<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mac/Apple Archives - Datarecovery.com</title>
	<atom:link href="https://datarecovery.com/category/data-types/macapple/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Thu, 26 Sep 2024 17:46:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>How to Use Target Disk Mode and Share Mode on Mac Computers</title>
		<link>https://datarecovery.com/rd/mac-target-disk-mode-share-mode/</link>
		
		<dc:creator><![CDATA[John Krane]]></dc:creator>
		<pubDate>Thu, 26 Sep 2024 17:46:36 +0000</pubDate>
				<category><![CDATA[Mac/Apple]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=8050</guid>

					<description><![CDATA[<p>Target Disk Mode is a special boot mode for Intel-based Macs (and an option in macOS Recovery on Macs with Apple silicon) that allows you to connect one Mac to another and use the first Mac as an external storage...</p>
<p>The post <a href="https://datarecovery.com/rd/mac-target-disk-mode-share-mode/">How to Use Target Disk Mode and Share Mode on Mac Computers</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_5838" style="width: 310px" class="wp-caption alignright"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-5838" class="size-medium wp-image-5838" src="https://datarecovery.com/wp-content/uploads/2018/07/321-300x279.jpg" alt="Apple MacBook Pro" width="300" height="279" srcset="https://datarecovery.com/wp-content/uploads/2018/07/321-300x279.jpg 300w, https://datarecovery.com/wp-content/uploads/2018/07/321.jpg 452w" sizes="(max-width: 300px) 100vw, 300px" /><p id="caption-attachment-5838" class="wp-caption-text">Apple MacBook Pro</p></div>
<p><span style="font-weight: 400;">Target Disk Mode is a special boot mode for Intel-based Macs (and an option in macOS Recovery on Macs with Apple silicon) that allows you to connect one Mac to another and use the first Mac as an external storage device.</span></p>
<p><span style="font-weight: 400;">This lets you quickly transfer large amounts of data between the two computers, which is particularly useful for migrating data to a new Mac, recovering data from an old Mac, or troubleshooting a Mac that won&#8217;t start up normally.  </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><b>An important note: If your Mac shows signs of media failure, do not attempt to read data in Target Disk mode or Share Disk mode. </b><span style="font-weight: 400;">Signs of media failure include (but aren’t limited to) clicking sounds, file corruption, and extremely slow operation. Learn more about the signs of media failure. </span></p>
<p><span style="font-weight: 400;">Below, we’ll explain how to enter Target Disk mode. We’ll also explain how to use a similar feature (“Share Disk&#8221; or “Mac Disk Sharing&#8221;) for Apple Silicone Macs (M1 and later). </span></p>
<h2><span style="font-weight: 400;">Using Target Disk Mode on Intel-Based Macs</span></h2>
<ol>
<li style="font-weight: 400;" aria-level="1"><b>Connect the Macs:</b><span style="font-weight: 400;"> Use a Thunderbolt or USB-C cable to connect the Intel Mac (the one you want to use as a disk) to the second Mac. Note that you </span><i><span style="font-weight: 400;">must </span></i><span style="font-weight: 400;">use a Thunderbolt cable if either computer has macOS or later installed. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Start Target Disk Mode (if the Mac is off):</b><span style="font-weight: 400;"> Press and hold the </span><b>T</b><span style="font-weight: 400;"> key, then press the power button to turn on the Mac. Keep holding T until you see the Thunderbolt icon.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Start Target Disk Mode (if the Mac is already on):</b><span style="font-weight: 400;"> Click the </span><b>Apple icon &gt; System Settings &gt; General &gt; Startup Disk &gt; Restart in Target Disk Mode</b><span style="font-weight: 400;">.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Access the Disk:</b><span style="font-weight: 400;"> The Intel Mac&#8217;s drive will appear as an external hard drive on the second Mac&#8217;s desktop. You can now copy files to or from it.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Exit Target Disk Mode:</b><span style="font-weight: 400;"> Eject the disk from the second Mac. Then, press and hold the power button on the Intel Mac to turn it off.</span></li>
