Archive for the "Business Continuity" Category
A quarter century ago, I got into the disaster recovery business by accident. I was walking through my company’s loading dock and found a huge fireproof safe containing Reel-to-reel backup tapes of all of the software that we developed and sold to our customers, along with our accounting records. Less than a year after I opened my mouth about those tapes sitting on the loading dock, the Loma Prieta earthquake struck and the rest is history.
A fire alarm roused 1,800 people staying at two Sheraton hotels. Do you have a plan if you need to evacuate your hotel room? I do and here is what it is.
For many families, Black Friday is the center of their Thanksgiving tradition. The planning you do before heading to the mall can be used to help your employees understand why tabletop exercises are so important before doing a full blown (or live fire) BCP test.
During and after Superstorm Sandy, power and communications were out. Weeks later, power is still out for tens of thousands and some buildings will be uninhabitable for months due to contamination. Cellphone carriers successfully fought the FCC on installing backup power and Netflix reported that viewership doubled on the East Coast. If your organization had a work-from-home disaster recovery plan, did it work?
My iPhone 4 wanted to be connected to iTunes and was a brick for four days until I could make it to an Apple store. Why carry a phone that can't even be a phone without being plugged into a computer first?
Even though his data was in the cloud and on multiple machines, Matt Honan lost a year's worth of photos, emails, documents, and who knows what else. The lesson? Back up to disk, tape, or something else and lock it away.
Although it makes people uncomfortable to discuss, you should understand what to do if you are involved in an active shooter situation. This will be a series and the first post points you to an online training course that your entire family can take to help you understand your options if you find yourself in the middle of an active shooter situation.
At VMWorld and at Open Mobile Summit this year, VMware showed off a new product currently code-named Horizon. While some websites are calling Horizon a mobile platform that creates a “phone within a phone,” Horizon is much more than that. Think of whatever computing device you have in your hands as a window to your applications […]
In our last blog I said to watch for our guest blogger Randall Becker. As much as I would like to take credit for his writing, this is Randall’s entry. I hope you enjoy it as much as I did. What is “The Cloud?” Put simply, a computing cloud is a set of resources that […]
Protecting your data against loss means protecting it against a spectrum of risks. If you are worried about corruption or deletion of data, then you should be thinking about replication and backup. If you are worried about your data falling into the wrong hands, then you should be thinking about data encryption solutions along with access controls and separation of duties. Last but not least, if you are worried about regulatory compliance or eDiscovery, then you might also have a requirement to store your data in a provably read-only form.