IT Application Downtime, Executive Visibility and Disaster Tolerant Computing

نویسندگان

  • Michael A. HARPER
  • Chad M. LAWLER
چکیده

This paper examines the relationship among disaster tolerant systems, Information Technology (IT) application operation and availability, and the executive level management visibility necessary for system operational success. The current state of disaster tolerant application systems is explored including an investigation into the reliability and survivability requirements necessary to achieve disaster tolerant system operation through a simplified network architecture analysis. Specific focus is directed towards the risk of IT application downtime attributable to the increasing dependence placed on critical data-driven applications operating in distributed and unbounded networks. A method for disaster tolerance is proposed which mitigates unplanned downtime through a disciplined approach of computer and people based processes implementing specific documentation procedures. In addition, the importance of executive visibility into the system wide impact of downtime and the resultant effects on the total cost of ownership (TCO) of these critical systems is addressed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Components of Disaster Tolerant Computing

This paper provides a review of the components of disaster tolerant computing and communications and reviews the current state in light of recent man-made terrorist events. The paper examines the relationships between disaster tolerant systems, Information Technology (IT) application availability and executive level management visibility necessary for successful system operations in the event o...

متن کامل

Components of disaster-tolerant computing: analysis of disaster recovery, IT application downtime and executive visibility

This paper provides a review of disaster tolerant Information Technology (IT). The state of traditional disaster recovery approaches is outlined. The risks of IT application downtime attributable to the increasing dependence on critical information technology operating in interdependent, interacting complex infrastructure systems is reviewed. General disaster tolerance techniques are summarized...

متن کامل

Disaster-Tolerant Storage with SDN

Cloud services are becoming centralized at several georeplicated datacentres. These services replicate data within a single datacentre to tolerate isolated failures. Unfortunately, disasters’ effects can not be entirely avoided, as existing approaches migrate a copy of data to backup datacentres only after data have been stored at a primary datacentre. Upon disaster, all data not yet migrated c...

متن کامل

Fault Tolerant DNA Computing Based on ‎Digital Microfluidic Biochips

   Historically, DNA molecules have been known as the building blocks of life, later on in 1994, Leonard Adelman introduced a technique to utilize DNA molecules for a new kind of computation. According to the massive parallelism, huge storage capacity and the ability of using the DNA molecules inside the living tissue, this type of computation is applied in many application areas such as me...

متن کامل

Efficient Scheduling of Pigeons for a Constrained Delay Tolerant Application

Information collection in the disaster area is an important application of pigeon networks—a special type of delay tolerant networks (DTNs) that borrows the ancient idea of using pigeons as the telecommunication method. The aim of this paper is to explore highly efficient scheduling strategies of pigeons for such applications. The upper bound of traffic that can be supported under the deadline ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005