</ol>
<h2><span style="font-weight: 400;">Using Share Disk Mode on Apple Silicon Macs</span></h2>
<p><span style="font-weight: 400;">Due to new security features, Apple Silicon Macs (those with M1, M2, and later chips) don&#8217;t have a Target Disk Mode in the same way Intel-based Macs do. Instead, they use a feature called </span><b>Share Disk</b><span style="font-weight: 400;"> within macOS Recovery. Here&#8217;s how to use it:  </span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><b>Connect the Macs:</b><span style="font-weight: 400;"> Use a </span><span style="font-weight: 400;">USB, USB-C, or </span><span style="font-weight: 400;">Thunderbolt cable to connect the target Apple silicon Mac to the second Mac (the one you&#8217;ll be accessing the disk from).</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Turn off the Target Mac</b><span style="font-weight: 400;">: Make sure it’s fully shut down; the Touch Bar and keyboard should be completely off. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Start up in macOS Recovery:</b><span style="font-weight: 400;"> Turn on the target Mac and </span><b>keep holding the power button</b><span style="font-weight: 400;"> until you see the startup options window.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Continue to Recovery:</b><span style="font-weight: 400;"> Select </span><b>Options</b><span style="font-weight: 400;">, click </span><b>Continue</b><span style="font-weight: 400;">, and enter your password if asked.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Open Share Disk:</b><span style="font-weight: 400;"> In the macOS Utilities window, select </span><b>Utilities &gt; Share Disk</b><span style="font-weight: 400;"> from the menu bar.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Choose the disk or volume:</b><span style="font-weight: 400;"> Select the one you want to share from this Mac, then click <strong>Start Sharing.</strong></span></li>
<li style="font-weight: 400;" aria-level="1"><b>Connect: </b><span style="font-weight: 400;">The second Mac can now connect to the shared disk. Access the shared disk through the Network section in Finder.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Stop Sharing:</b><span style="font-weight: 400;"> When finished, click </span><b>Stop Sharing</b><span style="font-weight: 400;"> in the Share Disk window.</span></li>
</ol>
<h2><span style="font-weight: 400;">Understanding the Limitations of Target Disk / Share Disk Mode</span></h2>
<p><span style="font-weight: 400;">While Target Disk/Share Disk can be useful, it can’t fix physical issues with your storage media. If the drive you&#8217;re trying to access has errors or is failing, Target Disk Mode/Share Disk might not work reliably, and it could cause permanent data loss. </span></p>
<p><span style="font-weight: 400;">Additionally, Target Disk and Share Disk may not provide the fastest possible transfer speeds; directly connecting the target drive may be advisable, particularly if the Macs are more than a few generations apart. </span></p>
<p><span style="font-weight: 400;">If you’re experiencing data loss on a macOS device, we’re here to help. Datarecovery.com provides free media evaluations, and we support our services with a </span><b>no data, no charge guarantee</b><span style="font-weight: 400;">: If we’re unable to successfully recover important files from your macOS device, you don’t pay for the attempt. </span></p>
<p><span style="font-weight: 400;">To learn more, call 1-800-237-4200 to speak with an expert or </span><a href="http://datarecovery.com/submit.php"><span style="font-weight: 400;">submit a case online.</span></a></p>
<p>&nbsp;</p>
<p>The post <a href="https://datarecovery.com/rd/mac-target-disk-mode-share-mode/">How to Use Target Disk Mode and Share Mode on Mac Computers</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Can a MacOS Computer Get a Virus?</title>
		<link>https://datarecovery.com/rd/can-a-mac-os-computer-get-a-virus/</link>
		
		<dc:creator><![CDATA[John Krane]]></dc:creator>
		<pubDate>Thu, 20 Apr 2023 18:58:37 +0000</pubDate>
				<category><![CDATA[Mac/Apple]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=7526</guid>

					<description><![CDATA[<p>Apple’s macOS is extremely secure, but like all operating systems, it can be infected by trojans, viruses, ransomware, and other types of malware. <br />
