FACTOID # 5: Minnesota and Connecticut are both in the top 5 in saving money and total tax burden per capita.
 
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 
   
 
WHAT'S NEW
 

SEARCH ALL

FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:

 

 

(* = Graphable)

 

 


Encyclopedia > Disaster recovery

Disaster recovery is the process of regaining access to the data, hardware and software necessary to resume critical business operations after a natural or human-induced disaster. A disaster recovery plan (DRP) should also include plans for coping with the unexpected or sudden loss of key personnel, although this is not covered in this article, the focus of which is data protection. DRP is part of a larger process known as business continuity planning (BCP). Business continuity planning life cycle Business Continuity Planning (BCP) is an interdisciplinary peer mentoring methodology used to create and validate a practiced logistical plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption. ... // Emergency management (or disaster management) is the discipline dealing of with and avoiding risks. ... DRP stands for: Democratic-Republican Party (United States), the dominant political party in the United States from 1800 until the 1820s Deutsche Reichspartei, a nationalist political party in West Germany (1950-1964) Disaster Recovery Plan Distribution Resource Planning Dividend reinvestment plan Maldivian Peoples Party, (Dhivehi Rayiithunge Party) The Ruling Political... Mount Pinatubo eruption, 1991 A natural disaster is the consequence of a natural hazard (e. ... Man-made hazards are threats having an element of human intent, negligence, error or involving a failure of a system. ... Business continuity planning life cycle Business Continuity Planning (BCP) is an interdisciplinary peer mentoring methodology used to create and validate a practiced logistical plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption. ...

Contents

Business data protection

With the rise in information technology and the reliance on business-critical data, the landscape has changed in recent years in favor of protecting irreplaceable data. This is especially evident in information technology, with most large computer systems backing up digital information to limit data loss and to aid data recovery. Information and communication technology spending in 2005 Information technology (IT), as defined by the Information Technology Association of America (ITAA), is the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware. ... Data recovery is the process of salvaging data from damaged, failed, corrupted or inaccessible primary storage media when it cannot be accessed normally. ...


It is believed that some of the companies spend up to 25% of their budgets on disaster recovery planning; this is intended to avoid larger losses. Of companies that had a major loss of computerized records, 43% never reopen, 51% close within two years, and only 6% will survive long-term.[1]


The current data protection market is characterized by:

  • Rapidly changing customer needs that are driven by data growth, regulatory issues and the growing importance to access data quickly by retaining it online.
  • An ever-shrinking time frame for backing up data, which is burdening conventional tape backup technologies.

As the disaster recovery market continues to undergo significant structural changes, the shift presents opportunities for next-generation startup companies that specialize in business continuity planning and offsite data protection such as Recall, Switch Communications, Symagio, NetMass, SunGard Availability Services, and CyGem. In information technology, backup refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. ... Business continuity planning life cycle Business Continuity Planning (BCP) is an interdisciplinary peer mentoring methodology used to create and validate a practiced logistical plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption. ... It has been suggested that this article or section be merged with remote backup service. ...


Events that necessitate disaster recovery

There are many different risks that can negatively impact the normal operations of an organization. A risk assessment should be performed to determine what constitutes a disaster and which risks a specific company is most susceptible to, including: Risk assessment is a step in the risk management process. ...

Mount Pinatubo eruption, 1991 A natural disaster is the consequence of a natural hazard (e. ... For other uses, see Fire (disambiguation). ... A power outage is the loss of the electricity supply to an area. ... The following is a timeline of acts and failed attempts that can be considered terrorism. ... Everyday instance of theft: the bike which fits on this wheel has disappeared. ... This page may meet Wikipedias criteria for speedy deletion. ... In computer security technology, a virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents (for a complete definition: see below). ... Look up test in Wiktionary, the free dictionary. ...

