
Oct. 8, 2015 12:00 PM EDT Reads: 431
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
Oct. 8, 2015 12:00 PM EDT Reads: 199
As a company adopts a DevOps approach to software development, what are key things that both the Dev and Ops side of the business must keep in mind to ensure effective continuous delivery? In his session at DevOps Summit, Mark Hydar, Head of DevOps, Ericsson TV Platforms, will share best practices and provide helpful tips for Ops teams to adopt an open line of communication with the development side of the house to ensure success between the two sides.
Oct. 8, 2015 12:00 PM EDT Reads: 572
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Oct. 8, 2015 12:00 PM EDT Reads: 1,047
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Oct. 8, 2015 11:45 AM EDT Reads: 203
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Oct. 8, 2015 11:45 AM EDT Reads: 209
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Oct. 8, 2015 11:15 AM EDT Reads: 159
SYS-CON Events announced today that IBM Cloud Data Services has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IBM Cloud Data Services offers a portfolio of integrated, best-of-breed cloud data services for developers focused on mobile computing and analytics use cases.
Oct. 8, 2015 11:00 AM EDT Reads: 726
SYS-CON Events announced today that Key Information Systems, Inc. (KeyInfo), a leading cloud and infrastructure provider offering integrated solutions to enterprises, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Key Information Systems is a leading regional systems integrator with world-class compute, storage and networking solutions and professional services for the most advanced softwa...
Oct. 8, 2015 11:00 AM EDT Reads: 367
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction....
Oct. 8, 2015 11:00 AM EDT Reads: 118
The last decade was about virtual machines, but the next one is about containers. Containers enable a service to run on any host at any time. Traditional tools are starting to show cracks because they were not designed for this level of application portability. Now is the time to look at new ways to deploy and manage applications at scale. In his session at @DevOpsSummit, Brian “Redbeard” Harrington, a principal architect at CoreOS, will examine how CoreOS helps teams run in production. Attende...
Oct. 8, 2015 10:45 AM EDT Reads: 1,206
The enterprise is being consumerized, and the consumer is being enterprised. Moore's Law does not matter anymore, the future belongs to business virtualization powered by invisible service architecture, powered by hyperscale and hyperconvergence, and facilitated by vertical streaming and horizontal scaling and consolidation. Both buyers and sellers want instant results, and from paperwork to paperless to mindless is the ultimate goal for any seamless transaction. The sweetest sweet spot in innov...
Oct. 8, 2015 10:30 AM EDT Reads: 178
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Oct. 8, 2015 10:30 AM EDT
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Oct. 8, 2015 10:30 AM EDT Reads: 202
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Oct. 8, 2015 10:30 AM EDT Reads: 159
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
Oct. 8, 2015 10:30 AM EDT Reads: 135
As the world moves towards more DevOps and microservices, application deployment to the cloud ought to become a lot simpler. The microservices architecture, which is the basis of many new age distributed systems such as OpenStack, NetFlix and so on, is at the heart of Cloud Foundry - a complete developer-oriented Platform as a Service (PaaS) that is IaaS agnostic and supports vCloud, OpenStack and AWS. In his session at 17th Cloud Expo, Raghavan "Rags" Srinivas, an Architect/Developer Evangeli...
Oct. 8, 2015 10:15 AM EDT Reads: 151
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 17th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity
Oct. 8, 2015 10:00 AM EDT Reads: 479