This is less of a significant threat than on Windows machines for several reasons:</p>
<p>By default, macOS...</p>
<p>The post <a href="https://datarecovery.com/rd/can-a-mac-os-computer-get-a-virus/">Can a MacOS Computer Get a Virus?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Apple’s macOS is extremely secure, but like all operating systems, it can be infected by trojans, viruses, ransomware, and other types of malware. </span></p>
<p><span style="font-weight: 400;">This is less of a significant threat than on Windows machines for several reasons:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">By default, macOS doesn’t allow the installation of unverified third-party software. A scanning service called Notarization requires developers to submit their apps for scanning as a component of the distribution process.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">macOS has built-in malware tools. </span><a href="https://support.apple.com/guide/security/gatekeeper-and-runtime-protection-sec5599b66df/web"><span style="font-weight: 400;">Gatekeeper</span></a><span style="font-weight: 400;">, the primary security technology, verifies that executables haven’t been altered and prompts users before allowing them to run.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The operating system also maintains a regularly updated, signature-based list of malware (</span><a href="https://support.apple.com/guide/security/protecting-against-malware-sec469d47bd8/web"><span style="font-weight: 400;">XProtect</span></a><span style="font-weight: 400;">). This enables macOS to remediate most malware that has been executed. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Generally, macOS is a poor target for ransomware. Windows computers represent a bigger share of the market. Malware creators want their software to spread, so they typically target Windows users — it makes less sense to target a smaller operating system with stronger security controls.</span></li>
</ul>
<p><span style="font-weight: 400;">Essentially, Apple devices existed in a walled garden: Apple controls what software is allowed to run, and while users </span><i><span style="font-weight: 400;">can </span></i><span style="font-weight: 400;">disable security controls, most do not. </span></p>
<h2><span style="font-weight: 400;">How Malware Spreads on MacOS Machines</span></h2>
<p><span style="font-weight: 400;">With that said, malware can infect macOS computers, particularly if users disable their security controls. That’s common when users are trying to pirate software: In 2020, the </span><a href="https://www.macworld.com/article/674499/mac-ransomware-thiefquest-evilquest-could-encrypt-your-mac-updated.html"><span style="font-weight: 400;">ThiefQuest/EvilQuest ransomware</span></a><span style="font-weight: 400;"> spread across macOS machines via an infected copy of pirated software that was available through torrent tracking websites.  </span></p>
<div id="attachment_6421" style="width: 210px" class="wp-caption alignright"><img decoding="async" aria-describedby="caption-attachment-6421" class="wp-image-6421 size-medium" src="https://datarecovery.com/wp-content/uploads/2020/10/annie-spratt-N5Q8RNXrX8Q-unsplash-200x300.jpg" alt="A computer running macOS. " width="200" height="300" srcset="https://datarecovery.com/wp-content/uploads/2020/10/annie-spratt-N5Q8RNXrX8Q-unsplash-200x300.jpg 200w, https://datarecovery.com/wp-content/uploads/2020/10/annie-spratt-N5Q8RNXrX8Q-unsplash-683x1024.jpg 683w, https://datarecovery.com/wp-content/uploads/2020/10/annie-spratt-N5Q8RNXrX8Q-unsplash-768x1152.jpg 768w, https://datarecovery.com/wp-content/uploads/2020/10/annie-spratt-N5Q8RNXrX8Q-unsplash-1024x1536.jpg 1024w, https://datarecovery.com/wp-content/uploads/2020/10/annie-spratt-N5Q8RNXrX8Q-unsplash-1365x2048.jpg 1365w, https://datarecovery.com/wp-content/uploads/2020/10/annie-spratt-N5Q8RNXrX8Q-unsplash-scaled.jpg 1707w" sizes="(max-width: 200px) 100vw, 200px" /><p id="caption-attachment-6421" class="wp-caption-text">Mac OS computers may be targets for malware infection.</p></div>
<p><span style="font-weight: 400;">And in March 2023, a trojan horse known as </span><a href="http://aler-command-and-control-c2-malware"><span style="font-weight: 400;">MacStealer</span></a><span style="font-weight: 400;"> spread through a compromised .DMG file. MacStealer targeted user data in KeyChain databases and other types of files, potentially stealing iCloud passwords, credit card numbers, and other sensitive data. </span></p>
