{"id":2064,"date":"2013-06-18T16:32:13","date_gmt":"2013-06-18T16:32:13","guid":{"rendered":"http:\/\/www.backupassist.com\/blog\/?p=2064"},"modified":"2019-11-19T03:10:54","modified_gmt":"2019-11-19T03:10:54","slug":"introducing-the-data-container","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container","title":{"rendered":"Introducing &#8211; the Data Container"},"content":{"rendered":"<p><a href=\"http:\/\/www.backupassist.com\/blog\/releases\/introducing-the-data-container\/attachment\/blog-image-design-template-3\/\" rel=\"attachment wp-att-2079\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2079\" title=\"Introducing the Data Container\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template1.jpg\" alt=\"\" width=\"640\" height=\"250\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template1.jpg 640w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template1-300x117.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>It\u2019s great having your <a href=\"http:\/\/www.backupassist.com\/education\/whitepapers\/system_protection_whitepaper.html\">System Protection<\/a> backups on other media. If your server decides to stop working or a hard drive breaks, your data is safely stored on another device. Once your server is fixed, you can restore any of the image backups you made from whatever media they are on &#8230; in most cases. There are two situations where a Windows Server can be picky about what it does with a backup media.<\/p>\n<p><!--more-->When BackupAssist creates an image backup, it uses a Windows service to back up only the data that changed while still creating a full restore point for each backup. However, if the destination is an RDX drive or a Network destination (like a NAS) Windows cannot maintain historical information about the backups. This means full and not incremental image backups are made, and each backup will overwrite the previous one &#8211; leaving only a single restore point.<\/p>\n<p>Another issue can arise when an image backup is moved to another media. When this happens, Windows is seldom happy. A Windows 2008R1 Server will look at it think, \u201cwho are you? You\u2019re not the media my data was backed up to,\u201d and ignore the media. On 2008R2, Windows is a little more forgiving. It will recognize the media, but the restore will only be from the last backup that was made.<\/p>\n<p>System Protection backups are powerful and versatile but, as the scenarios show, they can be constrained by how Windows interacts with some types of media. BackupAssist overcomes these constraints with the introduction of the data container. A data container is a storage file that the backup job creates on the destination media, and puts the backup inside of. What makes this container so special is that it will be automatically mounted as a local disk for backups and restores. This means your Windows Server will not see a strange or unexpected media, but a media that it understands and can work with.<\/p>\n<blockquote>\n<ul>\n<li>If your image backup was moved to another media, BackupAssist can still restore any backup from it.<\/li>\n<li>When you create an image backup to a Network destination or RDX drive, incremental backups will take place and maintain multiple restore points, at a single destination.<\/li>\n<\/ul>\n<\/blockquote>\n<p>Data containers add improved portability and flexibility to System Protection backups. In a world with so many types of storage media, these new containers make backups more versatile because they make Windows feel at home.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s great having your System Protection backups on other media. If your server decides to stop working or a hard drive breaks, your data is safely stored on another device. Once your server is fixed, you can restore any of the image backups you made from whatever media they are on &#8230; in most cases. &#8230; <a title=\"Introducing &#8211; the Data Container\" class=\"read-more\" href=\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container\">Read more <span class=\"screen-reader-text\">Introducing &#8211; the Data Container<\/span><\/a><\/p>\n","protected":false},"author":13,"featured_media":2079,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,3,760],"tags":[93,154,155],"class_list":["post-2064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-releases","category-support","category-legacy","tag-backup","tag-data-container","tag-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introducing the Data container | BackupAssist<\/title>\n<meta name=\"description\" content=\"Learn how BackupAssist uses Data containers to overcome the limitations of image backups and restores with a new and versatile backup destination.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing the Data container | BackupAssist\" \/>\n<meta property=\"og:description\" content=\"Learn how BackupAssist uses Data containers to overcome the limitations of image backups and restores with a new and versatile backup destination.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-18T16:32:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-19T03:10:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rick Dwyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rick Dwyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container\"},\"author\":{\"name\":\"Rick Dwyer\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\"},\"headline\":\"Introducing &#8211; the Data Container\",\"datePublished\":\"2013-06-18T16:32:13+00:00\",\"dateModified\":\"2019-11-19T03:10:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container\"},\"wordCount\":410,\"commentCount\":7,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template1.jpg\",\"keywords\":[\"Backup\",\"Data container\",\"media\"],\"articleSection\":[\"Product Releases\",\"Support\",\"Z-Legacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container\",\"url\":\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container\",\"name\":\"Introducing the Data container | BackupAssist\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template1.jpg\",\"datePublished\":\"2013-06-18T16:32:13+00:00\",\"dateModified\":\"2019-11-19T03:10:54+00:00\",\"description\":\"Learn how BackupAssist uses Data containers to overcome the limitations of image backups and restores with a new and versatile backup destination.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template1.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template1.jpg\",\"width\":640,\"height\":250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introducing &#8211; the Data Container\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\",\"name\":\"Rick Dwyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"caption\":\"Rick Dwyer\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introducing the Data container | BackupAssist","description":"Learn how BackupAssist uses Data containers to overcome the limitations of image backups and restores with a new and versatile backup destination.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container","og_locale":"en_US","og_type":"article","og_title":"Introducing the Data container | BackupAssist","og_description":"Learn how BackupAssist uses Data containers to overcome the limitations of image backups and restores with a new and versatile backup destination.","og_url":"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container","og_site_name":"Cyber Resilience Blog","article_published_time":"2013-06-18T16:32:13+00:00","article_modified_time":"2019-11-19T03:10:54+00:00","og_image":[{"width":640,"height":250,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template1.jpg","type":"image\/jpeg"}],"author":"Rick Dwyer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rick Dwyer","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container"},"author":{"name":"Rick Dwyer","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61"},"headline":"Introducing &#8211; the Data Container","datePublished":"2013-06-18T16:32:13+00:00","dateModified":"2019-11-19T03:10:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container"},"wordCount":410,"commentCount":7,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template1.jpg","keywords":["Backup","Data container","media"],"articleSection":["Product Releases","Support","Z-Legacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container","url":"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container","name":"Introducing the Data container | BackupAssist","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template1.jpg","datePublished":"2013-06-18T16:32:13+00:00","dateModified":"2019-11-19T03:10:54+00:00","description":"Learn how BackupAssist uses Data containers to overcome the limitations of image backups and restores with a new and versatile backup destination.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/introducing-the-data-container"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template1.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/06\/Blog-image-design-template1.jpg","width":640,"height":250},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/introducing-the-data-container#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Introducing &#8211; the Data Container"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61","name":"Rick Dwyer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","caption":"Rick Dwyer"},"url":"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=2064"}],"version-history":[{"count":3,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2064\/revisions"}],"predecessor-version":[{"id":14546,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2064\/revisions\/14546"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/2079"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=2064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=2064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=2064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}