The Current Wave of Smart Home Technology

The Current Wave of Smart Home Technology

The Future of Smart Home Technology Some say the vision of smart homes kicked off with the invention of household machines in the early part of the 20th century, but the current wave of smart home technology was established in the beginning of this century
How the Economics of Data Science is Creating New Sources of Value

How the Economics of Data Science is Creating New Sources of Value

The Economics of Data Science There are several technology and business forces in-play that are going to derive and drive new sources of customer, product and operational value. As a set up for this blog on the Economic Value of Data Science, let’s review some of
disaster recovery plan

A Good Quality Disaster Recovery Plan Cannot Be Underestimated

Disaster Recovery Plan

Anyone who is a regular reader of this site will know about the cloud’s numerous benefits. Using the cloud can provide businesses with cost-effective resource usage, rapid provisioning, easy scalability and flexible elasticity – benefits that simply don’t exist when using local on-site servers and services.

One of the more overlooked benefits, however, is the changes it has brought to companies’ disaster recovery plans.

The importance of a good quality disaster recovery plan cannot be underestimated. We recently published an infographic in which we noted that “only 6% of businesses that experience downtime without a plan will survive long term” and “less than half of all businesses that experience a disaster are likely to reopen their doors”.

A recent survey by Quorum found a long list of reasons that could cause a disaster recovery plan to be activated. While respondent’s perceived reasons (34 percent thought natural disasters were the most likely reason, followed by human error at 25 percent, software error or maintenance at 22 percent and hardware failure at 20 percent) differed considerable from the reality (55 percent hardware failure, 22 percent human error, 18 percent software failure, and 5 percent natural disasters) – the truth is that all of the risks mentioned can pose a serious threat to a company’s mission-critical business tasks.

Before the widespread adoption of cloud computing, disaster recovery used to imply backing up to either tape or disk. There are clear drawbacks to this method; setting it up can be complex and it may be difficult to recover entire distributed, multi-tier, multi-site workloads. Furthermore, disks are not easily scalable, are not easily portable, and are not necessarily secure.

Thankfully, the cloud has revolutionised the industry. By using virtualisation the entire server– including the operating system, applications, patches and data – is encapsulated into a single software bundle or virtual server. This entire virtual server can be copied or backed up to an offsite data centre and launched on a virtual host in a matter of minutes. It means the cloud can offer faster recovery times and multi-site availability at a fraction of the cost of conventional disaster recovery.

Additionally, because virtual servers are hardware independent, data can be easily and quickly transferred between data centres without needing to reload each component of the server. This can further improve recovery times compared to traditional disaster recovery approaches in which servers need to be loaded with the correct operating system and application software before being patched to the last configuration used before any data can be restored.

There are also non-technical benefits to cloud-based disaster recovery. For example, businesses will be able to take advantage of the improved data protection that the cloud offers as well as benefitting from lower energy consumption thanks to the removal of large on-site server rooms.

By Daniel Price

Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

TOP ARCHIVES

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a ...
Real-time Communications - Voice, Messaging, Video or Collaboration

Real-time Communications – Voice, Messaging, Video or Collaboration

The Communications Cloud As more and more real-time communications – whether voice, messaging, video or collaboration – move to distributed software ...
Infosec thought leaders

Cryptocurrencies and Ransomware: How VDI Can Help Defend Against the Next Ransomware Attack

Cryptocurrencies and Ransomware The WannaCry ransomware made headlines back in May when it crippled hospitals across the UK and put ...
6 Best Practices For Increasing Security In AWS In A Zero Trust World

6 Best Practices For Increasing Security In AWS In A Zero Trust World

AWS Security Best Practices Enterprises are rapidly accelerating the pace at which they’re moving workloads to Amazon Web Services (AWS) ...
3 Steps to Better Security in the API Economy

3 Steps to Better Security in the API Economy

API Security Whenever you’re working online with the Internet, security is also a top concern. Any mistakes or lapse of ...

PARNTER LEARNING

$1,499.00Enroll Now

Cyber Security Expert Master's Program

Cyber Security Expert Master’s Program

The course will teach you: Advanced hacking concepts that can help you manage information security better. Architectures of frame cloud data storage and security strategies. You will learn how to use them to find and analyze risks. How to install, ...

$2,899.00Enroll Now

CEH (v10) – Certified Ethical Hacker Training Course

CEH (v10) – Certified Ethical Hacker Training Course

The course will help you: To understand the tactics and methodologies that hackers use to attack and penetrate any network. Understand honeypots, wireless hacking, firewall, and IDS. Become an expert in the hacking concepts, including smartphone hacking, writing virus codes, ...