<<

ILLUSTRATION BY THE PROJECT TWINS T in biology at University the of California, tional linguistics as of part a master’s degree wrongin the directory. tories. There was just one problem — she was recursively,directory including subdirec all computer current inthe to delete everything nal: BY JEFFREYM.PERKEL at last ready her analysis. to begin The first step ing and running simulation software, and was Los Angeles. She had spent months develop At time, the Teal was studying computa rm −rf *. That command the instructs routine command inher Unix termi she executed what should have a been Tealracy was a graduate student when -STORAGE DISASTER Hard-drive failures are inevitable, but data loss doesn’t have to be. WAYS TO AVOID A - - - - one. But not such all strategies have same the with researchers typically exploiting more than to huge institutional magnetic-tape servers, sticks and cloud-based data-storage services inevitably fail — or are lost, stolen or damaged. sets. are media and fragile, they phone or selfies massive genome-sequencing executing trash cans, there’s no way of recovering from Windows and Macintosh operating-system And safety unlike the ject. net offered by the she says. Instead, she deleted her entire pro was to “clean up data the and get organized”, essential, whether those dataessential, those are whether smart © options range from USB memory In world, digital the backing up data is

2 0 1 9

S p r rm. Unless you have abackup. i n TOOLBOX g e r

N a t u r e

L i m i t e d .

A l l r i g h t s r e s e r v e d . - - 4 APRIL 2019 | VOL 2019| NATURE 568| APRIL 4 |131 worked for information the technology on scientific computing — had previously Francisco, that California, workshops runs anon-profitCarpentries, organization inSan Teal — who is now executive director at The embarrassing,particularly she says, because able to recover But her files. situation the was ment’s life-sciences computing helpdesk were andfriendly helpful IT folks” on her depart availability and concerns about data privacy. and volume of data, their storage-resource works for best on them basis of the nature the advantages, and scientists must discover what regularly backed up to tape, and “very the on which sheThe was working server was In Teal’s automation case, saved day. the

