In the contemporary business landscape, data is unequivocally the most valuable asset. From proprietary intellectual property and financial records to customer databases and operational workflows, the integrity and availability of information are paramount to an organization's survival and success. However, this critical asset is constantly exposed to myriad threats, ranging from hardware failures and human error to sophisticated cyberattacks and unforeseen natural disasters. The consequences of data loss or prolonged system downtime can be devastating, leading to significant financial losses, reputational damage, legal liabilities, and, in severe cases, business closure.
Comprehensive White Paper: Data Recovery, NAS Backup, and SME IT Disaster Management
Safeguarding Your Digital Assets in an Evolving Threat Landscape
Introduction
In the contemporary business landscape, data is unequivocally the most valuable asset. From proprietary intellectual property and financial records to customer databases and operational workflows, the integrity and availability of information are paramount to an organization's survival and success. However, this critical asset is constantly exposed to myriad threats, ranging from hardware failures and human error to sophisticated cyberattacks and unforeseen natural disasters. The consequences of data loss or prolonged system downtime can be devastating, leading to significant financial losses, reputational damage, legal liabilities, and, in severe cases, business closure.
This comprehensive white paper delves into three interconnected pillars of robust data protection: the intricacies of data recovery from failed Hard Disk Drives (HDDs) and Solid State Drives (SSDs), the strategic implementation of Network Attached Storage (NAS) for effective backup, and the overarching framework of IT Disaster Management for Small and Medium-sized Enterprises (SMEs). We will explore the technical nuances of each area, highlight best practices, and demonstrate how a holistic approach, supported by expert solutions like those offered by KeenComputer.com and IAS-Research.com, is essential for safeguarding your digital assets and ensuring business continuity.
Part 1: Data Recovery from Failed HDDs and SSDs - What You Need to Know
Data loss is an unfortunate reality that can strike at any moment. While preventative measures are crucial, understanding the possibilities and limitations of data recovery from failed storage devices is vital for mitigating the impact when disaster strikes. The recovery process differs significantly between traditional HDDs and modern SSDs due to their distinct underlying technologies.
1.1 Understanding Hard Disk Drives (HDDs) and Their Recovery
Hard Disk Drives store data magnetically on spinning platters accessed by read/write heads. This mechanical nature dictates both their vulnerabilities and the methods used for data retrieval.
HDD Failure Categories:
- Logical Failures: These involve issues with the data's organization rather than the physical hardware. Common causes include:
- Accidental deletion of files or partitions.
- Unintentional formatting of a drive.
- File system corruption (e.g., NTFS, FAT32) due to improper shutdowns, software errors, or malware.
- Operating system crashes or software conflicts.
- Virus or ransomware attacks that encrypt or corrupt data.
- Physical Failures: These involve mechanical or electrical damage to the drive's components. Common indicators include:
- Head Crashes: The read/write heads make contact with the platters, causing scratches and often producing clicking, grinding, or scraping noises.
- Motor Failure: The spindle motor, responsible for spinning the platters, ceases to function, resulting in the drive not spinning up or making unusual noises.
- Printed Circuit Board (PCB) Failure: Damage to the electronic board controlling the drive's operations can prevent it from powering on or being recognized.
- Bad Sectors: Areas on the platters become unreadable due to physical damage, leading to data corruption or inaccessibility.
- Firmware Corruption: Damage to the drive's internal programming can prevent it from initializing correctly.
HDD Data Recovery Approaches:
- Software-Based Recovery (for Logical Failures): For logical issues, specialized data recovery software can scan the drive for residual data signatures and reconstruct files. The success rate is highly dependent on whether the lost data has been overwritten. Crucially, the drive must be immediately powered off and removed from the system to prevent further data overwriting.
- Professional Data Recovery (for Physical Failures): Physical damage necessitates a professional data recovery lab. These facilities employ highly skilled technicians, specialized tools, and a Class 100 Cleanroom environment to:
- Disassemble the drive without contamination.
- Replace damaged components (e.g., read/write heads, PCB).
- Repair or stabilize the drive to allow for imaging.
- Create a sector-by-sector clone of the failing drive onto a healthy one.
- Utilize advanced techniques to extract and reconstruct data from the cloned image.
- Attempting DIY recovery on a physically failed HDD is strongly discouraged as it can lead to irreversible damage and make professional recovery impossible.