<p><span style="font-weight: 400;">macOS malware can also spread through phishing. Users are tricked into clicking a link on a website or in an email. They may be prompted to enter private credentials or download an executable file. </span></p>
<p><span style="font-weight: 400;">Adware and spyware can also be an issue, though these programs may not meet strict definitions of “malware.” Users may willingly download a program that slows down their computer by tracking behavior and showing ads. Generally, these programs don’t make it through the Notarization process.</span></p>
<h2><span style="font-weight: 400;">Recovering Data from a MacOS Malware Infection</span></h2>
<p><span style="font-weight: 400;">The good news: Apple releases regular security patches to address known threats. If you keep your computer up to date — and don’t routinely install pirated software — you probably don’t need to worry much about malware. </span></p>
<p><span style="font-weight: 400;">You certainly don’t need a third-party virus scanner: macOS’s built in security controls are sufficient for the typical user. </span></p>
<p><span style="font-weight: 400;">However, malware is a potential threat for </span><i><span style="font-weight: 400;">every </span></i><span style="font-weight: 400;">computer, including Linux, Unix, and macOS machines. If you believe that your computer has been infected by ransomware or any other type of malware, take these steps:</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Keep your computer disconnected from the internet. Some malware may actively transfer data (including passwords and other sensitive information) to bad actors.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">If the malware has compromised important data, make a list of important files. If you have a backup, use it for disaster recovery — but don’t plug external hard drives or other devices into the affected machine. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Document any activities that may have enabled the infection. For example, if you recently downloaded software from a torrent website or clicked on an email link from an unknown source, that information could be helpful for identifying and resolving the infection. </span></li>
</ol>
<p><span style="font-weight: 400;">If you don’t have a backup, you’ll need to contact a professional data recovery provider. Malware can corrupt key files and render the machine unusable, and manufacturer warranties generally don’t cover data recovery services. </span></p>
<p><span style="font-weight: 400;">However, an experienced data recovery firm should be able to handle the project — even “successful&#8221; macOS ransomware variants rarely encrypt all data, and reversing the damage should be fairly straightforward.</span></p>
<p><span style="font-weight: 400;">At Datarecovery.com, we provide free evaluations and support our services with a </span><b>no data, no charge </b><span style="font-weight: 400;">guarantee: If we’re unable to successfully recover important files from your macOS device, you don’t pay for the attempt. </span></p>
<p><span style="font-weight: 400;">To learn more, call 1-800-237-4200 to speak with an expert or <a href="http://datarecovery.com/submit.php">submit a case online.</a></span></p>
<p>The post <a href="https://datarecovery.com/rd/can-a-mac-os-computer-get-a-virus/">Can a MacOS Computer Get a Virus?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Datarecovery.com Announces Support for APFS File System</title>
		<link>https://datarecovery.com/2016/06/datarecovery-com-announces-support-apfs-file-system/</link>
					<comments>https://datarecovery.com/2016/06/datarecovery-com-announces-support-apfs-file-system/#respond</comments>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 20 Jun 2016 19:05:37 +0000</pubDate>
				<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Mac/Apple]]></category>
		<category><![CDATA[Storage Industry]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[Mac OS]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?p=4556</guid>

