Enterprise Backup and Recovery Considerations: How to Maintain Your Restore-Readiness

Enterprise Backup and Recovery Considerations: How to Maintain Your Restore-Readiness

Cover
IT systems are vulnerable to a variety of disruptions, ranging from mild (e.g., short-term power outage, disk drive failure) to severe (e.g., equipment destruction, fire) from a variety of sources such as natural disasters, employee errors, and internal or external sabotage. While much of this vulnerability may be minimized or eliminated through technical, management, or operational solutions as part of the organization's risk management effort, it is virtually impossible to completely eliminate all risks. These risks drive the need for reliable and efficient backup/restore systems. This paper will focus on common processes and procedures that should be part of any effective enterprise backup/restore system.

Author

Pete Stephens Senior Technical Consultant, Sirius Computer Solutions Pete Stephen has over 20 years of IT experience in a variety of design, development, implementation, management and consulting roles. Pete is an IBM Certified Infrastructure Systems Architect and has earned The Open Group Architecture Framework (TOGAF) Certification. He has strong IT architecture skills in: IT systems optimization and server consolidation, analyzing and defining IT standards and processes, and systems migration planning and execution. He currently performs delivery consulting for Power Systems/System p and IBM Middleware design and implementation, with AIX,TPC, DB2/UDB, TSM, HACMP, SAN and IBM DS4000, DS6000 and DS8000 storage.
Vendor:
Sirius Computer Solutions
Posted:
08 Jul 2009
Published:
26 Jun 2009
Format:
PDF
Length:
20 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy