Send in the clones

Rick Cook

Disk cloning can significantly reduce the time and effort needed to update existing systems or bring up new ones. By preparing an image of the disk containing the files the user needs and using cloning software, the entire setup can be transferred to the target computer in a matter of minutes.

Cloning is also a fast way to bring back a system that has been messed up by an over-enthusiastic user fiddling with the controls. Rather than spending the time to figure out what was actually done to the system, you can restore it to basic configuration by copying over a disk image.

There are a number of programs available for disk cloning, including Symantec's Norton Ghost and LabExpert from SmartStuff.

There are a couple of considerations when using cloning software. First, cloning assumes that the data aren't important. The cloned image consists of only system and application files that are common to all the systems. Cloning a disk image isn't a substitute for backup, and if you are upgrading a system you should back up the data before cloning the disk. Alternatively, you might want to keep all the users' data in a separate volume that isn't cloned.

Secondly, cloning works best if the hardware and software configurations of the source and target systems are substantially the same. That includes things like video and NIC drivers and other hardware-specific software. If you have many different configurations to support,

Requires Free Membership to View

cloning is considerably less useful.

Additional resources:

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.