					<description><![CDATA[<p>Datarecovery.com (formerly ESS Data Recovery, Inc.) has announced full support for the upcoming Apple File System (APFS). The company will offer a full set of data recovery services, providing an important resource for Mac OS users who lose files from...</p>
<p>The post <a href="https://datarecovery.com/2016/06/datarecovery-com-announces-support-apfs-file-system/">Datarecovery.com Announces Support for APFS File System</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Datarecovery.com (formerly ESS Data Recovery, Inc.) has announced full support for the upcoming Apple File System (APFS). The company will offer a full set of data recovery services, providing an important resource for Mac OS users who lose files from APFS volumes.</p>
<p>Apple, Inc. recently announced the new file system to developers, although APFS wasn’t the direct focus of the company&#8217;s WWDC 2016 keynote address.</p>
<p>Since APFS draws from the successful features of Apple&#8217;s HFS+ while incorporating features from other next-generation file systems such as ZFS, Datarecovery.com&#8217;s engineers already have an established set of viable data recovery tools.</p>
<p>&#8220;Some of the new features of APFS have been around for a while, so we&#8217;ve already developed resources that we could reliably use in a data recovery case,&#8221; said Ben Carmitchel, President of Datarecovery.com. &#8220;Obviously, we need to build new recovery utilities for the file system efficiently, but our research engineers are already hard at work.&#8221;</p>
<p>&#8220;We&#8217;re completely confident that we could handle an APFS case with our current technology,&#8221; Carmitchel added. &#8220;Now, we&#8217;re working at making that process more efficient.&#8221;</p>
<p>APFS will support clones, writable copies of storage blocks that track changes and allow those changes to be rolled back. This is largely seen as preferable to the copies used in HFS+, because clones are writable (not just readable). Mac users will be able to use the new features to back up their systems reliably.</p>
<p>&#8220;APFS is exciting, and it should make data backup even easier for Mac OS users,&#8221; said Carmitchel. &#8220;That means fewer instances of data loss. However, until the file system has been in popular use for several months, we strongly recommend keeping full, offsite backups of any APFS volumes to protect important data.&#8221;</p>
<p>Other features of the operating system include improved atomicity, adaptable filesystem-level encryption and TRIM support. Datarecovery.com&#8217;s engineers will perform simulated recoveries of APFS from various media, including solid-state drives and servers, to establish a streamlined process for APFS data recovery.</p>
<p>&#8220;From what we&#8217;ve seen so far, APFS improves on HFS+ in just about every conceivable way,&#8221; said Carmitchel. &#8220;However, it&#8217;s important not to confuse functionality with redundancy. Data loss will still be a problem with this file system, so proper backup procedures are absolutely important.&#8221;</p>
<p>&#8220;If a drive fails, or a file becomes corrupted without a back up, we&#8217;ll be ready to help.&#8221;</p>
<p>Datarecovery.com is a worldwide leader in data loss prevention, computer forensics and data recovery services. With four locations in California, Illinois, Arizona, and Toronto, the company provides a variety of services to thousands of clients each year. Visit <a href="https://datarecovery.com">https://datarecovery.com</a> for more information.</p>
<p>The post <a href="https://datarecovery.com/2016/06/datarecovery-com-announces-support-apfs-file-system/">Datarecovery.com Announces Support for APFS File System</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/2016/06/datarecovery-com-announces-support-apfs-file-system/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Xsan Data Recovery</title>
		<link>https://datarecovery.com/rd/xsan-data-recovery/</link>
		
		<dc:creator><![CDATA[Ben Carmitchel]]></dc:creator>
		<pubDate>Tue, 24 Jun 2014 03:10:59 +0000</pubDate>
				<category><![CDATA[Data Recovery Service]]></category>
		<category><![CDATA[Data Types]]></category>
		<category><![CDATA[Mac/Apple]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[RAID]]></category>
		<category><![CDATA[SAN]]></category>
		<category><![CDATA[Services]]></category>
