Back Up, Back Up, Back Up!

This is not your typical lost data story. I was a good girl and I kept my files on the network drive just like the company recommended. The only thing I put on my hard drive was junk files - things that wouldn't bother me if the hard drive crashed. But not on the network drive. The drives are backed up and even my PC has a local back up program. Can you see where this is going?

On Wednesday, August 25, I accessed my work from the network drive as always. I kept copies of my time report and my daily activities there. Since I was going to be out on August 26 for surgery, I saved everything and did the usual end of day sign out routine.

I returned to work on Wednesday, September 1 and accessed the drive through my 'Favorites' and got an error message. Thought nothing of it -- figured the network was down or something. Eventually, I went into File Explorer and accessed my private network drive from there. Ah ha! They moved me to a new server. Fine, fine. Whatever.

Not fine! On that drive were two folders: /windows and /log. That's it. Nothing else. I opened a ticket. Turned out the data wasn't migrated from the old to the new server. Thankfully, they kept archived data for 30 days, so the ticket should take care of that.

Thursday, I went home early. My surgery wore me out after half a day. Friday, September 3, I had to go to the ER and ended up not returning to work until October 5. I checked the drive and nothing changed. I checked the ticket and it was closed! According to the ticket, the problem was resolved. My foot! I immediately contacted support and explained the ticket wasn't resolved.

He asked for permission to remote control my PC. By all means. I watched him do all the things I had attempted. He passed the ticket to a specific group. I kept checking on the ticket and emailing the contact. I heard stuff like it's past 30 days so it may not be archived. Well, hey, I reported the problem within five days of the last time it worked! Why wasn't it properly resolved while I was out?

If you work for support or have worked for them - don't get me wrong, I am married to a guy who has worked in it and managed it. I've lost serious data here.

Lesson learned? I should've backed up the data onto my hard drive. If I had, then all would be cool. What are the chances of losing the network data AND hard drive data? Wait, don't answer that.

Back up early and back up often.

meryl k. evans is the Content Maven behind meryl k. evans, meryl k. evans. She is also a PC Today columnist and a tour guide at InformIT. She is geared to tackle your editing, writing, content, and process needs. The native Texan resides in Plano, Texas, a heartbeat north of Dallas, and doesn't wear a 10-gallon hat or cowboy boots.

Aledo prom limo .. Lockport Chicago limo O’Hare
In The News:

Tech expert Kurt “CyberGuy" Knutsson says hackers are embedding dangerous code in Chrome extensions to steal your data.
Google Maps Location Sharing is now built into Android settings; no need for Maps settings. Tech expert Kurt “CyberGuy" Knutsson discusses the welcome improvement for Android users.
Not all apps out there offer legit virtual private networks, according to Kurt the CyberGuy. He explains how to keep your information safe.
Apple's Image Playground transforms text prompts into images or animations in seconds, brining a world of creativity to the palm of your hand.
NASA's Ingenuity helicopter, which flew on Mars in April 2021, became the first aircraft to achieve powered, controlled flight on a planet other than Earth.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Thieves who have iPhones can usually detect a hidden AirTag in vehicles they are attempting to steal, and an RFID wallet may not help you.
Genmoji, the latest addition to Apple's Apple Intelligence suite, uses artificial intelligence to generate customized emoji based on text descriptions.
It's easy to find yourself swamped in unread emails. Here are a few simple steps to archiving them and clearing out some of your digital clutter.
Keep your retirement plan safe from data brokers selling your personal information. Kurt the CyberGuy explains how to protect yourself and your retirement.
Turo faces scrutiny after tragic incidents involving rented vehicles, raising questions about security measures and regulatory frameworks.
A Chinese company has developed a spherical, 276-pound law enforcement robot that has been chasing down criminals at impressive speeds.
Here are some powerful online sleuthing tricks you can use to check the credibility of a website, see old pictures of places you've lived and even learn more about your neighbors.
Beware scam calls: Avoid unknown numbers and protect your personal information. Tech expert Kurt “CyberGuy" Knutsson talks about the increasingly common scam.
Tech expert Kurt “CyberGuy" Knutsson helps you crush your New Year's goals with these 12 apps to help you stay on track and succeed.
There are many untapped safeguards and tips you can learn to take your Wi-Fi knowledge to the next level, technology expert Kim Komando shares her tricks.
VPNs ensure privacy; antivirus stops malware. Tech expert Kurt “CyberGuy" Knutsson says both are essential for online security.
Tech expert Kurt “CyberGuy" Knutsson cites a new report that says many people still use weak passwords like "123456," risking their accounts.
Tech expert Kurt “CyberGuy" Knutsson says a tech support scam used a fake Windows Defender pop-up, tricking the victim to call and download software.
Tech expert Kurt “CyberGuy" Knutsson reveals ways to restore accidentally deleted text messages on your Android phone.
A new study says outdoor security camera apps are among the biggest collectors of user data, including phone numbers, payment details and precise location.
In iOS 18.2 and later, Apple's Mail app enhances email management by automatically sorting messages into distinct categories to help find emails faster.
A virtual private network (VPN) allows computer and smartphone users to mask an IP and create a secure, encrypted connection between a device and the internet.
Android 15's latest feature, Private Space, is like a private vault helping to keep your personal or sensitive apps away from prying eyes.
Cybercriminals have more ways than ever to target teenagers; here are some of the most widespread scams and tricks to watch in order to keep your loved ones safe.

