So, means you should remove the power cord before removing hard drives?
I would, yes. S-ATA may be hot-swappable if it's using S-ATA power as
well as data connections, but I'd read the small print very carefully
first... in practice, I always pull power out and wait a few seconds.
Right. This 'simply' implies that you need to do a complete system backup
just after installing Windows and setting up your default applications.
Then, keep this known good backup separate from the on-going/periodic
backups, which can be used if you need to restore from hardware failure.
That's the theory, but it's flawed when viewed against 2005 realities.
I might as well write it now... I've been meaning to do a "definitive"
on backup theory for a while, heh.
Backup is inherently a conundrum, if it is to:
- retain all wanted changes (i.e. complete up-to-date contents)
- lose all unwanted changes (i.e. the corruption)
On what basis does one scope in the wanted changes, and scope out the
wanted changes? The usual answer is: Time. Make your backup before
any unwanted changes take place, then you can fall back to this
earlier time at which your PC didn't suck.
Trouble is, any wanted changes done since the backup are lost too.
One of the most effective time-based backups is System Restore, which
is NOT a "backup" in the normal sense of the word. Rather, it is a
system-level "undo" that maintains a series of recent prior states, to
which a system may be returned - as long as the System Restore data is
intact, and the system is still able to do the System Restore.
Your proposal to create a known-good full system backup straight after
the installation (before anything goes wrong) would normally be a fine
way to maintain the system; too bad about any subsequently-installed
programs or subsequently-created data, of course.
So there are two things "wrong" with the above approach:
- it loses all patches, thus leaves you vulnerable to attack
- it loses all apps and data
Nevertheless it's a perfect solution if you are an OEM, responsibile
only for keeping the OS running so that you can refuse an RMA; in
fact, it's the lowest common denominator amongst OEMs, esp. the
biggest brands (where consumer confidence in "the brand" is high, so
they can be gouged and still be likely to come back for more)
Normally, one would modify the approach as "restore the perfect
original boilerplate system backup, re-install any programs installed
since that time, then restore your last data backup".
Implicit in the above are two things:
- an ability to scope data from malicious material
- an assumption that the original "fit to ship" code is fit to use
There's not much grounds for optimism on either count.
Why would you need to restore from backups? The answers to that
question should guide how you try to scope "wanted" from "unwanted"
1) Computer theft, destruction or natural hardware failure
- Wanted: OS and program code, user data
- Unwanted: hardware-specific driver code and settings
2) Malware payload, inability to reclaim ownership from malware
- Wanted: User data, preferences, MRUs
- Unwanted: All potentially-infected code and integrations
3) Software re-versioning
- Wanted: User data, preferences, MRUs, drivers
- Unwanted: Affected code, version dependencies
4) Computer re-deployment, e.g. sale, different job description
- Wanted: OS and program code, drivers
- Unwanted: User data, preferences, settings, MRUs
So in order to prepare for these crises, your management has to be
geared to scoping "wanted" from "unwanted" from the very outset. MS
doesn't really have the faintest clue here; infectable code is mixed
with user data, user data is version-bound to applications that are in
turn version-bound to the OS, even MS Backup is version-bound.
It's a complete mess, made worse by the need to magically be patched
up to date before hitting the Internet for the first time. Frankly,
the best approach is to minimize your data's relationship with MS
products as far as possible, and to override MS's useless duhfault
data locations (e.g. nesting IE and IM downloads and massive Music and
Pictures within the data set, gratuitously long paths, etc.).
You're referring to heat - yes? I.e., the temperature of HDD's in external
enclosures run hotter than when installed in a professionally built PC?
Heat is one of the likely factors, but not the only one, and you can
monitor this as long as the HD is in reach of S.M.A.R.T. queries.
Other factors are; static build-up (ground the HD's shell to chassis),
quality of the data cabling and connections (if you need 80-pin cable,
then an extra set of mechanical contacts will be like hitting a trench
dug across a highway at 70 mph), power misadventures, and mechanics.
How about the external enclosures with built in fans? [The ones that
actually have ventilation for moving new air in, hot air out]
Yes, you'd want non-risible fans, plenty of air circulation, chassis
grounding, decent cabling, good power discipline and gentle handling.
But I've seen sick or dead HDs even when these criteria were met.
Part of the problem may be the choice and quality of HDs adopted by
"removable hard drive" package vendors, such as IOmega etc.
Lastly, how about 2.5" harddrives? I've got one running in an aluminum case
made by IWILL. It runs cooler to the touch than the bottom of my notebook
where the hard drive is located. Are 2.5" HDD's any more susceptible to
heat induced errors than 3.5" ones?
I think 2.5" drives are more failure-prone than 3.5", whether they're
in laptops or in external brackets, even though they are at least
presumably designed to be bumped, powerred up and down, etc.
They are also designed to consume less power, so the performance
usually sucks (think 4500 RPM vs. 7200 RPM, and the puny capacities)
so they should be less likely to heat up.
The pricing's pretty dismal too, but they are small and cute. It
would be interesting to see enough useage data and results to
objectively assess reliability in the following scenarios:
- 3.5" inside PCs
- 3/5" in brackets
- 2.5" inside laptops
- 2/5" in brackets
For example, if 2.5" in brackets fail significantly less often than
3.5" in brackets, then that could make them interesting, even if they
fail in laptops more often than 3.5" fail in "real" PCs.
---------- ----- ---- --- -- - - - -
On the 'net, *everyone* can hear you scream