		<guid isPermaLink="false">http://datarecovery.com/?post_type=rd&#038;p=2080</guid>

					<description><![CDATA[<p>An overview of our Xsan data recovery services, including a detailed case study involving an enterprise SAN with a failed RAID volume.</p>
<p>The post <a href="https://datarecovery.com/rd/xsan-data-recovery/">Xsan Data Recovery</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>The Xsan file system is intended for enterprise Storage Area Networks (SANs), and while it is heavily utilized, data recovery requires an extensive understanding of its layout and architecture.</strong> Datarecovery.com has successfully provided services for 64-bit Xsan RAID arrays since the file system was released, and we specialize in Xserve and Promise VTrak data recovery.</p>
<p>In most circumstances, our engineers can focus data recovery efforts on a failed RAID array, allowing for seamless re-integration when the data is restored. A case study is included below. For more information or to get a quote for Xsan data recovery, call 1.800.237.4200 today and ask to speak with a RAID expert.</p>
<h3><strong>Case Study: Xsan RAID Failure During Firmware Upgrade</strong></h3>
<p>In July of 2008, Datarecovery.com received a call from a company with six Xserve RAID boxes (12 separate RAIDs altogether including a mirror for metadata). The company utilized this SAN for large graphic files, and it was under heavy use.</p>
<p>For performance reasons, the company&#8217;s technicians upgraded the firmware on all of the Xserve RAIDs. While the upgrade did not negatively affect data on most of the arrays, the final Xserve RAID encountered a serious error. The disk configuration was lost, and all of the RAID members registered as hot spares.</p>
<p>Any sort of reconfiguration of the RAID would result in a complete initialization of the data, which would render all of the graphic files permanently inaccessible. Unfortunately, the timing couldn&#8217;t have been worse &#8211; the company&#8217;s backups had recently failed, and they were unable to restore the data on their own.</p>
<p>Datarecovery.com&#8217;s lead SAN and RAID engineer spoke directly with the technicians at the company in order to create a plan that would minimize downtime. By sending a team of engineers to the company&#8217;s headquarters, Datarecovery.com was able to clone every drive in the SAN (40 drives total) within a day.</p>
<p>After completing this process, Datarecovery.com&#8217;s RAID team was able to analyze the cloned media from the failed Xserve RAID array. We utilized our firmware repair equipment to create a fix, then created a replacement set of Xserve RAID modules to replace the modules in the failed RAID array. The Xsan software recognized the &#8220;new&#8221; array, and the SAN was online.</p>
<p><strong>The entire process took less than 48 hours and saved the company hundreds of thousands of dollars in lost revenue.</strong> We kept the costs of our services below $50,000, including the costs of our onsite engineering team, and we remained in contact with the client to verify that the data was fully intact.</p>
<h3><strong>Data Recovery for Xsan Software Systems</strong></h3>
<p>Xsan is an extremely useful <img decoding="async" class="alignright size-full wp-image-2081" src="http://datarecovery.com/wp-content/uploads/2014/06/RAID_4.jpg" alt="RAID_4" width="250" height="200" />software technology that allows multiple users to access a large amount of striped data across multiple Xserve RAID boxes or Promise VTrak E-Class RAID Subsystems. However, while it has numerous advantages from a technical standpoint, it is by no means perfect.</p>
<p>Data recovery issues occur when one of the subsystems fails, causing the entire SAN to go down (there is no redundancy built into the Xsan software, although redundant configurations are certainly possible). Datarecovery.com&#8217;s team of experienced RAID &amp; Apple data recovery engineers will ensure optimal recovery results at a cost that fits your budget.</p>
<p>If your SAN requires data recovery or if a volume is inaccessible, we strongly advise seeking immediate assistance. Datarecovery.com can provide a fast quote along with detailed advice from the world&#8217;s leading Xsan data recovery experts. <strong>Call us today at 1.800.237.4200 to speak with a RAID specialist.</strong></p>
<p>&nbsp;</p>
