SlideShare a Scribd company logo
Downtime
Causes and Costs
Downtime: What it is….
•

On computational environments, downtime is obvious to everybody (time
of system down), but the most important thing to keep in mind is:
•

Downtime can lead to serious material and non-material damages

•

Downtime not only represents money lost, but trust, image of your
brand, damages for your customers, etc
Main Reasons for System Failures
!
•

Around 70% of all system failures can be
attributed to software or user errors. This
number is based on researches and
published for example in the Oracle
Backup and Recovery Handbook

Others
5%
Software Error
36%

Phisical (HW Problems)
25%

Operation (User Error)
34%

Reference: libelle.com.cn
Impacts and Consequences of
System Downtime

Visible Impacts!

Invisible Impacts!

!

•

Lost Production Hours

•

Employee Dissatisfaction

•

Increased Costs

•

Lost Revenue

•

Security Issues

•

Bad Financial Performance

•

Lost Profits

•

Decreased Productivity

•

Liabilities and Risks

•

Press Attention

•

Dissatisfied Customers

•

Poor Communications

•

Time to Restore Normal Operation

•

Brand Erosion

•

Lower IT Department Reputation

•

Long-Term Loss of Customers
Cost of Downtime Calc Example

Reference: libelle.com.cn
Think in High Availability
•

The availability and accessibility of data is one of the most costly
investments of every organisation

•

The cost of downtime or data loss is usually vastly underestimated

•

Where there is a downtime incident, most of the affected departments are
surprised by the actual consequences

More Related Content

What's hot

Pure Gold: Leveraging Software Usage Data to Reduce License Costs & Risk
Pure Gold: Leveraging Software Usage Data to Reduce License Costs & RiskPure Gold: Leveraging Software Usage Data to Reduce License Costs & Risk
Pure Gold: Leveraging Software Usage Data to Reduce License Costs & Risk
John Emmitt
 
20 Minutes on Desktop Analytics: Objective QA in Contact Centers & Back Office
20 Minutes on Desktop Analytics:  Objective QA in Contact Centers & Back Office 20 Minutes on Desktop Analytics:  Objective QA in Contact Centers & Back Office
20 Minutes on Desktop Analytics: Objective QA in Contact Centers & Back Office
Cicero, Inc.
 
Overview of emandatory.com
Overview of emandatory.comOverview of emandatory.com
Raam risk analysis assessment and management
Raam risk analysis assessment and managementRaam risk analysis assessment and management
Raam risk analysis assessment and management
Terry Penney
 
What Is Enterprise Asset Management Software?
What Is Enterprise Asset Management Software?What Is Enterprise Asset Management Software?
What Is Enterprise Asset Management Software?
Stacey Kramer
 
Windows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring AdaptivaWindows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring Adaptiva
Flexera
 
ClockworkISMS
ClockworkISMSClockworkISMS
ClockworkISMS
Delaney
 
It change management
It change managementIt change management
It change management
IT-Toolkits.org
 
AMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramAMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management Program
Ivanti
 
Successful preparation for regulatory inspections of computerized systems in ...
Successful preparation for regulatory inspections of computerized systems in ...Successful preparation for regulatory inspections of computerized systems in ...
Successful preparation for regulatory inspections of computerized systems in ...
ARITHMOS
 

What's hot (12)

Pure Gold: Leveraging Software Usage Data to Reduce License Costs & Risk
Pure Gold: Leveraging Software Usage Data to Reduce License Costs & RiskPure Gold: Leveraging Software Usage Data to Reduce License Costs & Risk
Pure Gold: Leveraging Software Usage Data to Reduce License Costs & Risk
 
20 Minutes on Desktop Analytics: Objective QA in Contact Centers & Back Office
20 Minutes on Desktop Analytics:  Objective QA in Contact Centers & Back Office 20 Minutes on Desktop Analytics:  Objective QA in Contact Centers & Back Office
20 Minutes on Desktop Analytics: Objective QA in Contact Centers & Back Office
 
Overview of emandatory.com
Overview of emandatory.comOverview of emandatory.com
Overview of emandatory.com
 
Raam risk analysis assessment and management
Raam risk analysis assessment and managementRaam risk analysis assessment and management
Raam risk analysis assessment and management
 
Vmworld 2005-sln241
Vmworld 2005-sln241Vmworld 2005-sln241
Vmworld 2005-sln241
 
What Is Enterprise Asset Management Software?
What Is Enterprise Asset Management Software?What Is Enterprise Asset Management Software?
What Is Enterprise Asset Management Software?
 
Windows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring AdaptivaWindows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring Adaptiva
 
ClockworkISMS
ClockworkISMSClockworkISMS
ClockworkISMS
 
It change management
It change managementIt change management
It change management
 
AMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramAMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management Program
 
Successful preparation for regulatory inspections of computerized systems in ...
Successful preparation for regulatory inspections of computerized systems in ...Successful preparation for regulatory inspections of computerized systems in ...
Successful preparation for regulatory inspections of computerized systems in ...
 
