Cloud Sites In The Eye Of Super Storm Sandy Hanging By A Moment

Cloud Sites in the eye of Super Storm Sandy Hanging by a Moment

Super storm Sandy is the old man of the sea wrecking havoc everywhere, from data centers to homes. However, it seems like the American spirit is not yet doused by the news as disaster recovery is underway. According to Fox News, a woman told the New York governor that she had lost all her effects and even then, those around were reiterating to return and start from scratch. Echoing these views were site managers and colocation service providers, who as it is now, are hanging by a moment trying to generate power, in-house, after electricity went off the grid.

Some of the disaster recovery efforts center entirely on the sites that had no cloud backup for their operations. The biggest search engine in the world, Google, is now offering rations in the sector for all those who want to use its cloud service without any charges for provisioning, as for now. Some sites like Huffington Post had their basements full to the neck, in 5ft of deluge that visited their NYC facilities yesterday.

The real picture of the cloud as a remote backup place for files and documents is getting clearer now in the wake of Sandy.

According to a marketing agent with a software company, it were time entrepreneurs came to know that data is not in the machines that are easy to go away with the water, but the backup that is in store faraway in some cloud.

Even as disaster recovery comes into the context, there have been evacuation efforts in datacenters that foresaw the effect. Here are some of the cloud providers who sent alarms to their clients before the storm:

October 29: The Sandy Map from Google came out providing data providers and sites with a way to know the progress and routes of the hurricane using visual accounts, news and mapping details.

October 30: Just one day before Super Storm Sandy reached its full strength, Nirvanix asked its clients to remove their information racks from its New Jersey facility that was in the path of the storm.

October 30: SiSense, an Israeli start-up unveiled its new analytical infrastructure product that can evaluate the best place to keep data machines, far away from weather catastrophes. Though it is not a guarantee that accidents like fire won’t happen, such a product can help to tell exactly what may happen in an area depending on meteorological intelligence.

Even as more than 55 people-the actual figure varies-lost their lives to the storm in the United States, recovery efforts are still going on. Some of these are quite helpful to cloud computing providers including that by Gartner, the tech research firm. The site is providing a range of news that can help people analyze how to handle the aftermath of Sandy. Writers are tackling issues, ranging from business hazards to lack of electric current.

It is easy to say that the apocalyptic effects of Hurricane Sandy, both upon landfall early Tuesday and before that on the major Internet undersea cables have taught a lesson to data providers. They will no longer stand and stare while waters surge into their very basements, unstoppably, like a pistol shot.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…