SlideShare a Scribd company logo
What would happen if?

      Steven Conyers
      1-347-599-0737

sconyers@cmitsolutions.com
What If?
What if your computer crashes and you can’t access your
customer information?

What if you suddenly can’t access email?

What if your files become infected with a nasty virus?

What if you had a plan and support to take care of your
systems so you can focus on your business?
Disasters That Can (And Do) Happen
                                                                 Data Loss Statistics
                                                       Hardware – 44%
                                                        - Hard drive failure – most common
                                                        - Power surge from lightning storm
                                                       Human Error – 32%
                                                        - Accidental deletion of data
                                                        - Disgruntled employee / salesperson moving
                                                          to a new company
                                                        - Hardware theft/Data theft
                                                       Software – 14%
                                                        - Data corruption due to program crash
                                                        - Security patches causes software to stop
                                                          functioning correctly
                                                       Disaster – 3%
                                                        - Natural disasters –
                                                          fire, flood, earthquake, tornado
CMIT Solutions, Inc. – Proprietary and Confidential
True Cost Of Data Loss
     National Stats:
        • US businesses lose over $12 billion annually due to data
          loss! 1
        • It takes an average of 20 days and costs $18,000 to
          retype 20 megabytes of sales or accounting data 2
     Personal Reality:
              • Lost
                   orders, contacts, financials, calendars, emails, customers
1

2
                   and a lot of sleep!
    National Archives & Records, Washington D.C
    Source: 2001 Cost Of Downtime Survey Results
How Do Most Businesses Protect
      Their Data Today?
Common Backup Types
                 Type                                 Pros                          Cons

           Tape Drives                   • Handles Large Volumes        • Manual Interaction
                                         • ‘Relatively’ Inexpensive     • Need for multiple tapes
                                         • Complete Copy Possible       • 42% Fail -worst rate for
                                         (bare-metal restore)           recovery (source Microsoft)

        External Drives                  • Inexpensive                  • Small amounts of data
                                         • Good option for 1-3 person   • Data not verified
                                           office                       • File copy only (bare-metal
                                         • Little technical expertise     restore not possible)
                                           required                     • 7% failure rate (source
                                                                          Google)


CMIT Solutions, Inc. – Proprietary and Confidential
Common Backup Types (cont.)
                 Type                                 Pros                        Cons

         Offsite Backup                  • Great for retrieval of one  • Small amounts of data
                                           file at a time              • Days to retrieve
                                         • Relatively Inexpensive      • File copy only (bare-metal
                                         • Best for very small offices   restore not possible)
                                           and remote users

           NAS Device                    • Ability to backup large    • Investment in Hardware
                                           amounts of data            • Not all devices check data
                                         • Good success rate for        integrity
                                           restore                    • Technical expertise for
                                         • Complete Copy Possible       install & maintenance
                                           (bare-metal restore)

CMIT Solutions, Inc. – Proprietary and Confidential
Three Deadliest Data Mistakes

   1. Infrequent Backup (no onsite AND offsite)
   2. No Recovery Plan
   3. No Plan for Business Continuity

                 It’s not just about backing up,
         it’s about recovery and business continuity
CMIT Solutions, Inc. – Proprietary and Confidential
Three Questions You Need To Ask:
   1. How often do we back up and where?
   2. How will we recover the data if we need
      it?
   3. What’s our plan to keep the business
      running in the event of a data or systems
      loss?


CMIT Solutions, Inc. – Proprietary and Confidential
What You Need to Look For
      Continuous Backups
             As often as every 15 min, on-site and off-site

      Fast Recovery
             Plan to be up in running in less than 24 hours.

      Virtualization Capability
             You should be able to continue doing business, even
                 if your server is down




CMIT Solutions, Inc. – Proprietary and Confidential
Example of a complete system:
      Guardian




Onsite Network
Attached Storage
Device and Offsite
Redundant Backups
CMIT Solutions, Inc. – Proprietary and Confidential
What is Virtualization & Why You
   Might Need it?
Virtualization




CMIT Solutions, Inc. – Proprietary and Confidential
QUESTIONS?

      Steven Conyers
      1-347-599-0737

sconyers@cmitsolutions.com

More Related Content

What's hot

Barco CineCare Web
Barco CineCare WebBarco CineCare Web
Barco CineCare Web
Barco
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
CrystaLink Inc.
 
V Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedV Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii Edited
SHC
 
232 a7d01
232 a7d01232 a7d01
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
SHC
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
ChristoanSmit
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
SHC
 
Your New Workplace
Your New WorkplaceYour New Workplace
Your New Workplace
bpaternoster
 
smAlbany 2013 gn bdr pp
smAlbany 2013 gn bdr ppsmAlbany 2013 gn bdr pp
smAlbany 2013 gn bdr pp
Liberteks
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
mrmwood
 
L05 slides
L05 slidesL05 slides
L05 slides
Ann Bentley
 
L49 slides
L49 slidesL49 slides
L49 slides
sgibson28
 
Managed services
Managed servicesManaged services
Managed services
Norayr Eblighatian
 
Ldc
LdcLdc
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computers
FindWhitePapers
 
Desktop Services
Desktop ServicesDesktop Services
Desktop Services
CloudTechnology
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
Logicalis Australia
 
Intel® V Pro™ Technology
Intel® V Pro™ TechnologyIntel® V Pro™ Technology
Intel® V Pro™ Technology
SHC
 
CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1
Ian Sommerville
 

What's hot (19)

Barco CineCare Web
Barco CineCare WebBarco CineCare Web
Barco CineCare Web
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
 
V Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedV Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii Edited
 
232 a7d01
232 a7d01232 a7d01
232 a7d01
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
 
Your New Workplace
Your New WorkplaceYour New Workplace
Your New Workplace
 
smAlbany 2013 gn bdr pp
smAlbany 2013 gn bdr ppsmAlbany 2013 gn bdr pp
smAlbany 2013 gn bdr pp
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
 
L05 slides
L05 slidesL05 slides
L05 slides
 
L49 slides
L49 slidesL49 slides
L49 slides
 
Managed services
Managed servicesManaged services
Managed services
 
Ldc
LdcLdc
Ldc
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computers
 
Desktop Services
Desktop ServicesDesktop Services
Desktop Services
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
 
Intel® V Pro™ Technology
Intel® V Pro™ TechnologyIntel® V Pro™ Technology
Intel® V Pro™ Technology
 
CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1
 

Viewers also liked

Nóminas selectivos
Nóminas selectivosNóminas selectivos
Nóminas selectivos
Trova Ciudad de Medellín
 
Giving and Borrowing Things
Giving and Borrowing ThingsGiving and Borrowing Things
Giving and Borrowing Things
AgusDarmaPutra
 
Bedah skl biologi
Bedah skl biologiBedah skl biologi
Bedah skl biologi
Nining Mtsnkra
 
Aging and Financial Inclusion
Aging and Financial InclusionAging and Financial Inclusion
Aging and Financial Inclusion
AliMaryLiv
 
Upper and lower tract
Upper and lower tractUpper and lower tract
Upper and lower tract
perlaa7
 
Heart & blood, white cells 2
 Heart & blood, white cells 2 Heart & blood, white cells 2
Heart & blood, white cells 2
perlaa7
 
Male & female reproductve system
Male & female reproductve systemMale & female reproductve system
Male & female reproductve system
perlaa7
 
Kelangsungan hidup organisme++
Kelangsungan hidup organisme++Kelangsungan hidup organisme++
Kelangsungan hidup organisme++Nining Mtsnkra
 
Bab 5 bioteknologi 9i
Bab 5 bioteknologi 9iBab 5 bioteknologi 9i
Bab 5 bioteknologi 9i
Nining Mtsnkra
 
Bab 4 adaptasi mahluk hidup 9i
Bab 4 adaptasi mahluk hidup 9iBab 4 adaptasi mahluk hidup 9i
Bab 4 adaptasi mahluk hidup 9iNining Mtsnkra
 
Digestive system
Digestive systemDigestive system
Digestive system
perlaa7
 
Path of circulation arteries & veins
Path of circulation arteries & veinsPath of circulation arteries & veins
Path of circulation arteries & veins
perlaa7
 
Bab 4 kelangsungan hidup organisme 9j
Bab 4 kelangsungan hidup organisme 9jBab 4 kelangsungan hidup organisme 9j
Bab 4 kelangsungan hidup organisme 9jNining Mtsnkra
 
Mbsr
Mbsr Mbsr
Mbsr
qtyang
 
Cáncer de ovario
Cáncer de ovarioCáncer de ovario
Cáncer de ovario
Sabri Dom
 
Brand culture
Brand cultureBrand culture
IWB Presentation Assignment 4
IWB Presentation Assignment 4 IWB Presentation Assignment 4
IWB Presentation Assignment 4
fuzefotos
 

Viewers also liked (18)

Nóminas selectivos
Nóminas selectivosNóminas selectivos
Nóminas selectivos
 
Bab 6 kls 9i
Bab 6 kls 9iBab 6 kls 9i
Bab 6 kls 9i
 
Giving and Borrowing Things
Giving and Borrowing ThingsGiving and Borrowing Things
Giving and Borrowing Things
 
Bedah skl biologi
Bedah skl biologiBedah skl biologi
Bedah skl biologi
 
Aging and Financial Inclusion
Aging and Financial InclusionAging and Financial Inclusion
Aging and Financial Inclusion
 
Upper and lower tract
Upper and lower tractUpper and lower tract
Upper and lower tract
 
Heart & blood, white cells 2
 Heart & blood, white cells 2 Heart & blood, white cells 2
Heart & blood, white cells 2
 
Male & female reproductve system
Male & female reproductve systemMale & female reproductve system
Male & female reproductve system
 
Kelangsungan hidup organisme++
Kelangsungan hidup organisme++Kelangsungan hidup organisme++
Kelangsungan hidup organisme++
 
Bab 5 bioteknologi 9i
Bab 5 bioteknologi 9iBab 5 bioteknologi 9i
Bab 5 bioteknologi 9i
 
Bab 4 adaptasi mahluk hidup 9i
Bab 4 adaptasi mahluk hidup 9iBab 4 adaptasi mahluk hidup 9i
Bab 4 adaptasi mahluk hidup 9i
 
Digestive system
Digestive systemDigestive system
Digestive system
 
Path of circulation arteries & veins
Path of circulation arteries & veinsPath of circulation arteries & veins
Path of circulation arteries & veins
 
Bab 4 kelangsungan hidup organisme 9j
Bab 4 kelangsungan hidup organisme 9jBab 4 kelangsungan hidup organisme 9j
Bab 4 kelangsungan hidup organisme 9j
 
Mbsr
Mbsr Mbsr
Mbsr
 
Cáncer de ovario
Cáncer de ovarioCáncer de ovario
Cáncer de ovario
 
Brand culture
Brand cultureBrand culture
Brand culture
 
IWB Presentation Assignment 4
IWB Presentation Assignment 4 IWB Presentation Assignment 4
IWB Presentation Assignment 4
 

Similar to What if

Gary managed services_naples (2)
Gary managed services_naples (2)Gary managed services_naples (2)
Gary managed services_naples (2)
Gary Fincher
 
Skadoit Brochure
Skadoit BrochureSkadoit Brochure
Skadoit Brochure
tomrufe
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planning
AureusIT
 
Business-Critical Backup: Preparing for a Disaster
Business-Critical Backup: Preparing for a DisasterBusiness-Critical Backup: Preparing for a Disaster
Business-Critical Backup: Preparing for a Disaster
NetWize
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211
hdmchughgmailcom
 
Business Disaster Recovery by Clients First
Business Disaster Recovery by Clients FirstBusiness Disaster Recovery by Clients First
Business Disaster Recovery by Clients First
Clients First Business Solutions
 
Gary managed services_naples (2)
Gary managed services_naples (2)Gary managed services_naples (2)
Gary managed services_naples (2)
Gary Fincher
 
Data Virtualization: revolutionizing database cloning
Data Virtualization: revolutionizing database cloningData Virtualization: revolutionizing database cloning
Data Virtualization: revolutionizing database cloning
Kyle Hailey
 
End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slide
Laura Breese
 
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Storage Switzerland
 
Learn About Disaster Recovery Services
Learn About Disaster Recovery ServicesLearn About Disaster Recovery Services
Learn About Disaster Recovery Services
Bradley Smith
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
Agora Group
 
RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"
efrid630
 
Mis05
Mis05Mis05
Mis05
Lee Gomez
 
A Buyer\'s Guide - What to look for in online backup and recovery services - ...
A Buyer\'s Guide - What to look for in online backup and recovery services - ...A Buyer\'s Guide - What to look for in online backup and recovery services - ...
A Buyer\'s Guide - What to look for in online backup and recovery services - ...
jatabq
 
03 2010 Online Buyer 101 Webinar
03 2010 Online Buyer 101 Webinar03 2010 Online Buyer 101 Webinar
03 2010 Online Buyer 101 Webinar
Bob Chaput
 
Chap11
Chap11Chap11
Chap11
Aman Sharma
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
Haa'Meem Mohiyuddin
 
Chap11
Chap11Chap11
Chap11
nitin_009
 
Storing Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesStoring Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance Challenges
Tony Pearson
 

Similar to What if (20)

Gary managed services_naples (2)
Gary managed services_naples (2)Gary managed services_naples (2)
Gary managed services_naples (2)
 
Skadoit Brochure
Skadoit BrochureSkadoit Brochure
Skadoit Brochure
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planning
 
Business-Critical Backup: Preparing for a Disaster
Business-Critical Backup: Preparing for a DisasterBusiness-Critical Backup: Preparing for a Disaster
Business-Critical Backup: Preparing for a Disaster
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211
 
Business Disaster Recovery by Clients First
Business Disaster Recovery by Clients FirstBusiness Disaster Recovery by Clients First
Business Disaster Recovery by Clients First
 
Gary managed services_naples (2)
Gary managed services_naples (2)Gary managed services_naples (2)
Gary managed services_naples (2)
 
Data Virtualization: revolutionizing database cloning
Data Virtualization: revolutionizing database cloningData Virtualization: revolutionizing database cloning
Data Virtualization: revolutionizing database cloning
 
End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slide
 
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
 
Learn About Disaster Recovery Services
Learn About Disaster Recovery ServicesLearn About Disaster Recovery Services
Learn About Disaster Recovery Services
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
 
RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"
 
Mis05
Mis05Mis05
Mis05
 
A Buyer\'s Guide - What to look for in online backup and recovery services - ...
A Buyer\'s Guide - What to look for in online backup and recovery services - ...A Buyer\'s Guide - What to look for in online backup and recovery services - ...
A Buyer\'s Guide - What to look for in online backup and recovery services - ...
 
03 2010 Online Buyer 101 Webinar
03 2010 Online Buyer 101 Webinar03 2010 Online Buyer 101 Webinar
03 2010 Online Buyer 101 Webinar
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Storing Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesStoring Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance Challenges
 

Recently uploaded

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

What if

  • 1. What would happen if? Steven Conyers 1-347-599-0737 sconyers@cmitsolutions.com
  • 2. What If? What if your computer crashes and you can’t access your customer information? What if you suddenly can’t access email? What if your files become infected with a nasty virus? What if you had a plan and support to take care of your systems so you can focus on your business?
  • 3. Disasters That Can (And Do) Happen Data Loss Statistics  Hardware – 44% - Hard drive failure – most common - Power surge from lightning storm  Human Error – 32% - Accidental deletion of data - Disgruntled employee / salesperson moving to a new company - Hardware theft/Data theft  Software – 14% - Data corruption due to program crash - Security patches causes software to stop functioning correctly  Disaster – 3% - Natural disasters – fire, flood, earthquake, tornado CMIT Solutions, Inc. – Proprietary and Confidential
  • 4. True Cost Of Data Loss National Stats: • US businesses lose over $12 billion annually due to data loss! 1 • It takes an average of 20 days and costs $18,000 to retype 20 megabytes of sales or accounting data 2 Personal Reality: • Lost orders, contacts, financials, calendars, emails, customers 1 2 and a lot of sleep! National Archives & Records, Washington D.C Source: 2001 Cost Of Downtime Survey Results
  • 5. How Do Most Businesses Protect Their Data Today?
  • 6. Common Backup Types Type Pros Cons Tape Drives • Handles Large Volumes • Manual Interaction • ‘Relatively’ Inexpensive • Need for multiple tapes • Complete Copy Possible • 42% Fail -worst rate for (bare-metal restore) recovery (source Microsoft) External Drives • Inexpensive • Small amounts of data • Good option for 1-3 person • Data not verified office • File copy only (bare-metal • Little technical expertise restore not possible) required • 7% failure rate (source Google) CMIT Solutions, Inc. – Proprietary and Confidential
  • 7. Common Backup Types (cont.) Type Pros Cons Offsite Backup • Great for retrieval of one • Small amounts of data file at a time • Days to retrieve • Relatively Inexpensive • File copy only (bare-metal • Best for very small offices restore not possible) and remote users NAS Device • Ability to backup large • Investment in Hardware amounts of data • Not all devices check data • Good success rate for integrity restore • Technical expertise for • Complete Copy Possible install & maintenance (bare-metal restore) CMIT Solutions, Inc. – Proprietary and Confidential
  • 8. Three Deadliest Data Mistakes 1. Infrequent Backup (no onsite AND offsite) 2. No Recovery Plan 3. No Plan for Business Continuity It’s not just about backing up, it’s about recovery and business continuity CMIT Solutions, Inc. – Proprietary and Confidential
  • 9. Three Questions You Need To Ask: 1. How often do we back up and where? 2. How will we recover the data if we need it? 3. What’s our plan to keep the business running in the event of a data or systems loss? CMIT Solutions, Inc. – Proprietary and Confidential
  • 10. What You Need to Look For  Continuous Backups  As often as every 15 min, on-site and off-site  Fast Recovery  Plan to be up in running in less than 24 hours.  Virtualization Capability  You should be able to continue doing business, even if your server is down CMIT Solutions, Inc. – Proprietary and Confidential
  • 11. Example of a complete system: Guardian Onsite Network Attached Storage Device and Offsite Redundant Backups CMIT Solutions, Inc. – Proprietary and Confidential
  • 12. What is Virtualization & Why You Might Need it? Virtualization CMIT Solutions, Inc. – Proprietary and Confidential
  • 13. QUESTIONS? Steven Conyers 1-347-599-0737 sconyers@cmitsolutions.com

