Disaster recovery plans and the usual mix of uninterrupted power supplies (UPSs), co-location services, data mirroring and hot-standby technologies theoretically make it possible to weather any storm. But are backup systems, replication rules and fast failover solutions enough?
Syria suffered another Internet and mobile communications outage that lasted for about 20 hours. Service was restored earlier today.
A common misconception in IT is that virtualization and enterprise-class disaster recovery just don't mix. Either you get the flexibility of the virtual data center or the robust capabilities and short recovery time objectives (RTOs) and recovery point objectives (RPOs) that come with great DR, but never both at the same time.
If deployed correctly, encryption does not need to be a headache. Instead, encryption can be an enabler to achieve the flexibility, compliance and data privacy that is required in today's business environments.
STORserver, a maker of backup appliances, announced private and public cloud backup services.
If your IT organization doesn't have a clear core strategy, it's easy to get caught up in--and spend too much on--technology trends. Learn about six CIOs' strategies for 2013 and see how they compare to your plans for the rest of the year.
If you are making a list of tech predictions for next year, as this story does, it may be a good idea to put the solar maximum on this list. The next one is expected in 2013, says NASA.
Data recovery experts have been kept busy in the wake of Hurricane Sandy, which left a slew of data centers underwater, damaging equipment and threatening a significant loss of business-critical data.
Lessons from 9/11 have helped ensure the financial services sector in New York and New Jersey is prepared for disasters, and even shorted the time to recover when regional events happen.
As a nation, we have certainly faced our fair share of disasters lately; flooding in Queensland and Victoria, cyclones in Queensland and massive bush fires in Western Australia — just months after devastating earthquakes in Christchurch. Our hearts certainly goes out to all of the people affected by these disasters but I personally feel the pain of all the IT professionals who are, or will be, working tirelessly to bring IT systems back on-line in order to maintain some form of business continuity in these affected areas.
Earthquakes? Volcanoes? Pandemics? Tsunamis? Are these the stuff of business continuity? Gartner has issued several papers covering major disasters such as the Iceland volcano eruption and its impact on business travel, admitting that “few, if any, businesses plan for a volcanic ash disruption scenario”, which is probably the understatement of the year.
Whitepapers about disaster recovery
With many backup and recovery strategies not keeping up with rampant data growth and increasing migration to virtual environments, many in-house IT budgets are stretched to breaking point. This whitepaper outlines the best practice in delivering a backup strategy that is efficient, effective and affordable. Click to download!
Sign up now »
- FTLead Software EngineerSA
- FTFlash / ActionScript Developer - ContractNSW
- FTQuality ManagerSA
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTechnical Business AnalystNSW
- FTR&D EngineerSA
- FTSenior Python DeveloperNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTOS Web Applications DeveloperNSW
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. This whitepaper examines the escalating complexity for the security management environment; ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Four dissenters to spur next year's security debates
- AusCERT 2013: Kill the password, says Mozilla
- AusCERT 2013: Unmanaged, unknown privileged logins opening the door for APTs: Cyber-Ark
- AusCERT 2013: Companies unaware of IPv6 security risk even if they’re not using it
- In pictures: AusCERT 2013 roundup
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia