Kayla Matthews

Here’s How AI Startups Are Doing in 2019

AI Startup Growth Now that artificial intelligence (AI) is part of the mainstream, companies are rapidly investigating what they can do to develop new AI technologies that will make society better and translate to substantial profits for their startups. These AI startups continually capture the
/
John Pientka

China Ascendant? Maybe, Maybe Not

China seems to be beating us at leadership in tech in just about every category. In a decade they are supposed to be the largest economy in the world. But is it all built on a foundation of sand? China and the US are in
/
Ed Dryer

Backups And Disaster Recovery Are Not The Same Thing

Backups And Disaster Recovery

Most business owners are aware of the consequences of losing data. Much of the value of a modern business is in its data: customer records, analytics, marketing data, product catalogs, bookkeeping and accounting data, emails and other communication data — the full list would consume several paragraphs. Serious data loss incidents cost businesses millions of dollars per year and some businesses don’t survive the loss.

The case for backups is clear. The chances of permanent data loss are significantly reduced if a business has secure, up-to-date, offsite backups. Backups are a necessary component of risk reduction, but backups aren’t the whole story. To be useful, data requires infrastructure.

What Is Disaster Recovery?

It is comforting to know that your business’s data is safely backed up when an incident takes resources offline, but without redundant infrastructure to run applications and services, business will grind to a halt until replacements can be found or repairs made. Depending on the size of your business, downtime may cost hundreds of thousands of dollars an hour.

Infrastructure service interruptions aren’t all that unusual. There were several major incidents last year in which large cloud providers suffered outages due to DDoS attacks, technical issues, and power blackouts. Businesses with critical infrastructure hosted on those services paid the price in lost revenue and customer dissatisfaction.

Disaster recovery complements a comprehensive backup process by ensuring that redundant infrastructure is available should the worst happen. A solid disaster recovery plan (and having a regular schedule to test it) will allow a business to quickly transfer workloads to redundant infrastructure with minimal disruption to operations.

A typical disaster recovery process looks like this: an outage at an infrastructure vendor causes servers running business critical applications to become unreachable. Redundant infrastructure in an unaffected location is quickly activated and failover systems automatically transfer load to those systems. With comprehensive file, database, and virtual machine backups, the redundant infrastructure can seamlessly take over and, from the perspective of an employee, nothing changes.

Disaster Recovery Planning

Effective disaster recovery requires risk assessment, planning and, testing. Business leaders must understand the infrastructure failure risks their business faces. They must plan for outages and infrastructure service interruptions. Redundant infrastructure should be ready to take over when disaster strikes. The whole system should be thoroughly tested in advance: it is a bad idea to wait until an incident to discover a shortcoming in the disaster recovery plan.

Disaster recovery planning is an ongoing process. As your business grows, its disaster recovery needs change. An out-of-date disaster recovery plan is about as useful as an old backup.

Do You Need A Disaster Recovery Plan

Most business owners understand the need for backups, but we come across far too many who think that a backup is all that’s needed to protect their business from disaster. Backups alone are effective in some data loss scenarios, but a significant proportion of data loss incidents are caused by infrastructure failures. Disaster recovery planning and data backups are the twin pillars of an effective business continuity strategy.

By Ed Dryer

Ed Dryer Contributor
Ed Dryer is a Senior Technology Strategist at Steadfast. With 22 years of experience in the technology world, Ed’s specialty is turning the ‘impossible’ into ‘the new standard’.  When he’s not building solutions for you and your clients, he spends his time geeking out over games of all types and teaching his three kids the difference between Star Wars and Star Trek.
Mark Casey Apcela

Industrial IoT will reshape network requirements

Industrial IoT The hype around IoT may have been surpassed this year by breathless coverage of topics such as artificial intelligence and cryptocurrencies, but there ...
Vibhav Agarwal

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as an afterthought. These include a ...
Understanding Data Governance - Don't Be Intimidated By It

Understanding Data Governance – Don’t Be Intimidated By It

Understanding Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose ...
The Guardian

Google, Facebook, Amazon and Apple asked to turn over internal documents

/
The US government’s investigations into big tech widened on Friday as lawmakers announced they were seeking internal documents from Google, Facebook, Amazon and Apple. Letters went out to the four ...
The Verge

Richard Stallman resigns from MIT over Epstein comments

/
Famed computer scientist Richard Stallman has resigned from his position at MIT over recent comments he made concerning Jeffrey Epstein’s victims. He has also resigned as president of the Free Software Foundation, an ...
BBC Tech

New Twitter algorithms aim to stamp out trolling

/
A new tool can identify Twitter accounts engaging in bullying with over 90% accuracy, according to researchers. Its algorithms classify two specific types of offensive online behaviour - cyber-bullying and ...

TRENDING | TECH NEWS