1.2 Understanding Solid State Drives (SSDs) and Their Recovery Challenges
SSDs store data electronically on NAND flash memory chips, offering superior speed, durability against physical shock, and silent operation due to the absence of moving parts. However, their internal data management processes pose unique complexities for data recovery.
Key SSD Technologies Impacting Recovery:
- TRIM Command: This ATA command, enabled by default in modern operating systems, informs the SSD controller which data blocks are no longer in use (e.g., after a file deletion or drive format). The SSD then proactively erases these blocks to maintain performance and write efficiency. Once a block is "trimmed," the data is permanently erased and virtually unrecoverable, even by professional labs.
- Wear Leveling: To extend the lifespan of NAND flash cells (which have a finite number of write/erase cycles), SSD controllers employ wear-leveling algorithms. These algorithms distribute data writes evenly across all memory cells, meaning data is not necessarily stored contiguously or sequentially. This makes traditional "undelete" methods (which rely on sequential data storage) ineffective and complicates direct data reconstruction.
- Garbage Collection: This background process identifies and erases invalid data blocks, consolidating valid data to free up space for new writes. Like TRIM, it contributes to the permanent erasure of data.
- Encryption: Many modern SSDs feature hardware-level encryption (e.g., Opal standard). If the encryption key is lost or the drive controller fails, data recovery becomes significantly more challenging, if not impossible, without the key.
SSD Failure Categories:
- Logical Failures: Similar to HDDs (accidental deletion, formatting, file system corruption). However, the effectiveness of software recovery is severely limited by the TRIM command. Immediate power-off is critical but offers only a slim chance of recovery.
- Firmware/Controller Failure: The SSD's internal firmware or the controller chip (which manages data flow, wear leveling, and garbage collection) can malfunction. This often results in the drive not being detected by the system, showing incorrect capacity, or becoming completely unresponsive.
- NAND Flash Wear-Out: Over time, repeated write/erase cycles can degrade NAND cells, leading to read errors, data corruption, and eventual drive failure.
- Electrical Component Failure: Damage to the PCB or power delivery components can render the SSD inoperable.
SSD Data Recovery Approaches:
- Software-Based Recovery (for Logical Failures - Highly Limited): Only feasible if TRIM has not yet acted on the deleted data. Success rates are generally low.
- Professional Data Recovery (for Firmware/Physical Failures): For most SSD failures, professional recovery is the only viable option. This highly specialized process often involves:
- Bypassing the failed controller to directly access the raw data from the individual NAND flash chips.
- Using proprietary tools and techniques to reassemble the data, accounting for wear leveling, ECC (Error-Correcting Code), and controller-specific algorithms.
- This is a complex, time-consuming, and expensive process, and success is not guaranteed, especially if TRIM has been active or the NAND chips are severely damaged.
1.3 Critical Considerations for Any Data Recovery Attempt
To maximize the chances of successful data recovery, regardless of the drive type, adhere to these critical guidelines:
- Immediate Action is Key: As soon as data loss is suspected or a drive shows signs of failure, immediately power down the device. Continued operation can overwrite recoverable data or exacerbate physical damage.
- Never Attempt DIY on Physically Damaged Drives: For drives exhibiting physical symptoms (clicking, grinding, no spin, not detected), do NOT open the drive, attempt to fix it, or run software. This can introduce contaminants, cause further damage, and render the data unrecoverable.
- Avoid Overwriting: Do not install data recovery software on the failing drive, and never save recovered files back to the source drive. Always use a separate, healthy storage device for recovery efforts.
- Byte-to-Byte Imaging: If the drive is still partially accessible, creating a sector-by-sector image or clone to a healthy drive is a crucial first step. This preserves the original state of the failing drive and allows recovery attempts to be performed on the image, minimizing stress on the unstable source.
- Consult Professionals for Critical Data: For any critical data or complex drive failures, engaging a reputable professional data recovery service is always the safest and most effective course of action. They possess the specialized expertise, tools, and controlled environments necessary for successful retrieval.
Part 2: NAS-Based Backup - Your First Line of Defense
While data recovery is a reactive measure, a robust backup strategy is the proactive cornerstone of data protection. Network Attached Storage (NAS) devices have emerged as an indispensable tool for individuals and Small to Medium-sized Enterprises (SMEs) to implement comprehensive, reliable, and scalable backup solutions.