Be Prepared in the Event Computer Disaster Strikes

ComputersBusinesses and individuals alike have all grown to rely on... Read More

Reliable File and Folder Sharing in Windows Xp

This tip is on sharing files and folders on a... Read More

Are You Putting Off Productivity?

I recently took a good look at what was keeping... Read More

Home Video? Bring it On

So you got yourself a digital camcorder. If you want... Read More

How to Buy a Plasma Television Set

Most people think that all you have to do to... Read More

Seven Things to Consider When Choosing a PDA

In the early days, Personal Digital Assistants (PDAs) were not... Read More

What Has A Portable MP3 Player Have To Do With Your Business

Plenty! When we made the decision to be our own... Read More

PC Tools Youd Never Think You Need

Do you use Windows standard uninstall feature? How do you... Read More

What Exactly are Screensavers? - part II

Here are some tips on how to use screensavers:First of... Read More

Healthy Webmasters Choose Ergonomic Computer Products

Webmasters usually sit at their computers much longer in a... Read More

5 Minute Guide to Video Editing for Beginners

Getting started with video editing is very simple you only... Read More

PC Owners - The Largest Criminal Gang Ever?

The year is 1981. IBM has just released the Personal... Read More

COOKIES - What Are They!!

Cookies, not the kind that Mom makes, but the computer... Read More

Digital Cameras: Hot Gear with the Coolest Features!

Cameras: still known for taking pictures but assumed as digital... Read More

Your Computer Cant Keep Time

A computer needs a certain amount of information to operate;... Read More

How To Have Two (Multiple) Copies Of Windows

Having two operating systems is not as difficult as many... Read More

Digital Cameras + Photo Printers = Quality Instant Photographs

In the 1950's and 1960's Polaroid's instant cameras were all... Read More

MCSE 70-290 Certification Primer

Microsoft Certifications are one of the most widely acclaimed, pursued,... Read More

Gain Control Over Your Screensavers With These Simple Steps

We all enjoy our favorite screensavers but in the same... Read More

The Many Benefits of Owning a DVR

Has This Ever Happened To You? OK.. it's Friday night,... Read More

Compile .BAT Files into Native Windows Applications (.EXE)

Since the DOS days, batch files have been one of... Read More

USB Drives - What to Look For in a USB Device

Those small USB drives have so many names, pocket drives,... Read More

How To Increase Computer Speed And Performance - Great Tips & Tricks

Many computer users are worried about their computer's performance. After... Read More

Computer Viruses are Bad Luck

OK, so you caught a computer virus and your system... Read More

Basic Computer Thermodynamics

That desk in front of you and everything else around... Read More

Bishop Hill Chicago limo service ..