SlideShare a Scribd company logo
1 of 6
Download to read offline
Downtime
Causes and Costs
Downtime: What it is….
•

On computational environments, downtime is obvious to everybody (time
of system down), but the most important thing to keep in mind is:
•

Downtime can lead to serious material and non-material damages

•

Downtime not only represents money lost, but trust, image of your
brand, damages for your customers, etc
Main Reasons for System Failures
!
•

Around 70% of all system failures can be
attributed to software or user errors. This
number is based on researches and
published for example in the Oracle
Backup and Recovery Handbook

Others
5%
Software Error
36%

Phisical (HW Problems)
25%

Operation (User Error)
34%

Reference: libelle.com.cn
Impacts and Consequences of
System Downtime

Visible Impacts!

Invisible Impacts!

!

•

Lost Production Hours

•

Employee Dissatisfaction

•

Increased Costs

•

Lost Revenue

•

Security Issues

•

Bad Financial Performance

•

Lost Profits

•

Decreased Productivity

•

Liabilities and Risks

•

Press Attention

•

Dissatisfied Customers

•

Poor Communications

•

Time to Restore Normal Operation

•

Brand Erosion

•

Lower IT Department Reputation

•

Long-Term Loss of Customers
Cost of Downtime Calc Example

Reference: libelle.com.cn
Think in High Availability
•

The availability and accessibility of data is one of the most costly
investments of every organisation

•

The cost of downtime or data loss is usually vastly underestimated

•

Where there is a downtime incident, most of the affected departments are
surprised by the actual consequences

More Related Content

What's hot

Pure Gold: Leveraging Software Usage Data to Reduce License Costs & Risk
Pure Gold: Leveraging Software Usage Data to Reduce License Costs & RiskPure Gold: Leveraging Software Usage Data to Reduce License Costs & Risk
Pure Gold: Leveraging Software Usage Data to Reduce License Costs & RiskJohn Emmitt
 
20 Minutes on Desktop Analytics: Objective QA in Contact Centers & Back Office
20 Minutes on Desktop Analytics:  Objective QA in Contact Centers & Back Office 20 Minutes on Desktop Analytics:  Objective QA in Contact Centers & Back Office
20 Minutes on Desktop Analytics: Objective QA in Contact Centers & Back Office Cicero, Inc.
 
Raam risk analysis assessment and management
Raam risk analysis assessment and managementRaam risk analysis assessment and management
Raam risk analysis assessment and managementTerry Penney
 
What Is Enterprise Asset Management Software?
What Is Enterprise Asset Management Software?What Is Enterprise Asset Management Software?
What Is Enterprise Asset Management Software?Stacey Kramer
 
Windows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring AdaptivaWindows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring AdaptivaFlexera
 
ClockworkISMS
ClockworkISMSClockworkISMS
ClockworkISMSDelaney
 
AMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramAMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramIvanti
 
Successful preparation for regulatory inspections of computerized systems in ...
Successful preparation for regulatory inspections of computerized systems in ...Successful preparation for regulatory inspections of computerized systems in ...
Successful preparation for regulatory inspections of computerized systems in ...ARITHMOS
 

What's hot (12)

Pure Gold: Leveraging Software Usage Data to Reduce License Costs & Risk
Pure Gold: Leveraging Software Usage Data to Reduce License Costs & RiskPure Gold: Leveraging Software Usage Data to Reduce License Costs & Risk
Pure Gold: Leveraging Software Usage Data to Reduce License Costs & Risk
 
20 Minutes on Desktop Analytics: Objective QA in Contact Centers & Back Office
20 Minutes on Desktop Analytics:  Objective QA in Contact Centers & Back Office 20 Minutes on Desktop Analytics:  Objective QA in Contact Centers & Back Office
20 Minutes on Desktop Analytics: Objective QA in Contact Centers & Back Office
 
Overview of emandatory.com
Overview of emandatory.comOverview of emandatory.com
Overview of emandatory.com
 
Raam risk analysis assessment and management
Raam risk analysis assessment and managementRaam risk analysis assessment and management
Raam risk analysis assessment and management
 
Vmworld 2005-sln241
Vmworld 2005-sln241Vmworld 2005-sln241
Vmworld 2005-sln241
 
What Is Enterprise Asset Management Software?
What Is Enterprise Asset Management Software?What Is Enterprise Asset Management Software?
What Is Enterprise Asset Management Software?
 