2.1 What is NAS and Why is it Essential for Backup?
A NAS device is a dedicated server connected to a network, providing centralized data storage and file-sharing capabilities. Unlike direct-attached storage (DAS) connected to a single computer, a NAS is accessible by multiple users and devices over the network, making it an ideal hub for backup operations.
Key Advantages of NAS for Backup:
- Centralized Data Repository: Consolidates data from various endpoints (desktops, laptops, servers, mobile devices) into a single, easily manageable location.
- Network Accessibility: Data can be backed up to and restored from the NAS from any networked device, facilitating seamless data management across an organization.
- Scalability: Most NAS devices are designed to be easily expandable. You can increase storage capacity by adding more hard drives as your data grows, making them a future-proof investment.
- Data Redundancy with RAID: NAS devices typically support various Redundant Array of Independent Disks (RAID) configurations (e.g., RAID 1, RAID 5, RAID 6). RAID distributes data across multiple drives in a way that provides fault tolerance. If one drive fails within the NAS, the data remains accessible, and the failed drive can be replaced without data loss or downtime. It is crucial to understand that RAID is not a backup; it protects against single drive failures within the array, but not against accidental deletions, ransomware, or site-wide disasters.
- Automation and Scheduling: NAS operating systems often include built-in backup software or integrate seamlessly with third-party solutions, allowing for automated, scheduled backups without manual intervention.
- Versioning Capabilities: Many NAS backup solutions support data versioning, enabling you to restore files to previous points in time. This is invaluable for recovering from accidental overwrites, corruption, or ransomware attacks.
- Cost-Effectiveness: For many SMEs, a NAS offers a more affordable and manageable solution for centralized storage and backup compared to more complex and expensive enterprise-grade Storage Area Networks (SANs) or purely cloud-based infrastructures.
- Hybrid Cloud Integration: Modern NAS devices often integrate with public cloud storage services, allowing for a hybrid backup approach that combines local speed with off-site cloud resilience.
2.2 Implementing Effective NAS-Based Backup Strategies
A robust backup strategy adheres to the widely recognized "3-2-1 Rule":
- 3 Copies of Your Data: Maintain at least three copies of your data (the original and two backups).
- 2 Different Media Types: Store these copies on at least two different types of storage media (e.g., internal NAS drives, external USB drives, cloud storage, tape).
- 1 Copy Off-Site: Ensure at least one backup copy is stored in a geographically separate location to protect against localized disasters (e.g., fire, flood, theft).
Here are common strategies for leveraging NAS in your backup plan:
- NAS to External USB Hard Drive:
- Description: Connect an external USB drive directly to the NAS and configure it for scheduled backups.
- Pros: Simple to implement, cost-effective, provides a local, easily transportable backup copy for off-site storage.
- Cons: Requires manual rotation of drives for off-site copies, limited scalability for very large datasets, potential for human error in rotation.
- NAS to Another NAS (Replication):
- Description: Replicate data from your primary NAS to a secondary NAS, ideally located in a different building or remote office.
- Pros: Automated, fast recovery times, excellent for redundancy and business continuity, provides a true off-site copy.
- Cons: Higher initial cost (requires two NAS devices), depends on a reliable network connection between locations.
- NAS to Cloud Storage:
- Description: Integrate your NAS with public cloud storage services (e.g., Google Drive, Dropbox, Amazon S3, Azure Blob Storage, or dedicated NAS cloud services like Synology C2).
- Pros: Provides excellent off-site protection, highly scalable, accessible from anywhere with an internet connection, mitigates risks of local disasters.
- Cons: Dependent on internet bandwidth for initial sync and large restores, recurring subscription costs, potential data privacy concerns depending on the cloud provider and data sensitivity.
- Hybrid Backup Solutions:
- Description: The most comprehensive and recommended approach, combining multiple strategies. For example, local backups to the NAS, with the NAS then replicating critical data to an off-site NAS or cloud storage.
- Pros: Offers multiple layers of protection, balances speed of local recovery with resilience of off-site copies, adheres strongly to the 3-2-1 rule.
- Cons: More complex to set up and manage, potentially higher overall cost.
2.3 Best Practices for NAS Backup Implementation
To ensure your NAS-based backup strategy is effective and reliable:
- Automate Backup Schedules: Configure daily, weekly, or continuous backups based on data change rates and criticality.
