This document discusses disaster recovery planning for an organization. It defines what constitutes a disaster versus everyday operational issues. Example threats that could cause disasters are provided, such as power outages, fires or cyber attacks. The document recommends conducting a business impact analysis to understand priority systems and developing recovery time and point objectives. It outlines a sample disaster recovery approach and strategies for different priority systems, including maintaining backup data at remote sites to enable quick recovery in the event of a disaster.
Middleware and Middleware in distributed applicationRishikese MR
The seminar discuss about the common middleware concept and middleware in distributed applications .Also we discuss about 4 different types of middleware. MOM( Message oriented Middleware), ORB (object request broker), TP Monitors, Request procedure calls RPC.
The slide also gives the advantages and disadvantages of each.
Middleware and Middleware in distributed applicationRishikese MR
The seminar discuss about the common middleware concept and middleware in distributed applications .Also we discuss about 4 different types of middleware. MOM( Message oriented Middleware), ORB (object request broker), TP Monitors, Request procedure calls RPC.
The slide also gives the advantages and disadvantages of each.
One of my first attempts to present my research in a popular way and explain to casual taxpayers why resource management in cloud computing is important.
Integrated Intrusion Detection Services for z/OS Communications Server zOSCommserver
z/OS Communications Server provides integrated Intrusion Detection Services (IDS) for TCP/IP. This session will describe the Communications Server IDS and how it can be used to detect intrusion attempts against z/OS.
This session will cover the following topics
- IDS Overview
- Intrusion events detected by z/OS IDS
- IDS Actions Recording Actions Defensive Actions
- IDS Reports Automation for IDS Working with IDS policy
One of my first attempts to present my research in a popular way and explain to casual taxpayers why resource management in cloud computing is important.
Integrated Intrusion Detection Services for z/OS Communications Server zOSCommserver
z/OS Communications Server provides integrated Intrusion Detection Services (IDS) for TCP/IP. This session will describe the Communications Server IDS and how it can be used to detect intrusion attempts against z/OS.
This session will cover the following topics
- IDS Overview
- Intrusion events detected by z/OS IDS
- IDS Actions Recording Actions Defensive Actions
- IDS Reports Automation for IDS Working with IDS policy
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseRapidScale
80% of companies that do not recover from a data loss within one month are likely to go out of business in the immediate future (Bernstein Crisis Management). With Disaster Recovery and Business Continuity, a business is able to survive and thrive after a disaster has struck.
When it comes to backup and recovery, backup performance numbers rule the roost. It’s understandable really: far more data gets backed up than ever gets restored, and backup length is one of most difficult problems facing administrators today. But a reliance on backup numbers alone is dangerous. Recovery may not happen as frequently as daily backup but recovery is the entire reason for backup. Backing up because everyone does it isn’t good enough.
In this presentation, CloudSmartz presented the Buffalo, NY Region of CIO and IT Executives recent trends on disaster recovery and business resilience.
This was great opportunity to learn and discuss new technologies on how you can maintain control of your data and have the flexibility you want over your environment:
• Defining critical applications for Disaster Recovery & Business Continuity
• Disaster Recovery approaches within the secure cloud environment
• Security, Control and Flexibility at your fingertips
• Reduce disaster recovery costs and gain continuous storage access
Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business operations and safeguarding people, assets and overall brand equity.
Learn the facts about replication in mainframe storage webinarHitachi Vantara
Business continuity is essential for today's enterprise computing environments, and protecting your data and information is key. However, the many myths associated with data replication can be confusing. How do you sort truth from fiction. Join Hitachi solution architect Joe Amato to learn about in-system replication as well as replication to remote locations, both synchronously and asynchronously. You'll come away equipped with valuable insight into the business continuity solutions available for mainframe storage.
The first in our 'Journey' series of webinars, this complimentary presentation discusses the use of AWS as a Disaster Recovery environment and how the architectural approaches to DR in the AWS cloud make a perfect learning ground for more complex production application deployments.
In this webinar we introduce differing architectural patterns for using AWS as a disaster recovery platform and how AWS can make a cost effective part of your overall business continuity planning. By discussing a customer use-case end to end, we highlight key lessons learned to help you on your journey into the AWS cloud.