Editor's Notes

  1. Insert story # 2 here - a business that couldn’t run, they couldn’t get to their data, and owner whose life was a mess, The personal reality story about how someone’s life went off course at every level, they couldn’t run their business, they lost all their contacts etc, try to make it clear how it affected their personal life
  2. As you can see from this graphic, the “obvious” disasters that you normally would think about really are only a small percentage of the real disasters out there!
  3. Insert story # 2 here - a business that couldn’t run, they couldn’t get to their data, and owner whose life was a mess, The personal reality story about how someone’s life went off course at every level, they couldn’t run their business, they lost all their contacts etc, try to make it clear how it affected their personal life
  4. Tape DrivesPros:Can backup large amounts of dataHardware & Software is ‘relatively’ inexpensiveBackup process is automated with higher end systemsBare-metal restore may be possible with additional softwareCons:Manual interaction – user has to rotate tapesTechnical expertise required for install & maintenanceOne tape may not backup entire server as data grows/replace tapes regularlyVerifications frequently fail/ Worst success rate for recoveryCDs, DVDs , Basic External Drives & Thumb DrivesPros:InexpensiveLittle technical expertise requiredReasonable success rate for recovery of single data filesGood option for 1 – 3 person officeCons:Manual/Can only backup small amounts of dataData is not verified when backed upBare-Metal restore not practical / possibleMost people email won’t even fit on a CDBackup can take up to ½ hour, no one wants to wait another ½ hour at the end of the day
  5. Offsite Backup of Critical DataNormally just data not software takes days to retrieve - Example quick books, you don’t have anything until you get quick books back on computer, disk liscense number, etc. Pros:Relatively inexpensiveGreat for retrieval of one file at a timeBest for home users or very small officesCons:Not realistic for large amts of dataCould take days/weeks to retrieve/restore data Must install OS and software first before restoring data.Not appropriate for complex databases Network Attached Storage DeviceYou have someone to maintain it, 1,000 or more, and if something happened to it, still not protected, sprinkler system drowns it. Pros:No human interaction requiredCan backup very large amounts of dataBare-metal restore possibleGood success rate for restoreCons:Expensive investment in hardwareTechnical expertise required for install & maintenanceMay not have off-site capabilities or may take a long time for retreivalNot all devices have ability to check data integrityFor Nas Devices - Actually becomes cheaper than tape for very large amounts of data ( > 400 GB ).Downside is that this is purely a local solution and very difficult to store data offsite. One option is to combine the NAS with an Offsite backup solution.
  6. Won’t spend a ton of time, but this will show you the kind of system you need to get in place even if you don’t use us. Things that you need to look for People processes and hardware Actually becomes cheaper than tape for very large amounts of data ( > 400 GB )
  7. Example shown is an Exchange server with email has “gone down” The onsite NAS device can be “virtualized” to take over the duties of the failed server until it can be repaired or replaced. Something you should be asking yourself – How much would it cost my business to be without my server for (1) hours (2) days (3) weeks? How much value would you place on a product that could prevent downtime – and “keep your environment running” while repairs were made? A recent client’s server went down. . .a CPA firm,--- in the middle of tax season. Within 15 minutes, CMIT was able to virutalize the server and the firm continued working while the server was repaired. (Took a day to get a replacement hard drive for the server) Needless to say, the CPA firm was more than thrilled with their decision to go with Guardian.Three servers, nas device backing up all three, the server with email is down, but the nas device simply takes over the duties of the server, while we fix the server, it takes a few minutes to virtualize it, this is revolutionary because in the past only large businesses, like chase bank, meryl lynch, people with more than 250 companies had this, it’s revolutionary, and affordable. The bigger on right represents, the nas in the middle, we can tell it remotely to take over the duties of the server, we are already doing it and companies are just amazed, No smal business had the ability to have double coverage before, on site, off site and capabilility to virtualize f something happen, Work in guardian name