<p>The post <a href="https://datarecovery.com/rd/xsan-data-recovery/">Xsan Data Recovery</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Apple Xserve RAID Data Recovery</title>
		<link>https://datarecovery.com/rd/apple-xserve-raid-data-recovery/</link>
		
		<dc:creator><![CDATA[Ben Carmitchel]]></dc:creator>
		<pubDate>Tue, 24 Jun 2014 03:05:27 +0000</pubDate>
				<category><![CDATA[Data Recovery Service]]></category>
		<category><![CDATA[Data Types]]></category>
		<category><![CDATA[Mac/Apple]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[RAID]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[OS X]]></category>
		<guid isPermaLink="false">http://datarecovery.com/?post_type=rd&#038;p=2076</guid>

					<description><![CDATA[<p>A detailed look at Xserve RAID failures and data recovery options.</p>
<p>The post <a href="https://datarecovery.com/rd/apple-xserve-raid-data-recovery/">Apple Xserve RAID Data Recovery</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>Factors That Affect Apple Xserve Data Recovery</h3>
<p>Apple&#8217;s Xserve utilizes a wide variety of RAID levels, and Datarecovery.com offers services for every configuration.</p>
<p>The most common configuration is a standard stripe set with parity ( RAID 5). The default RAID stripe size is 64k (128 sectors), and data is striped across all of the disks with a parity block that rotates between the drives; this parity block uses the XOR algorithm.</p>
<p>If one disk fails in a standard RAID 5, the RAID controller card can default to degraded mode and the server can continue to operate without interruption. Data recovery may be necessary if there is corruption within essential parity blocks or if a second drive fails while the array is operating in a degraded state. Additional data loss issues include failed firmware upgrades, RAID controller card failures, and natural disasters.</p>
<p>Xserve also supports hardware RAID levels 0, 1, 3, and 0+1. RAID levels 10, 30, and 50 are available, but these levels must be supported supported using host-based software RAID. Our engineers have experience with every configuration, including options not supported by Xserve hardware, and each of our laboratories is completely outfitted for Xserve data recovery.</p>
<p>If you have an Apple Xserve and you need to recover key files after a failure, contact us right away at 1.800.237.4200 to discuss options.</p>
<h3>Real Laboratories for Xserve RAID Data Recovery</h3>
<p>To keep your downtime to a minimum, we will work closely with your IT staff to create a case-appropriate recovery and reintegration plan. In some circumstances, this can include on-site recovery at your location or remote data recovery. We recognize that Xserve systems play a critical role in your business&#8217;s operation, and our experience with various Xserve models allows for a RAID recovery success rate of 95 percent (dependent on scenario, RAID level, and other factors).</p>
<p>Datarecovery.com operates fully outfitted laboratories &#8211; unlike our competitors, we do not receive your media and immediately outsource it to another facility.  With locations throughout the United States and Canada, we can quickly gain access to your RAID media and begin working on your case. We create full clones of every drive in the array before performing data recovery, and our Apple specialists can create software on-the-fly to address your server&#8217;s specific needs.</p>
<p>Datarecovery.com&#8217;s Xserve technology is unparalleled, and we&#8217;re always available to provide a free consultation. Call us now at 1.800.237.4200 and ask to speak with an Xserve expert.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-2077" src="http://datarecovery.com/wp-content/uploads/2014/06/xserve.jpg" alt="xserve" width="200" height="160" /></p>
<p>Apple Xserve RAID<br />
<span class="paraSix">*Xserve is a registered trademark of Apple Computer, Inc. Datarecovery.com, Inc. is not affiliated with Apple Computer, Inc. All images herein are property of Apple Computer, Inc.</span></p>
<p>The post <a href="https://datarecovery.com/rd/apple-xserve-raid-data-recovery/">Apple Xserve RAID Data Recovery</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 102/132 objects using Memcached
Page Caching using Disk: Enhanced 
Minified using Disk

Served from: datarecovery.com @ 2026-04-13 19:07:53 by W3 Total Cache
-->