Back Up, Back Up, Back Up!

This is not your typical lost data story. I was a good girl and I kept my files on the network drive just like the company recommended. The only thing I put on my hard drive was junk files - things that wouldn't bother me if the hard drive crashed. But not on the network drive. The drives are backed up and even my PC has a local back up program. Can you see where this is going?

On Wednesday, August 25, I accessed my work from the network drive as always. I kept copies of my time report and my daily activities there. Since I was going to be out on August 26 for surgery, I saved everything and did the usual end of day sign out routine.

I returned to work on Wednesday, September 1 and accessed the drive through my 'Favorites' and got an error message. Thought nothing of it -- figured the network was down or something. Eventually, I went into File Explorer and accessed my private network drive from there. Ah ha! They moved me to a new server. Fine, fine. Whatever.

Not fine! On that drive were two folders: /windows and /log. That's it. Nothing else. I opened a ticket. Turned out the data wasn't migrated from the old to the new server. Thankfully, they kept archived data for 30 days, so the ticket should take care of that.

Thursday, I went home early. My surgery wore me out after half a day. Friday, September 3, I had to go to the ER and ended up not returning to work until October 5. I checked the drive and nothing changed. I checked the ticket and it was closed! According to the ticket, the problem was resolved. My foot! I immediately contacted support and explained the ticket wasn't resolved.

He asked for permission to remote control my PC. By all means. I watched him do all the things I had attempted. He passed the ticket to a specific group. I kept checking on the ticket and emailing the contact. I heard stuff like it's past 30 days so it may not be archived. Well, hey, I reported the problem within five days of the last time it worked! Why wasn't it properly resolved while I was out?

If you work for support or have worked for them - don't get me wrong, I am married to a guy who has worked in it and managed it. I've lost serious data here.

Lesson learned? I should've backed up the data onto my hard drive. If I had, then all would be cool. What are the chances of losing the network data AND hard drive data? Wait, don't answer that.

Back up early and back up often.

meryl k. evans is the Content Maven behind meryl k. evans, meryl k. evans. She is also a PC Today columnist and a tour guide at InformIT. She is geared to tackle your editing, writing, content, and process needs. The native Texan resides in Plano, Texas, a heartbeat north of Dallas, and doesn't wear a 10-gallon hat or cowboy boots.

Wheaton limo Chicago a> .. Lockport Chicago limo O’Hare
In The News:

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt the CyberGuy offers tips to dramatically reduce the risk of having your information stolen while booking flights, cruises, vehicles and accommodations.
Whoosh to launch a new urban transit system in 2026, offering a unique blend of on-demand service, direct routing and privacy that sets it apart from traditional public transportation.
Spambots, data thieves, and other bad actors run rampant online — more so now than ever before. Here's what to do if one gets ahold of you.
Tech expert Kurt “CyberGuy" Knutsson says the Super Bowl's huge audience makes it a prime target for many types of cybersecurity scams.
It's not just about freeing up space on your computer, Kurt “CyberGuy" Knutsson says. It's about protecting your digital memories and important documents.
From proofreading and research to brainstorming and data analysis, you can use generative AI as a sidekick for just about any task you can dream of.
Tech expert Kurt “CyberGuy" Knutsson says Super Bowl 2025 ads promise star power and laughs, featuring Beckham's twin reveal.
First driverless semi delivers 100 loads in Texas, transforming logistics with AI. Tech expert Kurt “CyberGuy" Knutsson gives his takeaways.
A new scam using Elon Musk's name is making the rounds, promoting "energy-saving" devices and falsely linking the Tesla and SpaceX leader to the products.
China recently unveiled a new bullet train prototype with a test speed of 280 mph that is poised to break records and set new standards.
Hackers sometimes find ways to exploit iPhones, and Apple recently discovered a vulnerability in iOS that may have been exploited for over a year.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Lynx the robot dog from China is pushing boundaries of what autonomous mobile robots can achieve with a groundbreaking design and unique mobility.
A startup claims to have developed the world's first entirely artificial intelligence-designed and 3D-printed shoe, the brainchild of a 25-year-old.
Creating an email alias can help clean up your inbox by organizing emails based on purpose, like creating different aliases for shopping, newsletters and work.
A multipurpose robotic system promises to transform how items are stacked onto pallets, aiming to maximize space utilization and reduce shipping costs.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The number of people affected by a UnitedHealth data breach in February 2024 was actually higher than previously reported and was the largest medical data breach in U.S. history.
A phishing campaign uses Google Calendar to schedule fake meeting invitations that appear legitimate, redirecting targets to phishing sites.
Toll road text scam: Fake messages claim unpaid fees, seek payment via fraudulent links. Kurt “CyberGuy" Knutsson says this scam is becoming increasingly sophisticated and widespread.
Kurt “CyberGuy" Knutsson says these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.
Tech expert Kurt “CyberGuy" Knutsson offers tips on how to protect your identity: Be vigilant, monitor accounts, use smart security, know theft response.
Tech expert Kurt “CyberGuy" Knutsson says cybercriminals are exploiting iMessage phishing protection, tricking users to reactivate links.
It's hard to imagine life without in-flight Wi-Fi these days – but sky-high web surfing comes with its own set of privacy concerns. Here's how to protect yourself.