- Implement Versioning and Retention Policies: Define how many versions of files to keep and for how long. This is crucial for recovering from ransomware or accidental data corruption.
- Encrypt Backups: Always encrypt data both in transit (during transfer) and at rest (on the NAS and off-site copies) to protect sensitive information from unauthorized access.
- Regularly Test Restores: Periodically perform test recoveries of individual files, folders, or even entire systems to verify that your backups are intact and recoverable. This is the only way to confirm your backup strategy works.
- Monitor NAS Health and Performance: Regularly check drive health (SMART status), RAID array integrity, available storage space, and backup job completion logs.
- Secure Your NAS: Implement strong, unique passwords, enable two-factor authentication (2FA), keep the NAS firmware and software updated, and configure a firewall to restrict access.
- Document Your Backup Plan: Clearly document your backup procedures, schedules, storage locations, and recovery steps.
Part 3: SME IT Disaster Management - Ensuring Business Continuity
While data recovery and backup are foundational, they are components of a broader, more critical discipline: IT Disaster Management (ITDM). For Small and Medium-sized Enterprises (SMEs), a well-defined ITDM plan is not merely a luxury but a necessity for survival in the face of unforeseen disruptions. ITDM encompasses the processes and procedures to prepare for, respond to, and recover from events that disrupt IT services and data, ensuring minimal downtime and rapid restoration of critical business operations.
3.1 The Imperative of IT Disaster Management for SMEs
Many SMEs mistakenly believe they are too small to warrant a formal disaster recovery plan (DRP) or that their existing backups are sufficient. This is a dangerous misconception. SMEs are often more vulnerable to disasters due to limited resources, lack of dedicated IT staff, and a higher dependency on operational continuity. A single major IT disruption can lead to:
- Significant Financial Losses: Due to lost sales, operational downtime, contractual penalties, and recovery costs.
- Reputational Damage: Loss of customer trust and market share.
- Legal and Regulatory Non-Compliance: Failure to meet data protection regulations (e.g., GDPR, HIPAA) can result in hefty fines.
- Operational Stagnation: Inability to process orders, communicate with customers, or access critical information.
- Business Failure: A substantial percentage of businesses that experience major data loss or prolonged downtime without a DRP never fully recover.
An effective ITDM plan moves beyond simply backing up data; it focuses on the entire ecosystem of IT services and their impact on business functions.
3.2 Key Components of an SME Disaster Recovery Plan (DRP)
A comprehensive DRP for an SME should include the following essential elements:
- Risk Assessment:
- Purpose: Identify potential threats that could disrupt IT operations and assess their likelihood and potential impact.
- Process: Brainstorming and analyzing risks such as:
- Natural Disasters: Fire, flood, earthquake, extreme weather.
- Cyber Threats: Ransomware, malware, data breaches, denial-of-service (DoS) attacks.
- Human Error: Accidental deletions, misconfigurations, unauthorized access.
- Hardware Failure: Server crashes, network equipment failure, storage device failure.
- Software Failure: Application bugs, operating system corruption.
- Utility Outages: Power outages, internet service disruptions.
- Output: A prioritized list of risks with their potential impact on IT systems and business operations.
- Business Impact Analysis (BIA):
- Purpose: Identify critical business functions and the IT systems that support them. Quantify the financial and operational impact of downtime for each function.
- Process:
- Identify core business processes (e.g., sales, customer service, production, accounting).
- Determine the IT applications and infrastructure components essential for each process.
- Define Recovery Time Objective (RTO): The maximum acceptable downtime for a critical system or application after a disaster.
- Define Recovery Point Objective (RPO): The maximum acceptable amount of data loss (measured in time) from a critical system or application.
- Output: A clear understanding of business criticalities, acceptable downtime, and data loss tolerances, which guides recovery strategy development.
- Recovery Strategies Development:
- Purpose: Outline the methods and resources required to restore IT services and data to their operational state within the defined RTO and RPO.
- Considerations:
- Backup & Restore: Leveraging NAS backups (as discussed in Part 2) is fundamental. This includes restoring operating systems, applications, and data.
- Off-Site Recovery Locations:
- Cold Site: A basic facility with power and connectivity, but no hardware. Requires significant time to set up.