- TOOLBOX

(IT) team. It was “like the lifeguard having for data backup, but only one is approved for gave in tip 1, Cobb says: “So, 3-2-1 backup, and to be rescued”, she says. use with sensitive data. Your department’s then restore [some key files]. And test it on a Here are 11 tips that could make potential IT team can offer advice. “Being out of com- different computer, in a different room, on a data-loss disasters a little less painful. pliance for data protection can be very serious. different device — because if the worst-case You could face financial penalties, or lose the scenario happens, you won’t have your device.” 1. Apply the 3-2-1 rule. The rule of thumb ability to conduct research,” Wickes says. to follow when making data , says 9. Expect the unexpected. Life happens. Michael Cobb, director of engineering at 5. Automate backing up. When making back- Cobb — who lost all of his personal posses- DriveSavers, a data-recovery firm in Novato, ups, automation is key. Kelly Smith, a cardiac sions in a wildfire in 2017 — had a client who California, is ‘3-2-1’: “It’s three copies, [on] geneticist at the University of Queensland stored a rack of 96 hard disks underneath a two different media, one off-site.” You might, in Brisbane, Australia, has access to a shared fire-control sprinkler. One day, the sprinkler for instance, maintain copies on your per- network drive that is copied to tape. She used popped, and the disks were inundated with sonal computer, an external hard disk and to move her files to the drive manually, but water. “None of that data was backed up,” he the cloud-based file-synchronization service only monthly; in the event that the drive failed, says. Leslie Vosshall, a neurobiologist at the Dropbox (US$12.50 per user each month, for newer files could be lost. An automated cloud- Rockefeller University in New York City, almost 3 or more users and 3 terabytes of storage). based backup system called Druva inSync, lost her mosquito-genome sequencing data in “This is a rubric to take inspiration from, not from data-protection firm Druva in Sunnyvale, 2012 when her basement servers were flooded a law,” notes Elizabeth Wickes, an information California, now obviates that concern. “It’s one in the wake of Hurricane Sandy. Such events are scientist at the University of Illinois at Urbana– less thing I have to worry about,” she says. unavoidable but can often be anticipated — so Champaign — precious data might require “You have to not think about it,” explains search hard for vulnerabilities. About a year- extra precautions. Teal. “Because when you’re most stressed and-a-half ago, Cobb’s office was shaken by is when things go down, and when you’ve a small earthquake — hardly a surprise in 2. Talk to the specialists. Your institution forgotten backups for the past three months.” California. A picture of former US president, employs people to think about data full-time, and one-time client, Gerald Ford fell off the so talk to them, advises Juliane Schneider, 6. Protect raw data. All data are precious, wall and hit his laptop “just right”, shattering who leads at Harvard Catalyst but raw data are irreplaceable: the only way to the screen. “After that, I was like, ‘I better move in Boston, Massachusetts. Your research- recreate them is to run the experiment again. things around so I am better prepared’.” computing centre might offer free or low-cost These must therefore be backed up — and institutional backup systems; your librarian kept as read-only files. Wickes once had to kill 10. Keep a backup offline. Internet-con- can help you to craft a data-management a project because she opened a crucial file in nected backup devices are convenient: the strategy; and your grants office can advise you Microsoft Excel, which automatically format- data are instantly available. But those devices on funding-agency requirements, including ted a column, changing the values and ruining are also instantly vulnerable to user error and how, and for how long, data must be main- the underlying data set. So, protect your raw malicious software (malware). Craig Rager, tained. “They want to help you keep your data, says Martinez, “no matter what”. chief technology officer at Data Mechanix, data — especially if you have a grant,” she says. a data-recovery firm in Irvine, California, 7. Make backing up achievable. A data- says that many of his clients have suffered 3. Manage your data. Reliable backups management plan must be easy to follow for attacks, in which a virus encrypts require clever . Referenc- new members of the lab, as well as for postdocs a computer’s hard disk, making it unusable. A ing the organizing method devised by Marie who are pulling an all-nighter. “You might say, backup drive, whether attached to the com- Kondo, a popular Japanese lifestyle consultant ‘Oh, this is a perfect system.’ Okay, now, are you puter directly or through a network, can also and author of The Life-Changing Magic of going to do it at 3 a.m., after you’ve been work- be hit in such an attack, he notes. “Because you Tidying (2014), Ciera Martinez, a data scien- ing for 24 hours on something? Are you going can never eliminate this threat 100%, the only tist at the University of California, Berkeley, to do it when you’re in the middle of fighting thing you can really do is have a device that advises asking of each file: ‘Does this need to with a code problem?” Wickes says. Discuss the you back up, which is then taken offline or not be stored?’ Adds Teal, with a laugh, “You can’t strategy as a team, and make sure that it’s work- accessible to your network,” for instance, by just keep the data that bring you joy!” able. Then, just as you would for your −80 °C being powered off. Establish conventions on file naming and freezer, simulate what would happen if disas- organization — for instance, that each project ter strikes: what data would you lose, and how 11. Plan ahead. Ultimately, your data need to gets its own folder; that data and code go quickly could you recover? “At a minimum, that be available in the future. So, think about “future into dedicated subdirectories; and that each as a thought experiment would be valuable,” you”, says Teal. Consider the media on which project folder includes a file that documents says Teal. your data are saved, and the applications that the project’s aims, methods, metadata and you use to open them. Try to stay up to date. files. Plan where and how data are backed up, 8. Test backups regularly. Don’t assume Much of Vosshall’s early data are stored in an and develop a schedule — daily or weekly, for that your backups are working: test them. obsolete disk format, she says, meaning they’re instance — for doing so. Can you open your files? Do you have the backed up but inaccessible. “I’d have to go to an Raw data should always be saved, but necessary applications, login credentials antique store to find a reader.” Even the cloud intermediate processing files can often be and registration keys to run them? Wickes’ provides no guarantees: data-storage companies discarded. Massive data sets require special departmental IT service offers staff a free can shift their business priorities, or you might thought: some cloud-based providers cap account on CrashPlan from Code42 Software simply lose access to your account. So, make the sizes of stored files, and data-transfer and in Minneapolis, Minnesota, which automates sure to keep a local backup — or, at least, back storage costs can become prohibitive. backups to the cloud. One day, Wickes decided up your data on independent services. “Peo- to test her backup, only to find that it had ple will ask, ‘You mean, you don’t trust Google 4. Safeguard privacy. Data gathered from stopped syncing six months earlier. “I was fine Docs?’” says Wickes. “It’s not necessarily about patients or students are often restricted, because I had a local Time Machine backup, trusting Google Docs, it’s about trusting that which means that they cannot be stored just as well,” she says, referring to Apple’s backup you don’t lose access.” ■ anywhere. At her institution, Wickes says, system for computers running its Macintosh researchers have several cloud-based options operating system. Reiterating the advice he Jeffrey M. Perkel is technology editor, Nature.

132 | NATURE | VOL 568 | 4 APRIL 2019 ©2019 Spri nger Nature Li mited. All ri ghts reserved.