Ever heard of the term "data deduplication" James?  It's been quiet the
buzz-phrase for a while now in the backup field, and now I'm seeing it in
other areas of IT.

On 9/24/08, James Winzenz <[EMAIL PROTECTED]> wrote:
>
>   I would be wary of using any product to check for duplicate files.  How
> do you **know** they are duplicate files?  How is it checking?  Filename,
> last modified date, size, etc. could all be the same, but the files could
> still be different.  Unless your program has a way of scanning the content
> of the files (scary!) to confirm all of the data is exactly the same, I
> would be leery of any results, and I certainly wouldn't use this for any
> sort of data cleanup effort unless it were just to notify the user(s) and
> ask them to check those files and remove any duplicates.  That being said, I
> have never used said program, so I don't know anything about the way it
> works.  But we have seen other programs that claim to find duplicate files
> (Treesize Pro, have used Bindview (now Symantec Control Compliance Suite)),
> and none of them work to the level where I would completely trust the
> results.
>
>
>
> Thanks,
>
>
>
> James Winzenz
>
> Infrastructure Engineer - Security
>
> Pulte Homes Information Services
>
>
>  ------------------------------
>
> *From:* Stefan Jafs [mailto:[EMAIL PROTECTED]
> *Posted At:* Wednesday, September 24, 2008 8:42 AM
> *Posted To:* NTSysadmin
> *Conversation:* Duplicated File Finder
> *Subject:* RE: Duplicated File Finder
>
>
> I'm running it on 2003, it's amazing how some users have to have the same
> files in so many different folder! I guess they user belt and suspenders
> also!
>
>
>
> *__________________________________________________*
> *Stefan Jafs*
>
>
>
> *From:* Michael B. Smith [mailto:[EMAIL PROTECTED]
> *Sent:* Wednesday, September 24, 2008 11:38
> *To:* NT System Admin Issues
> *Subject:* RE: Duplicated File Finder
>
>
>
> Bah. It doesn't understand the file and directory links used by Vista and
> Server 2008. It seriously over-reports disk usage and finds duplicate files
> that aren't actually duplicates.
>
>
>
> Regards,
>
>
>
> Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
>
> My blog: http://TheEssentialExchange.com/blogs/michael
>
> Link with me at: http://www.linkedin.com/in/theessentialexchange
>
>
>
> *From:* Stefan Jafs [mailto:[EMAIL PROTECTED]
> *Sent:* Tuesday, September 23, 2008 1:59 PM
> *To:* NT System Admin Issues
> *Subject:* RE: Duplicated File Finder
>
>
>
> Thanks, seems to work good!
>
>
>
> *__________________________________________________*
> *Stefan Jafs*
>
>
>
> *From:* Liu, David [mailto:[EMAIL PROTECTED]
> *Sent:* Tuesday, September 23, 2008 12:18
> *To:* NT System Admin Issues
> *Subject:* RE: Duplicated File Finder
>
>
>
> Disk recon. Its cheap & you can do other storage mgmt/reports
>
>
>
> *From:* Stefan Jafs [mailto:[EMAIL PROTECTED]
> *Sent:* Tuesday, September 23, 2008 12:02 PM
> *To:* NT System Admin Issues
> *Subject:* Duplicated File Finder
>
>
>
> What do you guys use to find duplicated files on your file server?
>
>
>
> *__________________________________________________*
> *Stefan Jafs** *
>
>
>
> This email and any attached files are confidential and intended solely for
> the intended recipient(s). If you are not the named recipient you should not
> read, distribute, copy or alter this email. Any views or opinions expressed
> in this email are those of the author and do not represent those of
> the Amico Corporation. Warning: Although precautions have been taken to make
> sure no viruses are present in this email, the company cannot accept
> responsibility for any loss or damage that arise from the use of this email
> or attachments.
>
>
>
>
>
>
>
>
>
>
>
>
>
> This email and any attached files are confidential and intended solely for
> the intended recipient(s). If you are not the named recipient you should not
> read, distribute, copy or alter this email. Any views or opinions expressed
> in this email are those of the author and do not represent those of
> the Amico Corporation. Warning: Although precautions have been taken to make
> sure no viruses are present in this email, the company cannot accept
> responsibility for any loss or damage that arise from the use of this email
> or attachments.
>
>
>
>
>
>
>
>
>
>
>
>
>
> This email and any attached files are confidential and intended solely for
> the intended recipient(s). If you are not the named recipient you should not
> read, distribute, copy or alter this email. Any views or opinions expressed
> in this email are those of the author and do not represent those of
> the Amico Corporation. Warning: Although precautions have been taken to make
> sure no viruses are present in this email, the company cannot accept
> responsibility for any loss or damage that arise from the use of this email
> or attachments.
>
>
>
>
>
>
>
>
> CONFIDENTIALITY NOTICE:  This email may contain confidential and privileged
> material for the sole use of the intended recipient(s).  Any review, use,
> distribution or disclosure by others is strictly prohibited.  If you have
> received this communication in error, please notify the sender immediately
> by email and delete the message and any file attachments from your
> computer.  Thank you.
>
>
>
>
>
>


-- 
Sherry Abercrombie

"Any sufficiently advanced technology is indistinguishable from magic."
Arthur C. Clarke

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to