- Warm Site: A facility with basic hardware pre-installed, requiring less setup time than a cold site.
- Hot Site: A fully equipped and operational facility with replicated data, allowing for near-instantaneous failover. (Typically for larger enterprises, but cloud solutions offer similar benefits for SMEs).
- Cloud-Based Recovery: Utilizing cloud infrastructure (Infrastructure as a Service - IaaS) to host replicated systems and data, offering flexibility and scalability for recovery.
- Virtualization: Leveraging virtual machines (VMs) simplifies recovery, as entire server environments can be backed up and restored or replicated to different hardware or cloud platforms.
- Data Synchronization/Replication: For highly critical data, continuous replication to a secondary site or cloud ensures minimal data loss (low RPO).
- Plan Development and Documentation:
- Purpose: Create a clear, concise, and actionable document outlining all procedures for disaster response and recovery.
- Content:
- Emergency contact lists (internal and external).
- Roles and responsibilities of the disaster recovery team.
- Step-by-step recovery procedures for critical systems and data.
- Inventory of hardware, software, and network configurations.
- Location of backups (local and off-site) and recovery media.
- Vendor contact information for critical services.
- Communication plan (see below).
- Testing and Review:
- Purpose: Validate the DRP's effectiveness and identify any gaps or weaknesses.
- Process:
- Tabletop Exercises: Discussing the plan with the team to ensure everyone understands their roles.
- Simulated Restores: Periodically restoring data and applications from backups to verify integrity and recovery times.
- Full Disaster Simulations: Conducting comprehensive tests where critical systems are intentionally failed and recovered according to the plan (e.g., once a year).
- Importance: A DRP is only as good as its last test. Regular testing ensures the plan remains viable and staff are proficient in its execution. The plan should be reviewed and updated annually or after any significant IT or business change.
- Communication Plan:
- Purpose: Define how internal and external stakeholders will be informed during and after a disaster.
- Content:
- Internal communication protocols (e.g., emergency contact tree, alternative communication channels).
- External communication protocols (e.g., notifying customers, suppliers, media, regulatory bodies).
- Pre-approved statements or templates for various scenarios.
3.3 Leveraging NAS within Your DRP
A NAS device, with its robust backup capabilities, forms a crucial component of an SME's DRP. It serves as the primary local backup target, providing fast recovery for common incidents like accidental deletions or individual system failures. When integrated with off-site replication (to another NAS or cloud), it directly supports achieving low RPO and RTO for critical data. The NAS becomes the local "data vault" from which recovery operations can quickly commence, minimizing the impact of localized disruptions.
Part 4: How KeenComputer.com and IAS-Research.com Can Help
KeenComputer.com and IAS-Research.com collectively offer a powerful synergy in navigating the complexities of data protection, from the critical moment of data loss to the proactive establishment of resilient IT infrastructure. This partnership provides a comprehensive suite of services designed to safeguard your digital assets and ensure business continuity for individuals and SMEs.
4.1 Expert Data Recovery Services (KeenComputer.com)
When your HDD or SSD fails, KeenComputer.com provides professional data recovery services aimed at maximizing the chances of retrieving your invaluable information.
- Diagnostic Assessment: We perform a thorough, non-invasive assessment of your failed storage device to accurately diagnose the type of failure (logical, physical, firmware) and determine the feasibility and estimated cost of recovery.
- State-of-the-Art Facilities: For physically damaged drives, our partners utilize industry-leading cleanroom environments and specialized tools to safely disassemble and repair drives, allowing for data extraction.
- Advanced Techniques for All Drive Types: Our experts are proficient in recovering data from a wide range of storage media, including all types of HDDs and complex SSD architectures, understanding the nuances of TRIM, wear leveling, and controller-specific challenges.
- Secure and Confidential Process: We adhere to strict data privacy protocols, ensuring your sensitive information remains confidential throughout the recovery process.
- Transparent Communication: You will be kept informed at every stage of the recovery, with clear explanations of the process and potential outcomes.
- "No Data, No Charge" Policy (where applicable): For many recovery scenarios, we offer a "no data, no charge" policy, providing peace of mind that you only pay for successful data retrieval.
4.2 Comprehensive NAS-Based Backup Solutions (KeenComputer.com)
KeenComputer.com specializes in designing, implementing, and managing robust NAS-based backup solutions that align with the industry's best practices, including the essential 3-2-1 rule.
