Vision and goals
WHY DATA SOLUTIONS?
OUR VALUES:
Our people: We believe that our people are our biggest resource, therefore we encourage them and give them every opportunity to develop their potentials and creativity.
Our clients: We believe that our clients are the reason of our existence.
Our striving for perfection: We believe in quality. Therefore we are constantly improving our service, procedures and processes, as well as quality control of sistem so we could still be no. 1 in the country and region.
OUR VISION:
Our vision is forming hi-tech laboratory that would provide efficiently solution of the problem of data recovery using the research of technology of hard disk and multidisciplinary approach. But we are also trying to achieve a scientific contribution both in the field of computer forensics and data recovery.
OUR WARRANTY:
We guarantee that you won’t bear any costs if:
- Data solutions couldn’t successfully recover your data.
- Client didn’t receive required data
- Client is not satisfied with data integrity
- The recovery is not completed within the required time frame
In the years to come, we intend to improve capacities of our research center, and to apply developed technologies and methods in other fields.
Our inspiration to create such laboratory was a true story about the first data recovery in early twentieth century.
Namely, a well-known punch card system developed late in the 19th century, used for almost eighty years thereafter, was designed by Charles Babbage and Ada Lovelace. They made the first computer device operating on a similar principle as modern computers of today. When they started building a prototype, they ran into a problem, punch cards that contained programming schemes of the future computer were damaged. Their device was useless without these programs; therefore a new one was created, more complex by far, that managed to recover required programs.
Modern media for storage of large quantity of data of course do not use punch card technologies, but technological process of recovery of corrupted data is still based on methods and equipment that are far more sophisticated compared to devices where corrupted data are stored.
Hard disc involves many technological novelties, but is based on a principle that is more than half a century old. Having been continuously improved, today it presents the most complex devices in any computer case. Within hard disk chamber, discs rotate at a rate of up to 15 000 rpm.A head floats several micrometers above, reading magnetic records and sending this value to HDA for processing. Highly integrated chips, driven by powerful logic, send data to the computer. To simplify, in terms of a modern disc, this happens every nanosecond.
The purpose of our research is to find a way to access data stored on a damaged hard disc. This research process should help us modify the rules set by manufacturers, for the purpose of accessing data even after devices where they are stored have been damaged. In order to adequately analyze the entire system, one needs to know electronics, precise mechanics, physics, programming as well as creative problem-solving.
Thousands of clients like you, who show us confidence, are the reason we go step ahead and move the boundaries every day.
RECOMMENDED
Transcend StoreJet 1TB USB 3.0
19.08.2015.TRANSCEND STOREJET (USB 3.0) – SHOCK RESISTANT?! GENERAL CHARACTERISTICS: Brand (Manufacturer): Transcend Model: 25H3P Capacity: 500GB, 750GB, 1TB, 1,5TB Interface: USB 2.0/3.0 Data transfer rate: USB 2.0 – do 480Mb/s USB 3.0 – do 5Gb/s Dimensions: 130.8 x 80.8 x 21.7 mm Weight: 216g (500GB/750GB/1TB) 256g (1.5TB) Price: from 7.000RSD (500GB) from 8.000RSD (750GB) from […]
more >>The latest from the blog
28.09.2015.Forensic specialists may encounter different protection systems for data access. The most common and simple system of protection is compressing archives by a password. At present, ZIP and RAR are two most commonly used archive managers. Russian archive manager (RAR) has a stronger encryption mechanism (AES-128 standard) which implies 128 bits encryption. This archive manger […]
more >>