The Great Disconnect of Data Protection: Perception, Reality and Best Practicesiland Cloud
iland and Veeam recently conducted a data protection survey of IT organizations worldwide. In this webinar, we summarize and analyze the survey responses so you canunderstand today’s data protection landscape. Then, we cover best practices that can help ensure thatyour organization, and its data,are properly protected
Watch the webinar on-demand: https://www.iland.com/wb-data-protection-report/
Similar to Disaster Recovery - Business & Technology (20)
Ever heard that IT is constantly changing? Or that we all need to be constantly learning? Simple in theory, hard in practice even if like me that’s part of what you love about IT. What if you could hack your brain to learn faster? To understand data, situations, and people more quickly? We’ll briefly discuss some common mental models, illustrate them with IT stories, and let you know where you can learn more.
Note: there's very little text in this presentation - I presented it at South Florida VMUG Usercon for the VMUG Theater and likely will at other usercons.
Make sure to attend Varrow Madness - a one of a kind technology conference on March 20 at the Westin in Charlotte - http://madness.varrow.com for more details and to register.
Let me know on Twitter or via email (amiller @ varrow . com) if would like the file to send to people inside your organization.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Disaster Recovery - Business & Technology
1. Disaster Recovery
Business & Technology
Varrow Madness
March 15, 2012
Andrew Miller
Technical Consultant
t: @andriven w:www.thinkmeta.net
2. One Big Reason to Do This
Expectations for Disaster
Recovery
≠ IT Capabilities
for Disaster Recovery
3. What is a Disaster?
• Disaster: An event that affects a service or system such
that significant effort is required to restore the original
performance level.
» IT Service Management Forum
But what does that look like IN
OUR ENVIRONMENT?
What disaster and recovery
scenarios should we plan for?
Where do we begin?
How do we do it?
5. Disaster Recovery vs. Operational Recovery
• Disaster Recovery
– To cope with & recover from an IT crisis that moves work to an
alternative system in a non-routine way.
– A real “disaster” is large in scope and impact
– DR typically implies failure of the primary data center and recovery to an
alternate site
• Operational Recovery
– Addresses more “routine” types of failures (server, network, storage,
etc.)
– Events are smaller in scope and impact than a full “disaster”
– Typically implies recovering to alternate equipment within the primary
data center
• Business expectations for recovery timeframe is typically
shorter for “operational recovery” issues than a true “disaster”
• Each should have its own clearly defined objectives
6. Risks, Threats and Vulnerabilities
Risk is a function of the likelihood of a given threat
acting upon a particular potential vulnerability,
and the resulting impact of that adverse event on
the organization.
7. Some threats that can cause Disasters…
• Human Error
• Localized IT systems /
network failure
• Extended power outage
• Telecommunications outage
• Storm / Weather damage
• Earthquake / Volcano
• Fire in the facility
• Facility flooding
• Local evacuation
• Cyber attack
• Sabotage
8. (Varrow) Disaster Recovery Approach
• Interviews with key personnel to understand Business Process priorities
and establish Business Impact Analysis (BIA).
• Review existing IT production infrastructure, including applications,
servers, storage, network, and external connectivity. Identify Risks and
Gaps.
• Establish Disaster Impact Scenarios and Disaster Recovery strategies to
meet requirements.
• Recommend Roadmap for establishing recovery capabilities and
documenting plans.
• Implement required recovery capabilities.
• Develop framework and content for IT DR Plan.
• Develop maintenance and test procedures for IT DR Plan.
• Address Business Continuity requirements and planning as appropriate.
9. What is the Business Impact Analysis?
• A conversation between IT and key stakeholders to
understand:
– What are the most time-critical and information-critical
business processes?
– How does the business REALLY rely upon IT Service and
Application availability?
– What are the Student, Financial, Regulatory, Reputational,
and other impacts of IT Service and Application
unavailability?
– What availability or recoverability capabilities are justifiable
based on these requirements, potential impact, and costs?
10. Disaster Recovery: Key Measures
Recovery Point Objectives Recovery Time Objectives
(RPO) (RTO)
5 6 7 8 9 10 11 12 1 2 3 4 5 6 7
a.m. a.m. a.m. a.m. a.m. a.m. a.m. a.m. p.m. p.m. p.m. p.m. p.m. p.m. p.m.
RPO: Amount of data lost from DECLARE RTO: Targeted amount of time
failure, measured as the amount DISASTER to restart a business service
10 a.m.
of time from a disaster event after a disaster event
11. Disaster Recovery: Key Measures
• Recovery Time Objective (RTO)
Maximum duration of disruption of service
• Recovery Point Objective (RPO)
Point in time to which application data is recovered / Maximum data loss
Weeks Days Hours Minutes Seconds Seconds Minutes Hours Days Weeks
Recovery Point Recovery Time
Real Time
Cost
12. BIA - Example Priority Tiers
Priority Tier Description
Priority 1 Services whose unavailability more than a brief period can have a severe impact on
High Availability / customers or time-critical business operations.
