{"id":1851,"date":"2009-10-11T12:52:56","date_gmt":"2009-10-11T11:52:56","guid":{"rendered":"http:\/\/www.itwriting.com\/blog\/1851-when-the-unthinkable-happens-microsoftdanger-loses-customer-data.html"},"modified":"2009-10-11T12:52:56","modified_gmt":"2009-10-11T11:52:56","slug":"when-the-unthinkable-happens-microsoftdanger-loses-customer-data","status":"publish","type":"post","link":"https:\/\/www.itwriting.com\/blog\/1851-when-the-unthinkable-happens-microsoftdanger-loses-customer-data.html","title":{"rendered":"When the unthinkable happens: Microsoft\/Danger loses customer data"},"content":{"rendered":"<p><a href=\"http:\/\/www.danger.com\/index.php\" target=\"_blank\">Danger<\/a> is a company acquired by Microsoft in April 2008, which provides synchronization and online data storage for mobile devices, the best-known being the T-Mobile <a href=\"http:\/\/www.sidekick.com\/\" target=\"_blank\">Sidekick<\/a>.&#160; Here\u2019s the Danger <a href=\"http:\/\/www.danger.com\/platform\/exp.php\" target=\"_blank\">promise<\/a>:<\/p>\n<blockquote>\n<p><strong>Data is always synchronized and backed up<\/strong>       <br \/>Danger-powered devices are always connected to the Danger service. All user data is automatically and securely backed up over-the-air, and emails, photos, and organzier data are automatically synchronized with a Web-based application. All changes that are made on the device are instantly and automatically reflected on the user&#8217;s computer, and vice versa.<\/p>\n<\/blockquote>\n<p>That dream is in tatters thanks to a currently unspecified server failure. Problems started over a week ago, culminating in this devastating \u201cstatus update\u201d:<\/p>\n<blockquote>\n<p>Regrettably, based on Microsoft\/Danger\u2019s latest recovery assessment of their systems, we must now inform you that personal information stored on your device \u2013 such as contacts, calendar entries, to-do lists or photos \u2013 that is no longer on your Sidekick almost certainly has been lost as a result of a server failure at Microsoft\/Danger &#8230; we recognize the magnitude of this inconvenience. <\/p>\n<\/blockquote>\n<p><img decoding=\"async\" style=\"display: block; float: none; margin-left: auto; margin-right: auto\" src=\"http:\/\/www.itwriting.com\/images\/ms-danger.gif\" \/><\/p>\n<p>The word \u201cinconvenience\u201d does not express what some users are experiencing. Here\u2019s an <a href=\"http:\/\/forums.t-mobile.com\/tmbl\/board\/message?board.id=Sidekick2&amp;view=by_date_ascending&amp;message.id=10867#M10867\" target=\"_blank\">example<\/a>:<\/p>\n<blockquote>\n<p>I too have lost business contacts (over 200), family and friends mailing, email address &amp; phone #. Good luck now with holiday cards.&#160; Without my calendar, I now have no clue when all my upcoming appts are.&#160; In addition, I have lost passwords, account codes and my gym workout routine.&#160; I was unable to do my side jobs over the past two weekends without these codes.&#160; To recover the information will take hours of my time worth way more than the month of service credit in addition to the money I have already lost not being able to work.<\/p>\n<p>The entire reason I chose to stay with the sidekick and renew with t-mobile was because of the piece of mind knowing that my data information was backed up to an online system.&#160; <\/p>\n<\/blockquote>\n<p>So what next? People are drawing a variety of conclusions, the most obvious being either that the cloud can never be trusted, and\/or that Microsoft can never be trusted. Of course there is no such thing as total data (or any other kind of) security, but risks can be minimized, and in the absence of nuclear war, earthquake or volcanic eruption this looks inexcusable \u2013 but bad things happen.<\/p>\n<p>The company is promising an update tomorrow (October 12th). Personally I doubt that the data is really irrecoverable, knowing a little about what data forensics can achieve, but it may be economically irrecoverable. Still, the best thing Microsoft could do would be to announce that it can get the data back after all. Failing that, we need to understand as much as possible about what went wrong so that we can make our own judgment about what to conclude.<\/p>\n<p>Presuming that the data does not reappear, this is going to get messy. What happens when the marketing information says one thing, but the small print says another (as is often the case)? One user found <a href=\"http:\/\/forums.t-mobile.com\/tmbl\/board\/message?board.id=Sidekick2&amp;view=by_date_ascending&amp;message.id=10858#M10858\" target=\"_blank\">this<\/a> in his contract:<\/p>\n<blockquote>\n<p>The services and devices are provided on an \u201cas-is\u201d and \u201cwith all faults\u201d basis and without warranties of any kind <\/p>\n<\/blockquote>\n<p>which may well be typical. Then again, what about T-Mobile\u2019s relationship with Microsoft?<\/p>\n<p>Finally, while I accept that data may be safer in a cloud service provider\u2019s data centre than on my cheap local hard drives, it is also obvious that cloud + local backup is even safer. Apparently this is one thing that Danger made somewhat difficult, and I\u2019ve known this to be true of other cloud-based services.<\/p>\n<p><strong>Update<\/strong>: <a href=\"http:\/\/www.hiptop3.com\/archives\/what-caused-the-sidekick-fail\" target=\"_blank\">rumour<\/a> has it that this was a failed SAN (Storage Area Network) upgrade without a backup. Further rumours of the poor state of Danger (and Windows Mobile) within Microsoft are in this <a href=\"http:\/\/www.roughlydrafted.com\/2009\/10\/09\/exclusive-pink-danger-leaks-from-microsofts-windows-phone\/\" target=\"_blank\">RoughlyDrafted article<\/a>.<\/p>\n<div style=\"padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px\" id=\"scid:0767317B-992E-4b12-91E0-4F059A8CECA8:2c5ffa6b-672c-4f1a-a8c4-47ec814f2916\" class=\"wlWriterEditableSmartContent\">Technorati Tags: <a href=\"http:\/\/technorati.com\/tags\/cloud\" rel=\"tag\">cloud<\/a>,<a href=\"http:\/\/technorati.com\/tags\/danger\" rel=\"tag\">danger<\/a>,<a href=\"http:\/\/technorati.com\/tags\/t-mobile\" rel=\"tag\">t-mobile<\/a>,<a href=\"http:\/\/technorati.com\/tags\/microsoft\" rel=\"tag\">microsoft<\/a>,<a href=\"http:\/\/technorati.com\/tags\/data+loss\" rel=\"tag\">data loss<\/a>,<a href=\"http:\/\/technorati.com\/tags\/backup\" rel=\"tag\">backup<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Danger is a company acquired by Microsoft in April 2008, which provides synchronization and online data storage for mobile devices, the best-known being the T-Mobile Sidekick.&#160; Here\u2019s the Danger promise: Data is always synchronized and backed up Danger-powered devices are always connected to the Danger service. All user data is automatically and securely backed up &hellip; <a href=\"https:\/\/www.itwriting.com\/blog\/1851-when-the-unthinkable-happens-microsoftdanger-loses-customer-data.html\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">When the unthinkable happens: Microsoft\/Danger loses customer data<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19,44,55],"tags":[],"class_list":["post-1851","post","type-post","status-publish","format-standard","hentry","category-cloud-computing","category-internet","category-microsoft"],"_links":{"self":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/1851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/comments?post=1851"}],"version-history":[{"count":0,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/1851\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/media?parent=1851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/categories?post=1851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/tags?post=1851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}