Windows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring AdaptivaWindows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring Adaptiva
 
ClockworkISMS
ClockworkISMSClockworkISMS
ClockworkISMS
 
It change management
It change managementIt change management
It change management
 
AMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramAMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management Program
 
Successful preparation for regulatory inspections of computerized systems in ...
Successful preparation for regulatory inspections of computerized systems in ...Successful preparation for regulatory inspections of computerized systems in ...
Successful preparation for regulatory inspections of computerized systems in ...
 
3 mis-it system
3 mis-it system3 mis-it system
3 mis-it system
 

Viewers also liked (7)

Always On - Zero Downtime releases
Always On - Zero Downtime releasesAlways On - Zero Downtime releases
Always On - Zero Downtime releases
 
Zero Downtime JEE Architectures
Zero Downtime JEE ArchitecturesZero Downtime JEE Architectures
Zero Downtime JEE Architectures
 
Conquistando seu espaço
Conquistando seu espaçoConquistando seu espaço
Conquistando seu espaço
 
Architecting for Continuous Delivery
Architecting for Continuous DeliveryArchitecting for Continuous Delivery
Architecting for Continuous Delivery
 
A Gen Y versus Gen X conflict
A Gen Y versus Gen X conflictA Gen Y versus Gen X conflict
A Gen Y versus Gen X conflict
 
Generation Theory
Generation TheoryGeneration Theory
Generation Theory
 
Generation X, Y or Z
Generation X, Y or ZGeneration X, Y or Z
Generation X, Y or Z
 

Similar to Downtime

Keynote Tech Talks: Watching SaaS Apps with Keynote
Keynote Tech Talks: Watching SaaS Apps with KeynoteKeynote Tech Talks: Watching SaaS Apps with Keynote
Keynote Tech Talks: Watching SaaS Apps with KeynoteKeynote Mobile Testing
 
Layered Process Audits - The Compelling and Immediate ROI
Layered Process Audits - The Compelling and Immediate ROILayered Process Audits - The Compelling and Immediate ROI
Layered Process Audits - The Compelling and Immediate ROIEase Inc.
 
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...Precisely
 
Why Integrating IBM Z into ServiceNow and Splunk Is So Important
Why Integrating IBM Z into ServiceNow and Splunk Is So ImportantWhy Integrating IBM Z into ServiceNow and Splunk Is So Important
Why Integrating IBM Z into ServiceNow and Splunk Is So ImportantPrecisely
 
Seminar on Software Testing
Seminar on Software TestingSeminar on Software Testing
Seminar on Software TestingMD ISLAM
 
Great Lakes Oracle Conference (GLOC) Benefits of migrating to the Cloud- Me...
Great Lakes Oracle Conference (GLOC)  Benefits of migrating to the Cloud-  Me...Great Lakes Oracle Conference (GLOC)  Benefits of migrating to the Cloud-  Me...
Great Lakes Oracle Conference (GLOC) Benefits of migrating to the Cloud- Me...ebreger
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesJeff Stokes
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
Dependable Systems - System Dependability Evaluation (8/16)
Dependable Systems - System Dependability Evaluation (8/16)Dependable Systems - System Dependability Evaluation (8/16)
Dependable Systems - System Dependability Evaluation (8/16)Peter Tröger
 
PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)
PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)
PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)Prashant Rasekar
 
Business Process Automation A Productivity Lever
Business Process Automation A Productivity LeverBusiness Process Automation A Productivity Lever
Business Process Automation A Productivity LeverKnoldus Inc.
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden UserJeff Stokes
 
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNowAvoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNowPrecisely
 
Eliminate Risks in SOA Implementation & Support
Eliminate Risks in SOA Implementation & SupportEliminate Risks in SOA Implementation & Support
Eliminate Risks in SOA Implementation & SupportSuneraTech
 
Document Management Options for Abila MIP
Document Management Options for Abila MIPDocument Management Options for Abila MIP
Document Management Options for Abila MIPNet at Work
 
Adapting Scrum in an Organization with Tailored Processes
Adapting Scrum in an Organization with Tailored ProcessesAdapting Scrum in an Organization with Tailored Processes
Adapting Scrum in an Organization with Tailored ProcessesPrabhat Sinha
 
Dev Dives: Mastering AI-powered Document Understanding
Dev Dives: Mastering AI-powered Document UnderstandingDev Dives: Mastering AI-powered Document Understanding
Dev Dives: Mastering AI-powered Document UnderstandingUiPathCommunity
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM IntegrationPrecisely
 
A short introduction into HEAT Software for tracking customer service
A short introduction into HEAT Software for tracking customer serviceA short introduction into HEAT Software for tracking customer service
A short introduction into HEAT Software for tracking customer serviceTim Wilmot
 

