Ever heard of the term "data deduplication" James? It's been quiet the buzz-phrase for a while now in the backup field, and now I'm seeing it in other areas of IT.
On 9/24/08, James Winzenz <[EMAIL PROTECTED]> wrote: > > I would be wary of using any product to check for duplicate files. How > do you **know** they are duplicate files? How is it checking? Filename, > last modified date, size, etc. could all be the same, but the files could > still be different. Unless your program has a way of scanning the content > of the files (scary!) to confirm all of the data is exactly the same, I > would be leery of any results, and I certainly wouldn't use this for any > sort of data cleanup effort unless it were just to notify the user(s) and > ask them to check those files and remove any duplicates. That being said, I > have never used said program, so I don't know anything about the way it > works. But we have seen other programs that claim to find duplicate files > (Treesize Pro, have used Bindview (now Symantec Control Compliance Suite)), > and none of them work to the level where I would completely trust the > results. > > > > Thanks, > > > > James Winzenz > > Infrastructure Engineer - Security > > Pulte Homes Information Services > > > ------------------------------ > > *From:* Stefan Jafs [mailto:[EMAIL PROTECTED] > *Posted At:* Wednesday, September 24, 2008 8:42 AM > *Posted To:* NTSysadmin > *Conversation:* Duplicated File Finder > *Subject:* RE: Duplicated File Finder > > > I'm running it on 2003, it's amazing how some users have to have the same > files in so many different folder! I guess they user belt and suspenders > also! > > > > *__________________________________________________* > *Stefan Jafs* > > > > *From:* Michael B. Smith [mailto:[EMAIL PROTECTED] > *Sent:* Wednesday, September 24, 2008 11:38 > *To:* NT System Admin Issues > *Subject:* RE: Duplicated File Finder > > > > Bah. It doesn't understand the file and directory links used by Vista and > Server 2008. It seriously over-reports disk usage and finds duplicate files > that aren't actually duplicates. > > > > Regards, > > > > Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP > > My blog: http://TheEssentialExchange.com/blogs/michael > > Link with me at: http://www.linkedin.com/in/theessentialexchange > > > > *From:* Stefan Jafs [mailto:[EMAIL PROTECTED] > *Sent:* Tuesday, September 23, 2008 1:59 PM > *To:* NT System Admin Issues > *Subject:* RE: Duplicated File Finder > > > > Thanks, seems to work good! > > > > *__________________________________________________* > *Stefan Jafs* > > > > *From:* Liu, David [mailto:[EMAIL PROTECTED] > *Sent:* Tuesday, September 23, 2008 12:18 > *To:* NT System Admin Issues > *Subject:* RE: Duplicated File Finder > > > > Disk recon. Its cheap & you can do other storage mgmt/reports > > > > *From:* Stefan Jafs [mailto:[EMAIL PROTECTED] > *Sent:* Tuesday, September 23, 2008 12:02 PM > *To:* NT System Admin Issues > *Subject:* Duplicated File Finder > > > > What do you guys use to find duplicated files on your file server? > > > > *__________________________________________________* > *Stefan Jafs** * > > > > This email and any attached files are confidential and intended solely for > the intended recipient(s). If you are not the named recipient you should not > read, distribute, copy or alter this email. Any views or opinions expressed > in this email are those of the author and do not represent those of > the Amico Corporation. Warning: Although precautions have been taken to make > sure no viruses are present in this email, the company cannot accept > responsibility for any loss or damage that arise from the use of this email > or attachments. > > > > > > > > > > > > > > This email and any attached files are confidential and intended solely for > the intended recipient(s). If you are not the named recipient you should not > read, distribute, copy or alter this email. Any views or opinions expressed > in this email are those of the author and do not represent those of > the Amico Corporation. Warning: Although precautions have been taken to make > sure no viruses are present in this email, the company cannot accept > responsibility for any loss or damage that arise from the use of this email > or attachments. > > > > > > > > > > > > > > This email and any attached files are confidential and intended solely for > the intended recipient(s). If you are not the named recipient you should not > read, distribute, copy or alter this email. Any views or opinions expressed > in this email are those of the author and do not represent those of > the Amico Corporation. Warning: Although precautions have been taken to make > sure no viruses are present in this email, the company cannot accept > responsibility for any loss or damage that arise from the use of this email > or attachments. > > > > > > > > > CONFIDENTIALITY NOTICE: This email may contain confidential and privileged > material for the sole use of the intended recipient(s). Any review, use, > distribution or disclosure by others is strictly prohibited. If you have > received this communication in error, please notify the sender immediately > by email and delete the message and any file attachments from your > computer. Thank you. > > > > > > -- Sherry Abercrombie "Any sufficiently advanced technology is indistinguishable from magic." Arthur C. Clarke ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
