Skip to content

Disaster Proofing Information Systems A Complete Methodology for Eliminating Single Points of Failure

Spend $50 to get a free movie!

ISBN-10: 007140922X

ISBN-13: 9780071409223

Edition: 2003

Authors: Robert W. Buchanan, Robert W. Buchanan

List price: $63.00
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Since the events in the USA during September 2001, disaster recovery has gone from being an annoyance to a key IT priority. Robert Buchanan presents a complete guide for IT departments on how to implement disaster recovery plans that will provide immediate returns on investment and preserve business continuity.
Customers also bought

Book details

List price: $63.00
Copyright year: 2003
Publisher: McGraw-Hill Education
Publication date: 12/17/2002
Binding: Paperback
Pages: 268
Size: 7.00" wide x 9.00" long x 0.75" tall
Weight: 1.034
Language: English

Robert W. Buchanan, Jr. is president and CEO of Shiloh Network Solutions (SNS), a start-up software company developing a new generation of proactive network analysis tools for clustered systems within the enterprise and Internet market. Prior to SNS, Mr. Buchanan was the managing partner in Shiloh Consulting, an independent network consulting company that provides network and e-business planning, management, and testing services to product manufacturers and Fortune 500 companies. He also served 4 years as Sr. Vice President, General manager, and COO at LANQuest Labs, a network consulting company and independent test lab. During his tenure there, he was responsible for the development of new…    

Foreword
Introduction
A SHARED Methodology for Disaster Avoidance across Enterprise, B2B, and B2C Systems
Avoidance Versus Recovery
What Is Disaster Recovery?
What Is Business Continuity?
What Is Disaster Avoidance?
How Daily Business Operations Benefit from Disaster Avoidance
Web Site Co-location
Intranet or Enterprise Workgroup Servers
Home Office
Mobile Wireless Access
Business Benefits
B2B and Business-to-Customer (B2C) Disaster Avoidance
Small Business Disaster Avoidance
Business Continuity Requirements
The SHARED Objective of Analyzing Business and System Needs
The Process of Analyzing Business-User-Customer Needs
Business Overview
Data Flow Dependencies
Technology Dependencies
Prioritizing Existing Operational Problems
Future Operational Requirements
Personnel and Facilities
Financial Considerations
B2B Requirements
Small Business Requirements
Developing a Disaster Avoidance Strategy
Disaster Avoidance Alternatives for Critical Systems
Hardware Platforms
Co-location
Hot/Warm Standby or Failover
Hot or Cold Restoration
Applications
Data Store
System Access
Infrastructure
Access Devices
Shared Information (Intranet and E-business)
Small Businesses
Disaster Avoidance Best Practices
Performance Improvements Through SHARED Disaster Avoidance
Availability as a Function of Disaster Avoidance
Capacity/Scalability Enhancements
Maintenance and Deployment Enhancements
Integrating Business Continuity and Disaster Avoidance Needs
Mating Business Requirements to Disaster Avoidance Alternatives
Prioritize Order
Map Requirements
Define Exact Requirements
End User and Facility Requirements
B2B Requirements
Financial Analysis
Example 2 - B2B Supply Chain Management
Analyzing Business-User-Customer Needs from Chapter 2
Mating Business Requirements to Disaster Avoidance Alternatives
Business Continuity and Disaster Avoidance--Added Cost
Deployment and Validation Is Critical to Success
Implementing the SHARED Architecture
Access Devices
Best Practices
Asset and Configuration Management
Data Synchronization and Recovery
Products and Procedures
Handhelds
Palm Handhelds
Windows CE Handhelds
Research in Motion (RIM) Blackberry--Integrated Wireless Products
XcelleNet Afaria Products
Desktops and Laptops
Platforms
Best Practices for Availability and Reliability
Platform Simplicity
Uninterrupted Power Supply (UPS)
Clustering
Co-location
Reduce Planned Downtime
Reduce Unplanned Downtime
Use Network Load Balancing (NLB)
Use Data Store Redundancy
Best Practices for Performance and Scalability
Best Practices for Management and Security
Products and Procedures
Microsoft Windows
Sun Solaris
IBM
Veritas
Applications
Best Practices
For Disaster Avoidance
For Operations and Development
Products and Procedures
Data Store
Critical Business Applications' Shared Data Store
Critical Remote Data Store Synchronization
Local Productivity Data Files
Data Sharing
File Replication
Best Practices
Databases
File Replication
Physical Data Storage
Products and Procedures
File Replication
Database Transaction Replication
SANs and Network Storage
Infrastructure
Infrastructure Requirements
Best Practices
Avoid Chatty Communication
Network Load Balancing (NLB)
High-Speed Data Links
ISPs for User Access
CO or Wire Centers
Products and Services
B2B, B2C, B2G, and Small Business Needs
Best Practices
Use Standards
Integrate the B2X Environment with Existing Back-End Systems
Isolate the B2B Environment from the Rest of the Systems for Security Purposes
Coordinate Disaster Avoidance and Recovery
Products and Procedures
Small Businesses
Validation and Testing
Life Cycle
Test Objectives
Testing and Systems Management
Methodology
System Versus Component Tests
Validating the Components
Validating the System
Validating B2X E-commerce
Test Preparation
Test Bed Setup
Tools
Load Models
Testing
Instrumentation
Loading
Measuring
Analyzing
Evolution
Index