sponsored by Alcatel-Lucent
Posted:  10 Jan 2008
Published:  01 Jan 2007
Format:  PDF
Length:  5  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:
Ensuring that business operations continue regardless of any circumstance is itself big business. Whether potential disruptions come as a result of natural disasters; sabotage (malware); technical failures in data storage or networking components; or service provider shortcomings, most organizations rely on their ICT infrastructure to ensure business continuity. However, there are some sectors of business and government where the loss of operational continuity doesn't just mean lost revenues or tarnished reputations: for some, it means lives and livelihoods placed in jeopardy.

Some sectors - such as energy, transportation, defense, government and certain areas within education, finance and healthcare - have an even sharper focus on the continuity of operations and business. In these environments, continuity is founded on not only service availability, but also on service performance, defined in terms of:

  • The ability to transport and protect synchronization of time-critical information.
  • The ability to protect and integrate a plethora of voice, data or service-critical interfaces.
  • The requirement to guarantee throughput, delay and variations in delay.
  • When networks fail, recovery times measured in microseconds, rather than hundreds of milliseconds or seconds.



Author

Jean Walravens
Director Business Development Business Access Solutions ,  Alcatel-Lucent



BROWSE RELATED RESOURCES
Business Continuity Planning | Disaster Recovery | IP Networks | QOS | ROI | TDM

View All Resources sponsored by Alcatel-Lucent

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement