	{"id":50,"date":"2007-10-29T09:42:41","date_gmt":"2007-10-29T07:42:41","guid":{"rendered":"http:\/\/blog.intego.com\/2007\/10\/29\/more-comments-about-time-machine\/"},"modified":"2014-08-13T09:30:06","modified_gmt":"2014-08-13T16:30:06","slug":"more-comments-about-time-machine","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/","title":{"rendered":"More Comments about Time Machine"},"content":{"rendered":"<p>In <a title=\"Intego Personal Backup Compared with Apple\u2019s Time Machine\" href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-personal-backup-compared-with-apples-time-machine\/\" target=\"_blank\">Intego Personal Backup Compared to Apple&#8217;s Time Machine<\/a>, we listed some reasons why Time Machine simply cannot replace the flexibility of <a href=\"https:\/\/www.intego.com\/personalbackup\/\">Intego Personal Backup<\/a>. Today, TidBITS author Joe Kissell <a href=\"http:\/\/db.tidbits.com\/article\/9270\">discusses Time Machine<\/a> showing just how problematic this feature can be. On his Mac, &#8220;Time Machine backs up tens of thousands of files, totaling hundreds of megabytes, every single hour&#8221;, and each hourly backup takes a half-hour.<\/p>\n<p>It&#8217;s worth reading this article to better understand Time Machine&#8217;s limitations, and the headaches it can engender. With a more versatile backup solution, you&#8217;ll find backing up to be quicker, easier and more flexible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In Intego Personal Backup Compared to Apple&#8217;s Time Machine, we listed some reasons why Time Machine simply cannot replace the flexibility of Intego Personal Backup. Today, TidBITS author Joe Kissell discusses Time Machine showing just how problematic this feature can be. On his Mac, &#8220;Time Machine backs up tens of thousands of files, totaling hundreds [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[1294,1288],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"In Intego Personal Backup Compared to Apple&#039;s Time Machine, we listed some reasons why Time Machine simply cannot replace the flexibility of Intego\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"More Comments about Time Machine - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"In Intego Personal Backup Compared to Apple&#039;s Time Machine, we listed some reasons why Time Machine simply cannot replace the flexibility of Intego\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2007-10-29T07:42:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-08-13T16:30:06+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/\",\"name\":\"More Comments about Time Machine - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2007-10-29T07:42:41+00:00\",\"dateModified\":\"2014-08-13T16:30:06+00:00\",\"description\":\"In Intego Personal Backup Compared to Apple's Time Machine, we listed some reasons why Time Machine simply cannot replace the flexibility of Intego\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"More Comments about Time Machine\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"More Comments about Time Machine\",\"datePublished\":\"2007-10-29T07:42:41+00:00\",\"dateModified\":\"2014-08-13T16:30:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/#webpage\"},\"wordCount\":106,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"keywords\":[\"Intego Personal Backup\",\"Time Machine\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"In Intego Personal Backup Compared to Apple's Time Machine, we listed some reasons why Time Machine simply cannot replace the flexibility of Intego","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/","og_locale":"en_US","og_type":"article","og_title":"More Comments about Time Machine - The Mac Security Blog","og_description":"In Intego Personal Backup Compared to Apple's Time Machine, we listed some reasons why Time Machine simply cannot replace the flexibility of Intego","og_url":"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/","og_site_name":"The Mac Security Blog","article_published_time":"2007-10-29T07:42:41+00:00","article_modified_time":"2014-08-13T16:30:06+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/","name":"More Comments about Time Machine - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2007-10-29T07:42:41+00:00","dateModified":"2014-08-13T16:30:06+00:00","description":"In Intego Personal Backup Compared to Apple's Time Machine, we listed some reasons why Time Machine simply cannot replace the flexibility of Intego","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"More Comments about Time Machine"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"More Comments about Time Machine","datePublished":"2007-10-29T07:42:41+00:00","dateModified":"2014-08-13T16:30:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-comments-about-time-machine\/#webpage"},"wordCount":106,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"keywords":["Intego Personal Backup","Time Machine"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-O","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/50"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=50"}],"version-history":[{"count":2,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/50\/revisions"}],"predecessor-version":[{"id":30682,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/50\/revisions\/30682"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=50"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=50"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=50"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}