Preventions against data loss

  • Backups sent off-site in regular intervals
    • Includes software as well as all data information, to facilitate recovery
  • Create an insurance copy on Microfilm or similar and store the records off-site.
  • Storage Area Networks (SANs) over multiple sites are a recent development (since 2003) which make data immediately available without the need to recover or synchronize it
  • Surge Protectors — to minimize the effect of power surges on delicate electronic equipment
  • Uninterruptible Power Supply (UPS) and/or Backup Generator
  • Fire Preventions — more alarms, accessible extinguishers
  • Anti-virus software and other security measures

Microfilm machines may be available at libraries or record archives. ... This article needs to be cleaned up to conform to a higher standard of quality. ... In computing, a storage area network (SAN) is an architecture to attach remote computer storage devices such as disk array controllers, tape libraries and CD arrays to servers in such a way that to the operating system the devices appear as locally attached devices. ... An uninterruptible power supply (UPS), uninterruptible power source or sometimes called a battery backup is a device which maintains a continuous supply of electric power to connected equipment by supplying power from a separate source when utility power is not available. ... This article describes how security can be achieved through design and engineering. ...

Disaster recovery planning

Disaster recovery planning falls into the realm of Business continuity planning, as well as Risk management. The planning process consists of the following steps: Business continuity planning life cycle Business Continuity Planning (BCP) is an interdisciplinary peer mentoring methodology used to create and validate a practiced logistical plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption. ... For non-business risks, see risk or the disambiguation page risk analysis. ...

  • Assess business impact and risk. This should include an assessment of the business unit's function and, preferably, a business impact analysis (BIA). The purpose of the assessment is to determine the business unit's relative contribution to the larger organization (monetary and functional).
  • Develop a Disaster Recovery framework. Data should be categorized by importance. Two measures of importance are used, RTO and RPO. Recovery Time Objective (RTO) is the acceptable amount of time between the disaster and the post-disaster resumption of function (how long can we wait to restore data?). Recovery Point Objective (RPO) is the acceptable data roll-back (how current does the data have to be?).
  • Develop a recovery strategy and then a written Disaster Recovery Plan. That written plan should address at a minimum: response, recovery, and resumption of services detailed tasks.
  • Adjust information systems to make Disaster Recovery easier. This includes consolidating servers and data, perhaps with a Storage Area Network or other archival storage method.

A good plan takes into account many different factors. The most important are: The recovery time objective (RTO) is determined based on the acceptable down time in case of a disruption of operations. ... Recovery Point Objective (RPO) is the point in time that the restarted application will reflect. ...

  • Communication
    • Personnel — notify all key personnel of the problem and assign them tasks focused toward the recovery plan.
    • Customers — notifying clients about the problem minimizes panic.
  • Recall backups — If backup tapes are taken offsite, these need to be recalled. If using remote backup services, a network connection to the remote backup location (or the Internet) will be required.
  • Facilities — having backup hot sites or cold sites for larger companies. Mobile recovery facilities are also available from many suppliers.
  • Prepare your employees — during a disaster, employees are required to work longer, more stressful hours, and a support system should be in place to alleviate some of the stress. Prepare them ahead of time to ensure that work runs smoothly.
  • Business information — backups should be stored in a completely separate location from the company
  • Testing the plan — provisions, directions, frequency for testing the plan should be stipulated.

References

  1. ^ Jim Hoffer, "Backing Up Business - Industry Trend or Event", Health Management Technology, Jan 2001 [1]

See also

The Seven Tiers of Disaster Recovery was originally defined by Share [1] to help identify the various methods of recovering mission-critical computer systems as required to support business continuity. ... A backup site is a location where a business can easily relocate following a disaster, such as fire, flood, or terrorist threat. ... Virtual Tape Library (VTL) is a data storage virtualization technology used typically for archival storage purposes. ... A remote backup service or online backup service is a service that provides users with an online system for backing up and storing computer files. ... Continuous data protection (CDP), also called continuous backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. ... Recovery Point Objective (RPO) is the point in time that the restarted application will reflect. ... The recovery time objective (RTO) is determined based on the acceptable down time in case of a disruption of operations. ... A Secure Virtual Office is a software environment which allows people to securely access and run applications on a remote server from an internet connection - as if the application and data was on their own desktop machine. ...

Further reading

  • Cummings, E., Haag, S., & McCubbrey D. (2005). Management Information Systems for the Information Age. McGraw-Hill Ryerson Higher Education.
  • Benton, Dick (2007). Disaster Recovery: A Pragmatist's Viewpoint. Disaster Recovery Journal.

External links


 
 

COMMENTARY     


Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:

 


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m