3 mis-it system
3 mis-it system3 mis-it system
3 mis-it system
 

Viewers also liked

Always On - Zero Downtime releases
Always On - Zero Downtime releasesAlways On - Zero Downtime releases
Always On - Zero Downtime releases
Anders Lundsgård
 
Zero Downtime JEE Architectures
Zero Downtime JEE ArchitecturesZero Downtime JEE Architectures
Zero Downtime JEE Architectures
Alexander Penev
 
Conquistando seu espaço
Conquistando seu espaçoConquistando seu espaço
Conquistando seu espaço
Alexandre Pitta
 
Architecting for Continuous Delivery
Architecting for Continuous DeliveryArchitecting for Continuous Delivery
Architecting for Continuous DeliveryAxel Fontaine
 
A Gen Y versus Gen X conflict
A Gen Y versus Gen X conflictA Gen Y versus Gen X conflict
A Gen Y versus Gen X conflict
Peter Horsten
 
Generation Theory
Generation TheoryGeneration Theory
Generation X, Y or Z
Generation X, Y or ZGeneration X, Y or Z
Generation X, Y or Z
Peter Hill
 

Viewers also liked (7)

Always On - Zero Downtime releases
Always On - Zero Downtime releasesAlways On - Zero Downtime releases
Always On - Zero Downtime releases
 
Zero Downtime JEE Architectures
Zero Downtime JEE ArchitecturesZero Downtime JEE Architectures
Zero Downtime JEE Architectures
 
Conquistando seu espaço
Conquistando seu espaçoConquistando seu espaço
Conquistando seu espaço
 
Architecting for Continuous Delivery
Architecting for Continuous DeliveryArchitecting for Continuous Delivery
Architecting for Continuous Delivery
 
A Gen Y versus Gen X conflict
A Gen Y versus Gen X conflictA Gen Y versus Gen X conflict
A Gen Y versus Gen X conflict
 
Generation Theory
Generation TheoryGeneration Theory
Generation Theory
 
Generation X, Y or Z
Generation X, Y or ZGeneration X, Y or Z
Generation X, Y or Z
 

Similar to Downtime

Role Of OEE in Lean Manufacturing
Role Of OEE in Lean ManufacturingRole Of OEE in Lean Manufacturing
Role Of OEE in Lean Manufacturing
InfoStream Solutions
 
Keynote Tech Talks: Watching SaaS Apps with Keynote
Keynote Tech Talks: Watching SaaS Apps with KeynoteKeynote Tech Talks: Watching SaaS Apps with Keynote
Keynote Tech Talks: Watching SaaS Apps with Keynote
Keynote Mobile Testing
 
Layered Process Audits - The Compelling and Immediate ROI
Layered Process Audits - The Compelling and Immediate ROILayered Process Audits - The Compelling and Immediate ROI
Layered Process Audits - The Compelling and Immediate ROI
Ease Inc.
 
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...
Precisely
 
Why Integrating IBM Z into ServiceNow and Splunk Is So Important
Why Integrating IBM Z into ServiceNow and Splunk Is So ImportantWhy Integrating IBM Z into ServiceNow and Splunk Is So Important
Why Integrating IBM Z into ServiceNow and Splunk Is So Important
Precisely
 
Seminar on Software Testing
Seminar on Software TestingSeminar on Software Testing
Seminar on Software Testing
MD ISLAM
 
Great Lakes Oracle Conference (GLOC) Benefits of migrating to the Cloud- Me...
Great Lakes Oracle Conference (GLOC)  Benefits of migrating to the Cloud-  Me...Great Lakes Oracle Conference (GLOC)  Benefits of migrating to the Cloud-  Me...
Great Lakes Oracle Conference (GLOC) Benefits of migrating to the Cloud- Me...
ebreger
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff Stokes
Jeff Stokes
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
Hitachi ID Systems, Inc.
 
Dependable Systems - System Dependability Evaluation (8/16)
Dependable Systems - System Dependability Evaluation (8/16)Dependable Systems - System Dependability Evaluation (8/16)
Dependable Systems - System Dependability Evaluation (8/16)
Peter Tröger
 
PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)
PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)
PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)
Prashant Rasekar
 
Business Process Automation A Productivity Lever
Business Process Automation A Productivity LeverBusiness Process Automation A Productivity Lever
Business Process Automation A Productivity Lever
Knoldus Inc.
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden User
Jeff Stokes
 
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNowAvoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
Precisely
 
Eliminate Risks in SOA Implementation & Support
Eliminate Risks in SOA Implementation & SupportEliminate Risks in SOA Implementation & Support
Eliminate Risks in SOA Implementation & Support
SuneraTech
 
Document Management Options for Abila MIP
Document Management Options for Abila MIPDocument Management Options for Abila MIP
Document Management Options for Abila MIP
Net at Work
 
Adapting Scrum in an Organization with Tailored Processes
Adapting Scrum in an Organization with Tailored ProcessesAdapting Scrum in an Organization with Tailored Processes
Adapting Scrum in an Organization with Tailored Processes
Prabhat Sinha
 
