持续IT可用性和容灾计算组件:2007年IEEE国土安全技术会议:增强关键基础设施的可靠性

Chad M. Lawler, S. Szygenda
{"title":"持续IT可用性和容灾计算组件:2007年IEEE国土安全技术会议:增强关键基础设施的可靠性","authors":"Chad M. Lawler, S. Szygenda","doi":"10.1109/THS.2007.370028","DOIUrl":null,"url":null,"abstract":"This paper provides a review of the components of disaster tolerant computing and communications and reviews the current state in light of recent man-made terrorist events. The technology, process and human resource challenges of traditional disaster recovery approaches to disaster preparedness are outlined. The paper examines the relationships between disaster tolerant systems, Information Technology (IT) application availability and executive level management visibility necessary for successful system operations in the event of a catastrophic disaster. The risks of IT application downtime attributable to the increasing dependence on critical information technology applications and infrastructure are explored. Opportunities to extend complex systems independence analysis to the private business sector, and disaster tolerance are explored. A general approach for disaster tolerance is reviewed which mitigates unplanned downtime through a disciplined approach of IT infrastructure design based on redundancy and distributed components, with special attention given to the ability of executive level management to comprehend the value of uptime of an application and make appropriate capital investment.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Components of Continuous IT Availability & Disaster Tolerant Computing: 2007 IEEE Conference on Technologies for Homeland Security: Enhancing Critical Infrastructure Dependability\",\"authors\":\"Chad M. Lawler, S. Szygenda\",\"doi\":\"10.1109/THS.2007.370028\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper provides a review of the components of disaster tolerant computing and communications and reviews the current state in light of recent man-made terrorist events. The technology, process and human resource challenges of traditional disaster recovery approaches to disaster preparedness are outlined. The paper examines the relationships between disaster tolerant systems, Information Technology (IT) application availability and executive level management visibility necessary for successful system operations in the event of a catastrophic disaster. The risks of IT application downtime attributable to the increasing dependence on critical information technology applications and infrastructure are explored. Opportunities to extend complex systems independence analysis to the private business sector, and disaster tolerance are explored. A general approach for disaster tolerance is reviewed which mitigates unplanned downtime through a disciplined approach of IT infrastructure design based on redundancy and distributed components, with special attention given to the ability of executive level management to comprehend the value of uptime of an application and make appropriate capital investment.\",\"PeriodicalId\":428684,\"journal\":{\"name\":\"2007 IEEE Conference on Technologies for Homeland Security\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-05-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 IEEE Conference on Technologies for Homeland Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/THS.2007.370028\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE Conference on Technologies for Homeland Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/THS.2007.370028","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

本文回顾了容灾计算和通信的组成部分,并根据最近的人为恐怖事件回顾了目前的状态。概述了传统灾难恢复方法在备灾方面的技术、流程和人力资源挑战。本文研究了在灾难性灾难发生时,成功的系统操作所必需的容灾系统、信息技术(IT)应用程序可用性和执行层管理可见性之间的关系。由于对关键信息技术应用程序和基础设施的依赖日益增加,对IT应用程序停机的风险进行了探讨。将复杂系统独立分析扩展到私营企业部门的机会,以及对灾难的容忍。本文回顾了一种通用的容灾方法,该方法通过基于冗余和分布式组件的IT基础设施设计的规范方法减少了计划外停机时间,并特别关注执行层管理理解应用程序正常运行时间价值并进行适当资本投资的能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Components of Continuous IT Availability & Disaster Tolerant Computing: 2007 IEEE Conference on Technologies for Homeland Security: Enhancing Critical Infrastructure Dependability
This paper provides a review of the components of disaster tolerant computing and communications and reviews the current state in light of recent man-made terrorist events. The technology, process and human resource challenges of traditional disaster recovery approaches to disaster preparedness are outlined. The paper examines the relationships between disaster tolerant systems, Information Technology (IT) application availability and executive level management visibility necessary for successful system operations in the event of a catastrophic disaster. The risks of IT application downtime attributable to the increasing dependence on critical information technology applications and infrastructure are explored. Opportunities to extend complex systems independence analysis to the private business sector, and disaster tolerance are explored. A general approach for disaster tolerance is reviewed which mitigates unplanned downtime through a disciplined approach of IT infrastructure design based on redundancy and distributed components, with special attention given to the ability of executive level management to comprehend the value of uptime of an application and make appropriate capital investment.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信