?
Solved

Cloning

Posted on 2008-10-29
3
Medium Priority
?
576 Views
Last Modified: 2010-03-17
Hello

I have an IBM Xseries server with 3 drives (Raid 5) that I would like to clone.  Please let me know what best practice (software) would be?

Thank you.
0
Comment
Question by:kinggirl
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 24

Expert Comment

by:ryansoto
ID: 22835369
The industry standard is Acronis True Image.  Tried and true.
It uses Linux drivers for raid cards so it recognizes a great amount.
0
 
LVL 35

Expert Comment

by:Joseph Daly
ID: 22835455
You could always virtualize the machine using VMware.

The vmware converter will allow you to pull a snapshot from an existing machine.
http://www.vmware.com/products/converter/

Then you could take that image file and has as many clonse of it as you want in virtual machines. Vmware server offers a free download that can run several machines.
0
 
LVL 2

Accepted Solution

by:
junglecom earned 1000 total points
ID: 22990624
I agree with ryansoto.

Acronis True Image is the best for cloning in my experience.

I use http://www.acronis.com/enterprise/download/ATIESWin/ everyday.

1. Download the trial (requires registration)
2. Install only the Management console and agent
3. Create a recovery boot disc
4. Take the boot disc to the computer you want to clone
5. Make sure you have another hard drive connected ( can be bigger in size)
6. Boot the machine with the CD and Select the CLone Disk Wizard and follow the steps
7. Boom! you are done and now have a cloned disk
0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows the method of using the Resultant Set of Policy Tool to locate Group Policy that applies a particular setting.
Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question