Microsoft Great Plains Dexterity Customizations

Microsoft Business Solutions is on the way to popularize it's... Read More

Toshiba Wins Hollywood Support for the HD DVD format

What led them to this choice, as all four studios... Read More

Refurbished Computers on the Internet

What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers. Reconditioned Computers.... Read More

Home Video? Bring it On

So you got yourself a digital camcorder. If you want... Read More

Maintain Your Computer ? Keep Your Business Running

Maintaining your computer is extremely important ? especially if you... Read More

Top 9 Ways To Speed Up Your Surfing & Computing

It seems like fast never quite rates fast enough.No matter... Read More

Have You Invited A Spy Into Your Computer?

Yes, it's true. You may have inadvertently invited a spy... Read More

How to Use SQLXML to Retrieve Data from SQL Server Database?

Using SQL Server 2000 and above versions you can retrieve... Read More

How I Started Working With 3D Modeling Programs

So I'll start from the very beginning.One day I was... Read More

Improve PC Performance - 6 Tips You Must Know

Are you frustrated with your PC?Is it feeling sluggish or... Read More

PDA Bible Free Download

Your Bible At Your FingertipsIt is fairly easy to find... Read More

Cisco Certification: Building Your Home Lab, Part II

In the first part of this home lab tutorial, CCNA... Read More

How To Safeguard Your Computer?

The following practice, if done regularly, may help you to... Read More

PC Owners - The Largest Criminal Gang Ever?

The year is 1981. IBM has just released the Personal... Read More

Help, I Need a New HDTV! (Part 2 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Mail-merging: The Principles

About mail-mergingMail-merging is the process of merging variable data and... Read More

CCNA 640-801 Certification Primer

The Cisco Certified Network Associate (CCNA) Certification is meant for... Read More

Internet Explorer Shortcuts for Mouse-o-phobes

If you're like me, you occasionally find the ubiquitous mouse... Read More

Review of Rio MP3 Players

Below you will find some useful information and comments about... Read More

Customize Your Portable Player with an MP3 Player Accessory

Everywhere you look today people are listening to personal audio... Read More

iPod users get the picture

iPod users start to get the picture and it's turning... Read More

Seven Things to Consider When Choosing a PDA

In the early days, Personal Digital Assistants (PDAs) were not... Read More

Basic Computer Maintenance

One of the most common questions computer users ask is,... Read More

The Benefits of the New Firefox Browser

You probably heard of the new Firefox browser version 1.0... Read More

Apache, MySQL & PHP for Windows

Apache, MysQL and PHP for Windows could be a nice... Read More

Chicago limo Lisle ..