Dev Dives: Mastering AI-powered Document Understanding
Dev Dives: Mastering AI-powered Document UnderstandingDev Dives: Mastering AI-powered Document Understanding
Dev Dives: Mastering AI-powered Document Understanding
UiPathCommunity
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
Precisely
 
A short introduction into HEAT Software for tracking customer service
A short introduction into HEAT Software for tracking customer serviceA short introduction into HEAT Software for tracking customer service
A short introduction into HEAT Software for tracking customer service
Tim Wilmot
 

Similar to Downtime (20)

Role Of OEE in Lean Manufacturing
Role Of OEE in Lean ManufacturingRole Of OEE in Lean Manufacturing
Role Of OEE in Lean Manufacturing
 
Keynote Tech Talks: Watching SaaS Apps with Keynote
Keynote Tech Talks: Watching SaaS Apps with KeynoteKeynote Tech Talks: Watching SaaS Apps with Keynote
Keynote Tech Talks: Watching SaaS Apps with Keynote
 
Layered Process Audits - The Compelling and Immediate ROI
Layered Process Audits - The Compelling and Immediate ROILayered Process Audits - The Compelling and Immediate ROI
Layered Process Audits - The Compelling and Immediate ROI
 
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...
 
Why Integrating IBM Z into ServiceNow and Splunk Is So Important
Why Integrating IBM Z into ServiceNow and Splunk Is So ImportantWhy Integrating IBM Z into ServiceNow and Splunk Is So Important
Why Integrating IBM Z into ServiceNow and Splunk Is So Important
 
Seminar on Software Testing
Seminar on Software TestingSeminar on Software Testing
Seminar on Software Testing
 
Great Lakes Oracle Conference (GLOC) Benefits of migrating to the Cloud- Me...
Great Lakes Oracle Conference (GLOC)  Benefits of migrating to the Cloud-  Me...Great Lakes Oracle Conference (GLOC)  Benefits of migrating to the Cloud-  Me...
Great Lakes Oracle Conference (GLOC) Benefits of migrating to the Cloud- Me...
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff Stokes
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Dependable Systems - System Dependability Evaluation (8/16)
Dependable Systems - System Dependability Evaluation (8/16)Dependable Systems - System Dependability Evaluation (8/16)
Dependable Systems - System Dependability Evaluation (8/16)
 
PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)
PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)
PFMEA, Risk Reduction and Effectiveness – Advance (AIAG FMEA #4 Edition)
 
Business Process Automation A Productivity Lever
Business Process Automation A Productivity LeverBusiness Process Automation A Productivity Lever
Business Process Automation A Productivity Lever
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden User
 
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNowAvoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
 
Eliminate Risks in SOA Implementation & Support
Eliminate Risks in SOA Implementation & SupportEliminate Risks in SOA Implementation & Support
Eliminate Risks in SOA Implementation & Support
 
Document Management Options for Abila MIP
Document Management Options for Abila MIPDocument Management Options for Abila MIP
Document Management Options for Abila MIP
 
Adapting Scrum in an Organization with Tailored Processes
Adapting Scrum in an Organization with Tailored ProcessesAdapting Scrum in an Organization with Tailored Processes
Adapting Scrum in an Organization with Tailored Processes
 
Dev Dives: Mastering AI-powered Document Understanding
Dev Dives: Mastering AI-powered Document UnderstandingDev Dives: Mastering AI-powered Document Understanding
Dev Dives: Mastering AI-powered Document Understanding
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 
A short introduction into HEAT Software for tracking customer service
A short introduction into HEAT Software for tracking customer serviceA short introduction into HEAT Software for tracking customer service
A short introduction into HEAT Software for tracking customer service
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Downtime

  • 2. Downtime: What it is…. • On computational environments, downtime is obvious to everybody (time of system down), but the most important thing to keep in mind is: • Downtime can lead to serious material and non-material damages • Downtime not only represents money lost, but trust, image of your brand, damages for your customers, etc
  • 3. Main Reasons for System Failures ! • Around 70% of all system failures can be attributed to software or user errors. This number is based on researches and published for example in the Oracle Backup and Recovery Handbook Others 5% Software Error 36% Phisical (HW Problems) 25% Operation (User Error) 34% Reference: libelle.com.cn
  • 4. Impacts and Consequences of System Downtime Visible Impacts! Invisible Impacts! ! • Lost Production Hours • Employee Dissatisfaction • Increased Costs • Lost Revenue • Security Issues • Bad Financial Performance • Lost Profits • Decreased Productivity • Liabilities and Risks • Press Attention • Dissatisfied Customers • Poor Communications • Time to Restore Normal Operation • Brand Erosion • Lower IT Department Reputation • Long-Term Loss of Customers
  • 5. Cost of Downtime Calc Example Reference: libelle.com.cn
  • 6. Think in High Availability • The availability and accessibility of data is one of the most costly investments of every organisation • The cost of downtime or data loss is usually vastly underestimated • Where there is a downtime incident, most of the affected departments are surprised by the actual consequences