- Tailored Needs Assessment: We begin by understanding your unique data volume, criticality, budget, and specific business requirements to recommend the optimal NAS hardware and software configuration.
- Custom NAS Deployment & Configuration: We assist with the selection and setup of the right NAS device for your environment, including RAID configuration for internal redundancy, network integration, user access permissions, and security hardening.
- Strategic Backup Plan Development: Our experts help you craft a multi-layered backup strategy, integrating local backups to the NAS with off-site replication to another NAS or secure cloud storage, ensuring comprehensive data protection.
- Automated Backup Implementation: We configure and automate your backup schedules, ensuring consistent and reliable data protection without manual intervention.
- Versioning and Retention Policy Setup: We help you define and implement appropriate versioning and retention policies to protect against accidental deletions, data corruption, and ransomware.
- Ongoing Support and Monitoring: We provide continuous support, monitoring, and maintenance services to ensure your NAS backup system operates efficiently, securely, and is always up-to-date with the latest firmware and security patches.
4.3 Strategic IT Disaster Management and Research (IAS-Research.com)
IAS-Research.com complements KeenComputer.com's implementation expertise by focusing on the strategic, analytical, and advanced research aspects of IT Disaster Management. This ensures that the solutions provided are not only practical but also cutting-edge and aligned with evolving threats and technologies.
- Advanced Risk Assessment and BIA Methodologies: IAS-Research.com provides in-depth analysis and methodologies for identifying complex risks and conducting comprehensive Business Impact Analyses, helping SMEs gain a profound understanding of their vulnerabilities and criticalities.
- Future-Proofing Recovery Strategies: Through ongoing research and development, IAS-Research.com identifies emerging trends in data storage, cybersecurity, and cloud computing to design innovative and resilient recovery strategies that anticipate future challenges. This includes exploring advanced data synchronization, immutable storage, and AI-driven threat detection.
- Technology Evaluation and Best Practices: IAS-Research.com conducts rigorous evaluations of new backup and disaster recovery technologies, providing unbiased insights and recommending best practices to ensure SMEs invest in solutions that are both effective and efficient.
- Compliance and Governance Guidance: With expertise in data governance and regulatory compliance, IAS-Research.com helps SMEs ensure their IT Disaster Management plans meet industry standards and legal requirements, mitigating potential fines and reputational damage.
- Training and Knowledge Transfer: IAS-Research.com develops and delivers specialized training programs and workshops on IT disaster management, empowering SME staff with the knowledge and skills needed to effectively respond to and recover from disruptions.
- Strategic Consulting: For complex IT environments or unique business challenges, IAS-Research.com offers high-level strategic consulting to develop bespoke ITDM frameworks that integrate seamlessly with an organization's overall business objectives.
4.4 Integrated Solutions for Holistic Data Protection
By leveraging the combined strengths of KeenComputer.com's practical implementation and ongoing support, and IAS-Research.com's strategic insights and advanced methodologies, clients benefit from a truly holistic approach to data protection. This integrated model ensures that:
- Solutions are well-researched and forward-looking: Benefiting from IAS-Research.com's expertise in emerging technologies and best practices.
- Implementation is seamless and effective: Executed by KeenComputer.com's experienced technical teams.
- Disaster preparedness is comprehensive: Covering all aspects from data recovery to full IT service restoration.
- Business continuity is maximized: Minimizing downtime and data loss in the face of any unforeseen event.
Conclusion
In an era where digital assets are indispensable, a proactive and multi-faceted approach to data protection is no longer optional but a fundamental requirement for business sustainability. The journey from potential data loss to guaranteed business continuity involves understanding the nuances of data recovery from failed HDDs and SSDs, strategically implementing robust NAS-based backup solutions, and, most importantly, establishing a comprehensive IT Disaster Management plan.
KeenComputer.com and IAS-Research.com are committed to empowering individuals and SMEs with the knowledge, tools, and expert support necessary to navigate this complex landscape. By partnering with us, you gain access to specialized data recovery services when the unexpected occurs, robust NAS backup solutions that form your first line of defense, and tailored IT Disaster Management planning that ensures your business can withstand and recover from any disruption. Don't leave your digital future to chance; secure your data and ensure your business continuity with KeenComputer.com and IAS-Research.com.