Immediate Recovery
Priority 2 Services whose unavailability significantly impacts customers or business
1-2 day recovery operations.
Priority 3 Services which can tolerate up to five days of disruption in a disaster.
3-5 day recovery
Priority 4 Services which can tolerate up to ten days of disruption in a disaster.
6-10 day recovery
Priority 3 and 4 systems may be restored in less time, depending on the situation.
However, higher priority functions will be restored first.
Priority 5 Non-critical services which can tolerate two weeks or more of disruption in a
“Best effort” recovery disaster. These systems will be restored on a best-effort basis, after other more
critical systems have been restored and ongoing operations have resumed.
Priority 5 systems may be restored in less time, depending on the situation.
However, higher priority functions will be restored first. In some cases, systems
deemed to not be required for continued operations may not be restored.
13. What does it take to RECOVER
from an IT Disaster?
• Data Protection
– Backups, Replication
• Recovery Facility
– Location to rebuild IT infrastructure or provision services
• Data Recovery & Storage
– Get Data into a form that is usable
• Servers / Compute Capacity
– Sufficient servers or virtual compute capacity to actually run the applications
• Network, Voice, and Data Communications
– Connect servers, storage and workers
– Connect the recovery site to work sites
– Communicate with customers
– Includes network, telecom, demarcation equipment; cabling; telecom provisioning
• DR Plan
– Documented and tested procedures for what to do, and how to do it
• People
14. Example Disaster Recovery Strategies
Priority Disaster Recovery Strategy Data Protection Approach
Priority 1 Establish hot site for systems and data in a Replicate / remote mirror / short
4 hour RTO or secondary data center at a remote interval remote disk-to-disk
less location that is unlikely to be impacted backup
by a local or regional event.
Priority 2 Maintain sufficient remote physical or virtual Remote disk-to-disk backup
24-48 hour RTO infrastructure for restoration. Ensure
sufficient space/power in recovery
facility.
Priority 3 Ensure ability to quickly acquire Tape (with sufficient off-site rotation)
72 hour RTO infrastructure for restoration. Ensure or remote disk-to-disk backup
sufficient space/power in recovery
facility.
Priority 4 Ensure ability to quickly acquire Tape (with sufficient off-site rotation)
1-2 week RTO infrastructure for restoration. Ensure or remote disk-to-disk backup
sufficient space/power in recovery
facility.
15. Storage Arrays + Replication
PRODUCTION SITE OPTIONAL DISASTER RECOVERY SITE
Application Local RecoverPoint bi-directional Remote Standby
servers copy replication/recovery copy servers
RecoverPoint RecoverPoint
appliance appliance
Production and
local journals
Prod Fibre Remote
SAN LUN Channel/WAN journal SAN
s
Storage Storage
Host-based write splitter arrays arrays
Fabric-based write splitter
Symmetrix VMAXe, VNX-, and
CLARiiON-based write splitter
16. Site A (Primary) Site B (Recovery)
Site Site
vCenter Server Recovery vCenter Server Recovery
Manager Manager
vSphere vSphere
vSphere
Replication
Storage-based
replication
vSphere Replication
Simple, cost-efficient replication for Tier 2 applications and smaller sites
Storage-based Replication
High-performance replication for business-critical applications in larger sites
Note to Presenter: View in Slide Show mode for animation. When EMC or its partners talk about remote replication, they usually mean between storage at two locations. The source and target are physically separated to reduce the risks associated with co-location. Remote replicated systems could be across a campus, across a town, or across the globe. Their physical distance and technology selected can affect how quickly you recover from a disruption and how much data is lost.Organizations normally set requirements for how much lost data and how much time to come back online is acceptable. The recovery point objective (RPO) is the amount of data that can be lost, measured in terms of time without being catastrophic to the business. The recovery time objective (RTO) is the amount of time that it takes to recover the data and restart your business services from the recovered data. Remote replication provides much lower RPOs (at or close to zero) and very small RTOs, depending on implementation. The bottom line is that replication is appropriate for all types of data, and the RPO and RTO you target are going to affect your implementation.For multiple RPOs and for remote replication with either zero or low RPO—and near-instant to instant recovery with DVR-like technology, EMC offers the RecoverPoint family.