{"title":"持续IT可用性和容灾计算组件:2007年IEEE国土安全技术会议:增强关键基础设施的可靠性","authors":"Chad M. Lawler, S. Szygenda","doi":"10.1109/THS.2007.370028","DOIUrl":null,"url":null,"abstract":"This paper provides a review of the components of disaster tolerant computing and communications and reviews the current state in light of recent man-made terrorist events. The technology, process and human resource challenges of traditional disaster recovery approaches to disaster preparedness are outlined. The paper examines the relationships between disaster tolerant systems, Information Technology (IT) application availability and executive level management visibility necessary for successful system operations in the event of a catastrophic disaster. The risks of IT application downtime attributable to the increasing dependence on critical information technology applications and infrastructure are explored. Opportunities to extend complex systems independence analysis to the private business sector, and disaster tolerance are explored. A general approach for disaster tolerance is reviewed which mitigates unplanned downtime through a disciplined approach of IT infrastructure design based on redundancy and distributed components, with special attention given to the ability of executive level management to comprehend the value of uptime of an application and make appropriate capital investment.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Components of Continuous IT Availability & Disaster Tolerant Computing: 2007 IEEE Conference on Technologies for Homeland Security: Enhancing Critical Infrastructure Dependability\",\"authors\":\"Chad M. Lawler, S. Szygenda\",\"doi\":\"10.1109/THS.2007.370028\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper provides a review of the components of disaster tolerant computing and communications and reviews the current state in light of recent man-made terrorist events. The technology, process and human resource challenges of traditional disaster recovery approaches to disaster preparedness are outlined. The paper examines the relationships between disaster tolerant systems, Information Technology (IT) application availability and executive level management visibility necessary for successful system operations in the event of a catastrophic disaster. The risks of IT application downtime attributable to the increasing dependence on critical information technology applications and infrastructure are explored. Opportunities to extend complex systems independence analysis to the private business sector, and disaster tolerance are explored. A general approach for disaster tolerance is reviewed which mitigates unplanned downtime through a disciplined approach of IT infrastructure design based on redundancy and distributed components, with special attention given to the ability of executive level management to comprehend the value of uptime of an application and make appropriate capital investment.\",\"PeriodicalId\":428684,\"journal\":{\"name\":\"2007 IEEE Conference on Technologies for Homeland Security\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-05-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 IEEE Conference on Technologies for Homeland Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/THS.2007.370028\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE Conference on Technologies for Homeland Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/THS.2007.370028","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Components of Continuous IT Availability & Disaster Tolerant Computing: 2007 IEEE Conference on Technologies for Homeland Security: Enhancing Critical Infrastructure Dependability
This paper provides a review of the components of disaster tolerant computing and communications and reviews the current state in light of recent man-made terrorist events. The technology, process and human resource challenges of traditional disaster recovery approaches to disaster preparedness are outlined. The paper examines the relationships between disaster tolerant systems, Information Technology (IT) application availability and executive level management visibility necessary for successful system operations in the event of a catastrophic disaster. The risks of IT application downtime attributable to the increasing dependence on critical information technology applications and infrastructure are explored. Opportunities to extend complex systems independence analysis to the private business sector, and disaster tolerance are explored. A general approach for disaster tolerance is reviewed which mitigates unplanned downtime through a disciplined approach of IT infrastructure design based on redundancy and distributed components, with special attention given to the ability of executive level management to comprehend the value of uptime of an application and make appropriate capital investment.