- Home
- About Us
- Recovery Services Individual RecoveryEnterprise RecoveryAdditional Recovery
- Software
- Testimonials
- Locations
Synology Data Recovery has become a large portion of DTI Data’s recovery business over the past year, with that we thought it only prudent to spend some time explaining how these NAS devices function and why they are vulnerable to data recovery needs. NAS devices come in many sizes and configurations. Each device has its own set of hardware specifications that enables it to do certain jobs within a specific end user environment. It is up to the end user to take a look at what their specific needs are and in doing so pinpoint as accurately as possible the type of NAS hardware necessary to optimize performance results. Whether it be home, business, or enterprise applications it is always necessary to make sure that you pick the right tool for the right job.
That being said, Synology offers a set of NAS devices that bring a great many possibilities for the end user. Each NAS device has its own set of pros and cons and as such should be scrutinized with an eye for current usage as well as future expansion. The following is a brief look at the different CPU types for the Synology Disk Station series that will hopefully aid you in your NAS choice and ultimate purchase.
At the heart of any NAS device is the CPU or integrated controller. It is what drives the hardware and in the case of Synology, is the backend engine for their DSM 5.2 operating system and NAS interface product. Each of these controllers offers a unique capability and is used throughout the Synology product line. The following is a description of some of the controllers and the models they are installed in.
The Marvell suite of CPUs/Integrated Controller offer a SoC (System on Chip) design that makes it easy to build a low cost but powerful NAS device. Marvell is the industry leader in on-board controllers for several hard drive manufacturers and is a tried and true chip for even the most robust of scenarios. Synology uses the Marvell controller in their Home and Small Business series which include the DS214se, DS414slim, and DS115J devices which offer an 800 MHz to 1 GHz CPU solution. In addition the DS2155, and DS115 series of NAS devices offer an upgrade in memory addressing and are more suited for the small business user.
Trying to repair an Exchange database should be a last resort. Often these attempts can lead to irretrievable data loss. The most common causes of corruption occur in the information store. Typically this will involve any one of public or private EDB files. When an Exchange database is corrupted, you may not see any warning signs, or you may experience the following symptoms:
To back up Virtual Server, you can:
Restoring Virtual Server involves reinstalling Virtual Server and copying the backed up files into the appropriate locations in the file system.
When you use backup software that works with the new Volume Shadow Copy Service writer for Virtual Server to back up your host operating system, you can back up Virtual Server and its running virtual machines without needing to install backup agents inside the guest operating system of the virtual machines.
Use the procedure described here to restore the entire virtual machine. During the restore process, you select a recovery point or backup and the Unitrends backup system uses the backed up data to create a new VM on the ESX host you select.
Note about VMs with hardware version 10: VMs with hardware version 10 can be restored only to ESX versions 5.5 and higher.
A couple of days back at I got a call from my support team informing me that one of our database located on the Production Server went into Suspect Mode. The version used was SQL Server 2005 Service Pack 3. Being a Production Database server, it was a Priority 1 incident and the expected time of resolution was 4 hours..
Solution:
The first step was to identify why this incident occured and after investigation it was found that it was due to the corruption of the transactional log file of the database.
I connected to SSMS using the sa login credentials and located the SUSPECT database:
I then reset the status of the SUSPECT Database by executing the below T-SQL query against the master database.
EXEC sp_resetstatus 'test_dr';