Similar to Downtime (20)

Role Of OEE in Lean Manufacturing
Role Of OEE in Lean ManufacturingRole Of OEE in Lean Manufacturing
Role Of OEE in Lean Manufacturing
 
Keynote Tech Talks: Watching SaaS Apps with Keynote
Keynote Tech Talks: Watching SaaS Apps with KeynoteKeynote Tech Talks: Watching SaaS Apps with Keynote
Keynote Tech Talks: Watching SaaS Apps with Keynote
 
Layered Process Audits - The Compelling and Immediate ROI
Layered Process Audits - The Compelling and Immediate ROILayered Process Audits - The Compelling and Immediate ROI
Layered Process Audits - The Compelling and Immediate ROI
 
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...
 
Why Integrating IBM Z into ServiceNow and Splunk Is So Important
Why Integrating IBM Z into ServiceNow and Splunk Is So ImportantWhy Integrating IBM Z into ServiceNow and Splunk Is So Important
Why Integrating IBM Z into ServiceNow and Splunk Is So Important
 
Seminar on Software Testing
Seminar on Software TestingSeminar on Software Testing
Seminar on Software Testing
 
Great Lakes Oracle Conference (GLOC) Benefits of migrating to the Cloud- Me...
Great Lakes Oracle Conference (GLOC)  Benefits of migrating to the Cloud-  Me...Great Lakes Oracle Conference (GLOC)  Benefits of migrating to the Cloud-  Me...
Great Lakes Oracle Conference (GLOC) Benefits of migrating to the Cloud- Me...
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff Stokes
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Dependable Systems - System Dependability Evaluation (8/16)
Dependable Systems - System Dependability Evaluation (8/16)Dependable Systems - System Dependability Evaluation (8/16)
Dependable Systems - System Dependability Evaluation (8/16)
 
PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)
PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)
PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)
 
Business Process Automation A Productivity Lever
Business Process Automation A Productivity LeverBusiness Process Automation A Productivity Lever
Business Process Automation A Productivity Lever
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden User
 
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNowAvoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
 
Eliminate Risks in SOA Implementation & Support
Eliminate Risks in SOA Implementation & SupportEliminate Risks in SOA Implementation & Support
Eliminate Risks in SOA Implementation & Support
 
Document Management Options for Abila MIP
Document Management Options for Abila MIPDocument Management Options for Abila MIP
Document Management Options for Abila MIP
 
Adapting Scrum in an Organization with Tailored Processes
Adapting Scrum in an Organization with Tailored ProcessesAdapting Scrum in an Organization with Tailored Processes
Adapting Scrum in an Organization with Tailored Processes
 
Dev Dives: Mastering AI-powered Document Understanding
Dev Dives: Mastering AI-powered Document UnderstandingDev Dives: Mastering AI-powered Document Understanding
Dev Dives: Mastering AI-powered Document Understanding
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 
A short introduction into HEAT Software for tracking customer service
A short introduction into HEAT Software for tracking customer serviceA short introduction into HEAT Software for tracking customer service
A short introduction into HEAT Software for tracking customer service
 

Recently uploaded

Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 

Recently uploaded (20)

Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 

Downtime

  • 2. Downtime: What it is…. • On computational environments, downtime is obvious to everybody (time of system down), but the most important thing to keep in mind is: • Downtime can lead to serious material and non-material damages • Downtime not only represents money lost, but trust, image of your brand, damages for your customers, etc
  • 3. Main Reasons for System Failures ! • Around 70% of all system failures can be attributed to software or user errors. This number is based on researches and published for example in the Oracle Backup and Recovery Handbook Others 5% Software Error 36% Phisical (HW Problems) 25% Operation (User Error) 34% Reference: libelle.com.cn
  • 4. Impacts and Consequences of System Downtime Visible Impacts! Invisible Impacts! ! • Lost Production Hours • Employee Dissatisfaction • Increased Costs • Lost Revenue • Security Issues • Bad Financial Performance • Lost Profits • Decreased Productivity • Liabilities and Risks • Press Attention • Dissatisfied Customers • Poor Communications • Time to Restore Normal Operation • Brand Erosion • Lower IT Department Reputation • Long-Term Loss of Customers
  • 5. Cost of Downtime Calc Example Reference: libelle.com.cn
  • 6. Think in High Availability • The availability and accessibility of data is one of the most costly investments of every organisation • The cost of downtime or data loss is usually vastly underestimated • Where there is a downtime incident, most of the affected departments are surprised by the actual consequences